Re: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)

Laurence Lundblade <lgl@island-resort.com> Sun, 05 June 2022 19:48 UTC

Return-Path: <lgl@island-resort.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95716C1527AF for <rats@ietfa.amsl.com>; Sun, 5 Jun 2022 12:48:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.927
X-Spam-Level:
X-Spam-Status: No, score=-1.927 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RDih4jxAqqyP for <rats@ietfa.amsl.com>; Sun, 5 Jun 2022 12:48:55 -0700 (PDT)
Received: from p3plsmtpa09-08.prod.phx3.secureserver.net (p3plsmtpa09-08.prod.phx3.secureserver.net [173.201.193.237]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2F10C14CF12 for <rats@ietf.org>; Sun, 5 Jun 2022 12:48:55 -0700 (PDT)
Received: from [192.168.1.7] ([75.80.148.139]) by :SMTPAUTH: with ESMTPSA id xwF4nB3168t7XxwF5nY0Bl; Sun, 05 Jun 2022 12:48:55 -0700
X-CMAE-Analysis: v=2.4 cv=fI/8YbWe c=1 sm=1 tr=0 ts=629d08a7 a=qS/Wyu6Nw1Yro6yF1S+Djg==:117 a=qS/Wyu6Nw1Yro6yF1S+Djg==:17 a=48vgC7mUAAAA:8 a=-dKNrbFoU2dT9DCAgDQA:9 a=QEXdDO2ut3YA:10 a=L7Xt4zkCvPFDL-Ml:21 a=_W_S_7VecoQA:10 a=w1C3t2QeGrPiZgrLijVG:22
X-SECURESERVER-ACCT: lgl@island-resort.com
From: Laurence Lundblade <lgl@island-resort.com>
Message-Id: <FC3A3545-D729-49E5-A570-CB7347D671A7@island-resort.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_DF2EEA12-E443-4525-A22D-66B3A17C9928"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
Date: Sun, 05 Jun 2022 12:48:54 -0700
In-Reply-To: <82ef60ca-e9b7-639d-5255-fbb97406995a@sit.fraunhofer.de>
Cc: "Eric Voit (evoit)" <evoit=40cisco.com@dmarc.ietf.org>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "rats@ietf.org" <rats@ietf.org>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
References: <45618431-7329-4F31-941F-A39BBC9D575F@cisco.com> <BYAPR11MB3125EB2DEC4CE5136AC903F9A1DF9@BYAPR11MB3125.namprd11.prod.outlook.com> <7FD4FE54-7A16-4E92-BDDC-878D726095E6@island-resort.com> <900bf8d8-0b00-cc98-fd82-786dc9c18901@sit.fraunhofer.de> <7DA26075-0764-4FC3-9176-F151BD50DF9A@island-resort.com> <82ef60ca-e9b7-639d-5255-fbb97406995a@sit.fraunhofer.de>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
X-CMAE-Envelope: MS4xfEB0TPSMT4bpdSfHVfX8dijuNvNEEpXbrWUSGNy6xisapZcifRJ6timvGWijRoww10MUP7P85BbhsKNbi8Htk7r0Bnk7mrN70wXJYZiWLkejg1oNbco5 XQcPibOpC+1phzJA98c0+R0jbDGzh7irweyUF1U59DQIqlYCMfHf9JR2shLfGin/FCW09EQEDhrbXUcwNSxHayAI6XrHQBLgTHbhLVQHiqTzi0HH+qSrJ922 kheURx/XznfWrNsWgaHphjl9ffso7SKEzvAqSbTP5UkQS54JDsrvUzsTMLk6QI63Ne/RqjG672n82qTkw/hh9Q==
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/AQDRf0WvM9kOthxxBL0_UKBq7iA>
Subject: Re: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Jun 2022 19:48:59 -0000

Hi Henk,

We talked this through at the Hackathon in Vienna and agree on resolution that I think is documented in this text <https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat-13#section-1.4.1> in draft 13. The Hackathon photographer even took a picture of us talking about it.

LL


> On Jun 1, 2022, at 2:28 PM, Henk Birkholz <henk.birkholz@sit.fraunhofer.de> wrote:
> 
> Hi Laurence,
> 
> I think we just framed one of the vital issues. More in-line!
> 
> On 01.06.22 23:16, Laurence Lundblade wrote:
>>> On Jun 1, 2022, at 2:06 PM, Henk Birkholz <henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de>> wrote:
>>> 
>>> Hi Laurence,
>>> 
>>> I see that the list of values for security-level has been trimmed, the context had quite some churn that is hard for me to reflect here in detail. What I am really missing now is the most important statement: "The claim made here is solely a self-claim made by the Attester.”
>> You suggested text would quite work out right.
>> - It could be a claim made by Verifier in AR and thus not a self-claim. (But only if this is a useful in the particular AR use case; some RP/Verifiers may prefer certification info or define their own scheme for security level; it’s just there if you like it and find it useful, not as any canonical standard representation of Verifier output)
> 
> Exactly. Which is why I still think that "just defining claims" without placing them in an Evidence or an Attestation bucket (or both! and then explaining why), explicitly, is mega important.
> 
>> - Even if it is a self-claim, so are many of the other claims
> 
> You'll probably see where I am going with this: this is an extension of the potentially cascading issue I am afraid we are creating.
> 
>> - In some cases when it is a claim made by the Attester, the Verifier may have rules for checking it when forwarding it to the RP, just like it has rules for all the other claims it may forward to the RP from either the Attester or Endorser. For example it might know the device manufacturer is very scrupulous and will only puts the correct security-level in just like it knows it puts in the correct UEID.
> 
> These appraisal policies for Evidence and appraisal policies for Attestation Results you are describing here will be implemented by independent teams of engineers most of the time like ships in the night, if the document does not elaborate on when they are okay to be put into Evidence and when they are okay to be put into Attestation Results.
> 
> Maybe this is just a déjà vu of mine, but didn't we had this exact some dialog already on the list? (maybe not byte compare identical, but more or less)
> 
> Viele Grüße,
> 
> Henk
> 
>> LL