Re: [Rats] More use cases for draft-richardson-rats-usecases-00

"Smith, Ned" <ned.smith@intel.com> Mon, 17 June 2019 17:07 UTC

Return-Path: <ned.smith@intel.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6FB21201C8 for <rats@ietfa.amsl.com>; Mon, 17 Jun 2019 10:07:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level:
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FoDLZrQkRrN0 for <rats@ietfa.amsl.com>; Mon, 17 Jun 2019 10:07:23 -0700 (PDT)
Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DF001201C7 for <rats@ietf.org>; Mon, 17 Jun 2019 10:07:23 -0700 (PDT)
X-Amp-Result: SKIPPED(no attachment in message)
X-Amp-File-Uploaded: False
Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Jun 2019 10:07:22 -0700
X-ExtLoop1: 1
Received: from orsmsx102.amr.corp.intel.com ([10.22.225.129]) by fmsmga005.fm.intel.com with ESMTP; 17 Jun 2019 10:07:22 -0700
Received: from orsmsx158.amr.corp.intel.com (10.22.240.20) by ORSMSX102.amr.corp.intel.com (10.22.225.129) with Microsoft SMTP Server (TLS) id 14.3.439.0; Mon, 17 Jun 2019 10:07:21 -0700
Received: from orsmsx109.amr.corp.intel.com ([169.254.11.17]) by ORSMSX158.amr.corp.intel.com ([169.254.10.128]) with mapi id 14.03.0439.000; Mon, 17 Jun 2019 10:07:21 -0700
From: "Smith, Ned" <ned.smith@intel.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
CC: Anders Rundgren <anders.rundgren.net@gmail.com>, Carl Wallace <carl@redhoundsoftware.com>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] More use cases for draft-richardson-rats-usecases-00
Thread-Index: AQHVIuFqWQBd9YaaOUe/YohgH2bb7KagGH2A
Date: Mon, 17 Jun 2019 17:07:21 +0000
Message-ID: <6744BE53-4071-4349-ACB5-23FDE107F16E@intel.com>
References: <MW2PR00MB03963ABEB87211AD28A16240A6490@MW2PR00MB0396.namprd00.prod.outlook.com> <12503.1552447661@localhost> <58E37DB5-098C-4387-9A52-4AECD0F69F25@island-resort.com> <6495.1553219901@dooku.sandelman.ca> <BA6E28A7-0F6A-46A8-AB1B-A64B9229F149@intel.com> <507.1553725386@dooku.sandelman.ca> <24C0968B-32B0-4EF1-99C8-61D3F0955BA1@intel.com> <793F9A34-050F-4914-AF4B-08C072730A06@island-resort.com> <D8C23800.D851F%carl@redhoundsoftware.com> <19652.1553943890@dooku.sandelman.ca> <D8C50A67.D8999%carl@redhoundsoftware.com> <79ccb2d7-09a3-913d-f47d-1e702a23b341@gmail.com> <7B05ABC3-FE60-4879-9DEE-B896DD15507D@intel.com> <4607.1560537962@localhost>
In-Reply-To: <4607.1560537962@localhost>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.19.0.190512
x-originating-ip: [10.24.14.38]
Content-Type: text/plain; charset="utf-8"
Content-ID: <0E41257AAD0C4A4890773BF43001A375@intel.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/XowiwY2Gv1qX53R74DZ6oETRjCY>
Subject: Re: [Rats] More use cases for draft-richardson-rats-usecases-00
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jun 2019 17:07:26 -0000

See inline [nms]

On 6/14/19, 11:46 AM, "Michael Richardson" <mcr+ietf@sandelman.ca> wrote:

    
    Smith, Ned <ned.smith@intel.com> wrote:
        > Anders refers to session-based attestation in the TEEP archive which
        > points to several sources including a TCG source. This may be referring
        > to a public specification known as DICE - Device Identifier Composition
        > Engine.
        > https://trustedcomputinggroup.org/wp-content/uploads/Hardware-Requirements-for-Device-Identifier-Composition-Engine-r78_For-Publication.pdf
    
        > TCG terminology for TEEP's "Static" attestation is "Explicit
        > Attestation" and TEEP's term "Session Based" attestation is "Implicit
        > Attestation" by TCG.
    
    I have included these translations into the document.
    
        > The EAT draft defines an attestation approach that seems close to (i)
        > if you ignore the nonce that is returned as a static claim / assertion
        > and if you rule out of scope the definition of how the signing key is
        > created / persisted.
    
        > The tokbind draft seems closely resemble (ii).
    
    I want to be sure you mean: draft-mandyam-tokbind-attest-07 ?
[nms] Yes.
    
        > The TUDA draft seems to
        > resemble (i). (Henk can correct me).
    
        > The yang draft seems to resemble
        > (ii). (Henk can correct me).
    
    I'm trying to figure out what to do this statement.
[nms] If there is value in categorizing the attestation approach taken by various proposed RATS drafts in terms of (i) implicit attestation and (ii) explicit attestation then it seems TUDA (https://datatracker.ietf.org/doc/draft-birkholz-rats-tuda/ ) may be classified as implicit attestation. Since TUDA is also using time-based exchanges Henk may think it doesn't fit well into this categorization. The YANG module draft https://datatracker.ietf.org/doc/draft-birkholz-rats-basic-yang-module/ appears to me to be a case of explicit attestation.

The basic definition of implicit attestation is that evidence isn't exchanged directly between attester to verifier. Rather only a handle, keyid or use of the attestation key is sufficient to signal the verifier which context to reference for evaluating trust properties. The details of the trust properties is communicated out-of-band (the out-of-band path is out of scope for RATS currently). 

Explicit attestation conveys the evidence directly from attester to verifier. 

Obviously, real world attestation deployments likely will use a hybrid of implicit and explicit attestation approaches.
-Ned
    
    --
    ]               Never tell me the odds!                 | ipv6 mesh networks [
    ]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
    ]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [
    
    
    --
    Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
     -= IPv6 IoT consulting =-