Re: [Rats] draft-chen-rats-tee-identification-01 and IDevID

Meiling Chen <chenmeiling@chinamobile.com> Wed, 04 August 2021 02:00 UTC

Return-Path: <chenmeiling@chinamobile.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94FFB3A3C34 for <rats@ietfa.amsl.com>; Tue, 3 Aug 2021 19:00:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.588
X-Spam-Level:
X-Spam-Status: No, score=-2.588 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x6cdGMEgRZBX for <rats@ietfa.amsl.com>; Tue, 3 Aug 2021 19:00:32 -0700 (PDT)
Received: from cmccmta3.chinamobile.com (cmccmta3.chinamobile.com [221.176.66.81]) by ietfa.amsl.com (Postfix) with ESMTP id ED8633A3C33 for <rats@ietf.org>; Tue, 3 Aug 2021 19:00:29 -0700 (PDT)
Received: from spf.mail.chinamobile.com (unknown[172.16.121.15]) by rmmx-syy-dmz-app10-12010 (RichMail) with SMTP id 2eea6109f4ac2c3-fcdaf; Wed, 04 Aug 2021 10:00:14 +0800 (CST)
X-RM-TRANSID: 2eea6109f4ac2c3-fcdaf
X-RM-TagInfo: emlType=0
X-RM-SPAM-FLAG: 00000000
Received: from cmcc-PC (unknown[223.104.39.124]) by rmsmtp-syy-appsvr08-12008 (RichMail) with SMTP id 2ee86109f4a84cb-9679e; Wed, 04 Aug 2021 10:00:13 +0800 (CST)
X-RM-TRANSID: 2ee86109f4a84cb-9679e
Date: Wed, 04 Aug 2021 10:00:11 +0800
From: Meiling Chen <chenmeiling@chinamobile.com>
To: Laurence Lundblade <lgl@island-resort.com>, yangpenglin <yangpenglin@chinamobile.com>
Cc: "rats@ietf.org" <rats@ietf.org>, suli <suli@chinamobile.com>
References: <0264979E-551B-41FE-BFAC-5A2A70A4C3AB@island-resort.com>, <2021080310515807143522@chinamobile.com>, <DB8101D3-AEA7-4733-9274-C52839B62F20@island-resort.com>
X-Priority: 3
X-Has-Attach: no
X-Mailer: Foxmail 7.2.9.115[cn]
Mime-Version: 1.0
Message-ID: <202108040943114486871@chinamobile.com>
Content-Type: multipart/alternative; boundary="----=_001_NextPart232203538271_=----"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/Omf8fbYt1-UwGJPgT-3-W-t0kB8>
Subject: Re: [Rats] draft-chen-rats-tee-identification-01 and IDevID
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2021 02:00:37 -0000

Hi Laurence,
It was really under your comments we noticed the IDevID, your suggestion do help.
We are not sure if we can reuse the implementation of IDevID, since we have notice there are some gaps, such as the processing of encryption and the interface with server. we will discuss it in detail, if it can be reused, we are willing to introduce it as a part for implementation. 

Best Reguards,
Meiling
 
From: Laurence Lundblade
Date: 2021-08-04 03:25
To: yangpenglin
CC: rats; 粟栗; chenmeiling
Subject: Re: [Rats] draft-chen-rats-tee-identification-01 and IDevID
Hello,

My primary observation is that the goals of the two protocols are very similar. I didn’t know whether you had looked at IDevID or not.

Also, I think an implementation of IDevID could be put in a TEE. Then your security goals would be met, I think.

This is just to offer a few thoughts and ideas. :-)

LL




On Aug 2, 2021, at 7:51 PM, yangpenglin@chinamobile.com wrote:

Hello there,as one of the authors, thank you very much for your advice, and it helps a lot. I made a comparison below to make a clarification about the difference and the meaning of TEE identification.
Architecture of IDevID
<CatchA81D.jpg>


Architecture of TEE Identification
<Catch04E1.jpg>
    In figure 1,the identity of IDevID will be exposed during the interface which is shown in arrow. In another word, there is no trusted binding between the ID and EAP-TLS server. If the attestation device is compromised, the attackers could obtain the ID and use it in other authentication scenarios.
In figure 2, all the ID related data will be encrypted by EAP-TLS handshake keys. The Inner middle layer could only export the handshake secret key encrypted certificate after verifying the credentials of EAP-TLS server. Since the EAP-TLS server will generate a random during every connection, so this architecture could also prevent replay attack.
The above is the fundamental distinction of these two architectures. This TEE identification architecture also indicates that this draft mostly focuses on the Inner middle layer and external middle layer design to provide a mechanism that could build a trusted connection between TEE and EAP-TLS Server. 
In the webinar there is a question about which identity should be supported in the architecture. Because of time limitation we cannot communicate very well. I think that the draft doesn’t restrict the type of identities since it can use X509 or RPK to identify during the process of EAP-TLS establishment. Or other identities could be sent out as encrypted application layer data after the EAP-TLS establishment.
AS a summary, the meaning of this architecture is to build a trusted authentication procedure with EAP-TLS server when the TEE resource is restricted. (If the TEE resource is sufficient, the whole network stack and EAP-TLS client could be involved in TEE.) And based on the protection of TEE, the sensitive data like IDs, keys will never be exposed in REE as plaintext.   




BR 

Penglin Yang 
China Mobile

 
From: Laurence Lundblade
Date: 2021-07-31 06:33
To: rats
CC: chenmeiling; suli
Subject: [Rats] draft-chen-rats-tee-identification-01 and IDevID
This is just to note that draft-chen-rats-tee-identification-01 seems conceptually similar to IDevID which is described in 
IEEE Std 802.1ARTM-2018, the title of which is "Secure Device Identity”.
 
LL