[Rats] draft-ietf-rats-reference-interaction-models
Daniel Migault <mglt.ietf@gmail.com> Mon, 01 November 2021 21:18 UTC
Return-Path: <mglt.ietf@gmail.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 818363A2FB6 for <rats@ietfa.amsl.com>; Mon, 1 Nov 2021 14:18:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id En1NBUTDb3uv for <rats@ietfa.amsl.com>; Mon, 1 Nov 2021 14:18:02 -0700 (PDT)
Received: from mail-vk1-xa36.google.com (mail-vk1-xa36.google.com [IPv6:2607:f8b0:4864:20::a36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 877DC3A2FB5 for <rats@ietf.org>; Mon, 1 Nov 2021 14:18:02 -0700 (PDT)
Received: by mail-vk1-xa36.google.com with SMTP id q203so1295914vka.5 for <rats@ietf.org>; Mon, 01 Nov 2021 14:18:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:from:date:message-id:subject:to; bh=Q14nySuo86Ct2KM1inM2pRTulBFGSWGAnecFK1Geq/k=; b=KK0yEFHdpLcygeX3BvyMZFpBiVlTV6EhzsCq2ePqQubtu7npX+lMoauYj35Q36hjeV /GY+8c6b8ZfpJk2+qSUpGgjBvLhAqT7Dqzds294f6lLBqhlmRZAKz5SJC5aqPkUTBUh9 x0HpkSB/S26lqT7F3GT4lqSVrOyGC3ioZDLrYJHErvTsUaclE5hJRpzdltnXtCXWt8Xr CzZRCh7N/AhrVizIwwIim6NyqMOXAx+Vo6g3/nHUMHYDboljY+BhmV2kuHGwXjeJWkjC SECc7+1i561eza/M7ZWp1X91gu3Zbu+k6mrfnF56CrsFC9hnvMm+zGVirXPERqq7CF9X 6nfQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=Q14nySuo86Ct2KM1inM2pRTulBFGSWGAnecFK1Geq/k=; b=y/7YCL0pq9GO2IXQIA57vZNnZmVJsIO0wAwxD0JjHWQamgiX8IBiyZyZa2HjIx4/3q J1AJDrklDZn/XmbhHO8OasY2OP8UuzhpHPwEyXBAgeoW8og+2fZ6oR4dTh/5F1IJll3S U9+h3w9PR+q/6i2id0swFYC4PEhDxLulkKsxhE3tDbzGgBh2eqRlSbekfvILTVrmbU47 +Om+v8PXL4Vh70R3y8jjdnpacx1xTRNk3H195uokYPy85eTIhqXy/RhOYYG5M46WZy5C ujEYrREJPNbBGJHpZg4An5ALY23E68feb9GGnqgQNoGSAz3uU5hG4qLu1sMIt9aIi0fJ vA4Q==
X-Gm-Message-State: AOAM532vPOi/4xkupsAb5xGP/0GpYW4DQ2UzcHizg2VcDed2wxElJ97C JWN8wU/VcyYrU7x6F403bzQkqhulF8W2LMx/K6TvTfsGMV4=
X-Google-Smtp-Source: ABdhPJznrncyjRo31vzYem9T7B1HQdfWbF2AnNhwJ75Kn+pHTFJQ43HQ4/88FVouf8yN5PQoSk9OK5LqlpEZRuCvKzM=
X-Received: by 2002:a05:6122:7c8:: with SMTP id l8mr5926531vkr.8.1635801478739; Mon, 01 Nov 2021 14:17:58 -0700 (PDT)
MIME-Version: 1.0
From: Daniel Migault <mglt.ietf@gmail.com>
Date: Mon, 01 Nov 2021 17:17:47 -0400
Message-ID: <CADZyTkkfyZpHh1BdJ44frXFeJWnUR92buM2NewGQo_LoioWchQ@mail.gmail.com>
To: rats@ietf.org
Content-Type: multipart/alternative; boundary="0000000000001037fa05cfc0b6e7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/GlkX6RVHJa-ka-spbZcYVvyzdXI>
Subject: [Rats] draft-ietf-rats-reference-interaction-models
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Nov 2021 21:18:05 -0000
Hi, I reviewed reference-interaction-models and have a few comments / questions. For this one I think - and hope - I am on time to provide comments. Yours, Daniel section Introduction There are some markdowm notations I am not sure are intended: __term__ section 4 I am reading 'MUST' while I am not concerned by such language for an informational document, I had to remove it and it appeared that lowering the case can bring some language confusions. Maybe chairs and AD can clarify what their recommendation is to the co-authors. It seems to me that authentication and authentic are different concepts -- at least as far as I see them. I see authentic as not altered by its origin, while I see authentication associating an identity to the origin. In other words, authentication does tell you who this piece of information is from as opposed to this information is trusted. I think the paragraph should better distinguish between authentication and integrity especially in a context of authenticated encryption. Typically I am wondering in which case do we have integrity without authentication ? I interpret a HMAC as using material agreed during an authenticated negotiation and so consider it as something related to authentication, but I might be missing the point. One small comment, this architecture considers Evidence rather than Attestation Evidence. I suggest to remain aligned with that unless there is a reason not to do so. I also saw this in EAT in case there is a need to uniformize the terminology. This might be more a question to clarify my thoughts. Related to the RoT of TPM, it seems to me Endorsement is the CA that signs the attestation keys ( and other keys) of the TPM. But I think we heavily rely on the BIOS being securely carried to the TPM PCR 0. I see this as a part of the RoT but not as a part of the Endorsement. If I am missing something, I appreciate you clarify this to me. section 5 Attestation Evidence Authenticity: Attestation Evidence MUST be authentic. I think authentic is unclear to me.... but that might be just me. I would like to understand why authenticity cannot be replaced by authentication. section 6 I think the statement there is dangerous. The way I interpret it is that a handle may have additional properties than freshness. A Verifier can also use a Handle as an indicator for authenticity or attestation provenance, as only Attesters and Verifiers that are intended to exchange Evidence should have knowledge of the corresponding Handles. Examples include Nonces or signed timestamps. section 6 => may be interpreted as information being sent from Attester to Verifier, which is not the case. This is just a comment. section 7 I have the impression I am missing the difference between Uni-Directional Remote Attestation and Streaming Remote Attestation. Typically, in both cases we have a continuous stream of attestations and since delta are being provided, it matters the verifier receives all packets and I expect that a transport channel TCP or HTTP is set between the Verifier and the Attester. In other words, there is a session and a specific dedicated channel between the Attester and the Verifier - as opposed to something being broadcast. Obviously I do not expect a boot sequence to be sent over and over, as a result, I am wondering what use case we have for such a stream of attestation. The main difference I see between Uni-Directional Remote Attestation and Stream Remote Attestation is that in one case the Handle Distributor initiates the attestation while in the other case, this is the Verifier directly. If that were the case, I would probably think that Unidirectional is a Stream Remote Attestation with an additional token that provides a third party handle. At that point it is a bit unclear to me why we are considering them as two different approaches and I suspect I am missing something. -- Daniel Migault Ericsson
- [Rats] draft-ietf-rats-reference-interaction-modeā¦ Daniel Migault