Re: [Rats] Review of draft-birkholz-rats-daa

Christopher Newton <c.newton@surrey.ac.uk> Mon, 28 June 2021 20:26 UTC

Return-Path: <c.newton@surrey.ac.uk>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D86123A0F47; Mon, 28 Jun 2021 13:26:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=surrey.ac.uk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vcwYAnrpZAgW; Mon, 28 Jun 2021 13:26:29 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150109.outbound.protection.outlook.com [40.107.15.109]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE0EC3A0F49; Mon, 28 Jun 2021 13:26:28 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=I0NffZmm2sTD/D72YWF22r42gBgcl+RyLs88YvTeC3lFMtR3C1Lgx3ihFdyh1ZlzNTWou1nCJU7EQzE0V4TipudGGBpFdzwVmdZpfigqEk7zvbkbPAli0jNuoySTEcHJGSju7Jy0VZkE539uEHXtxk1h9kmWOWb8kZEysznEWsW2CoCKZZJ1fxVm2Qia/Mc3ll8dW87IWQ2ehagoh4h7j72yKsL9qKUpI9ONg1ioRyCaF5RlmCT7E13GRzLWmgUsLBAei1U13Wit09YR5xaes3NxT5eBkVUhYw9hnlwtq3iVWi/s91c+ZhQMzum+lEapnnnlPsoAEJm824L8js2ZJQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5ILL43EAGZhhOVBYOfBpxjtsrdmBsUlP07QkLDa0nUk=; b=lQVu8BEIUrR/EsAS9haJ+fR1Nd6SjwWkFXRb/oYULJ+7McxdrH2ZITYa48fDmcyjoSfnDUaIWxMnhswIPXFddHBmgtANS+V5KsyUdUofq5RKmFAhwXvODY45XWd1b3tbv6RqobnNQfYeCWaIWB8hEwIe/N0AiHdiOfat4G2jb2kvM9LPooALONFINPGAlayVet2gqWp58wmZjaU/Ca0mOm0O/UscLEFYZXCA7JFKmi0QiNiPfy/Dzj5IEhL3CDNDRwKVG8L1DHDKMi+GYzU6DsxvqmAwrRa4u7lmrwqcgpoHaoN79Yl/yzd3snVpTN9wSgA8zYJMK/RuXtLbXbQaUg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=surrey.ac.uk; dmarc=pass action=none header.from=surrey.ac.uk; dkim=pass header.d=surrey.ac.uk; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=surrey.ac.uk; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5ILL43EAGZhhOVBYOfBpxjtsrdmBsUlP07QkLDa0nUk=; b=i349SPaxlOSy+44wTZtqfBQRpESjJtHKBpVoB80zV+p8dEPlwvr8Froh6JwQtFAJiY/aEYO6k12bV5UnDt1ehIu95OIAeFC+gx1nUFn5b4JY+bX/sP5yQsYHHXmE+8rxnQly9Y4o5BqzPuZkDDES18tC3C05Qmt7rZN2rwXzCAk=
Received: from AM8PR06MB7441.eurprd06.prod.outlook.com (2603:10a6:20b:366::19) by AM0PR0602MB3524.eurprd06.prod.outlook.com (2603:10a6:208:19::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4264.18; Mon, 28 Jun 2021 20:26:24 +0000
Received: from AM8PR06MB7441.eurprd06.prod.outlook.com ([fe80::fc7d:92e5:4354:3738]) by AM8PR06MB7441.eurprd06.prod.outlook.com ([fe80::fc7d:92e5:4354:3738%9]) with mapi id 15.20.4264.026; Mon, 28 Jun 2021 20:26:24 +0000
From: Christopher Newton <c.newton@surrey.ac.uk>
To: "Smith, Ned" <ned.smith@intel.com>, Thomas Fossati <Thomas.Fossati@arm.com>, "draft-birkholz-rats-daa@ietf.org" <draft-birkholz-rats-daa@ietf.org>
CC: Liqun Chen <liqun.chen@surrey.ac.uk>, "rats@ietf.org" <rats@ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Thread-Topic: [Rats] Review of draft-birkholz-rats-daa
Thread-Index: AQHXbDifBXIFpf54i0auOxYNwiHa86spRGaAgACSupw=
Date: Mon, 28 Jun 2021 20:26:24 +0000
Message-ID: <AM8PR06MB7441372FAB17123D968C5C4DB8039@AM8PR06MB7441.eurprd06.prod.outlook.com>
References: <6C9331BB-2A0B-4004-910A-4139BE981743@intel.com>, <0875E94C-FC02-4A5E-B731-D7CB883526E1@intel.com>
In-Reply-To: <0875E94C-FC02-4A5E-B731-D7CB883526E1@intel.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=surrey.ac.uk;
x-originating-ip: [150.143.110.19]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3f09a7bf-6f2d-4c94-fd56-08d93a730016
x-ms-traffictypediagnostic: AM0PR0602MB3524:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <AM0PR0602MB3524889241C0CC8DFA75269CB8039@AM0PR0602MB3524.eurprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM8PR06MB7441.eurprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(376002)(39850400004)(346002)(136003)(366004)(8676002)(33656002)(8936002)(83380400001)(166002)(478600001)(38100700002)(71200400001)(66946007)(7696005)(186003)(122000001)(26005)(2906002)(45080400002)(966005)(53546011)(6506007)(9686003)(4326008)(54906003)(110136005)(19627405001)(86362001)(91956017)(786003)(5660300002)(76116006)(66556008)(66446008)(64756008)(316002)(52536014)(66476007)(55016002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_AM8PR06MB7441372FAB17123D968C5C4DB8039AM8PR06MB7441eurp_"
MIME-Version: 1.0
X-OriginatorOrg: surrey.ac.uk
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM8PR06MB7441.eurprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3f09a7bf-6f2d-4c94-fd56-08d93a730016
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jun 2021 20:26:24.6215 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 6b902693-1074-40aa-9e21-d89446a2ebb5
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: oMMk+Xh5McYM0kSK1d1JlbhuUuMGgiJZH3EhBoTP3TfbSVwpsgfyCEPlmrIv9Qkv214gOMNK8P1hTui5m+g3Cw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0602MB3524
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/JVVozn1EWRfy4ifnWzfB2dS27oM>
X-Mailman-Approved-At: Mon, 28 Jun 2021 13:40:35 -0700
Subject: Re: [Rats] Review of draft-birkholz-rats-daa
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Jun 2021 20:26:35 -0000

Dear Ned,

Thank you for your thoughtful comments.

We agree that the DAA Issuer is the same as the TCG's Privacy CA. For the TPM the endorsement key is an encryption key and we need a CA to create a credential for a DAA key.  The DAA Issuer can be considered as an Endorser in the RATS scheme, in that the issue of the credential for a DAA key and the publication of their public key enables a Verifier to validate an Attesters (DAA) signature on the attestation. However, there has to be an interaction between the Attester and the DAA Issuer to provide a credential for the DAA key and this should be allowed for in the RATS scheme.

The manufacturer could act as the DAA Issuer, but if this was done as part of the manufacturing process the attester cannot later on ask for more DAA keys.

Even if the DAA Issuer and Endorser collude, the privacy of the Attester is guaranteed by the DAA scheme. The credential and the DAA public key are not given to the verifier. Verification uses the DAA signature and a randomised credential.

We hope that this is clear, if you have any questions please let us know.

Regards,

Chris and Liqun.


________________________________
From: Smith, Ned <ned.smith@intel.com>
Sent: 28 June 2021 19:12
To: Newton, Christopher Dr (Computer Science) <c.newton@surrey.ac.uk>; Thomas Fossati <Thomas.Fossati@arm.com>; draft-birkholz-rats-daa@ietf.org <draft-birkholz-rats-daa@ietf.org>
Cc: Chen, Liqun Prof (Computer Science) <liqun.chen@surrey.ac.uk>; rats@ietf.org <rats@ietf.org>; Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Subject: Re: [Rats] Review of draft-birkholz-rats-daa

Also, if Endorsements includes public keys (which could include group public keys) then The flow from the DAA Issuer (group public key) is itself a form of Endorsement. The DAA Issuer is a type of Endorser. Hence, the RATS Arch diagram is still relevant (and possibly doesn't need to be modified by this draft).

Rather, it might make sense to describe the DAA Issuer as an Endorser that that creates DAA public keys as Endorsements. As an Endorser, the DAA Issuer might be a device manufacturer. The cred req / cred rep messages might be part of a manufacturing process that doesn't require standardization but might benefit from it nevertheless. Alternatively, the DAA Issuer might be a service that Endorsers subscribe to, itself an Endorser. Maybe the draft should describe some of the viable deployment options and not stereotype a particular option?
-Ned

On 6/28/21, 9:14 AM, "RATS on behalf of Smith, Ned" <rats-bounces@ietf.org on behalf of ned.smith@intel.com> wrote:

    The TCG has had the notion of a "Privacy CA" for many years, but the ecosystem didn't materialize for Privacy CAs. How is the DAA Issuer different / or otherwise what motivates the ecosystem to be create the DAA Issuer? Given the Endorsements are not privacy preserving, the DAA Issuer would be a central point of possible collusion given it is trusted to preserve privacy? Given the DAA Issuer has as its customer base entities that are mutually suspicious. There would be a potential for collusion.
    -Ned

    On 6/7/21, 12:58 PM, "RATS on behalf of Christopher Newton" <rats-bounces@ietf.org on behalf of c.newton=40surrey.ac.uk@dmarc.ietf.org> wrote:

        Hi Thomas,

        We understand your suggestion now and we accept that the Endorser role can also cover that of a DAA Issuer. We assume that this (expanded Endorser) role, when implemented, could be fulfilled by two entities, for example the manufacturer who would provide the endorsement key for authenticating the attester and a separate entity who would issue the DAA credentials. This is likely to be the case in a real DAA application scenario.

        Regards,

        Chris and Liqun.

        --
        Dr Christopher Newton
        Surrey Centre for Cyber Security
        Department of Computer Science
        University of Surrey
        Guildford, Surrey, GU2 7XH, UK
        --

        -----Original Message-----
        From: Thomas Fossati <Thomas.Fossati@arm.com>
        Sent: 07 June 2021 11:08
        To: Newton, Christopher Dr (Computer Science) <c.newton@surrey.ac.uk>; draft-birkholz-rats-daa@ietf.org
        Cc: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>; rats@ietf.org; Chen, Liqun Prof (Computer Science) <liqun.chen@surrey.ac.uk>; Thomas Fossati <Thomas.Fossati@arm.com>
        Subject: Re: Review of draft-birkholz-rats-daa

        Hi Chris,

        Thank you for your explanation.

        What I was trying to say, maybe not very clearly, is that if one decomposes the DAA protocol into its two constituent phases, there seem to be no need to add the DAA Issuer as an *explicit* role to the current list [1].  The DAA Issuer can be expressed as a "meta" role that assumes the RATS Verifier and RATS Endorser roles depending on context.

        cheers, t

        [1] https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fietf-rats-wg.github.io%2Farchitecture%2Fdraft-ietf-rats-architecture.html%23name-roles&amp;data=04%7C01%7Cc.newton%40surrey.ac.uk%7Cd6da4d45bbe14a72a5af08d93a6044db%7C6b902693107440aa9e21d89446a2ebb5%7C0%7C1%7C637605007410642870%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=Ve%2F6PwHX1vSRGQuDDFAYAyikOYaO%2FIPTigKgWwvvyCI%3D&amp;reserved=0

        On 06/06/2021, 21:12, "Christopher Newton" <c.newton@surrey.ac.uk> wrote:
        > > Is it really necessary to introduce the new "DAA Issuer" role?
        > >
        > > It seems to me that if the JOIN and SIGN phases are considered as
        > > two separate attestation protocols, the Issuer could be mapped to a
        > > couple of well-known RATS roles depending on the phase it is
        > > involved in:
        > > * Verifier for JOIN - plus an authorisation RP on top
        > >   that grants the group credentials to the authenticated Attester;
        > > * Endorser for SIGN.
        >
        > Yes, the DAA Issuer is a separate role. it is effectively a
        > Certificate Authority for the DAA keys. The difference from a PKI CA
        > is that the Verifier uses the public key of the DAA Issuer to directly
        > verify the DAA signature. The signer's public key is not available to
        > the verifier.
        >
        > For a TPM, the Endorser is the chip manufacturer who provides a PKI
        > certificate for the TPM's endorsement key. However, the endorsement
        > key cannot be used as a DAA key as it is an encryption key. it is only
        > used to enable the DAA Issuer to authenticate the TPM in a deniable
        > way. After the Issuer authenticates the TPM it provides a DAA
        > credential to the DAA signing key. The Endorser can take on the role
        > of the DAA Issuer, but this is not a requirement.
        >
        > We hope that this makes things a little clearer, we could add more
        > detail in the RATS DAA document if this would help.
        >
        > Regards,
        >
        > Chris and Liqun.
        >
        >
        > --
        > Dr Christopher Newton
        > Surrey Centre for Cyber Security
        > Department of Computer Science
        > University of Surrey
        > Guildford, Surrey, GU2 7XH, UK
        > --
        >
        > -----Original Message-----
        > From: Thomas Fossati <Thomas.Fossati@arm.com>
        > Sent: 26 May 2021 13:04
        > To: draft-birkholz-rats-daa@ietf.org
        > Cc: rats@ietf.org; Thomas Fossati <Thomas.Fossati@arm.com>
        > Subject: Review of draft-birkholz-rats-daa
        >
        > Hi RATS-DAA authors,
        >
        > I have reviewed draft-birkholz-rats-daa-00 and I think this is a
        > useful document, plus it is short and sweet.
        >
        > I may have a few editorial suggestions, but I'd like to ask one meta
        > question first - apologies if this was brought up in previous
        > conversations:
        >
        > Is it really necessary to introduce the new "DAA Issuer" role?
        >
        > It seems to me that if the JOIN and SIGN phases are considered as two
        > separate attestation protocols, the Issuer could be mapped to a couple
        > of well-known RATS roles depending on the phase it is involved in:
        > * Verifier for JOIN - plus an authorisation RP on top that grants
        >   the group credentials to the authenticated Attester;
        > * Endorser for SIGN.
        >
        > Cheers, thank you.
        >
        > t





        IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.

        _______________________________________________
        RATS mailing list
        RATS@ietf.org
        https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Frats&amp;data=04%7C01%7Cc.newton%40surrey.ac.uk%7Cd6da4d45bbe14a72a5af08d93a6044db%7C6b902693107440aa9e21d89446a2ebb5%7C0%7C1%7C637605007410642870%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=fovtlFz6huIJ%2Bsha%2BFbcTWi3D%2FXJv%2BIj6uUyOOa0nI0%3D&amp;reserved=0

    _______________________________________________
    RATS mailing list
    RATS@ietf.org
    https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Frats&amp;data=04%7C01%7Cc.newton%40surrey.ac.uk%7Cd6da4d45bbe14a72a5af08d93a6044db%7C6b902693107440aa9e21d89446a2ebb5%7C0%7C1%7C637605007410642870%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=fovtlFz6huIJ%2Bsha%2BFbcTWi3D%2FXJv%2BIj6uUyOOa0nI0%3D&amp;reserved=0