Re: [Rats] draft-birkholz-rats-uccs

Laurence Lundblade <lgl@island-resort.com> Fri, 12 March 2021 17:33 UTC

Return-Path: <lgl@island-resort.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0DE43A182A for <rats@ietfa.amsl.com>; Fri, 12 Mar 2021 09:33:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0b0VIPFRK_sz for <rats@ietfa.amsl.com>; Fri, 12 Mar 2021 09:33:30 -0800 (PST)
Received: from p3plsmtpa07-02.prod.phx3.secureserver.net (p3plsmtpa07-02.prod.phx3.secureserver.net [173.201.192.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C954A3A1826 for <rats@ietf.org>; Fri, 12 Mar 2021 09:33:30 -0800 (PST)
Received: from [192.168.1.81] ([76.167.193.86]) by :SMTPAUTH: with ESMTPA id KlfElw99Hw7iwKlfFlFPCb; Fri, 12 Mar 2021 10:33:29 -0700
X-CMAE-Analysis: v=2.4 cv=LJqj/La9 c=1 sm=1 tr=0 ts=604ba5ea a=t2DvPg6iSvRzsOFYbaV4uQ==:117 a=t2DvPg6iSvRzsOFYbaV4uQ==:17 a=EUspDBNiAAAA:8 a=48vgC7mUAAAA:8 a=nGanCPMnVeTfHEsK5fMA:9 a=QEXdDO2ut3YA:10 a=NEcsnbqzHPwhu0D1VqYA:9 a=z3b4WkSplcxaUQ4Q:21 a=_W_S_7VecoQA:10 a=rMCfJy6NHDicN4J276Yl:22 a=w1C3t2QeGrPiZgrLijVG:22
X-SECURESERVER-ACCT: lgl@island-resort.com
From: Laurence Lundblade <lgl@island-resort.com>
Message-Id: <659C7D3E-B5C9-484F-85E8-5D48E2C2F856@island-resort.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E4E3EF29-17A3-4B6F-8A8E-34E0FE0B1A2F"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\))
Date: Fri, 12 Mar 2021 09:33:28 -0800
In-Reply-To: <BYAPR02MB442217661B96C66A8881DD89816F9@BYAPR02MB4422.namprd02.prod.outlook.com>
Cc: "rats@ietf.org" <rats@ietf.org>
To: Giridhar Mandyam <mandyam@qti.qualcomm.com>
References: <VI1PR08MB2639119D9BB1C98A1FBF3863FA6F9@VI1PR08MB2639.eurprd08.prod.outlook.com> <BYAPR02MB442217661B96C66A8881DD89816F9@BYAPR02MB4422.namprd02.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.104.17)
X-CMAE-Envelope: MS4xfHWnGC6m20B9WBsNPIqVdTr6CDOXvlYuQigjgaBSdXsU1yrQ5nF4kUvlrE9VyINetUF9BBqIRluCNEuG2qmib2DF1KtBXB2ozGEWGzmxpCVR2wqsEJQF qSgL1TUOU6cjLRIvclrmhruVSstv/9ek+2ktuOPyWuPiwLTo9yHoZ2bf+BrVmWfzpq2ozc7yBpf1wjAzAbwoP1b3VUpBKmgmxKfKV6Np1RhNo8O9pRTq9xI+
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/RRNJO5R2Xawr_5DgkI1gnJaZW6A>
Subject: Re: [Rats] draft-birkholz-rats-uccs
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Mar 2021 17:33:33 -0000

The horse is pretty dead, but one more comment. 

My thought is that UCCS over-specifies security. UCCS is a very general format for use inside rats and outside rats. It also will be used in several ways inside rats (Evidence and Results). A general document like UCCS can’t anticipate all the use cases and all the possible security issues and all the security solutions for all the use case so it should just have some general warnings that it provides no security. Would make the document very short and sweet.

The general security architecture and concerns for UCCS applied to rats should be in the rats architecture document.

That said, I’m OK with it as is.

LL



> On Mar 12, 2021, at 8:55 AM, Giridhar Mandyam <mandyam@qti.qualcomm.com> wrote:
> 
> Agree with Hannes.  I’ll also add that current text in https://tools.ietf.org/html/draft-ietf-rats-architecture-10#section-12.2 <https://tools.ietf.org/html/draft-ietf-rats-architecture-10#section-12.2> states:
>  
> “The security protecting conveyed information may be applied at different layers, whether by a conveyance protocol, or an information encoding format.  This architecture expects attestation messages (i.e., Evidence, Attestation Results, Endorsements, Reference Values, and Policies) are end-to-end protected based on the role interaction context.  For example, if an Attester produces Evidence that is relayed through some other entity that doesn't implement the Attester or the intended Verifier roles, then the relaying entity should not expect to have access to the Evidence.”
>  
> In other words, the first figure below actually shows a relaying entity (HTTP client outside of TEE/SE security boundary) that may have access to the evidence.
>  
> -Giri
>  
>  
> From: RATS <rats-bounces@ietf.org> On Behalf Of Hannes Tschofenig
> Sent: Friday, March 12, 2021 2:17 AM
> To: rats@ietf.org
> Subject: [Rats] draft-birkholz-rats-uccs
>  
> Hi all
>  
> draft-birkholz-rats-uccs was discussed at the WG meeting this week and there was some controverse around its security protection.
>  
> Having looked at the draft again I believe the proposal is sound. In fact, I would even argue that it provides better security protection than the use of COSE.
>  
> Here are my thoughts. 
>  
> Here is how some want to deploy EAT tokens: 
>  
>    +-------------------------------------------+
>    | Device                                    |
>    |                          +--------+ Maybe TLS/Maybe not
>    |    +-------------+       |        |-----------+  +-----------+
>    |    | TEE/SE      |       | HTTP   |---------+ |  |           |
>    |    | +--------+  |  +----| Client |       | | |  | Verifier  |
>    |    | |Attester|  |  |    |        |       | | +->| ( HTTP )  |
>    |    | |        |<----+    |        |       | |  +-| (Server)  |
>    |    | +--------+  |       |        |       | +->| |           |
>    |    |             |       +--------+       |    | +-----------+
>    |    |             |                        |    |        |
>    |    |             |                        |    +--------+
>    |    |             |                        |
>    |    |             |                        |
>    |    +-------------+                        |
>    +-------------------------------------------+
>  
>                               EAT protected by COSE
>              |----------------------------------------------|
>  
>  
> Here is how the UCCS protection looks like: 
>  
>    +-------------------------------------------+
>    | Device                                    |
>    |                          +--------+  TLS not needed
>    |    +-------------+       |        |-----------+  +-----------+
>    |    | TEE/SE      |       | Broker |---------+ |  |           |
>    |    | +--------+  |  +----|        |       | | |  | Verifier  |
>    |    | |Attester|  |  |    |        |       | | +->| ( HTTP )  |
>    |    | |        |<----+    |        |       | |  +-| (Server)  |
>    |    | +--------+  |       |        |       | +->| |           |
>    |    |             |       +--------+       |    | +-----------+
>    |    |             |                        |    |        |
>    |    |             |                        |    +--------+
>    |    |             |                        |
>    |    |             |                        |
>    |    +-------------+                        |
>    +-------------------------------------------+
>  
>                               EAT protected by TLS
>              |----------------------------------------------|
>  
> If you compare the two, then you might realize that a TLS handshake run into the SE/TEE actually provides better security properties than a  COSE protected EAT (with a signature or MAC) provides.
>  
> My conclusion is: draft-birkholz-rats-uccs is good stuff. I would even go as far as recommending to use TLS into the SE/TEE rather than terminating it on the non-secure side.
>  
> Ciao
> Hannes
>  
> IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
> _______________________________________________
> RATS mailing list
> RATS@ietf.org
> https://www.ietf.org/mailman/listinfo/rats