Re: [Rats] Reviewing EAT for enterprise/cloud use cases

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Fri, 22 November 2019 14:15 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55EC712082F for <rats@ietfa.amsl.com>; Fri, 22 Nov 2019 06:15:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rBx7-PVboMpy for <rats@ietfa.amsl.com>; Fri, 22 Nov 2019 06:15:40 -0800 (PST)
Received: from mail-oi1-x22a.google.com (mail-oi1-x22a.google.com [IPv6:2607:f8b0:4864:20::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6616E1207FE for <rats@ietf.org>; Fri, 22 Nov 2019 06:15:40 -0800 (PST)
Received: by mail-oi1-x22a.google.com with SMTP id l20so6570660oie.10 for <rats@ietf.org>; Fri, 22 Nov 2019 06:15:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=nUQTZ+R3QpUgHgfd9LdSW8Q9/gUJdWiff1M6GAAn/I0=; b=jyBteBVe7MyX9Qe8zY1Auu1HVC44UcgJPqKOowuGEl/fvk6GefhlgFYZY7UR1dVE3a bZFyzdoYofOmIFeVGhbZCQlnqVcGyUUeWvCmN/+uJ8rgedqdVM9DxcQPpJNYFW0X/FFv DVV9xnTzoNje9AvEf9yhHE9tiI1orBgWeossewtF8tYzY3e18Ym6+9AFml6p6i4S8tRC dLdEeW4oJpQociGU4qvFcRykySbPs52+QHi3OlbwF3wM8DRBCfrjsaY+tySIwqZU8XKF ulwdItB5/GJbTTomWMAFQCUUlDc10E66arz7SlVIWmp/JU2X5X+kc7Ri97S8bb4MNaCV yvpQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=nUQTZ+R3QpUgHgfd9LdSW8Q9/gUJdWiff1M6GAAn/I0=; b=TJds89SrjUomEUvJsMK+4DZBhv7nK8JuMk88t6XsjPojTBeGX2aRwo+asL4CUvvX/t 3EyRkTZpdDqqeCqXErmath+H1mjJuY4O66jdj4iYh339GV3WyRu2r1Zbl3ZCWTmpTJlp Rwhpe3NPE62WvXIZY0baGA+a6ber3qLD0NESsUvKTUE2gJm4IcvLHKTeH/9L68kUCkFe deDUSHLeYXOil8SMi5/Iv0XBBakpzai8j5UNnCjJwVI5Buajnd1CzIJlsfNmYeOkOyIq 4QXxF2FAxM/bvGgZnJP8Qv0vYbsFd7n/vGPiX0VjXvKj6G2ri6lWIXFBwp4tudOrvO8G Tf4Q==
X-Gm-Message-State: APjAAAV02uUvhKY+M0DfGMKXRLbgH5OQv6zp7payG1Fqt57E/rc6IRZo 0azH9X4ea0BCUci3h0HdfaAu2Ea8RD7Fmq3vy0c=
X-Google-Smtp-Source: APXvYqw+IvCDtxABlGzywNcaBkjjRzyy3Ym2HT7KmmCLrho35vJaheIPeCOTD2446xe89g8VYc2G6LSft1JOP/ght90=
X-Received: by 2002:a05:6808:498:: with SMTP id z24mr12553722oid.114.1574432139743; Fri, 22 Nov 2019 06:15:39 -0800 (PST)
MIME-Version: 1.0
References: <4EEB506F-5ED6-4DEC-873F-D6D5ABBA04B3@gmail.com>
In-Reply-To: <4EEB506F-5ED6-4DEC-873F-D6D5ABBA04B3@gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Fri, 22 Nov 2019 09:15:03 -0500
Message-ID: <CAHbuEH5s18SsBUUvznE6-Ee8sbtwKyPJSFbNxEXaODd18puGsg@mail.gmail.com>
To: Yaron Sheffer <yaronf.ietf@gmail.com>
Cc: "rats@ietf.org" <rats@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006996980597f00c87"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/YJQb7-YfsTOY04qohw36ZSQIyQ0>
Subject: Re: [Rats] Reviewing EAT for enterprise/cloud use cases
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Nov 2019 14:15:42 -0000

On Fri, Nov 22, 2019 at 12:57 AM Yaron Sheffer <yaronf.ietf@gmail.com>
wrote:

> I have read the EAT draft, specifically with a “cloud” use case in mind.
> To clarify, what I'm looking for is the capability:
>
>
>
> - To attest to software components that are running inside VMs, containers
> (either on VMs or bare metal), and anonymous containers
> (function-as-a-service, such as AWS Lambda).
>
> - Such components may be deployed in arbitrary hierarchies (VM-in-VM etc.).
>
> - Attestation of running (as opposed to installed) components. For
> example, container code may be pulled from a remote repository shortly
> before it is run.
>
> - To support diverse roots-of-trust, such that when a hardware
> root-of-trust is unavailable, we can have a hypervisor or an orchestration
> server (e.g. Kubernetes) as the RoT, even if that means a lower level of
> trust.
>
>
>
> I think in general, EAT can be made to fit these use cases, given its
> recursive structure. But not surprisingly given its origins, the draft
> would need quite a few changes.
>
>
>
> * 1.2 (and 3.12): why not spell out that a submodule can be either a
> hardware or software component?
>
> * 1.2: why *dedicated* root of trust, what is it dedicated to? A RoT may
> have other functions; a system may in general have multiple RoTs. The word
> "dedicated" is not repeated anywhere else in the document, nor is it
> explained.
>
> * 1.3 continues to only talk hardware, e.g. when defining the
> "manufacturer". Software has a manufacturer too.
>
> * 3.3: the notion of UEID is fundamentally incompatible with some
> component types that we would wish to attest. For example, the lifetime of
> a function-as-a-service container may be less than a second, and even if it
> has an identity during its lifetime, there is no registry or persistent
> record of this identity. Is a UEID required in this scheme?
>
> * 3.4: hey, finally some software!
>
>
>
> I think we still don't have a handle on identifying running software, and
> CosWID may not be the whole answer. CosWID is more like traditional
> software inventorying, and we need something that will cover dynamic modern
> software.
>

I'm going to write up some text for the CoSWID draft that would have a
CoSWID in an EAT (CWT).  If the entire CoSWID (or even SWID) were in a
claim, allowing you to add other claims, would this suffice for your use
case?

I think I'll write a draft specific to what CoSWID looks like in an EAT as
a follow up and would like coauthors.  I was thinking that might go into
SACM, referencing the EAT work.

Best regards,
Kathleen


>
> Thanks,
>
>                 Yaron
>
>
> _______________________________________________
> RATS mailing list
> RATS@ietf.org
> https://www.ietf.org/mailman/listinfo/rats
>


-- 

Best regards,
Kathleen