Re: [Rats] Call for adoption (after draft rename) for Yang module draft

"Eric Voit (evoit)" <evoit@cisco.com> Fri, 15 November 2019 14:38 UTC

Return-Path: <evoit@cisco.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BF37120873 for <rats@ietfa.amsl.com>; Fri, 15 Nov 2019 06:38:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=iVmtuMyT; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=cisco.onmicrosoft.com header.b=KcHYKjWq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gLJD7P5J0IVi for <rats@ietfa.amsl.com>; Fri, 15 Nov 2019 06:38:34 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 67B3C120013 for <rats@ietf.org>; Fri, 15 Nov 2019 06:38:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=51210; q=dns/txt; s=iport; t=1573828714; x=1575038314; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=nEAUopt///krPfxGbhLohjaxHJvgSR0qDICFqgZyeQI=; b=iVmtuMyTNMICHg/S8bOWibWgcgkrLLWUWHni2SVDK8LOMDS8Gbw2qTd0 ChLgffkZR4/fiKN/ZkknO89zgTRvBDoQQhTBAB8mNh9qSzW/ojH7doeP3 zcXPEOOi8WLt4YonLuNBykRxjusvEu1xYrG5Xlgx8TBXWl3FhPLhcgGsS c=;
X-Files: smime.p7s : 3975
IronPort-PHdr: 9a23:l0t4JBG6G2Dn/X7qjYRdXp1GYnJ96bzpIg4Y7IYmgLtSc6Oluo7vJ1Hb+e4w3A3SRYuO7fVChqKWqK3mVWEaqbe5+HEZON0pNVcejNkO2QkpAcqLE0r+efP0aC0mNM9DT1RiuXq8NBsdFQ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B5CQAquM5d/4UNJK1kGgEBAQEBAQEBAQMBAQEBEQEBAQICAQEBAYF+gRwvTgIFbCstIAQLKgqEH4NGA4pygl6YAIJSA1QCBwEBAQkDAQEtAgEBgUyCdAKCIyQ4EwIDCwEBBAEBAQIBBQRthTcMhVEBAQEBAgESCAMGChMBATcBBAsCAQgRBAEBDRQBBgMCAgIwFAkIAgQBDQUIBg0HgwGBeU0DDhEPAQKkTQKBOIhgdYEygn4BAQWFGxiCEAcJgTaBU4pCGIFAP4ERRoJMPoQeKQwJHwSCVjKCLI0ogjI5jwqPDAqCKoNNgjSGPYkqmg6NE4E1lh+DaQIEAgQFAg4BAQWBaSKBWHAVgydQERSRGgwXg1CKU3QBgSeNfoExAYEOAQE
X-IronPort-AV: E=Sophos;i="5.68,308,1569283200"; d="p7s'?scan'208,217";a="651799951"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 15 Nov 2019 14:38:16 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id xAFEcFVK015879 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 15 Nov 2019 14:38:15 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 15 Nov 2019 08:38:14 -0600
Received: from xhs-aln-003.cisco.com (173.37.135.120) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 15 Nov 2019 09:38:12 -0500
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 15 Nov 2019 08:38:12 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ecHhb5wfwCjUJZLPlkEIEYlUvTDhCHP/PMLjdar5A3E0sdYu+duAEWAeLGPeF+Zg8i66q93UKdluTSehFJ5TlTQYlpBt5SUvioZ5u3aYZUjgPihmOMddI1/XADRJFyS5l9Mzpr5XsREmV80vePExjyl9aBGAGmgZB0cQy6+rCdP4BISxdD8KpJhkRbexhRNCmjiz/HZXJwVM1B11aQHXb/HxYV5ZE4qdYJqxSQ4VgOVd4u88VZdB+KsVnBeJfiJg4aHYbg0X/rI8cICZK1Oaja3Vuk8DzKt9zrGNE+DdbJTnzgm3TrvHKMiNCv/6b2MaxqdDV2nrQD3a/VkO7U614A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sbIyEoNPBSk5l8+lAMi/tvdLDCs1C992aUzpHL8FAn4=; b=VNA1JadPIGiwaSsQukLmgLNj8/g2tvWndYjGZNjYmlfjqwU3yyuvcB8Wg5SOATeYAE7skY+7qIjuQK1AUXS56tVlOt60qV9ssAQwjLtMzp5J0tRc/8FIzpSrrAGKKtwak3/TD1RhAli1esiXjRuFKBiMGnLUXqMZg6ejEScQ1h3zLmFHoGgz+aDPvFRzW2h14RGgeNcsxGaSRmG5VoJ0nuqqHPJLhDHluPs5nGoXO43h7xY4cc1aYiOgufSNIVrwcd9dpL6j/He7rMzHpBLaV+8TW71wsr4vbEJcPD+BWU18eY5FH09/YlsyMj+CBxGBxu0+vAmw/TdEguJItyY/Lg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sbIyEoNPBSk5l8+lAMi/tvdLDCs1C992aUzpHL8FAn4=; b=KcHYKjWqUAAN1L+nbQ/bHK6nle0XrBmfXSvfwWHH/r/rHefMcyfngS0ktx5Tf8lItfAbtFXCIMcjATapT36jvtT1Fwqz6C+2r38FFobPt/OJ8S3RcL6WXEcRGq7QWF6kIbqnGXo7jrVwbuXNYCmHEvO2ZtSb8/eFnW2xeal2yIc=
Received: from DM6PR11MB4154.namprd11.prod.outlook.com (20.176.126.215) by DM6PR11MB3356.namprd11.prod.outlook.com (20.176.120.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2430.20; Fri, 15 Nov 2019 14:38:11 +0000
Received: from DM6PR11MB4154.namprd11.prod.outlook.com ([fe80::64fd:c810:5c47:243f]) by DM6PR11MB4154.namprd11.prod.outlook.com ([fe80::64fd:c810:5c47:243f%3]) with mapi id 15.20.2451.029; Fri, 15 Nov 2019 14:38:11 +0000
From: "Eric Voit (evoit)" <evoit@cisco.com>
To: Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>, Laurence Lundblade <lgl@island-resort.com>
CC: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "Oliver, Ian (Nokia - FI/Espoo)" <ian.oliver@nokia-bell-labs.com>, "Smith, Ned" <ned.smith@intel.com>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] Call for adoption (after draft rename) for Yang module draft
Thread-Index: AQHVlCwI8/lytau3hU+AhCwtIdg/0ad+jL2AgAAHhQCAAAO1AIAF46wAgACM2YCAAJAzgIAAtdsAgAB9XUCAAqYNAIABt5oQgAEmbJA=
Date: Fri, 15 Nov 2019 14:38:11 +0000
Message-ID: <DM6PR11MB4154BB7B7BA4A9CFAEDE1506A1700@DM6PR11MB4154.namprd11.prod.outlook.com>
References: <8B173958-FC2A-4D1D-A81C-F324AB632CD7@cisco.com> <147F9159-6055-4E55-ABDC-43DFE3498BF1@island-resort.com> <ce5f8206-74dc-36bb-0093-a93045d5c67f@sit.fraunhofer.de> <0A7E3A4F-8534-4E98-BCB7-1454E07699F4@island-resort.com> <C3AE2645-49C8-4313-BCED-02FEB576B614@cisco.com> <1C8A1884-A37D-45E3-8C11-2FC5A083B245@island-resort.com> <HE1PR0702MB375366C5F7FE5C497C35D73B8F740@HE1PR0702MB3753.eurprd07.prod.outlook.com> <7106C9D3-8ED1-419E-81F8-4CDA799BEDAE@intel.com> <MWHPR21MB07844F61BEFAE03F9E7DD290A3770@MWHPR21MB0784.namprd21.prod.outlook.com> <6E7D64B4-2049-4D0A-ADC5-CA3F0647779B@island-resort.com> <MWHPR21MB07840B6CF7BEE0A11ABE54BFA3700@MWHPR21MB0784.namprd21.prod.outlook.com>
In-Reply-To: <MWHPR21MB07840B6CF7BEE0A11ABE54BFA3700@MWHPR21MB0784.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=dthaler@ntdev.microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2019-11-14T20:24:13.3496979Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=096a2af9-9408-49d1-8867-8c9a9004dfea; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic
authentication-results: spf=none (sender IP is ) smtp.mailfrom=evoit@cisco.com;
x-originating-ip: [173.38.117.91]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 98299d03-e6c5-4400-7357-08d769d9709f
x-ms-traffictypediagnostic: DM6PR11MB3356:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DM6PR11MB335679E6DC46A9DF76D0FB06A1700@DM6PR11MB3356.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 02229A4115
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(346002)(366004)(39860400002)(136003)(396003)(189003)(199004)(15404003)(110136005)(8676002)(478600001)(229853002)(55016002)(256004)(6436002)(14454004)(316002)(3846002)(14444005)(81166006)(81156014)(54896002)(6306002)(790700001)(45080400002)(6116002)(26005)(186003)(8936002)(7736002)(53546011)(52536014)(486006)(66574012)(9686003)(74316002)(236005)(476003)(99286004)(66556008)(2906002)(446003)(64756008)(76176011)(71190400001)(71200400001)(102836004)(66616009)(66446008)(76116006)(25786009)(66066001)(54906003)(6506007)(66946007)(7696005)(6246003)(5660300002)(11346002)(33656002)(4326008)(86362001)(66476007); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB3356; H:DM6PR11MB4154.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 4zzjSdHyeoRtcaOkX6TYhtoPiMeaCK2pakUrp217DA6GYXQjuWxihMqTCsVMp9HldF5Xf54umz1flghVTsh4eSw16w1VWnw+7Ac6LAc4Rs2pH4cqvKGWPSS650O9/FD17T7WEZWtmfjZubCkZ16GbFeRljDOHmV22eo6t5en/zM3s9W+kuoS2B/LD0gLp0flcPvKA2FhDNl16rBEvy2kBMkDeZHziM3sMqs72f70UR6EtXbov9A0rxUQvTntLT03Yu8P8i0K+dY4IV06h2+ntfTzpTBDhCtbNzos2lHMaZWdAJBdOQ/Oz9Jz3iOn1aYdez0IinBkVRy23Sqwog6tdCmkHLcHSTM+LTUzJ+ZlaLnpAxTMzWgkiAmqacav9OUoFyGxn7TYWAuhpey5mx+ilCfvS9syr7o6pGg5HRKJjxdfGDbwWyEcjpNFMU+C7Ynd
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_01E9_01D59B98.6288BB80"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 98299d03-e6c5-4400-7357-08d769d9709f
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Nov 2019 14:38:11.4072 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: V1wWPp30P6BXF7GXA9dUR8nqoIb5DSDSAdVaktvQLR3EASx01AtvlXEyLXVLWLFS
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB3356
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.17, xch-aln-007.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/M7z8C7THVSbLapc20kD8sM7n8ro>
Subject: Re: [Rats] Call for adoption (after draft rename) for Yang module draft
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Nov 2019 14:38:38 -0000

From: Dave Thaler, November 15, 2019 2:39 AM



Netconf is not the only protocol supported by routers.

Routers also support IPv4, IPv6, link-layer protocols such as Ethernet, routing protocols, often things like DHCP relay, RADIUS, etc.

<Eric> Below I would have said " Router/YANG" below rather than "Router/NETCONF".   

 

I have not yet seen a compelling reason to use a pull-based mechanism instead of a push-based mechanism via another protocol the routers already support.

<Eric> Router vendors want push-based mechanisms too.  And NETCONF does push.  See RFC-8640 and RFC-5277.

 

The only reason I’ve heard so far is “because they support netconf and we’re used to it”, to which the counter argument is as above:

they support other things too and we’re used to them too.

<Eric> There is piles of documentation in the IETF and beyond detailing the reasoning and extent of consolidation on YANG for network management.    IETF, IEEE, MEF, OpenConfig, and others forums are defining these.  I wouldn't expect another anytime soon.  

 

NETCONF can support YANG. Other transports can support YANG.   The current draft under an adoption call does not specifically reference NETCONF.

 

In order to know who to pull data from, the Verifier has to have some indication from the Attester that triggers the attestation request 

indicated as Step 1 in draft-fedorkow-rats-network-device-attestation.  So in reality, there has to be a step before step 1,

whereby the Attester does something that makes the Attester discoverable by the Verifier.   That step could have included the EAT or the TPM data

expressed in the YANG draft, or whatever else, and then you’ve avoided the need for netconf, and reduced the number of round trips,

improving latency and bandwidth.

<Eric> It is already possible to subscribe to existing proprietary YANG attestation models.  This requires zero extra round-trips.   The push can be leave the Attester in <1 sec.

 

If there is a compelling reason to support a pull-based mechanism, and we get consensus that we need it, then great.

But so far I haven’t heard one.

<Eric> A YANG model supports both push and pull.  Application vendors want a standard attestation model.  That is why you have many network vendors authoring this YANG draft under the adoption call.

 

Honestly I don't understand the push-back.   This should be a no-brainer.

 

/Eric

 

Dave

 

From: Laurence Lundblade <lgl@island-resort.com <mailto:lgl@island-resort.com> > 
Sent: Wednesday, November 13, 2019 10:07 AM
To: Dave Thaler <dthaler@microsoft.com <mailto:dthaler@microsoft.com> >
Cc: Smith, Ned <ned.smith@intel.com <mailto:ned.smith@intel.com> >; Oliver, Ian (Nokia - FI/Espoo) <ian.oliver@nokia-bell-labs.com <mailto:ian.oliver@nokia-bell-labs.com> >; Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com <mailto:ncamwing@cisco.com> >; rats@ietf.org <mailto:rats@ietf.org> ; Henk Birkholz <henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de> >
Subject: Re: [Rats] Call for adoption (after draft rename) for Yang module draft

 

My version of technology bases for attestation is something like this:

 

Router/Netconf World

Millions of devices. Currently TPM oriented. Long possible transition to EAT. YANG used to create very specific fine-grained interactions. No privacy issues.

 

Web Browser World

Billions of devices. Current attestation use is primarily WebAuthN / FIDO. JWT is used heavily for authentication so would be more EAT oriented, but TPM attestation is supported in FIDO. Larger use of attestation may evolve. Fine-grained interactions are with WebAPIs (Javascript) (sort of parallel to YANG for routers). Big privacy issues.

 

Mobile App World

Billions of devices. Main attestation use is Android’s Keystore. This is EAT-like, but based on X.509. Fine grained interactions are Android APIs. I may be out of date, but so far IoS doesn’t do attestation. Privacy issues vary by app.

 

IoT World

Billions of devices most likely going to trillions. Attestation is a critical enabling feature in this world. There are lots of protocols and formats involved. TPMs are too expensive for many of these, but are probably in use somewhere. No privacy issues for a large portion of this world.

 

The router world is the smallest, but it is “well represented” because this is the IETF.

 

I see EAT as applicable to all these worlds, where the YANG module is just for the smallish router world. So I mostly agree with Dave about proportions, however this is the IETF where YANG modules are created.  (Maybe I should go join the W3C world and work on attestations APIs for browsers after RATS is done).

 

LL

 

 

 

On Nov 11, 2019, at 5:43 PM, Dave Thaler <dthaler@microsoft.com <mailto:dthaler@microsoft.com> > wrote:

 

As far as I can understand from draft-birkholz-rats-basic-yang-module-01 and

draft-fedorkow-rats-network-device-attestation-01, they break down the use case

space as follows:

 

                        Requirements?

         +--------------+---------------+---------++---------------

         |  RoT         | Host Firewall | Privacy ||   Solution    

         |  Type        |   Enabled     | Needed  ||    Pieces     

         +--------------+---------------+---------++---------------

      1  |  SGX         | No            | No      ||

      2  |  SGX         | No            | Yes     ||

      3  |  SGX         | Yes           | No      ||

      4  |  SGX         | Yes           | Yes     ||

      5  |  TrustZone   | No            | No      ||

      6  |  TrustZone   | No            | Yes     ||

      7  |  TrustZone   | Yes           | No      ||

      8  |  TrustZone   | Yes           | Yes     ||

      9  |  TPM         | No            | No      || draft-birkholz-rats-basic-yang-module-01

     10  |  TPM         | No            | Yes     ||

     11  |  TPM         | Yes           | No      ||

     12  |  TPM         | Yes           | Yes     ||

     13  |SecureElement | No            | No      ||

     14  |SecureElement | No            | Yes     ||

     15  |SecureElement | Yes           | No      ||

     16  |SecureElement | Yes           | Yes     ||

     17  | Firmware     | No            | No      ||

     18  | Firmware     | No            | Yes     ||

     19  | Firmware     | Yes           | No      ||

     20  | Firmware     | Yes           | Yes     ||

     ... |   ...        |               |         ||

 

And draft-fedorkow-rats-network-device-attestation-01 further scopes itself down

by only being applicable to cases with "embedded" apps only = Yes, and where

the security policy is only an Exact match against reference values = Yes.

I believe that the yang draft doesn't have those two restrictions, from my reading.

However, the point is that both drafts are VERY narrow, and in the table shown above,

only address 1 out of 20 possibilies in that space.

 

In contrast, the TEEP WG decided that it was not interested in narrow scopings

(specifically something Global Platform specific), but instead wanted one general solution.

 

If the RATS WG spends effort on something that only addresses a single row out of 20+ rows,

then do we expect 19+ other solutions to also be done in the WG?  Or could we work on things

that are broader and happen to also work for row 9?

 

I've seen others commenting on the fact that the YANG module only supports TPMs and not

other things (EATs etc), which would just add support for a couple more rows, but still not

be general.

 

Personally, I would much rather see the WG spend effort on things that really are generic,

i.e., work with or without host firewalls, work with multiple RoT/TEE types, etc., rather

than seeing an explosion of point solutions.

 

Dave

 

From: RATS <rats-bounces@ietf.org <mailto:rats-bounces@ietf.org> > On Behalf Of Smith, Ned
Sent: Monday, November 11, 2019 10:12 AM
To: Oliver, Ian (Nokia - FI/Espoo) <ian.oliver@nokia-bell-labs.com <mailto:ian.oliver@nokia-bell-labs.com> >; Laurence Lundblade <lgl@island-resort.com <mailto:lgl@island-resort.com> >; Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com <mailto:ncamwing@cisco.com> >
Cc: rats@ietf.org <mailto:rats@ietf.org> ; Henk Birkholz <henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de> >
Subject: Re: [Rats] Call for adoption (after draft rename) for Yang module draft

 

Right. This implies the RATS “token” should support existing “binary” formats as an encapsulation (signed by a second TA where the TPM is a first TA) or as a conveyance (unsigned?) token. Possibly, the only added value of the latter is a tag that identifies it as a TPM binary format?

 

 

On 11/10/19, 23:21 PM, "RATS on behalf of Oliver, Ian (Nokia - FI/Espoo)" <rats-bounces@ietf.org <mailto:rats-bounces@ietf.org>  on behalf of ian.oliver@nokia-bell-labs.com <mailto:ian.oliver@nokia-bell-labs.com> > wrote:

 

> Remote TPM attestations are useful and necessary the short run, but are of very limited capability. I believe that > EAT will replace TPM attestations in the long run (maybe decades) because they are far more expressive. I know > others believe that too. 

 

I would disagree with the statement of "short run" ... TPM is practically the only existing standardised (hardware, software, firmware, measurement - x86 only etc) hardware root of trust in common use, ie: practically all x86 machines,  The attestation mechanisms provided are going to be around for a very long time.  

 

>From telco experience, 30 years ago we said SS7 would only be around in the short term.

 

> Thus, I am opposed to adoption with the current TPM-only draft. I’d be OK with the current draft and a promise > to add EAT to it.

 

Agree

 

Ian

 

-- 

Dr. Ian Oliver

Cybersecurity Research

Distinguished Member of Technical Staff

Nokia Bell Labs

+358 50 483 6237

 

  _____  

From: Laurence Lundblade <lgl@island-resort.com <mailto:lgl@island-resort.com> >
Sent: 11 November 2019 00:44
To: Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com <mailto:ncamwing@cisco.com> >
Cc: Henk Birkholz <henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de> >; rats@ietf..org <mailto:rats@ietf..org>  <rats@ietf.org <mailto:rats@ietf.org> >
Subject: Re: [Rats] Call for adoption (after draft rename) for Yang module draft 

 

 

On Nov 10, 2019, at 2:20 PM, Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com <mailto:ncamwing@cisco.com> > wrote:

 

So, Laurence, are you still OK with the adoption of the current draft with a rename for now?
Thanks, Nancy

 

I think the value add to the larger RATS effort of adding EAT support to this YANG protocol is really high. It a core thing to do that helps bring together the two attestation worlds and make the TPM and EAT work here less like ships in the night.

 

Remote TPM attestations are useful and necessary the short run, but are of very limited capability. I believe that EAT will replace TPM attestations in the long run (maybe decades) because they are far more expressive. I know others believe that too. 

 

If we don’t include EAT in the YANG mode it is sort of like defining HTTP to only convey HTML to the exclusion of PDF. We’re defining an attestation protocol that can only move one kind of attestation even though we have consensus on what the other one looks like.

 

It seems relatively simple to add EAT support (or promise to add EAT support). Pretty sure I heard Henk agree to add it.

 

Thus, I am opposed to adoption with the current TPM-only draft. I’d be OK with the current draft and a promise to add EAT to it.

 

LL