Re: [Rats] Implementation report

"Friedman, Allan" <allan.friedman@cisa.dhs.gov> Fri, 23 February 2024 20:09 UTC

Return-Path: <allan.friedman@cisa.dhs.gov>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 149B4C14F5F7 for <rats@ietfa.amsl.com>; Fri, 23 Feb 2024 12:09:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.606
X-Spam-Level:
X-Spam-Status: No, score=-3.606 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_GOV_DKIM_AU=-0.999, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cisa.dhs.gov
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AhcqBPRLhVqf for <rats@ietfa.amsl.com>; Fri, 23 Feb 2024 12:09:52 -0800 (PST)
Received: from mx0e-00376703.gpphosted.com (mx0f-00376703.gpphosted.com [67.231.155.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA2C1C14F68C for <rats@ietf.org>; Fri, 23 Feb 2024 12:09:52 -0800 (PST)
Received: from pps.filterd (m0231304.ppops.net [127.0.0.1]) by mx0e-00376703.gpphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 41NJpk8X015846; Fri, 23 Feb 2024 20:09:44 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisa.dhs.gov; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=select1; bh=Wm4qzFS0WcvavIAI4/sdHS9wpJRmroaVIW0bHRvCQEI=; b=li4hSKgo7VSiti81LMS7+605D9Xr0k/sxvUldpOlC10R3K+IFZumiB8dV0S9cX+3/Xo0 V56swOyilfy6Q7d07UAmd9Mgmnj9Z66LObVoLd1JSgJ3XVBI2sFNMznpbCD0KfsfF9YQ +Fi+Q/97Z+0biuJ87+R4uTrXZEsGilLsLrfD79wG24P+SeCbpldOmV2edoRkc56Y+j0M imYQsyRXq0FeaQhQDwvu2S7DsV8dQ5i8MiCPpRnaRWtTDmAxh4fN1h+ah9I8WhIL5Kbg obRn/+p7OIVVbecofiWvApt4+pcgX7BSsYazMsUJ97sGuFWBKMilVOHpKvO5El/cxlHD Qg==
Received: from gcc02-dm3-obe.outbound.protection.outlook.com (mail-dm3gcc02lp2101.outbound.protection.outlook.com [104.47.65.101]) by mx0e-00376703.gpphosted.com (PPS) with ESMTPS id 3wf1w184jj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 23 Feb 2024 20:09:43 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XiET6gdAqhYu5cXd6tyBMZN6Helw6eQRcaLjRSd4FSYCGinJqcvCtY2H++OHFIHb1XLw3jRm0WYiwHuSwGpiGuOEjqxlaVktvCnOeEp10UMymffzckQ/Cwe2X9dZ0pMDcrI/3CjHlWPToIlYAZIY2tsOnmgCqI4LRY9XbR8EntKnoJ7NUVjFLxPh/LToUK+WVdZ/GT34kP5qxZh+wIi6bUIc1iW2fGaqMufDf4WyyaK6TMM5IwQB89RV29UToG0htxXYKljE8nmfzhmP5+Cf4shtMOodSyM8LU5+qHZOuo89CQBXfpqM+iT1+anosCcnSz5cMoEFx9ed04468KN5zg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Wm4qzFS0WcvavIAI4/sdHS9wpJRmroaVIW0bHRvCQEI=; b=mRPBR2Hiy9t/P6YZAJmJwBy4xjTGcijg/mply+dhPGLFlTXcSs9SJL8b/QDRanE+Omb3wVEe9RWZfsHvADPgSdCfqiLdUfwVubWq1FJ77TSVRVVLzhWrOiiNUYcMPXaw6+HsQ/qcGDf7Cff8hek0VAaLTKHwm7UoXf28mL6ZEdXiZbQv5P1qB96nnf35/w67Ic3xfldQQFcmGNOVMxbCUPZ97+d0bM8ASKQ074twZusTHLl6K5Tt6tAl+KpShJTa3NBK/3sFNAt0tgzPDEVCq9H0/aVpIefQFYEe29B1aJ88KVL0WsbJs3OjHiYWDlRP5rw/SF+HuEBOI1B9KczmTw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisa.dhs.gov; dmarc=pass action=none header.from=cisa.dhs.gov; dkim=pass header.d=cisa.dhs.gov; arc=none
Received: from MN2PR09MB5034.namprd09.prod.outlook.com (2603:10b6:208:21c::16) by SA1PR09MB11352.namprd09.prod.outlook.com (2603:10b6:806:362::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.24; Fri, 23 Feb 2024 20:09:41 +0000
Received: from MN2PR09MB5034.namprd09.prod.outlook.com ([fe80::804b:80bb:bcdd:c849]) by MN2PR09MB5034.namprd09.prod.outlook.com ([fe80::804b:80bb:bcdd:c849%6]) with mapi id 15.20.7316.023; Fri, 23 Feb 2024 20:09:41 +0000
From: "Friedman, Allan" <allan.friedman@cisa.dhs.gov>
To: Tom Jones <thomasclinganjones@gmail.com>, Henk Birkholz <henk.birkholz@ietf.contact>
CC: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, rats <rats@ietf.org>, John Schmidt <john.schmidt.ietf@gmail.com>, Sean Turner <sean@sn3rd.com>
Thread-Topic: [Rats] Implementation report
Thread-Index: AQHaZLbDXYMJzgFuSU+I5KBUgfgoubEYVpiAgAADaAI=
Date: Fri, 23 Feb 2024 20:09:41 +0000
Message-ID: <MN2PR09MB503491B31FD1AA1E64C7DA15BD552@MN2PR09MB5034.namprd09.prod.outlook.com>
References: <CAHbuEH6NU0yKDX=qwwf_xauKraejKuDa+5XNY-Q6pVv-i1RKbQ@mail.gmail.com> <4376cd0f-bd4d-c2dd-4ace-047e05d55677@ietf.contact> <CAK2Cwb4aTc-g6mJp5ctoFV_8=o2nu0jseQEt8Wy2YLyhcEv-TQ@mail.gmail.com>
In-Reply-To: <CAK2Cwb4aTc-g6mJp5ctoFV_8=o2nu0jseQEt8Wy2YLyhcEv-TQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR09MB5034:EE_|SA1PR09MB11352:EE_
x-ms-office365-filtering-correlation-id: 015bf974-dab4-4865-7ac6-08dc34ab5ecd
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR09MB5034.namprd09.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(230273577357003)(38070700009); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 837vEjR6ykAG7BOvuKg19lhdn+87k2ioQkU72I9a0TlEg10NQhEXdyfvYmQHmBGVHEFji3I8Zkvbnp/3NMbz/buust3+DAUlrllFzKKVnIfP5/OCkZYMbj3DBuVhwy/iuZlOVVC/G+PGatuW8VNlpjh2r81fAeliDaayGsmS8k3B8A0MuMUNg/3TFzXsKU8LWDfLN07l8Wpv3iHx4l3/8GkeGWpad8+KHHHJLJjctxpeJAqaRMuYUx8tiFeeDojOB7pvOfKG2mmfHFrR1UtdeGcv5jJN2TPWlxrgOz03DiD2FzS5+qUsXP3THARgjyaSZ9IfebM2XNmB0yb3TVCGjjHToIUpV6iv8H+88cnZRYtPy47NJ3xGDSK/yaCVvu6INpty0xj1n40VTEsRsaP9ny4r1gNX/C7ZhIdFJr7NbzpPoQklaUtA4RdXBciPyJnRxOHEOGF/euD5vng0WE5q71XJwUdNJuy9y510Kb/Iyd6o/n3+H2x0m2+YeIX4nclOCPRnjW/cZjBaEIbzq9n2+DN/SMUQS5Xo6hPrln39Cot46E1PF54X8y794HB0+giBCdcEdBZaY5Eg4fhVb9B9drZzGAGYB5RBTMaVsZbcBylCuY9WHWyU7zyQDwXXrR+8xvGMCMpBvTZaltGa6BW2TuVKEmzpxiiMQXObDmxkYq+q2tlDQ90xtPOv8axUVurhgPSIF1284tBUW5iCacEROxsJOEoLoLsCjmUHTaklJ3BVLgCGw+XSydDMHg3QVnJBDMwSP7vQjk0rnbKVd15SedWf6umGFtZxbx7LHIurDD+YPRmx9VeWKbL9RPJKa+Has1ttUsIHX1Dk8xw8ej9EirJOowVWEVgAKUxqltOp4eYMz6D5XZf4fY1ulwNc2JpBob0dNe3gnGVGvZnEp849hQYqg+3ZGcxyyuRKMb0wB7RZ6OGoNtVQDtrQK123YqLRQHSK0o5OZ50Re0By7/mVVdCEM6BGRzjhECkt8QxsW78Y/v5EQaaf3CfRA7qchIlWUcwAYQADylJe/4XKm5pTBTSVI8mH5zVvvtBgMg06HEvCnDybcoTPFfhJcgM3bJQ6mGvCaiqO+4zovmptXjY7Sr0DzczikgYMDD8QbIBtVzwcIY8BOIwgLElbxynsMQOgonRxEKm3JmLd/R0W35faRHnfDpUkdOoOyW2fH+PCG8QGESxxpNYiQBv2j34YNMWi/yIIFIvftNR50G9d6CSFf4anyV9d7o62yJ/UaUCr8qPsBbcCWVzNEM5RSd/V3qchqBItobL6bMYwhBC6kJG/jg4Y0r/RKHS1HLEL7uBTFVqrLh740Lyn8vsvvmDLUeNl9dSfMye8oKZoyer6E+ia1jMSqQOToNdkl6kubiSeG/MUa9M/0UkAQiEgEVDyLmJ8REECICzFNxRCOA7bHSwWN1pmyzn4jBtalj2gub7QsB9NHxyTG5+eZliC/NBwFLrdtVn05TUJrSDKmRwDL3kGlDEKCVY9wDgRGBEVnP0RW0ro2J7RV/2mxmjWgPaau8ulIi/5ofEJhAq7/N30AGNh19y+t2YI+q99tgJVNb57iCaeuVYeY/XB4B3B/KNaRQhdnIgGuRQgR77qRI3yfl8DhoKQC2SGeAh4y57fyS1gUF4=
Content-Type: multipart/alternative; boundary="_000_MN2PR09MB503491B31FD1AA1E64C7DA15BD552MN2PR09MB5034namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisa.dhs.gov
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR09MB5034.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 015bf974-dab4-4865-7ac6-08dc34ab5ecd
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Feb 2024 20:09:41.4014 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3ccde76c-946d-4a12-bb7a-fc9d0842354a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR09MB11352
X-Proofpoint-GUID: 0VLqj2905BBAFTWNnoGm_C7A0KVoiVLR
X-Proofpoint-ORIG-GUID: 0VLqj2905BBAFTWNnoGm_C7A0KVoiVLR
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-02-23_06,2024-02-23_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 bulkscore=0 adultscore=0 suspectscore=0 clxscore=1011 priorityscore=1501 mlxlogscore=999 mlxscore=0 lowpriorityscore=0 impostorscore=0 spamscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311290000 definitions=main-2402230149
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/PPXMv3Lppfnp3WOuSIWWFAPBHYw>
X-Mailman-Approved-At: Fri, 23 Feb 2024 16:03:31 -0800
Subject: Re: [Rats] Implementation report
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Feb 2024 20:10:45 -0000

Lovely to be pulled into the cool standards kids group!

Always happy to chat more about where SBOM sits today, and where there’s room for trying to help layer trust on without breaking some of the existing efforts.

On the hardware side, I’ll also flag that a whole lot of people are interested in a more holistic approach to hardware transparency side, and there may be some public calls for more information and ideas coming soon. Some work that happened at CISA (https://www.cisa.gov/resources-tools/resources/hardware-bill-materials-hbom-framework-supply-chain-risk-management ) highlighted the challenge of meaningful cross-organization supply chain visibility even before you get to the trust and trust anchor pieces.

allan (the SBOM guy)

From: Tom Jones <thomasclinganjones@gmail.com>
Date: Friday, February 23, 2024 at 2:40 PM
To: Henk Birkholz <henk.birkholz@ietf.contact>
Cc: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, rats <rats@ietf.org>, John Schmidt <john.schmidt.ietf@gmail.com>, Sean Turner <sean@sn3rd.com>, Friedman, Allan <allan.friedman@cisa.dhs.gov>
Subject: Re: [Rats] Implementation report
CAUTION: This email originated from outside of DHS. DO NOT click links or open attachments unless you recognize and/or trust the sender. Contact your component SOC with questions or concerns.

We are exploring the use of SBOM in OWF.
The last time I raised anything like that in a RATS thread I was met with outright hostility.
..tom


On Wed, Feb 21, 2024 at 3:11 AM Henk Birkholz <henk.birkholz@ietf.contact> wrote:
Hi Kathleen,

thank you for the pointers! Will you be in Brisbane?

Looking at your last link, I am wondering if there are plans for future
projects. Say... remote attestation based authenticity assurance in the
software supply chain chain: and I am thinking along the lines of
"Trustworthy SBOMs", which would be scenario that would combine various
building blocks and that is definitely still in demand of more standards
consolidation.

Because
https://learn.cisecurity.org/built-in-security-scale-hardware-support<https://urldefense.us/v3/__https:/learn.cisecurity.org/built-in-security-scale-hardware-support__;!!BClRuOV5cvtbuNI!FY6abhShH0gjKfhgUwQQJTDGccUOOxh5ZYquJkiDN7Xcov7Y2OtWVyAUCUU_FW9s7AbNZY08Tyrkuyb9-_v3EgZAmWGzOoZwUZw$>
cited https://www.cisa.gov/securebydesign, I am reeling Alan into this
reply. So that he is aware that we could do something meaningful here :-)


Viele Grüße,

Henk

On 13.02.24 15:58, Kathleen Moriarty wrote:
> Greetings!
>
> Last year, I introduced my team to RATS work and pulled together a
> project that was a lead in to the attestation sets draft, implementing
> largely what's described in
> https://datatracker.ietf.org/doc/draft-ietf-rats-endorsements/<https://urldefense.us/v3/__https:/datatracker.ietf.org/doc/draft-ietf-rats-endorsements/__;!!BClRuOV5cvtbuNI!FY6abhShH0gjKfhgUwQQJTDGccUOOxh5ZYquJkiDN7Xcov7Y2OtWVyAUCUU_FW9s7AbNZY08Tyrkuyb9-_v3EgZAmWGz7PcIVlM$>
> <https://datatracker.ietf.org/doc/draft-ietf-rats-endorsements/<https://urldefense.us/v3/__https:/datatracker.ietf.org/doc/draft-ietf-rats-endorsements/__;!!BClRuOV5cvtbuNI!FY6abhShH0gjKfhgUwQQJTDGccUOOxh5ZYquJkiDN7Xcov7Y2OtWVyAUCUU_FW9s7AbNZY08Tyrkuyb9-_v3EgZAmWGz7PcIVlM$>>
>
> It took some time to complete due to some hyperscaler environments not
> having a TPM or access to it from the container orchestration platform
> or virtual server host. Once we secured an environment where this was
> possible, through use of the IMA libraries (created for this purpose and
> previously proven by RedHat), positive results were demonstrated. The
> objective was to test assurance to CIS Benchmarks as that was my
> employer at the time. We hope you find this report useful.
>
> https://www.rsaconference.com/Library/blog/automated-assurance-on-a-path-to-becoming-practical<https://urldefense.us/v3/__https:/www.rsaconference.com/Library/blog/automated-assurance-on-a-path-to-becoming-practical__;!!BClRuOV5cvtbuNI!FY6abhShH0gjKfhgUwQQJTDGccUOOxh5ZYquJkiDN7Xcov7Y2OtWVyAUCUU_FW9s7AbNZY08Tyrkuyb9-_v3EgZAmWGzwhBhTTg$> <https://www.rsaconference.com/Library/blog/automated-assurance-on-a-path-to-becoming-practical<https://urldefense.us/v3/__https:/www.rsaconference.com/Library/blog/automated-assurance-on-a-path-to-becoming-practical__;!!BClRuOV5cvtbuNI!FY6abhShH0gjKfhgUwQQJTDGccUOOxh5ZYquJkiDN7Xcov7Y2OtWVyAUCUU_FW9s7AbNZY08Tyrkuyb9-_v3EgZAmWGzwhBhTTg$>>
>
> This was done at the same time other team members were researching the
> prevalence of TPMs and TEEs in infrastructure. The purpose of that work
> was to signal that hardware support is increasingly available and should
> be used to ease configuration management and posture assurance capabilities.
>
> https://www.cisecurity.org/insights/white-papers/built-in-security-at-scale-through-hardware-support<https://urldefense.us/v3/__https:/www.cisecurity.org/insights/white-papers/built-in-security-at-scale-through-hardware-support__;!!BClRuOV5cvtbuNI!FY6abhShH0gjKfhgUwQQJTDGccUOOxh5ZYquJkiDN7Xcov7Y2OtWVyAUCUU_FW9s7AbNZY08Tyrkuyb9-_v3EgZAmWGz7ddhyPc$> <https://www.cisecurity.org/insights/white-papers/built-in-security-at-scale-through-hardware-support<https://urldefense.us/v3/__https:/www.cisecurity.org/insights/white-papers/built-in-security-at-scale-through-hardware-support__;!!BClRuOV5cvtbuNI!FY6abhShH0gjKfhgUwQQJTDGccUOOxh5ZYquJkiDN7Xcov7Y2OtWVyAUCUU_FW9s7AbNZY08Tyrkuyb9-_v3EgZAmWGz7ddhyPc$>>
>
> The timeline could include more data points, we included key points.
>
> I am copying John Schmidt who did the work. Sean Turner joined the
> project in September and assisted with key management, application of
> cryptography, and validation. Thank you both for your great work to
> successfully implement this PoC!
>
> --
>
> Best regards,
> Kathleen
>
> _______________________________________________
> RATS mailing list
> RATS@ietf.org<mailto:RATS@ietf.org>
> https://www.ietf.org/mailman/listinfo/rats<https://urldefense.us/v3/__https:/www.ietf.org/mailman/listinfo/rats__;!!BClRuOV5cvtbuNI!FY6abhShH0gjKfhgUwQQJTDGccUOOxh5ZYquJkiDN7Xcov7Y2OtWVyAUCUU_FW9s7AbNZY08Tyrkuyb9-_v3EgZAmWGzo4pHZ_4$>

_______________________________________________
RATS mailing list
RATS@ietf.org<mailto:RATS@ietf.org>
https://www.ietf.org/mailman/listinfo/rats<https://urldefense.us/v3/__https:/www.ietf.org/mailman/listinfo/rats__;!!BClRuOV5cvtbuNI!FY6abhShH0gjKfhgUwQQJTDGccUOOxh5ZYquJkiDN7Xcov7Y2OtWVyAUCUU_FW9s7AbNZY08Tyrkuyb9-_v3EgZAmWGzo4pHZ_4$>