Re: [Rats] draft-richardson-rats-usecases-00 comments

Laurence Lundblade <lgl@island-resort.com> Wed, 20 March 2019 19:00 UTC

Return-Path: <lgl@island-resort.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E00C0131241 for <rats@ietfa.amsl.com>; Wed, 20 Mar 2019 12:00:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uijKYC0SSEZ3 for <rats@ietfa.amsl.com>; Wed, 20 Mar 2019 12:00:47 -0700 (PDT)
Received: from p3plsmtpa11-04.prod.phx3.secureserver.net (p3plsmtpa11-04.prod.phx3.secureserver.net [68.178.252.105]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE0351312B0 for <rats@ietf.org>; Wed, 20 Mar 2019 12:00:40 -0700 (PDT)
Received: from [192.168.1.82] ([76.192.164.238]) by :SMTPAUTH: with ESMTPSA id 6gS6h2lxpv4SW6gS8hR02z; Wed, 20 Mar 2019 12:00:40 -0700
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Laurence Lundblade <lgl@island-resort.com>
In-Reply-To: <12503.1552447661@localhost>
Date: Wed, 20 Mar 2019 12:00:38 -0700
Cc: Anthony Nadalin <tonynad=40microsoft.com@dmarc.ietf.org>, "rats@ietf.org" <rats@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <219648D6-188A-429D-A13F-ED6155DE9016@island-resort.com>
References: <MW2PR00MB03963ABEB87211AD28A16240A6490@MW2PR00MB0396.namprd00.prod.outlook.com> <12503.1552447661@localhost>
To: Michael Richardson <mcr+ietf@sandelman.ca>
X-Mailer: Apple Mail (2.3445.9.1)
X-CMAE-Envelope: MS4wfDQoS1iD5lsUi1Rgn+2hhsNBWxI9DbyU9Cxjfo0YFI2ihOFW7J4VlmtKIu19B7NJ3SP3S/GDs6MspqE1h+BiNxIUF3tnCnw0Ej6ffbm7/8Xj7h62Gshx g2YdqDfNiBrYVdHwaQ35i8ubZNYyEtjHFgdaDesQMidg0Kc0/iYFdwGE0RUF0EPbqS4tMhWWap0DU86YiQrX515V5RHgevz0RYHNOCPRHW11rTW1gQY4ruEs hR0zxPw5dhFYCY4z6+pbzw==
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/AerStkq1eW9UQ4W2Alh7jRQaFTk>
Subject: Re: [Rats] draft-richardson-rats-usecases-00 comments
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Mar 2019 19:00:58 -0000

The way I’d approach the FIDO use case is to say that the relying party wants to to have the HW/SW implementation that did the biometric check strongly identified (attested). This is to make sure that the end user is not using some short cut or hacked, or insecure implementation that is not checking the biometric properly. 

FIDO allows a bunch of attestation formats now because there is no broadly common attestation format, something I hope we will remedy. It will take some years of course…

I don’t know that it is necessary to dig into all the different formats that FIDO allows.

Agree with Tony that solving the privacy issue in a broad standard way will be really helpful for lots of use cases (also some use cases don’t have a privacy issue).

LL

> On Mar 12, 2019, at 8:27 PM, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> 
> Anthony Nadalin <tonynad=40microsoft.com@dmarc.ietf.org> wrote:
>> The section on FIDO usecase (5.3) is out of date, as in FIDO/W3C there are
>> many attestation formats that are acceptable from devices, the major concern
>> that we have is the privacy issues as most all the attestation formats lead
>> to potential collusion in one form or the other. The JS API is now the W3C
>> WebAuthentication API that is a recommendation now, this is no longer in
>> FIDO. I would be happy to send edits to this section.
> 
> That would be wonderful, THANK YOU!
> It's a -00 afterall, and the goal is to tease out what might be
> old/nonsensical/etc. so that we can get to the bottom of things :-)
> 
> (I thought I did say that it all became the WebAuthentication API...)
> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
> -= IPv6 IoT consulting =-
> 
> 
> 
> _______________________________________________
> RATS mailing list
> RATS@ietf.org
> https://www.ietf.org/mailman/listinfo/rats