Re: [Rats] EAT Profiles

Thomas Fossati <Thomas.Fossati@arm.com> Wed, 14 September 2022 16:30 UTC

Return-Path: <Thomas.Fossati@arm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50EC4C14F72C for <rats@ietfa.amsl.com>; Wed, 14 Sep 2022 09:30:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=5DGTmasG; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=5DGTmasG
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ecwvr3j-WG64 for <rats@ietfa.amsl.com>; Wed, 14 Sep 2022 09:30:01 -0700 (PDT)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50047.outbound.protection.outlook.com [40.107.5.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 656B6C14F725 for <rats@ietf.org>; Wed, 14 Sep 2022 09:30:01 -0700 (PDT)
ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=fR923EeZmolYg20R87yQ3iD7hV/zlVeH3Up0UdEDsScqoEFL5IZdLwZcGNXE17UwH7bn5anG/QOjW9zd0/Hve15RwPcVmTf4rlu1owK3YvAbdzWYUHs7KHDwMCElxhZeR4C2BE34G8RDCJSGq2aeM/W0nJMhV6mxW+WCJWh2qW3UxuMVtT8yxkUNJBmca2VRcVzDLSaDmlf1mbK+1QobAqIk51tjhGZqOiG4Ct8nhUiIZsZbc8Nyye1yFzCxOKvEW7sglfA/iwu8yJLlGJNuJvnnad/V+f37J1qM8w7pce2KBXoX6sFlfaoS1lN/crSri/4ifpTyZ/1szdbSSXzM1Q==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Vh/FLC3/zTLWlhW02RKa/Sja4tVGniuihSU7IAqAxVc=; b=BjXEe6bnUdQnmZsrLslQZE/k3OwY5LzmNitL3hDHuMFZae/CbA0RdaZooCnP0inKxx/1ASuuYj6T2d2si16JV3buYIdCY/P6VJWHrAheLsVezH4rw+GmY/JGO6yMzIhPD2cS1a/uwgq5WYeACevmWxnpZgFGJnRocffJbfEQogA6Jf6BeqHojzn40Ps9yIWL71Gbqd73kOaVPPPsL6HJ+sRRwKHNepUavsifbD/YbZ5ObPEFjiITssgAlF5jENJ0JkBxLELKobZjLPaoVFUPeTM8mXYnFH+BHonDttB5lNt2g1zCQjESUwwzxF+EpbUQzqYugrb8A/RWRK0K0KT+pw==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=ietf.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Vh/FLC3/zTLWlhW02RKa/Sja4tVGniuihSU7IAqAxVc=; b=5DGTmasGWVZDwULq12MIGCICLZ6HRF+n8rC+IjgkQ8xb72gN+uTn8jRngt2Y1bBtelth/SkqzmJIZaO6TOapipvhJtCCW8frjv9x6nxeBMLXQNdzjGhUjokFrXS2tvUGRFEG8XN17is9n88qixHDD1HZ3arXyYca6h/Kcvl5/NY=
Received: from DB6PR0501CA0035.eurprd05.prod.outlook.com (2603:10a6:4:67::21) by PA4PR08MB5934.eurprd08.prod.outlook.com (2603:10a6:102:e8::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5612.16; Wed, 14 Sep 2022 16:29:55 +0000
Received: from DBAEUR03FT063.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:67:cafe::2b) by DB6PR0501CA0035.outlook.office365.com (2603:10a6:4:67::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5632.12 via Frontend Transport; Wed, 14 Sep 2022 16:29:55 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DBAEUR03FT063.mail.protection.outlook.com (100.127.142.255) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5632.12 via Frontend Transport; Wed, 14 Sep 2022 16:29:54 +0000
Received: ("Tessian outbound e2c58cd9a6bb:v124"); Wed, 14 Sep 2022 16:29:54 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 12e6e723303521a0
X-CR-MTA-TID: 64aa7808
Received: from 8d15a549a4c4.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id CF0AD187-BC4A-4FF6-BA26-99EB8207E087.1; Wed, 14 Sep 2022 16:29:48 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 8d15a549a4c4.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 14 Sep 2022 16:29:48 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Q8ahMISQXq1Ddkbo5RZWeDEtGHV4wuhuO2VdZFBuyaP5WA6IdiPB44RvMTOPPqzShihjy1nbZji70IMBqZBHY+5ETQh3Vlhyj2kPU4r+bW7sLh416/zy5QMvb9fKbu6XUdDEH3S7c3UHCnC2DZiHRVkhABzUFe/tLDNPH+djyJelObpHKJYq78pYkb5uSKkyzgF0T+pYox7WQw2QNPxZkcKgMGumOgn5y3bQt7ufcrm7jMV0V8F/j9Fbo7PACcFb9GTxSKWaN3zRXHcnVDGMoqef6atGbH9P0da7B5zX/VL08y5HNuOvJT3iXpjLsNtCkUzWowR+gxZX41RsV+r9bg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Vh/FLC3/zTLWlhW02RKa/Sja4tVGniuihSU7IAqAxVc=; b=FmDDFD2/W++ZrVe+9hbqrqdzkkiHUvXim45Ot0xXmyAjiyqqYRelIYxhokaKykRXHQzJ42e2SRhEcW1+mYoqt3e9n6To226kyMRUqeX3tm/BFNLQ1ZYUCb2XpQDZ6+zNFkS1ZtDB2ih/YJ1CAMyDQKFy9Hka3vObP90XWMCRyK+26XoGkylkhdXD2xe4J9hk5hn/zk4/nR1EGUGSpsvC/NvGXZT0M3tnPvgrNOPk++KPwoxR0sOq3VlDsMkZok5s18WobF8Ei4PpBbdHQP6Cao6tqFAnsWIl5F/db4RX3jVLz2LuVI5WG9X0nqgWTBFATnaoV1i9dzM6/MANB77vMg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Vh/FLC3/zTLWlhW02RKa/Sja4tVGniuihSU7IAqAxVc=; b=5DGTmasGWVZDwULq12MIGCICLZ6HRF+n8rC+IjgkQ8xb72gN+uTn8jRngt2Y1bBtelth/SkqzmJIZaO6TOapipvhJtCCW8frjv9x6nxeBMLXQNdzjGhUjokFrXS2tvUGRFEG8XN17is9n88qixHDD1HZ3arXyYca6h/Kcvl5/NY=
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com (2603:10a6:10:251::8) by DB4PR08MB8197.eurprd08.prod.outlook.com (2603:10a6:10:383::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5612.22; Wed, 14 Sep 2022 16:29:46 +0000
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::c562:123f:fdc0:632a]) by DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::c562:123f:fdc0:632a%9]) with mapi id 15.20.5612.022; Wed, 14 Sep 2022 16:29:46 +0000
From: Thomas Fossati <Thomas.Fossati@arm.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] EAT Profiles
Thread-Index: AQHYyEuCz8t5IhR78keiyI9oGPhQjq3fFT2U
Date: Wed, 14 Sep 2022 16:29:45 +0000
Message-ID: <DB9PR08MB6524C8E33A05AE90F63BAE689C469@DB9PR08MB6524.eurprd08.prod.outlook.com>
References: <71934.1663019954@dooku>
In-Reply-To: <71934.1663019954@dooku>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
x-ms-traffictypediagnostic: DB9PR08MB6524:EE_|DB4PR08MB8197:EE_|DBAEUR03FT063:EE_|PA4PR08MB5934:EE_
X-MS-Office365-Filtering-Correlation-Id: 8c5e8a7e-ea27-41ac-1245-08da966e5b53
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB9PR08MB6524.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(39860400002)(366004)(346002)(136003)(396003)(376002)(451199015)(55016003)(26005)(52536014)(316002)(122000001)(110136005)(76116006)(33656002)(5660300002)(86362001)(66556008)(66946007)(38070700005)(478600001)(8676002)(66446008)(66476007)(64756008)(7696005)(38100700002)(53546011)(91956017)(6506007)(186003)(71200400001)(83380400001)(41300700001)(8936002)(9686003)(966005)(9326002)(2906002); DIR:OUT; SFP:1101;
Content-Type: multipart/alternative; boundary="_000_DB9PR08MB6524C8E33A05AE90F63BAE689C469DB9PR08MB6524eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB4PR08MB8197
Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DBAEUR03FT063.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: c982d326-cf94-48e4-c216-08da966e557c
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230022)(4636009)(396003)(136003)(346002)(39860400002)(376002)(451199015)(36840700001)(46966006)(40470700004)(33656002)(82740400003)(40460700003)(6506007)(8676002)(2906002)(40480700001)(53546011)(356005)(47076005)(82310400005)(55016003)(186003)(86362001)(110136005)(8936002)(83380400001)(336012)(7696005)(5660300002)(36860700001)(81166007)(70586007)(316002)(9326002)(70206006)(26005)(9686003)(41300700001)(478600001)(52536014)(966005); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Sep 2022 16:29:54.8930 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 8c5e8a7e-ea27-41ac-1245-08da966e5b53
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DBAEUR03FT063.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB5934
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/IgkrVMNLh_TK27wFQ0q9KZrsQH0>
Subject: Re: [Rats] EAT Profiles
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Sep 2022 16:30:06 -0000

Hi Michael,

Thanks.  This sounds like a useful exercise.  Could you please have a
look at the PSA draft from this angle too?  We have tried hard to make
the document a blueprint of a EAT profile definition that others could
follow. It'd be good to have confirmation that we are on the right
track.

On 14/09/2022, 16:06, "RATS" <rats-bounces@ietf.org> wrote:
> I read through the EAT profile for TEEP.  Dave posted the link at:
>
> https://www.ietf.org/archive/id/draft-ietf-teep-protocol-10.html#name-eat-profile
>
> let me reproduce some of it:
>
> > profile-label: The profile-label for this specification is the URI
> > https://datatracker.ietf.org/doc/html/draft-ietf-teep-protocol-10.
> > (RFC-editor: upon RFC publication, replace string with
> > "https://www.rfc-editor.org/info/rfcXXXX" where XXXX is the RFC
> > number of this document.)
>
> First, this really feels wrong to use a string here for a constrained
> object.  My first suggestion is that it be FCFS registry.

This is a choice TEEP made (and, BTW, PSA too [1])
For a more compact representation one could use a RFC9090 OID instead,
there is no need for a registry.  In fact, choosing URI / OID as the
underlying type was a conscious choice to avoid IANA round-tripping.

[1] https://www.ietf.org/archive/id/draft-tschofenig-rats-psa-token-10.html#section-4.5.2

> Second, the next bunch of items:
>
> > Use of JSON, CBOR, or both: CBOR only.
> > CBOR Map and Array Encoding: Only definite length arrays and maps.
> > CBOR String Encoding: Only definite-length strings are allowed.
> > CBOR Preferred Serialization: Encoders must use preferred
> > serialization, and decoders need not accept non-preferred
> > serialization.
> > COSE/JOSE Protection: See Section 8.
> > Detached EAT Bundle Support: DEB use is permitted.
> > Verification Key Identification: COSE Key ID (kid) is used, where the key
> > ID is the hash of a public key (where the public key may be used as
> > a raw public key, or in a certificate).
> > CBOR Tags: CBOR Tags are not used.
>
> I really don't like the EAT has not made a clear judgement on these
> things already.   I'd really really like EAT to be far more
> opinionated.

I think that's what the "The Constrained Device Standard Profile" [2] is
intended for?  One should use it as baseline, make a few custom
choices, define the claims set, and give it a new name.

[2] https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat#section-6.3

> The above list looks like it will be 95% of CBOR-based EAT "profiles"
> Could EAT just write this down, and give it a name?
> That way, we can well tested libraries that do the right thing here.
> I think that really this is where Eliot is coming from.
> EAT is all a la carte, and we are asking for a coordinated, three
> course set-menu. (Please pair the wine with the fish.)
>
> > Endorsement Identification: Optional, but semantics are the same as
> > in Verification Key Identification.
>
> I guess I have to read more about what this means, as told me nothing
> :-)
>
> > Freshness: See Section 9.
>
> It's totally reasonable that TEEP would have some specific freshness
> requirements.
>
> > Required Claims: None.
> > Prohibited Claims: None.
> > Additional Claims: Optional claims are those listed in Section
> > 4.3.1.
>
> This totally surprises me.  Are you saying that it's okay for TEEP
> evidence to have *NO CLAIMS*?   Surely that can't be right.    If
> there was anything I expected to see in a profile it would be a list
> of required claims.

Agree, this is quite surprising.  In contrast, a good chunk of the PSA
document (all of Section 4 [3]) deals with the definition of the claims
set.

[3] https://www.ietf.org/archive/id/draft-tschofenig-rats-psa-token-10.html#name-psa-claims

> > Refined Claim Definition: None.
>
> This is part of what worries me.  There should never be any semantics
> changes between profiles for claims.

I don't know what is meant by "Refined Claim Definition".  It doesn't
look like something required by EAT.

> > Manifests and Software Evidence Claims: The sw-name claim for a
> > Trusted Component holds the URI of the SUIT manifest for that
> > component.
>
> okay, this is actually important.

cheers, t

--

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.