Re: [Rats] About (E)UID's

Simon Frost <Simon.Frost@arm.com> Wed, 12 February 2020 17:52 UTC

Return-Path: <Simon.Frost@arm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BBA1120805 for <rats@ietfa.amsl.com>; Wed, 12 Feb 2020 09:52:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=S9OEJTvC; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=S9OEJTvC
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9nyOA1lBdFtt for <rats@ietfa.amsl.com>; Wed, 12 Feb 2020 09:52:49 -0800 (PST)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50071.outbound.protection.outlook.com [40.107.5.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A73C120164 for <rats@ietf.org>; Wed, 12 Feb 2020 09:52:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SaqIOmgPtGgEUAfbgQwvnwZ7BN4a3JCPRCWPL43ePwA=; b=S9OEJTvCxQ/ij8N/lPJj0XgYP/up7e/aBXJl0SS94Ul+xarGZdOedCMsKgRuFLFT+Ky8g3brb86Z0e5+q9YJXKbIOHMrwxwlFnTm8vq8VBM4yPKItq00udScbrsUrR4ljrgicB4Q6CFk9gAVXfNozrRLVai4omIHRQNy+xDjde0=
Received: from VI1PR0802CA0032.eurprd08.prod.outlook.com (2603:10a6:800:a9::18) by VI1PR08MB3904.eurprd08.prod.outlook.com (2603:10a6:803:c0::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.22; Wed, 12 Feb 2020 17:52:42 +0000
Received: from AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com (2a01:111:f400:7e08::209) by VI1PR0802CA0032.outlook.office365.com (2603:10a6:800:a9::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.25 via Frontend Transport; Wed, 12 Feb 2020 17:52:42 +0000
Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT060.mail.protection.outlook.com (10.152.16.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2665.18 via Frontend Transport; Wed, 12 Feb 2020 17:52:42 +0000
Received: ("Tessian outbound 3a0cbd311638:v42"); Wed, 12 Feb 2020 17:52:42 +0000
X-CR-MTA-TID: 64aa7808
Received: from dfa734543ff5.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 0F490023-3FE7-4CE1-9072-B36D1D3195CB.1; Wed, 12 Feb 2020 17:52:37 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id dfa734543ff5.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 12 Feb 2020 17:52:37 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Y7uaMCPjXR4Q77KY2rI1YaL2VJzudb9FFtsMii7NyYR8FlmAS45+iPL4+1sVc8/Gz6tyC1zOlfD7lLQm782hV7hVsZ7kYsyZ8QR2EnyatS/gnGahqE7Sw9Pwug5HDFnmTyCwPg3+GLRN/PQ4ev3GUwCd1qJYa3Xxzf2OXyI8ILnCRQTRslK6dvDTj4w3h1v/EcDLemgaLh8QYOaQ3Um1OlusymSrZEJajqfnFXagPe8N6VefNqxsBQeW3ZBjPCt8+aYiT59p3XXcOC1IgEJyDyYfoYtmB9bf84CIJ4x43pdQjXpB7KRgeS2ddNeVmYseJiiqAdFVtx3pRD6XwS4qyQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SaqIOmgPtGgEUAfbgQwvnwZ7BN4a3JCPRCWPL43ePwA=; b=VO9m9x6s50fyIIu8+jwufUWyEVlY+pqif4iNvPDbZ4R8nNwSvnBGh8shKnhQOa4h958luKiNrGalfsPlWNij8erYmvvtzaQg5Q2SgrLW4CBhY+F7MXoQMD6iJpEWZ5AnZtvLuHnEE+sHh/F2CmhgFQXuciAaHm4XDCPen40moG9SBpvnLY3ZYgka6jRA/Jx/Id9ZIkNHMqoUF72u/VltQY1dSFH6AKOTA7xnDuMFXB5bKSYEEiH+SKwx1FJWqFk8dTCGty3sDFv9bNCCcpoUFEmup22LfBuq+U0sUEJflKQWzyaREjzZR/hhUS4wenlwQqV/9MsiKGXEfyMPQmb/gw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SaqIOmgPtGgEUAfbgQwvnwZ7BN4a3JCPRCWPL43ePwA=; b=S9OEJTvCxQ/ij8N/lPJj0XgYP/up7e/aBXJl0SS94Ul+xarGZdOedCMsKgRuFLFT+Ky8g3brb86Z0e5+q9YJXKbIOHMrwxwlFnTm8vq8VBM4yPKItq00udScbrsUrR4ljrgicB4Q6CFk9gAVXfNozrRLVai4omIHRQNy+xDjde0=
Received: from DBBPR08MB4903.eurprd08.prod.outlook.com (10.255.78.17) by DBBPR08MB4284.eurprd08.prod.outlook.com (20.179.44.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.23; Wed, 12 Feb 2020 17:52:35 +0000
Received: from DBBPR08MB4903.eurprd08.prod.outlook.com ([fe80::880d:db9f:7e7c:a934]) by DBBPR08MB4903.eurprd08.prod.outlook.com ([fe80::880d:db9f:7e7c:a934%7]) with mapi id 15.20.2729.021; Wed, 12 Feb 2020 17:52:35 +0000
From: Simon Frost <Simon.Frost@arm.com>
To: Laurence Lundblade <lgl@island-resort.com>, Thomas Fossati <Thomas.Fossati@arm.com>
CC: "Salz, Rich" <rsalz@akamai.com>, "rats@ietf.org" <rats@ietf.org>, "Smith, Ned" <ned.smith@intel.com>
Thread-Topic: [Rats] About (E)UID's
Thread-Index: AQHV3bXmW6h++AX9GUeMvr4rBHsANKgP5Z2AgABgOICAAayuAIAEFkMQgAF83wCAABkjIIAAHeuAgAAE9ICAABNRgIAACQMA
Date: Wed, 12 Feb 2020 17:52:34 +0000
Message-ID: <DBBPR08MB4903A37806D5FEFF19643813EF1B0@DBBPR08MB4903.eurprd08.prod.outlook.com>
References: <8BDAAE2E-9803-4048-AD5B-59233708E6FB@akamai.com> <1C16DAA0-D03B-417C-894A-30C4015AEED7@island-resort.com> <DBBPR08MB49031E717F69E4CF58CF67A1EF1C0@DBBPR08MB4903.eurprd08.prod.outlook.com> <509C8229-20DC-4888-BE1D-9109733A9E2D@intel.com> <5B9516E6-1441-462E-86D2-B630B32CE1C7@island-resort.com> <DBBPR08MB4903356ED09601AA7A6006FAEF180@DBBPR08MB4903.eurprd08.prod.outlook.com> <07A3E092-068F-4E35-8C39-D290FDB8CFDC@island-resort.com> <DBBPR08MB4903840E6D30A59083F8B119EF1B0@DBBPR08MB4903.eurprd08.prod.outlook.com> <6CD93307-E6F2-40F9-B041-FEBF5AD226CA@akamai.com> <DE7B37F5-5675-4F3D-B279-5FB92107BED4@arm.com> <4680A258-DBCD-4464-91ED-DE239C55701B@island-resort.com>
In-Reply-To: <4680A258-DBCD-4464-91ED-DE239C55701B@island-resort.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: b0a8c2f9-5264-4c2d-975d-892b78bfab40.0
x-checkrecipientchecked: true
Authentication-Results-Original: spf=none (sender IP is ) smtp.mailfrom=Simon.Frost@arm.com;
x-originating-ip: [217.140.106.52]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: c2651a7e-1ddf-432a-13ac-08d7afe45bca
X-MS-TrafficTypeDiagnostic: DBBPR08MB4284:|DBBPR08MB4284:|VI1PR08MB3904:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS: <VI1PR08MB3904AEB134D9820EC5ECBBE7EF1B0@VI1PR08MB3904.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:9508;OLM:10000;
x-forefront-prvs: 0311124FA9
X-Forefront-Antispam-Report-Untrusted: SFV:NSPM; SFS:(10009020)(4636009)(366004)(346002)(376002)(396003)(39860400002)(136003)(199004)(189003)(33656002)(86362001)(52536014)(316002)(5660300002)(64756008)(66556008)(8936002)(66946007)(66476007)(76116006)(8676002)(7696005)(478600001)(66446008)(9686003)(2906002)(110136005)(26005)(6636002)(53546011)(6506007)(4326008)(55016002)(71200400001)(81156014)(81166006)(54906003)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:DBBPR08MB4284; H:DBBPR08MB4903.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 55NEG38FzvQR3ypa1zdLL5LJNcdcPeQaNGZQpBVnwNbp6fGab09O8eXzvEGFe7fId70kDUgXy9rfGrL0dAjuswOQ7jEMCQUPOcwQxhePesw0HRkQoUrSh6avjhZ1YovuthK0vkHN5sW1c/3cHSmdQEwgIAQehIEYMiw8rVP4nbrYRDt+xllyICvHjH6nJAJC2bGnzpPkAZuqQ0jXBAQK83Qt5lW3GMfMQ0s616I/rW6P94WCn/AQgrZCrWEazgm+Ii6Z8h5Qbe9HD9aPPhYd6X91bVDr/qDaL8WdeApsb4+j629pwCE6ZEsNXaJ9u6jbwP5oK1xDw9e/kchtzsgNGCkG5vx77x874G5sSWhdTzDVIz2fiABQ3Ds6NxBKOdb5lCCB320ikBQCwaHu1YtcO/82cB/EvJ4ecvh++pFIxEvXspCrAU4z9mAeqeLUDYyE
x-ms-exchange-antispam-messagedata: AiwrNKq3T1Wle40iigh5b2szpGi0vbDwQe/1BF8UDDonbjIBNQUqVy/OkaYegCc3COHxjL/DRoXrm9Lu4kG+jUkBt99AMl5hZPGxhpF2JUOK6+KGM1tWrsJ6tGHPNk4wlYIyPo9i8GVsX4v/qWHb9w==
Content-Type: multipart/alternative; boundary="_000_DBBPR08MB4903A37806D5FEFF19643813EF1B0DBBPR08MB4903eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4284
Original-Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Simon.Frost@arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; IPV:CAL; SCL:-1; CTRY:IE; EFV:NLI; SFV:NSPM; SFS:(10009020)(4636009)(396003)(39860400002)(376002)(346002)(136003)(189003)(199004)(52536014)(55016002)(70586007)(186003)(81166006)(70206006)(336012)(26005)(81156014)(8936002)(8676002)(2906002)(9686003)(54906003)(110136005)(4326008)(356004)(7696005)(6506007)(36906005)(478600001)(316002)(33964004)(33656002)(107886003)(86362001)(53546011)(26826003)(6636002)(5660300002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR08MB3904; H:64aa7808-outbound-1.mta.getcheckrecipient.com; FPR:; SPF:Pass; LANG:en; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; MX:1; A:1;
X-MS-Office365-Filtering-Correlation-Id-Prvs: d98f2315-5aa3-4402-7bb6-08d7afe4576c
X-Forefront-PRVS: 0311124FA9
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: OUx00Fo1PCepufwxetl1g9EhRd44on/5j6SkFH0MU262vm3baPIgM1ilYOkE32TFNt4/jyhS2pZ5dq9trjJlYmi3b7UsYl1LN4m98AiCXSWp50zzSSuLLBV11rzuzW7/qWpyT8O2mTcPOQ4MGmEKSZ+/IS9VkNk/xPCXNaQs/z8zMrEjAbuYQucCc2hIy4g/DlznAIxOHn3RCXP/CVzm4IHKm21/61bSDKNefsKypPeRk/xsTPR4DwjM7rVffjU3R8Lcxrfi9Y3mwdFicrc1H32j4N54FQBW060dkDiBizpggKYBKeMo4k3ugmYdZvZH6VV8yF1gKe1/f6oxzZW3dywhEapaHDijkbFZePgiuwyAA01ppK0pyY8pNPX+YeuwGd5HXx549TYWS+FIwAiHZ9o7VjQ8bp3nReoLVeREUWu1BKnHVh0NeW46HLqgoTHB
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2020 17:52:42.2768 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: c2651a7e-1ddf-432a-13ac-08d7afe45bca
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3904
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/MxBJHSi5TDC7uTuOu6KGZrevHoY>
Subject: Re: [Rats] About (E)UID's
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Feb 2020 17:52:53 -0000

I think that modification would address this discussion well (though perhaps add ‘or verifier’ as well as relying party in the text).

I agree not making a hard association here with any key selection, any implementor should be considering their particular threat model on how the different claims are protected.

Thanks
Simon

From: Laurence Lundblade <lgl@island-resort.com>
Sent: 12 February 2020 17:17
To: Thomas Fossati <Thomas.Fossati@arm.com>
Cc: Salz, Rich <rsalz@akamai.com>om>; Simon Frost <Simon.Frost@arm.com>om>; rats@ietf.org; Smith, Ned <ned.smith@intel.com>
Subject: Re: [Rats] About (E)UID's


On Feb 12, 2020, at 4:07 PM, Thomas Fossati <Thomas.Fossati@arm.com<mailto:Thomas.Fossati@arm.com>> wrote:

On 12/02/2020, 15:50, Salz, Rich <rsalz@akamai.com<mailto:rsalz@akamai.com>> wrote:

I am still concerned about what fails if someone re-uses an EUID,
either by accident or maliciously.  If the security of the RATS
architecture depends on uniqueness, this seems important.

I agree with you.

Here’s some text we might add:

UEID’s are intended to be globally unique permanent device identifiers, but these characteristics rely on the implementors of device following the specification well. A relying party, particularly one dealing with a very broad variety of devices from different manufacturers, may wish to take into account other data in the token to uniquely identify the device. For example they might consider a hash some or all of the UEID + oemid + hw_version + signing_key as the unique identifier of the device. Note these are all values that are permanently set for a device at time of manufacturer.




If ueid is used to locate the verification key, then verification
would fail.  (BTW, this is what we do in PSA.)

If ueid is disjoint from the verification key, then it *might* result in
impersonation -- this also depends on the verification policy.

I would like to keep the text in EAT for UEID focused on device identification and not try to build it into a key ID too, so I don’t think the text in the EAT document should consider that use case for UEID. Profiles of EAT can specify that and can doubly insist on uniqueness, proper implementation and have a certification program to check.

EAT is intended for use with a lot of different key types and signing schemes including things like ECDAA. Android and FIDO attestation use one key across 100,000 device for privacy. One implementation of attestation I’ve seen authenticates the relying party and generates relying-party specific UEIDs that are disjoint from the attestation key.  EAT needs to work for all of these. No strong coupling between the UEID and signing key should be required in the main EAT standard *and* it must allow for strong coupling should a profile wish it.

That is:
- UEIDs are for device identification
- Signing and signing keys are for claims authenticity and integrity, not device identification



The EAT document should warn about the latter.

Is the text above for the relying party, sufficient warning for the general case?  PSA will probably want stronger words in its profile.

LL
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.