Re: [Rats] Two types of secure attestation

Laurence Lundblade <lgl@island-resort.com> Sat, 23 November 2019 22:34 UTC

Return-Path: <lgl@island-resort.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A53F6120020 for <rats@ietfa.amsl.com>; Sat, 23 Nov 2019 14:34:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IS3yKIfgmLG1 for <rats@ietfa.amsl.com>; Sat, 23 Nov 2019 14:34:58 -0800 (PST)
Received: from p3plsmtpa08-05.prod.phx3.secureserver.net (p3plsmtpa08-05.prod.phx3.secureserver.net [173.201.193.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 055CA120013 for <rats@ietf.org>; Sat, 23 Nov 2019 14:34:57 -0800 (PST)
Received: from [10.86.0.74] ([45.56.150.43]) by :SMTPAUTH: with ESMTPA id YdzUitfIp55u4YdzViNVkH; Sat, 23 Nov 2019 15:34:57 -0700
From: Laurence Lundblade <lgl@island-resort.com>
Message-Id: <C3CB2744-A705-466E-BA0C-2FD94A75386E@island-resort.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E255ED41-4A89-4D6E-A2EA-904AF0C83693"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Sat, 23 Nov 2019 14:34:56 -0800
In-Reply-To: <52AC3EB5-1BD0-4A41-8EAD-5A779E125BF8@intel.com>
Cc: "rats@ietf.org" <rats@ietf.org>
To: "Smith, Ned" <ned.smith@intel.com>
References: <B099349B-711D-4A11-9E58-0886307FB7AF@island-resort.com> <CAHbuEH6qtVbzRXUALKBrr3butc8qT8Y81X-nQ6+PjC1n08CkvA@mail.gmail.com> <5DB30E08-9AB2-452A-B8D6-55BFD0AE5264@island-resort.com> <CAHbuEH4R4GZQCq9E1Nza8uPC=jxiM-FkV4tMrv9B==GsjvCLtw@mail.gmail.com> <34EB67FD-E76A-4132-87C4-C89EA70C9365@intel.com> <DC9F1051-E33A-477F-A855-2FBA33F8E8DF@island-resort.com> <cbb5f662-b073-5b5b-e504-56ea66b72744@sit.fraunhofer.de> <5A3105EA-8E54-4BB9-B266-96B6645811A1@island-resort.com> <c4967ed2-e484-d8c9-406b-8e1bb1b3b88d@sit.fraunhofer.de> <FF6F2CEE-1049-4B6C-8E12-9E21FE92D2F2@island-resort.com> <3285c3da-0748-5607-90ed-ac024ac826d0@sit.fraunhofer.de> <0384FAEE-6C5B-4A99-BBA0-F080DD27AA9B@island-resort.com> <def7a722-e357-a12a-1467-8ff8c442337e@sit.fraunhofer.de> <A9E1ED3A-80D1-4585-9029-A49CA5AE3AB6@island-resort.com> <52AC3EB5-1BD0-4A41-8EAD-5A779E125BF8@intel.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-CMAE-Envelope: MS4wfKq0uTADGWur2yY9svGKymTZy0KDs7Z6OAF+aEO3yzl6vaybf4orrsDgCOqF3/G4Zhhl1JpdbM5WTumU3q08gpgkO6NIEhZGKP/ru85KuqjTKgpWbaBa h23eNMj/3Ah6YL7k3m1Il7koNZOSGgtA7i0psU5FAoV2HkzHQ1cokex5xp9eUkPnTGPeDmDwfniinw==
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/SukXkuYBgsdF94i0NrnWy4hDRhA>
Subject: Re: [Rats] Two types of secure attestation
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Nov 2019 22:35:00 -0000

Hi Ned, (we missed seeing you in person)

Primarily the difference between TPM-style that doesn’t rely on secure boot and non-TPM-style that does rely on secure boot. 

You can and will implicit claims in either.

TPM-style is not going to have explicit claims unless you do TPM + EAT style. (Hmmm, should that be in the architecture and the YANG module?)

Makes sense, right?

LL



> On Nov 23, 2019, at 11:20 AM, Smith, Ned <ned.smith@intel.com> wrote:
> 
> @laurence - By “this” you mean the difference between implicit and explicit attestation?
>  
> From: RATS <rats-bounces@ietf.org <mailto:rats-bounces@ietf.org>> on behalf of Laurence Lundblade <lgl@island-resort.com <mailto:lgl@island-resort.com>>
> Date: Saturday, November 23, 2019 at 8:44 AM
> To: Henk Berkholz <henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de>>
> Cc: "rats@ietf.org <mailto:rats@ietf.org>" <rats@ietf.org <mailto:rats@ietf.org>>, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com <mailto:kathleen.moriarty.ietf@gmail.com>>, "Smith, Ned" <ned.smith@intel.com <mailto:ned.smith@intel.com>>
> Subject: Re: [Rats] Two types of secure attestation
>  
>  
>> On Nov 21, 2019, at 6:26 PM, Henk Birkholz <henk.birkholz@sit.fraunhofer.de <mailto:henk.birkholz@sit.fraunhofer.de>> wrote:
>>  
>> There are no semantic difference between the "simple non-TPM EAT" scenario and the TPM-based implicit remote attestation scenario. They are if fact the "same types of secure attestation”.
>  
>  
> I don’t have any need to drive taxonomic distinction when unnecessary, but note that the YANG module has to have explicit different facilities to be able to handle both.
>  
> The verifier implementations for these two types are also very different. in the "non-TPM EAT” scenario no known-good-values for SW hashes are need to be supplied to the verifier.
>  
> I don’t think these are the only differences that we’ll encounter in real implementations. 
>  
> This should probably all be described the architecture document. Seems as significant as the passport vs background check distinction.
>  
> LL
>  
> 
> 
> _______________________________________________
> RATS mailing list
> RATS@ietf.org <mailto:RATS@ietf.org>
> https://www.ietf.org/mailman/listinfo/rats <https://www.ietf.org/mailman/listinfo/rats>