Re: [Rats] draft-ounsworth-rats-x509-evidence-00

"Smith, Ned" <ned.smith@intel.com> Thu, 09 November 2023 15:01 UTC

Return-Path: <ned.smith@intel.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8D4FC17DC03 for <rats@ietfa.amsl.com>; Thu, 9 Nov 2023 07:01:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.605
X-Spam-Level:
X-Spam-Status: No, score=-1.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_ABOUTYOU=0.5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=intel.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9rdiYEVqCGZ0 for <rats@ietfa.amsl.com>; Thu, 9 Nov 2023 07:01:40 -0800 (PST)
Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C14DCC17DBE0 for <rats@ietf.org>; Thu, 9 Nov 2023 07:00:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1699542023; x=1731078023; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=CcORKNlwHGxq5fgYWW0dHcyuKCZP6ToJwKw5uztdk94=; b=GsMmb0aNQmZoZumTObBOzJfIkaJnOSl4dpPXfkmhC6ykSn+fc3JXj3iF LPksOOREt61x+Y3DAVZGWqLw6PZdCBFu4NPnrillHrkgX9YbqHLsOjWM9 9W+78VBBI/cs4K2e8ZxP3L4eo0zis+0ZDizm0NY/NbEq/taeBsmUyDVv/ XGXmtrNV2FXO+yF9+hXAmjS/sS7DGnhmxPY5ZvDZOdi5/+oiRTBXGblH4 M4pVQjdMS19qlBGctZ9wNvfNgD+tUVIXUD+leFf0ScVn2lt9+I3Wr5uCw T4PGV9HbUpufCLKhJgMLvqheh4UMNT/HnRBkH0yaLVXjtAl414iQofliC A==;
X-IronPort-AV: E=McAfee;i="6600,9927,10889"; a="454301146"
X-IronPort-AV: E=Sophos;i="6.03,289,1694761200"; d="scan'208";a="454301146"
Received: from orviesa002.jf.intel.com ([10.64.159.142]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Nov 2023 06:58:40 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="6.03,289,1694761200"; d="scan'208";a="4562048"
Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by orviesa002.jf.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 09 Nov 2023 06:58:40 -0800
Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34; Thu, 9 Nov 2023 06:58:39 -0800
Received: from fmsmsx603.amr.corp.intel.com (10.18.126.83) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34; Thu, 9 Nov 2023 06:58:39 -0800
Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34 via Frontend Transport; Thu, 9 Nov 2023 06:58:39 -0800
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.169) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.34; Thu, 9 Nov 2023 06:58:39 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IvJAo4dCOPlkQsexctAOHG/I2JXl7DKPdNflXMhSCdalJqHYuHfa5Ie6VwBTYBKxCMra4mh2n/meiTHYkXXm0mMtOBmsuui5nyNHIGszWZboctDsenefI/BRCAkqCRkRuGfyN/Bw/Z/AZfOM8yNyYcdn43+FoblBNaaIiRKv8rjOxnBmsgzab69o/TdvDePHHubYIoL6eIdSNOXZ+NbeIxZT/fPtso0/jP6Nd/D2uYHh6kPN37GK+Ov/WfTDo8N2anW20bEvU3I5vwjZ/uXclfhWkDupsfjY1HjGHvRTv6c6O2FXAeQPsXx0q9sGW5a7StUC5UOu+O4C0cb1/lZi5w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=CcORKNlwHGxq5fgYWW0dHcyuKCZP6ToJwKw5uztdk94=; b=HbR5xyXVz5X/C2SOve0RMRZCS+E6P61/QjRz5lZlDmqrchFEZxf7qTYEy0JW01BtIP3PMfEyEQ9ryAAQd0Y812AHuQEQdtRWKV+zDFTgpx9/kTwbadJeVEyalquFWGG/cHlHKbWXDNMoUsSGrmVFNO+W2r3F7y1sBA25d/3jpxDsxNhbXtzBH2nDwOdN+1c6/TJbU8PVsN2XEmacNz87YR9yzlGxNVTxhmOGRQtEpwppB2ssgwwTw35vgMEvvd84zfyi4db09faEwXQMFiYeV21HGSJFrL0+1NIaq9Lk0qGMuDRCcUZnD80OsM0b7R0cEgINrly29oCeEuYfTp7Plg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
Received: from CO1PR11MB5169.namprd11.prod.outlook.com (2603:10b6:303:95::19) by PH7PR11MB7450.namprd11.prod.outlook.com (2603:10b6:510:27e::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6977.19; Thu, 9 Nov 2023 14:58:35 +0000
Received: from CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::9033:4536:8538:e366]) by CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::9033:4536:8538:e366%4]) with mapi id 15.20.6954.029; Thu, 9 Nov 2023 14:58:35 +0000
From: "Smith, Ned" <ned.smith@intel.com>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "hannes.tschofenig@gmx.net" <hannes.tschofenig@gmx.net>, 'Carl Wallace' <carl@redhoundsoftware.com>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] draft-ounsworth-rats-x509-evidence-00
Thread-Index: AQHaEwyLySoH75efLUaIUwxBgAy++LBx9M4AgAAA8QCAAAoRAIAAD2aAgAAA2wCAABUFAA==
Date: Thu, 09 Nov 2023 14:58:34 +0000
Message-ID: <DEDCA7BD-D5E3-411E-8C33-EDCFAF016534@intel.com>
References: <6FCC00F5-1FAE-4CCD-9ED2-DA2BA923E7F7@island-resort.com> <011801da130d$74579390$5d06bab0$@gmx.net> <66c6191b-c393-69da-a849-f44da369917a@sit.fraunhofer.de> <7DC2D9E1-F052-48A1-B5A8-978D52275EE5@redhoundsoftware.com> <01e001da131a$a8c7ba30$fa572e90$@gmx.net> <9b8eb6e3-1b9b-7a0a-dffd-f8d0912a7bb6@sit.fraunhofer.de>
In-Reply-To: <9b8eb6e3-1b9b-7a0a-dffd-f8d0912a7bb6@sit.fraunhofer.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.78.23102801
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB5169:EE_|PH7PR11MB7450:EE_
x-ms-office365-filtering-correlation-id: 36cf59df-5bef-490d-9de4-08dbe13458f4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB5169.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376002)(136003)(366004)(396003)(39860400002)(346002)(230922051799003)(1800799009)(186009)(64100799003)(451199024)(36756003)(41300700001)(8676002)(8936002)(2906002)(82960400001)(122000001)(5660300002)(33656002)(38070700009)(86362001)(26005)(71200400001)(2616005)(53546011)(6506007)(478600001)(966005)(6486002)(6512007)(83380400001)(38100700002)(110136005)(91956017)(64756008)(66476007)(76116006)(66946007)(66556008)(66446008)(316002)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <2E92F268DA299845AE39F073D04634FD@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB5169.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 36cf59df-5bef-490d-9de4-08dbe13458f4
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Nov 2023 14:58:34.9917 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jzwLdbuE5Yzn9iKoIIya5f2PHj9Sw3AHFCtfCZ1HRymYPKCSQb9zp1JumSFqm8rnJFzQ9MbsekplPXOBaG9CRg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB7450
X-OriginatorOrg: intel.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/Ov9JAfvSSfYLvAXPip8mDeRH4co>
Subject: Re: [Rats] draft-ounsworth-rats-x509-evidence-00
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Nov 2023 15:01:45 -0000

The draft set the expectation that it would define evidence and that it would also convey endorsements. There is a difference in what claims make sense as evidence vs. what claims make sense as endorsements / reference values. An AE can't tell the version of firmware but can tell what it's digest is. Similarly, and AE can tell whether a FIPS self-test ran, but can't tell what FIPS rating was assigned by a FIPS lab. 

EAT claims are defined in such a way that they could be incorporated into a profile that defines evidence / endorsements / reference values / attestation results. That doesn't mean it makes sense for all EAT claims to be asserted in every type of conceptual message. 

The X.509 Attestation Evidence draft could be viewed as a profile for the HSM community. There will be claims that don't make sense as evidence (e.g., I don't know of any HSMs that have a GPS receiver or can triangulate a location using wireless signals). There likely are other EAT claims that don't make sense as endorsements for HSMs also. 

The question of ASN.1 vs. CBOR vs. JSON isn't that interesting from a bow tie perspective (we'd like the industry to easily map between them), but it might not make sense from a HSM community profile, which necessarily constrains the set of claims to those that make the most sense for that community.

-Ned

On 11/9/23, 3:43 PM, "RATS on behalf of Henk Birkholz" <rats-bounces@ietf.org <mailto:rats-bounces@ietf.org> on behalf of henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de>> wrote:


On 09.11.23 15:40, hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net> wrote:
> Hi Carl,
> 
> A few responses below:
> 
> * The use of CBOR/COSE in SUIT: At the start of the SUIT working group the participants expressed a strong preference to use CBOR/COSE and didn't want to use ASN.1/CMS. Brendan and I had written a draft that used ASN.1, which was inspired by work Russ did. It happens that work being proposed does not align with the expectations of the group. I remember Henk and Carsten being vocal proponents of CBOR & COSE at that time. Was it a good idea to use CBOR/COSE instead of ASN.1/CMS? Now that the standardization and implementation work is almost finished it is a bit too late to ask this question again.
> 
> * Do we want to provide claim definitions in ASN.1 format (as we do in the draft)? That was our understanding from the design team discussions.
> 
> * Should we keep the definition of the CBOR/COSE claim definitions in sync with the ASN.1 format? I believe there is value in doing so. There does not seem to be anything wrong with the semantics of the claims in EAT. We have received feedback already for better alignment since we have introduced a few bugs in the -00 submission.
> 
> * A question you did not ask was: Should all claims in EAT also be described in an ASN.1 format? Currently the draft only contains a subset of the claims. I have been asking myself the same question. It is somewhat likely that sooner or later all claims defined in EAT will need to be available in ASN.1 format.


Had the same thought, did not dare to voice it. I can imagine Mike 
groaning (as he wants to move fast). Not sure, if this I-D is the one to 
do that. Mike?


> 
> Ciao
> Hannes
> 
> -----Original Message-----
> From: RATS <rats-bounces@ietf.org <mailto:rats-bounces@ietf.org>> On Behalf Of Carl Wallace
> Sent: Donnerstag, 9. November 2023 14:45
> To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de>>; rats@ietf.org <mailto:rats@ietf.org>
> Subject: Re: [Rats] draft-ounsworth-rats-x509-evidence-00
> 
> 
> On 11/9/23, 8:09 AM, "RATS on behalf of Henk Birkholz" <rats-bounces@ietf.org <mailto:rats-bounces@ietf.org> <mailto:rats-bounces@ietf.org <mailto:rats-bounces@ietf.org>> on behalf of henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de> <mailto:henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de>>> wrote:
> 
> 
> I think this discussion is mood as was pointed out in the meeting already. Please see:
> 
> 
> https://www.rfc-editor.org/rfc/rfc9334.html#figure-9 <https://www.rfc-editor.org/rfc/rfc9334.html#figure-9> <https://www.rfc-editor.org/rfc/rfc9334.html#figure-9> <https://www.rfc-editor.org/rfc/rfc9334.html#figure-9&gt;>
> 
> [CW] I don't think that diagram renders this discussion moot. X.509 certificate-based attestations have existed since before RATS (and before we called attestation evidence). There's not even much question about potential for including claims in an X.509 certificate within current RATS documents (see section C.3 of EAT). I think the questions are: 1) do we want to provide ASN.1 definitions for claims and 2) do we want to keep claim definitions (roughly) in sync across ASN.1/CBOR/JSON. Re: 1), there's seems to be general acceptance of defining claims in ASN.1 for the most part (though no one really answered Brendan's question regarding why ASN.1 was disallowed for SUIT but is allowed here). Question 2) needs some more discussion. There was an exchange between Mike and Laurence during the presentation yesterday that highlights a potential difference of opinion between I-D author(s) and participants in the working group that could impact the adoption question.
> 
> On 09.11.23 14:05, hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net> <mailto:hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net>> wrote:
>> Hi Laurence,
>>
>> The charter says:
>>
>> “
>>
>> Standardize data models that implement and secure the defined
>> information model (e.g., CBOR Web Token structures [RFC8392
>> <https://datatracker.ietf.org/doc/rfc8392/> <https://datatracker.ietf.org/doc/rfc8392/&gt;> <https://datatracker.ietf.org/doc/rfc8392/&gt;> <https://datatracker.ietf.org/doc/rfc8392/&amp;gt;&gt;>], JSON Web Token structures
>> [RFC7519 <https://datatracker.ietf.org/doc/rfc7519/> <https://datatracker.ietf.org/doc/rfc7519/&gt;> <https://datatracker.ietf.org/doc/rfc7519/&gt;> <https://datatracker.ietf.org/doc/rfc7519/&amp;gt;&gt;>]).
>>
>> “
>>
>> CWT and JWT are mentioned as examples. The group already works on
>> another evidence format, namely the TPM-based stuff.
>>
>> I would say that the document fits nicely within the scope of the charter.
>>
>> Regarding the document split. I am open to discussions about your
>> suggestion, which assumes adoption in the group.
>>
>> Ciao
>>
>> Hannes
>>
>> *From:*RATS <rats-bounces@ietf.org <mailto:rats-bounces@ietf.org> <mailto:rats-bounces@ietf.org <mailto:rats-bounces@ietf.org>>> *On Behalf Of *lgl island-resort.com
>> *Sent:* Donnerstag, 9. November 2023 13:59
>> *To:* rats <rats@ietf.org <mailto:rats@ietf.org> <mailto:rats@ietf.org <mailto:rats@ietf.org>>>
>> *Subject:* [Rats] draft-ounsworth-rats-x509-evidence-00
>>
>> I think it might be better to split this into two drafts.
>>
>> First, define how to put CWT/JWT claims into ASN.1 and make an X.509
>> attestation token.
>>
>> Second, define the FIPS and CC status claims for CBOR, JSON and ASN.1.
>>
>> I wish we didn’t have to do the first, but understand that we might.
>> Note that the RATS charter says we work on CBOR and JSON. There was a
>> little discussion about ASN.1 back in the early days and we certainly
>> put it off back then. There was also YANG discussion. Search the RATS
>> mail archive for ASN.1.
>>
>> I’m much more interested in the FIPS and CC status claims. I would like
>> to define them for CBOR, JSON and ASN.1. If they are booleans this is
>> trivial. The would get registered in the CWT and JWT IANA registries.
>>
>> One of the reasons I’d like to define them for CBOR and JSON is so
>> there’s a known and accepted way to translate their ASN.1 claims into JSON.
>>
>> Also, the X.509 definition should be for Attestation Results as well as
>> Evidence. There’s no reason to restrict it and there’s no work to allow
>> use as Attestation Results.
>>
>> LL
>>
>> (sent incorrectly the first time only to the rats-chairs; meant it for
>> the list)
>>
>>
>> _______________________________________________
>> RATS mailing list
>> RATS@ietf.org <mailto:RATS@ietf.org> <mailto:RATS@ietf.org <mailto:RATS@ietf.org>>
>> https://www.ietf.org/mailman/listinfo/rats <https://www.ietf.org/mailman/listinfo/rats> <https://www.ietf.org/mailman/listinfo/rats> <https://www.ietf.org/mailman/listinfo/rats&gt;>
> 
> 
> _______________________________________________
> RATS mailing list
> RATS@ietf.org <mailto:RATS@ietf.org> <mailto:RATS@ietf.org <mailto:RATS@ietf.org>>
> https://www.ietf.org/mailman/listinfo/rats <https://www.ietf.org/mailman/listinfo/rats> <https://www.ietf.org/mailman/listinfo/rats> <https://www.ietf.org/mailman/listinfo/rats&gt;>
> 
> 
> 
> 
> _______________________________________________
> RATS mailing list
> RATS@ietf.org <mailto:RATS@ietf.org>
> https://www.ietf.org/mailman/listinfo/rats <https://www.ietf.org/mailman/listinfo/rats>
> 


_______________________________________________
RATS mailing list
RATS@ietf.org <mailto:RATS@ietf.org>
https://www.ietf.org/mailman/listinfo/rats <https://www.ietf.org/mailman/listinfo/rats>