Re: [Rats] use case document updates on Roots of Trust

Carl Wallace <carl@redhoundsoftware.com> Mon, 16 September 2019 12:26 UTC

Return-Path: <carl@redhoundsoftware.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D67612082F for <rats@ietfa.amsl.com>; Mon, 16 Sep 2019 05:26:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhoundsoftware.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VQ07-gd0PR_c for <rats@ietfa.amsl.com>; Mon, 16 Sep 2019 05:26:12 -0700 (PDT)
Received: from mail-qk1-x741.google.com (mail-qk1-x741.google.com [IPv6:2607:f8b0:4864:20::741]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6A1312006B for <rats@ietf.org>; Mon, 16 Sep 2019 05:26:12 -0700 (PDT)
Received: by mail-qk1-x741.google.com with SMTP id w2so13265187qkf.2 for <rats@ietf.org>; Mon, 16 Sep 2019 05:26:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhoundsoftware.com; s=google; h=user-agent:date:subject:from:to:cc:message-id:thread-topic :references:in-reply-to:mime-version:content-transfer-encoding; bh=7Ujf5S/ZjgwisJS8YezNMSlB0Y/LL/3FpeTkexbH774=; b=mCSxkdXdInNQfiKabESbUxqz5x9vlE+giN+sPZROtsleS/SkGiMWjwNmIwSIzJXAT3 63GWf92hUDkgttyCFMVk+RrADlpEwusX9lUQ3CQhNUxgqnKRc/c7Rz9wPl5jUEMk1eMx WhNSSPCcZYVLOFH5vX6IL9h4xGAFSV4KuHPVI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:user-agent:date:subject:from:to:cc:message-id :thread-topic:references:in-reply-to:mime-version :content-transfer-encoding; bh=7Ujf5S/ZjgwisJS8YezNMSlB0Y/LL/3FpeTkexbH774=; b=YWM3EZMu9B/sSr7oMpvSJSTKaGZjsKEPklRaIYkmtKWX3xmXgpdQOngBh8htv1tgZc JFzpv+0dy5ONovIGXJXgkNyuJl63xXxJbxgYX205K7oGJvbVk0b3v5tW0Gn3BVWRkS+Q QTSBlLFw3RWE1aBtr/MvUmSpzLBDp9X1qE/yq758dwSPYZtSjWqVP8LrljveT+wiuFG8 Orvn/udZTMOdwaXBeZDINowJ6UQfeeCVPU9LK67837YQ4fMzvOGh/yskdk/zKjhcUl0k SG53SCSuk4P4FhulMPlzs1HesnwZtctCn0UciWHujNgKOs5ZR2r9wldSTD7nrExrsGm8 fxWQ==
X-Gm-Message-State: APjAAAUKgHKAj7TlROU3mn4J3vf4fXVa5H4X52A72VKx9pyXqkf7lc5Q EBZENW3I+FImuWYD6tB25PRfbg==
X-Google-Smtp-Source: APXvYqx0RX+t+GHWo+Xnzzx1uq6JVlxfOEoXVaFPf1ro7onOMfo+Xq3GE/JG0NroamfskVCGThjfMg==
X-Received: by 2002:a37:9d53:: with SMTP id g80mr58630850qke.67.1568636771711; Mon, 16 Sep 2019 05:26:11 -0700 (PDT)
Received: from [192.168.2.105] (pool-96-255-231-27.washdc.fios.verizon.net. [96.255.231.27]) by smtp.googlemail.com with ESMTPSA id r4sm3835126qkb.25.2019.09.16.05.26.08 (version=TLS1 cipher=AES128-SHA bits=128/128); Mon, 16 Sep 2019 05:26:11 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/14.7.6.170621
Date: Mon, 16 Sep 2019 08:26:04 -0400
From: Carl Wallace <carl@redhoundsoftware.com>
To: Laurence Lundblade <lgl@island-resort.com>, "Salz, Rich" <rsalz@akamai.com>
CC: Michael Richardson <mcr+ietf@sandelman.ca>, "rats@ietf.org" <rats@ietf.org>
Message-ID: <D9A4F66D.EB1C1%carl@redhoundsoftware.com>
Thread-Topic: [Rats] use case document updates on Roots of Trust
References: <4155.1567948986@dooku.sandelman.ca> <64BD12AA-951A-468A-9F08-D442054605AD@island-resort.com> <de6ff852-062d-805d-3eed-10aca60502b2@sit.fraunhofer.de> <CAN40gStH5jUCJeVggREr3ABoFw7K97F=KtoJOSR_X+LWNLB+JA@mail.gmail.com> <CAN40gSu13DKkyahHA3_Cbt5j7Gsh=uGh5ic7fS3AvDGP3K1cug@mail.gmail.com> <5276.1568315351@dooku.sandelman.ca> <92137679-7DEA-42AD-B8D1-F3B909C77459@akamai.com> <BAA4C3C3-C98B-4BA7-8C89-A169DD99EF86@island-resort.com>
In-Reply-To: <BAA4C3C3-C98B-4BA7-8C89-A169DD99EF86@island-resort.com>
Mime-version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/OSCOTP_PJCo6PcLPfjsbYwmJUWg>
Subject: Re: [Rats] use case document updates on Roots of Trust
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Sep 2019 12:26:15 -0000

I took Rich's statement to be more from a relying party perspective and
your detail to be more what one might find in a policy describing nature
of the root of trust, which is not that different from how one may
describe a trust anchor/CA in a PKIX context in a policy that describes
how a CA are operated, etc. Two sides of the same coin.

On 9/15/19, 4:50 PM, "RATS on behalf of Laurence Lundblade"
<rats-bounces@ietf.org on behalf of lgl@island-resort.com> wrote:

>On Sep 12, 2019, at 3:31 PM, Salz, Rich <rsalz@akamai.com> wrote:
>> 
>> I do not see a meaningful difference between "trust anchor" and "trust
>>root" and "root(s) of trust."  All of them:
>> 	- Are pieces of data (certificate or key is not meaningful)
>> 	- Used to verify something such as a certificate or signature
>> 	- Are trusted by the application, based on actions that are "out of
>>band" of the application itself
>
>This is not how I understand a root of trust, nor how I think it is
>generally used in the TCG or TEE worlds. I think a root of trust involves
>a CPU, memory and SW that actively does something like boot and measure a
>device. There is usually a boundary around it so that other software on
>the device, like the high-level OS, can’t corrupt it. When it is doing
>reporting as in RATS it will have a private key that can do some signing.
>When it is doing trusted/secure boot, it will also have a public key to
>verify the software it loads.
>
>LL
>
>
>_______________________________________________
>RATS mailing list
>RATS@ietf.org
>https://www.ietf.org/mailman/listinfo/rats