Re: [Rats] Verifier Input instead of Endorsement?

Henk Birkholz <henk.birkholz@sit.fraunhofer.de> Tue, 07 July 2020 15:30 UTC

Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBB6F3A0825 for <rats@ietfa.amsl.com>; Tue, 7 Jul 2020 08:30:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ygl9sLHDRfgM for <rats@ietfa.amsl.com>; Tue, 7 Jul 2020 08:30:10 -0700 (PDT)
Received: from mail-edgeKA27.fraunhofer.de (mail-edgeka27.fraunhofer.de [153.96.1.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 62C5B3A0D6B for <rats@ietf.org>; Tue, 7 Jul 2020 08:30:02 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A2EfBgCfkwRf/xwBYJlgHQEBAQEJARIBBQUBQIFKAoMXgTMKhCiRFpocgV8JCwEBAQEBAQEBAQYBARgLCgIEAQEChEUCghMBJDgTAhABAQYBAQEBAQYEAgKGRAxDARABgnyBAgEBAQEBAQEBAQEBAQEBAQEBAQEWAkNVEgEBHQEBAQECAQEBIQ8BBTMDCxAJAg4EBgICIwMCAicfAQIOBgEMAQUCAQGDIgGCXB8FC41amwR2gTKFUYM9gToGgQ4qAYxaDw+BTD+BEScPgiwuPoJcAQGBRYMwgmAEkjeRTpBeKAeBWYEGgQcEC41jikUFCh2RGAaDCYp2kVqeYQIEAgkCFYFqWYEgTSRPgmlQFwINlyOFRHI3AgYBBwEBAwl8iCCGPgGBEAEB
X-IPAS-Result: A2EfBgCfkwRf/xwBYJlgHQEBAQEJARIBBQUBQIFKAoMXgTMKhCiRFpocgV8JCwEBAQEBAQEBAQYBARgLCgIEAQEChEUCghMBJDgTAhABAQYBAQEBAQYEAgKGRAxDARABgnyBAgEBAQEBAQEBAQEBAQEBAQEBAQEWAkNVEgEBHQEBAQECAQEBIQ8BBTMDCxAJAg4EBgICIwMCAicfAQIOBgEMAQUCAQGDIgGCXB8FC41amwR2gTKFUYM9gToGgQ4qAYxaDw+BTD+BEScPgiwuPoJcAQGBRYMwgmAEkjeRTpBeKAeBWYEGgQcEC41jikUFCh2RGAaDCYp2kVqeYQIEAgkCFYFqWYEgTSRPgmlQFwINlyOFRHI3AgYBBwEBAwl8iCCGPgGBEAEB
X-IronPort-AV: E=Sophos;i="5.75,324,1589234400"; d="scan'208";a="22948251"
Received: from mail-mtaka28.fraunhofer.de ([153.96.1.28]) by mail-edgeKA27.fraunhofer.de with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Jul 2020 17:30:00 +0200
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D2BACfkwRf/1lIDI1gHAEBAQEBAQcBARIBAQQEAQFAgUoCgihvVzAsCoQokRaaHIFoCwEDAQEBAQEGAQEYCwoCBAEBhEcCghECJDgTAhABAQUBAQECAQYEbYVbDEMBEAGFGQEBAQECAQEBIQ8BBTMDCxAJAg4EBgICIwMCAicfAQIOBgEMAQUCAQGDIgGCXCQLjVqbBHaBMoVRgz2BOgaBDioBjFoPD4FMP4ERJw+CLC4+glwBAYFFgzCCYASSN5FOkF4oB4FZgQaBBwQLjWOKRQUKHZEYBoMJinaRWp5hAgQCCQIVgWoiNoEgTSRPgmlQFwINlyOFREExNwIGAQcBAQMJfIgghj4BgRABAQ
X-IronPort-AV: E=Sophos;i="5.75,324,1589234400"; d="scan'208";a="30277398"
Received: from mailext.sit.fraunhofer.de ([141.12.72.89]) by mail-mtaKA28.fraunhofer.de with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Jul 2020 17:29:58 +0200
Received: from mail.sit.fraunhofer.de (mail.sit.fraunhofer.de [141.12.84.171]) by mailext.sit.fraunhofer.de (8.15.2/8.15.2/Debian-10) with ESMTPS id 067FTv7Q011872 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA256 bits=128 verify=NOT); Tue, 7 Jul 2020 17:29:57 +0200
Received: from [192.168.16.50] (79.206.156.41) by mail.sit.fraunhofer.de (141.12.84.171) with Microsoft SMTP Server (TLS) id 14.3.487.0; Tue, 7 Jul 2020 17:29:52 +0200
To: Laurence Lundblade <lgl@island-resort.com>, Michael Richardson <mcr+ietf@sandelman.ca>
CC: "rats@ietf.org" <rats@ietf.org>
References: <878E068C-DAFD-4441-94F7-BA79CAF7FED6@island-resort.com> <BL0PR2101MB10279501A4ECA5BB7B6AED63A36F0@BL0PR2101MB1027.namprd21.prod.outlook.com> <BF5071AC-0C8D-4B26-8330-8589736B6EF5@island-resort.com> <af8e64b9-41b3-f42a-183d-1c9544fc1d7d@sit.fraunhofer.de> <C4D6DCB6-F0D9-4858-823C-7B045005B48C@island-resort.com> <13132.1593723461@localhost> <6091010E-3F7D-4B45-9B8E-9D954CE03C43@island-resort.com> <24201.1593904708@localhost> <59471994-1797-42CE-AC6F-34F07315ADFB@island-resort.com>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Message-ID: <0a747f8c-81eb-2c03-46d3-73977faee457@sit.fraunhofer.de>
Date: Tue, 07 Jul 2020 17:29:51 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <59471994-1797-42CE-AC6F-34F07315ADFB@island-resort.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Originating-IP: [79.206.156.41]
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/Uu2tDoxXjvJhpknY_cS764cDkj0>
Subject: Re: [Rats] Verifier Input instead of Endorsement?
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2020 15:30:13 -0000

Hi Laurence,

at first, I thought I get your line of thought, but now I am confused 
again. Sorry! Comments in-line.

On 07.07.20 16:51, Laurence Lundblade wrote:
> 
> 
>> On Jul 4, 2020, at 4:18 PM, Michael Richardson <mcr+ietf@sandelman.ca 
>> <mailto:mcr+ietf@sandelman.ca>> wrote:
>>
>>
>> Laurence Lundblade <lgl@island-resort.com 
>> <mailto:lgl@island-resort.com>> wrote:
>>>> Laurence Lundblade <lgl@island-resort.com 
>>>> <mailto:lgl@island-resort.com>> wrote:
>>>>> The problem with Endorser is that they produce Endorsements and I 
>>>>> think there are problems with Endorsements:
>>>>
>>>>> - In Berlin you told me they don’t have keys in them. So then how do
>>>>> keys get into the Verifier?
>>>>
>>>> Well, first, I thought we agreed that the arcs above Verifier were 
>>>> out of
>>>> scope for the architecture.  The WG might recharter to include that, 
>>>> but I
>>>> thought we agreed that the concerns were seperable.  HOWEVER...
>>
>>> If that’s the approach, then Endorsements should be removed from the
>>> document, both in the text and diagram.
>>
>> That makes no sense to me.
>>
>> It is perfectly reasonable to define something just well enough in 
>> order to make it
>> clear what is out of scope for standardization.
>>
>> We can come up with many different ways to standardize Endorsements (or
>> Verifier Inputs), and it shouldn't matter at all to the protocol between
>> Attester and Verifier.
>>
>> That's what makes it seperable.
>> Do you agree?
> 
> Sorry, didn’t say that right.
> 
> If we’re going to minimize description of what is above the Verifier, 
> then the term “Endorsement” should be replaced with a more general term 
> like “Verifier Input” or “Attester Trust Criteria” or other.
> 
> I think there are three problems with the term “Endorsement":
> - It implies a specific style of input (a signed document) that is too 
> narrow for a general architecture

If that is what a reader gets from the document we have to do better. An 
endorsement does not have to be signed in the way that a UCCS does not 
have to be signed. It has to be tamper-evident though, because the 
Verifier relies on its integrity. That's the point and I think that is 
not too narrow.

> - It is ambiguous and/or not clear it is even correct. The room in 
> Berlin of experts agreed that Endorsement can’t have keys in them, but 
> there must be a key input to the Verifier.

Well, my recollection of that room of experts does not include any 
opinions on key material for Endorsements as defined for IETF RATS. The 
TCG defines (I just looked that up) four specific terms around and 
"Endorsement Key", so I am relatively sure that key material is involved 
in all cases, as these are the only terms that make use of the phrase 
endorsement.

> - It is TCG-specific. The term is not used in FIDO, Android and 
> TEE-based projects that I’ve worked on.

And this confuses me. I'll do a self-quote here: "Endorsements as 
defined for IETF RATS". We are defining that term here in the RATS 
architecture. The TCG does not define it in any document that I could 
google just now. Maybe I have missed something there. But that is beside 
the point anyways. The point is that we are defining it here.


Viele Grüße,

Henk

> 
> 
> Some text like this?
> 
>     Verifier Input
> 
>     Inputs used by the Verifier to establish trust in Attester, evaluate
>     Attestation Evidence and produce Attestation results. It may include
>     cryptographic keys, known-good/reference values, static implicit
>     claims and policy configuration.
> 
> 
> LL
> 
> _______________________________________________
> RATS mailing list
> RATS@ietf.org
> https://www.ietf.org/mailman/listinfo/rats
>