Re: [Rats] Entity vs. role

"Smith, Ned" <ned.smith@intel.com> Wed, 30 March 2022 17:23 UTC

Return-Path: <ned.smith@intel.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79FD73A15FF for <rats@ietfa.amsl.com>; Wed, 30 Mar 2022 10:23:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=intel.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WJWqNUFBw6ns for <rats@ietfa.amsl.com>; Wed, 30 Mar 2022 10:23:39 -0700 (PDT)
Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E88723A15F4 for <rats@ietf.org>; Wed, 30 Mar 2022 10:23:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1648661018; x=1680197018; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=JdosB2k7Drkk8HBQJ3xbUJY0n7byisLh9/TYzDof1Ok=; b=JfjC7gWxfl9jdmRRh2oZpQmiM0cJpjnYLyy7z3mZbdkQ57q7JneHSGgp 36it1qjnuj1Vxfoez7EKZmYhhnqsPjOT6/bLG3g5trNvWByXy1NqtqpEE /QjtCoPS7gZ42imYg4N4KGN+dFUNTBnw8fgFmcCdz9QZgBXy9i2FH1eyz kjfAFjuDvU6ux4ZLfDdopJ3kNivn13nfcFvjw59a/pc1sOaePGNUzA+9w nHCvHGB/iwwRtOHG473YQDzVKEBrgRRn4r3Gs+xpnFBSTEIZTjZmUs1ZB IJMXqdG7qYJHYqwh1SeMPR29k5zJK2E3NNys7N/5x6ao6gFAdMeaI4o5W w==;
X-IronPort-AV: E=McAfee;i="6200,9189,10302"; a="284510242"
X-IronPort-AV: E=Sophos;i="5.90,223,1643702400"; d="scan'208,217";a="284510242"
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Mar 2022 10:23:37 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,223,1643702400"; d="scan'208,217";a="586078689"
Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga001.jf.intel.com with ESMTP; 30 Mar 2022 10:23:37 -0700
Received: from orsmsx604.amr.corp.intel.com (10.22.229.17) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Wed, 30 Mar 2022 10:23:37 -0700
Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx604.amr.corp.intel.com (10.22.229.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27 via Frontend Transport; Wed, 30 Mar 2022 10:23:37 -0700
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.170) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.21; Wed, 30 Mar 2022 10:23:36 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=S/lwm1DGKVNpdg37cD+6AicBMBqSKQ/2UU9u3bJmtjf3ZGfcq20s8mkV6DXakGUylK2g7fPgT45+GNE+JdVfvxEsT20N9Axw8E1QdGmtHFuYh8eonWTvgrl+W3CP8EVaCQ8cFbYNxOUO++3rpUqy1xWys2s9p48IIFiT97YM1N+GmdFtoC1epfpg3PXn9Y0ERb0oyEdGoF/OidbiTTbegW3zs4OnPxcq7ycuJuAbxkaUwrFKcIEIUEdagDS6M7WrOXQEJsi2OQURFfFgcBDGjH8H9LMwF3qz0f0uezMije5iFTWY2KNehQmBTOByHVQVssmpJhbWOghzoeDbYxQt/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JdosB2k7Drkk8HBQJ3xbUJY0n7byisLh9/TYzDof1Ok=; b=JopZxAjKhjHM03dlqsplGhuAznB1OsXsafFL1MiE6bi2okwY/AzKWdAD6abLImcUgLgbB2fwL9s3NzRpeB3pOZx0K8uWH7Wv5S6PMhLJ6p2r6GjJho2gEtVabkxQwzVNZ6UJzDwqyIhmf6Uupuy5MpgzcPxMexgbZ32JFUCyw4N4lrz+JYYbv7jjpFX5k/AOmkRP9YN+krXEM+R8dZCtwXUkoJYNEQcUzSmpsBS2D4XVl6uzYDGqRwSwF99cDHQPvm4wtVhXC+vPlhbWWBMJyJ7Af3PiHhr1KZ+vAcR7Sm18YIP8pV5U0qw8yzYLNL9PoNXQUVVLvTysGEw9SgN5kw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
Received: from CO1PR11MB5169.namprd11.prod.outlook.com (2603:10b6:303:95::19) by DM6PR11MB3164.namprd11.prod.outlook.com (2603:10b6:5:58::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Wed, 30 Mar 2022 17:23:32 +0000
Received: from CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::dd51:af51:4b2a:a207]) by CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::dd51:af51:4b2a:a207%4]) with mapi id 15.20.5123.020; Wed, 30 Mar 2022 17:23:31 +0000
From: "Smith, Ned" <ned.smith@intel.com>
To: "Panwei (William)" <william.panwei@huawei.com>, "Eric Voit (evoit)" <evoit@cisco.com>, Laurence Lundblade <lgl@island-resort.com>
CC: "rats@ietf.org" <rats@ietf.org>, Thomas Fossati <tho.ietf@gmail.com>
Thread-Topic: [Rats] Entity vs. role
Thread-Index: AQHYPe6PgQWbu8zDYE+F8zzrq4lIsazLg0QAgAA6DYCAABj+AIAABWwAgAASg4CAAK6tgIAAUWwAgAFuMYCAAB7wgIAACIuAgAABcYCAAGNLAIAG4UmAgABd2ACAATRfAIAAaE0A
Date: Wed, 30 Mar 2022 17:23:31 +0000
Message-ID: <5DB590E0-962D-4EDB-AB49-4EA293F5EA0C@intel.com>
References: <3407CFB9-B713-4E13-BDA3-08EC7B5A905E@intel.com> <CAObGJnOxU0vfxzzZ9tv1J64KHDigxLcEMrgx0gDy97bE7NQJcA@mail.gmail.com> <E20F61DD-8775-4E68-8E56-E6EC92682A18@island-resort.com> <CAObGJnOv8ePE=R6vvdg5uib3Y9=WS8A5vcOdpWY0sREXA98aPQ@mail.gmail.com> <2BC14C43-80D0-4611-BEA0-9D9B9948BE0C@island-resort.com> <BYAPR11MB31255F64BDB773DB93A0C6CCA1179@BYAPR11MB3125.namprd11.prod.outlook.com> <9BFD1E45-569D-4E2F-BCD7-5DA6FF5A1BDF@island-resort.com> <SN6PR11MB3135EBAF7783D637C7BBA04AA1189@SN6PR11MB3135.namprd11.prod.outlook.com> <70179B54-6E99-4AD0-B28D-00284AA6BC86@island-resort.com> <86F9EC57-C752-407A-8E8E-C3C2C3A97F8A@intel.com> <716BA0A9-0EDE-425E-BE17-A072AF04832E@island-resort.com> <SN6PR11MB313507647DEB776A425ED124A1199@SN6PR11MB3135.namprd11.prod.outlook.com> <4A131D6A-F012-4B71-B5F7-A7129414D7E6@intel.com> <d203b82c5e2b4422b23aebec0d9f64f2@huawei.com> <4D346B42-70D4-4426-8036-B01B419316BA@intel.com> <2623a76b783b473e94d47457c764beaa@huawei.com>
In-Reply-To: <2623a76b783b473e94d47457c764beaa@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.59.22031300
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b629de4b-c129-4966-09aa-08da12720371
x-ms-traffictypediagnostic: DM6PR11MB3164:EE_
x-microsoft-antispam-prvs: <DM6PR11MB316429DFCBCFF725F15493B2E51F9@DM6PR11MB3164.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB5169.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(110136005)(66556008)(4326008)(6486002)(30864003)(54906003)(64756008)(316002)(186003)(8936002)(2906002)(8676002)(66476007)(53546011)(6506007)(26005)(76116006)(83380400001)(66946007)(71200400001)(82960400001)(66446008)(2616005)(33656002)(38070700005)(36756003)(5660300002)(38100700002)(122000001)(86362001)(6512007)(508600001)(45980500001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_5DB590E0962D4EDBAB494EA293F5EA0Cintelcom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB5169.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b629de4b-c129-4966-09aa-08da12720371
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Mar 2022 17:23:31.8720 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XHEF0ykZNBg5SX2G3yxgenAbZnb8bKFX9LX1vW6CJHsExewqabfoqOLxgOqyPeeE69R0XWJQl9edHvsxgY6U4w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB3164
X-OriginatorOrg: intel.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/7h0JR2KG_QrffAPNVSX3AV5RYcI>
Subject: Re: [Rats] Entity vs. role
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2022 17:23:45 -0000

See inline below

From: "Panwei (William)" <william.panwei@huawei.com>
Date: Tuesday, March 29, 2022 at 9:10 PM
To: "Smith, Ned" <ned.smith@intel.com>, "Eric Voit (evoit)" <evoit@cisco.com>, Laurence Lundblade <lgl@island-resort.com>
Cc: "rats@ietf.org" <rats@ietf.org>, Thomas Fossati <tho.ietf@gmail.com>
Subject: RE: [Rats] Entity vs. role

Hi Ned,

According to the definition of Attester: Attester is a role performed by an entity, Attester generates Evidence which is appraised to infer the trustworthiness of this **Attester**. And in the Evidence are the claims about the attributes of the Target Env and the Evidence is signed by the Attesting Env, so inferring the trustworthiness of the Attester is inferring the trustworthiness of the Attesting Env and the Target Env, so the Attester includes both the Attesting Env and the Target Env.
From the perspective of actions, it is true that an Attester mainly has the two actions (a) and (b). But action (a) involves Attesting Env and Target Env at the same time, because the claims are the attributes about the Target Env, and this action happens within the Attester. So, again, my understanding is that the Attesting Env and Target Env are both included in the Attester.

>But when you say “The Attesting Env implements the Attester role”, it gives me the feeling that Attester collects claims from the Target Env,
>which makes the Target Env become a role at the same level as Attester, Verifier, and Relying Party. So, this is how I’m confused.
[nms] I think it makes sense to qualify use of “Attester” in terms of an entity vs. role. Since the Arch draft defined upper case Attester as a role, one might reasonably infer lower case attester refers to an entity. That may be too subtle hence more pedantic qualification is helpful such as “the attester as an entity” etc…
In my remarks, Target Env always refers to an entity (i.e., a component of the attester entity). Attester Env always refers to a component of the attester entity that implements at least a portion of the Attester role functionality. A combination of Attester Environments may cooperate to implement all of the Attester role functions. I also regard the root of trust functionality to be an Attesting Environment.

I don’t think it is reasonable to assert that a Target Env implements Attester role functionality unless there is an Attesting Env that is a sub-component of the Target Env. This is illustrated in the layered attester example. The composite-device example shows a case where Target Environments don’t have embedded Attesting Environments and in these cases the TEs don’t implement Attester role functions. Hence, it’s reasonable to conclude they don’t need to be considered part of the Attester role. They however are part of the attester entity.

Maybe if you can come up with a set of functionality that the Target Env performs that aligns with the duties of the Attester role, you can convince yourself that it is/isn’t a role?

From the perspective of claims collection, the TE is passive it shouldn’t have the ability to lie to the Attesting Env about it’s claims. A common case where a TE may be perceived as not passive is if the TE is a uController (uC-A) accessed over a bus interface and the Attesting Env is a different uController (uC-B) on the same bus. Since the TE has its own thread of execution and the AE relies on the bus for conveyance of collected claims, the AE is at risk of being lied to by the TE (as well as by a MITM on the bus – but that is a different issue).

A better way to approach this scenario is for uC-A to be considered a distinct root-of-trust (a.k.a. an AE) that applies the layered device pattern. Then uC-B might be used as a “lead” Attester to relay uC-A’s Evidence to a Verifier. uC-A and uC-B are essentially peer nodes rather than a system of AE and TE.

Regards & Thanks!
Wei Pan (潘伟)

From: RATS [mailto:rats-bounces@ietf.org] On Behalf Of Smith, Ned
Sent: Wednesday, March 30, 2022 12:47 AM
To: Panwei (William) <william.panwei@huawei.com>; Eric Voit (evoit) <evoit@cisco.com>; Laurence Lundblade <lgl@island-resort.com>
Cc: rats@ietf.org; Thomas Fossati <tho.ietf@gmail.com>
Subject: Re: [Rats] Entity vs. role

If the capabilities or actions that an Attester performs includes (a) collection of claims and (b) creation of evidence which generally implies signing of collected claims. Then a Target Environment doesn’t do either (a) or (b). Target Env appears to be a passive component of the Attester (entity) rather than something that implements the Attester role within the Attester (entity).

It may be reasonably inferred that (b) could include (c) storage of keys / claims or (d) incorporation of freshness and recentness values.

The layering example suggests that if an Attesting Env is included in a Target Env, the target Attesting Env is passive and relies on the outer Attesting Env until evidence is created before the target (passive) Attesting Env becomes active. Hence, it is correct to refer to it as the Target Env until its trustworthiness details have been processed by the outer Attesting Env.

The system of Target and Attesting Environments are abstract terminology for ways to deconstruct / compose the Attester entity.

The RATS Arch is both an introduction to attestation concepts (and hence needs to use prose that is consumable by uninitiated readers; and a framework for more formal representation of the parameters and capabilities for assessing trustworthiness. It’s difficult to achieve both objectives in a short document. I think it does a pretty good job of that, but it isn’t perfect.

From: "Panwei (William)" <william.panwei@huawei.com<mailto:william.panwei@huawei.com>>
Date: Monday, March 28, 2022 at 9:10 PM
To: "Smith, Ned" <ned.smith@intel.com<mailto:ned.smith@intel.com>>, "Eric Voit (evoit)" <evoit@cisco.com<mailto:evoit@cisco.com>>, Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>
Cc: "rats@ietf.org<mailto:rats@ietf.org>" <rats@ietf.org<mailto:rats@ietf.org>>, Thomas Fossati <tho.ietf@gmail.com<mailto:tho.ietf@gmail.com>>
Subject: RE: [Rats] Entity vs. role

Hi Ned,

I feel confused by this sentence “Th Attesting Env is a component (entity) that implements an Attester role”.

In section 3.1 of the Arch draft, it says:
   As shown in Figure 2, an Attester consists of at least one Attesting
   Environment and at least one Target Environment co-located in one
   entity.
In my understanding, the combination of Attesting Env and Target Env implements the Attester role.

Besides that, the definition of Attester is:
   Attester:  A role performed by an entity (typically a device) whose
      Evidence must be appraised in order to infer the extent to which
      the Attester is considered trustworthy, such as when deciding
      whether it is authorized to perform some operation.
According to this definition, the Attester is going to be inferred whether it’s trustworthy. And to be specific, its trustworthiness is inferred based on the authenticity of the Attesting Env and the attributes (or claims) of the Target Env. So the Target Env must be a part of an Attester role.

Regards & Thanks!
Wei Pan (潘伟)

From: RATS [mailto:rats-bounces@ietf.org] On Behalf Of Smith, Ned
Sent: Friday, March 25, 2022 2:07 AM
To: Eric Voit (evoit) <evoit@cisco.com<mailto:evoit@cisco.com>>; Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>
Cc: rats@ietf.org<mailto:rats@ietf.org>; Thomas Fossati <tho.ietf@gmail.com<mailto:tho.ietf@gmail.com>>
Subject: Re: [Rats] Entity vs. role

Th Attesting Env is a component (entity) that implements an Attester role. Presumably, there is a Target Environment from which the AE collects claims. The TE isn’t implementing the Attester role (hence it isn’t an Attester). The Arch draft takes some liberties to improve readability for a wide audience at the expense of potentially confusing those who want to put a fine point on things.

BTW there are implied entities hosting Verifier A and RP / Verifier B. Otherwise, it wouldn’t be interesting to talk about the message exchange sequences (which are presumably signed by the entities behind the roles).
-N

From: "Eric Voit (evoit)" <evoit@cisco.com<mailto:evoit@cisco.com>>
Date: Thursday, March 24, 2022 at 2:11 PM
To: Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>, "Smith, Ned" <ned.smith@intel.com<mailto:ned.smith@intel.com>>
Cc: Thomas Fossati <tho.ietf@gmail.com<mailto:tho.ietf@gmail.com>>, "rats@ietf.org<mailto:rats@ietf.org>" <rats@ietf.org<mailto:rats@ietf.org>>
Subject: RE: [Rats] Entity vs. role

Yes, the four boxes on top enclose RATS architecture roles required for the ar4si "Below Zero Trust" use case.

Eric

From: Laurence Lundblade, March 24, 2022 9:06 AM
Isn’t everything in this diagram a role?  If not, shouldn’t it be?


     .----------------.

     | Attester       |

     | .-------------.|

     | | Attesting   ||             .----------.    .---------------.

     | | Environment ||             | Verifier |    | Relying Party |

     | '-------------'|             |     A    |    |  / Verifier B |

     '----------------'             '----------'    '---------------'

           time(VG)                       |                 |

             |<------Verifier PoF-------time(NS)            |

             |                            |                 |

    time(EG)(1)------Evidence------------>|                 |

             |                          time(RG)            |

             |<------Attestation Results-(2)                |

             ~                            ~                 ~

           time(VG')?                     |                 |

             ~                            ~                 ~

             |<------Relying Party PoF-----------------(3)time(NS')

             |                            |                 |

   time(EG')(4)------AR-augmented Evidence----------------->|

             |                            |   time(RG',RA')(5)

                                                           (6)

                                                            ~

                                                         time(RX')

LL




On Mar 24, 2022, at 12:35 PM, Smith, Ned <ned.smith@intel.com<mailto:ned.smith@intel.com>> wrote:

Technically, the RATS Architecture is informational. Hence, no normative “requirements” but that doesn’t mean a I-D based on the architecture should assume conceptual messages can be routed to some other role or that some other role can produce a different conceptual message.

The main point of this thread is to highlight the difference between role and entity. And to try to avoid conflating them. But they are intimately related nevertheless. The examples I provided help illustrate how they relate but without conflation.
-Ned

From: Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>
Date: Thursday, March 24, 2022 at 11:45 AM
To: "Eric Voit (evoit)" <evoit@cisco.com<mailto:evoit@cisco.com>>
Cc: Thomas Fossati <tho.ietf@gmail.com<mailto:tho.ietf@gmail.com>>, "rats@ietf.org<mailto:rats@ietf.org>" <rats@ietf.org<mailto:rats@ietf.org>>, "Smith, Ned" <ned.smith@intel.com<mailto:ned.smith@intel.com>>
Subject: Re: [Rats] Entity vs. role

It seems to me now that we need to sort out some of these use cases a little better as Henk suggested in the room in Vienna.

On Mar 23, 2022, at 1:54 PM, Eric Voit (evoit) <evoit@cisco.com<mailto:evoit@cisco.com>> wrote:

From: Laurence Lundblade, March 23, 2022 4:03 AM
...

Ironic in a way — I want to forward/passthrough Evidence in Results, you are forwarding/passingthrough Results in Evidence :-)

<eric> It is not me that puts Results in Evidence.  It is the definitions in the architecture document which requires it *must* be specified this way.

5.1 describing the passport model does not imply or require (or preclude) two verifiers.

Section 5.1 does not require that AR be embedded in a new AE message when sent from the device to the RP. It puts no requirements on that transmission. I don’t think it even Requires the Results be relayed by something that has security properties.

None of the examples in section 16 work this way.

I think the design is a fine and good, but I don’t see it in my read of the architecture document. (I searched for occurrences of “passport”). Apologies in advance if I’ve missed something in the architecture document.

LL