Re: [Rats] Android comments on EAT draft

Giridhar Mandyam <mandyam@qti.qualcomm.com> Tue, 21 May 2019 03:40 UTC

Return-Path: <mandyam@qti.qualcomm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD54112003F for <rats@ietfa.amsl.com>; Mon, 20 May 2019 20:40:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=qti.qualcomm.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b3Wcp5_7KtFp for <rats@ietfa.amsl.com>; Mon, 20 May 2019 20:40:47 -0700 (PDT)
Received: from alexa-out-sd-02.qualcomm.com (alexa-out-sd-02.qualcomm.com [199.106.114.39]) (using TLSv1.2 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9423A120111 for <rats@ietf.org>; Mon, 20 May 2019 20:40:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qti.qualcomm.com; i=@qti.qualcomm.com; q=dns/txt; s=qcdkim; t=1558410047; x=1589946047; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=BQI25fCFuO139uBQgdkafkdl0uUxcsu6jFxtG5DujbE=; b=uMrPFitl/FHEo0c23J81g70VgXwF4+hcoqybnhPqJY+XPtoW8H5jCrq3 AyRE5+TEEwr7G1Fb22q7jRMJYp6mVjaUmNQA5k/k5SJprMRRs8bymTum+ +DgYOTrP1itCbyqezE3jfU1kcW9PTHab4GJK5JfO3DVTWsDIJdeVV4dDR 8=;
Received: from unknown (HELO ironmsg05-sd.qualcomm.com) ([10.53.140.145]) by alexa-out-sd-02.qualcomm.com with ESMTP; 20 May 2019 20:40:46 -0700
X-IronPort-AV: E=McAfee;i="5900,7806,9263"; a="255583749"
Received: from nasanexm01a.na.qualcomm.com ([10.85.0.81]) by ironmsg05-sd.qualcomm.com with ESMTP/TLS/AES256-SHA; 20 May 2019 20:40:46 -0700
Received: from NASANEXM01C.na.qualcomm.com (10.85.0.83) by nasanexm01a.na.qualcomm.com (10.85.0.81) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 20 May 2019 20:40:46 -0700
Received: from NASANEXM01C.na.qualcomm.com ([10.85.0.83]) by NASANEXM01C.na.qualcomm.com ([10.85.0.83]) with mapi id 15.00.1395.000; Mon, 20 May 2019 20:40:46 -0700
From: Giridhar Mandyam <mandyam@qti.qualcomm.com>
To: "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] Android comments on EAT draft
Thread-Index: AQHVC4B6k56wXxjAOEyVrZUT4gj5/KZte9yAgACT9wCAAFg1gIACDseAgASGhgD//+ig8A==
Date: Tue, 21 May 2019 03:40:45 +0000
Message-ID: <4576ba43611446a9be9759bb22cc2a9b@NASANEXM01C.na.qualcomm.com>
References: <CAFyqnhVJ-ps4bdhsyQDOHdzHVZsXeK7_kCDXxUVUcuyDzWS3uA@mail.gmail.com> <35459D73-3D08-4E0B-814B-780AD60DD600@island-resort.com> <HE1PR0801MB1643AA2E129098E2C65F9163EF0A0@HE1PR0801MB1643.eurprd08.prod.outlook.com> <0B8DFC2F-9C35-4F72-A07F-E5258413F50F@arm.com> <7661893A-8EEC-475F-9FB2-CBB2915E2C95@island-resort.com> <B4E207B0-3367-4CDB-AF5D-AC539BD29852@arm.com>
In-Reply-To: <B4E207B0-3367-4CDB-AF5D-AC539BD29852@arm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.80.80.8]
Content-Type: multipart/alternative; boundary="_000_4576ba43611446a9be9759bb22cc2a9bNASANEXM01Cnaqualcommco_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/N4EghZynY4O5kCDRAK9hBw_IK6c>
Subject: Re: [Rats] Android comments on EAT draft
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 May 2019 03:40:51 -0000

> The idea is that a device might want to attest a key that would be used for other purposes than proof-of-possession (authentication).

EAT can be applied to use cases other than attestation of a key that is only used for PoP.

For instance, I had proposed a usage of EAT for the W3C’s Web Authentication API (Webauthn).  For Webauthn, the ideal attestation would be for the authenticator itself (e.g. biometric), which could also include the credential (keypair) along with matcher protection, anti-spoof implementation, etc.  In the Webauthn case, the keypair is used to sign assertions when a user verification having taken place (see https://w3c.github.io/webauthn/#sctn-op-get-assertion, the assertion represents more than just PoP of the private key).  The Webauthn attestation can be broader than just attesting the keypair – the authenticator implementation can be attested as well (which is not the same as the device itself).  In other words, the attestation is broader than for a key used only for proof-of-possession.

Following the model provided in Webauthn (https://w3c.github.io/webauthn/#sctn-attestation), I proposed https://pr-preview.s3.amazonaws.com/gmandyam/webauthn/pull/1121.html#fido-eat .  Granted – this is only an initial proposal and would need a another look.  But the existing claim set only had to be extended slightly in order to meet Webauthn requirements.  The claim set can be extended further given the use of the Webauthn keypair in the context of user verification.  For instance, in the SoC context, if the keypair is implemented in a root-of-trust but the biometric is implemented in user space (e.g. rich execution environment such as Android), then the EAT claims can be augmented to provide this information.

Note that for Webauthn, an IANA registry has been proposed that would allow for extension of the existing suite of attestation formats (https://tools.ietf.org/html/draft-hodges-webauthn-registries-02 ).  For any attestation formats this group considers, it could be a good exercise to see how the format could meet the Webauthn requirements if we want to verify that an attestation format is usable beyond keypairs used for PoP.

-Giri Mandyam

From: RATS <rats-bounces@ietf.org> On Behalf Of Mathias Brossard
Sent: Monday, May 20, 2019 2:04 PM
To: Laurence Lundblade <lgl@island-resort.com>
Cc: Shawn Willden <swillden=40google.com@dmarc.ietf.org>; rats@ietf.org; Simon Frost <Simon.Frost@arm.com>
Subject: Re: [Rats] Android comments on EAT draft

.
Hi,

The idea is that a device might want to attest a key that would be used for other purposes than proof-of-possession (authentication). The attestation token would act as a form of certificate, essentially the link between a key to a device. We are thinking about integrity (signature) and encryption / key agreement. In many cases you could use TLS with PoP to provide the same kind of security properties. But in some cases there is no IP connectivity, the resources are too constrained or you want the security to be maintained end-to-end (rather than at the transport layer).

The protocol flow would not change for attestation.

Sincerely,
-- Mathias Brossard

From: Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>
Date: Friday, May 17, 2019 at 6:57 PM
To: Mathias Brossard <Mathias.Brossard@arm.com<mailto:Mathias.Brossard@arm.com>>
Cc: Simon Frost <Simon.Frost@arm.com<mailto:Simon.Frost@arm.com>>, Shawn Willden <swillden=40google.com@dmarc.ietf.org<mailto:swillden=40google.com@dmarc.ietf.org>>, "rats@ietf.org<mailto:rats@ietf.org>" <rats@ietf.org<mailto:rats@ietf.org>>
Subject: Re: [Rats] Android comments on EAT draft


On May 16, 2019, at 9:31 AM, Mathias Brossard <Mathias.Brossard@arm.com<mailto:Mathias.Brossard@arm.com>> wrote:

But even for the relatively simple use-case of putting a public key in a token, which it technically supports, I am worried that the semantics might be too constraining. It focuses on proof-of-possession (PoP), where we are thinking about additional functions (signature, encryption, key agreement, etc.).

Mathias, can you say more about the additional functions you are thinking about?

Would they change the protocol flow in a big way? Mostly what we are thinking is that the RP sends a nonce to the device and the device returns a token.

LL


IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.