Re: [Rats] More use cases for draft-richardson-rats-usecases-00

Anders Rundgren <anders.rundgren.net@gmail.com> Sun, 31 March 2019 07:01 UTC

Return-Path: <anders.rundgren.net@gmail.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5EF01200B6 for <rats@ietfa.amsl.com>; Sun, 31 Mar 2019 00:01:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4i7vzhRdzDmt for <rats@ietfa.amsl.com>; Sun, 31 Mar 2019 00:01:08 -0700 (PDT)
Received: from mail-wr1-x42f.google.com (mail-wr1-x42f.google.com [IPv6:2a00:1450:4864:20::42f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49838120171 for <rats@ietf.org>; Sun, 31 Mar 2019 00:01:08 -0700 (PDT)
Received: by mail-wr1-x42f.google.com with SMTP id k11so7696638wro.5 for <rats@ietf.org>; Sun, 31 Mar 2019 00:01:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=p5IY/H/N2pA1c+cq6GHPWdRScXwln9K7crdEipkadac=; b=cI/jA0iw9kOyoHkjOsXmtBnfYNxo+tgM+wHsRBI9b8d47MxLF12hQ6L7iLSQNLos0r N4h5/sUZ59z+TYMuuLILEHFf6YmXTdzoBWImajl9FJzzOvhCltUELrN89kFyIZNjz3Y+ eebBwAL1+g8lfFEBZ9KOXm8OVhZ+OkSKxq6MpOJw2JjHDWAJJgguqe8pWYC5GzHPi5Wb 6SyLjtVVFSLTgWT4I/Je/JpIFib9oFSu2JAMtqTnlr63vrVnpU3OdSMROVjDv6UEUqAr F+Mpv6ZkrWsFq3H2R9C2FUBVOPNM2wdCKnt6FUM+aAzunYD5UB80/nlGGKFJnC4XybUo ceGg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=p5IY/H/N2pA1c+cq6GHPWdRScXwln9K7crdEipkadac=; b=KeX3rp8gKSRlvIpuubE3YlWYj0nKTtl8wmoIYNs2RHc69MlGqHuzzRS8cZ7Q7H8hX3 qLDndEO4775Ps9GDUVmzJR2A+RvB5AlA6gOyHEPaUjTuhnGTRr3lsy+S/Tj3K25g/Dow RcQfCU4INTe317B/S9XHnoJIfXjfi8zE2IELQVbVlXK4YyQemzQDuc4iEUVq12taPSaE aYqirtj7Ddgmj4fng20RVrYJT7sQnf1gQ/SwqmzqlSWkkB1zDLJ7LIQhuEPiXJwAtw6G rH2P0+rmjf//8fdVEAE1Bd3AVNqfKP4v8U10o9baJEaniLkC8+Kvykw0/Pem38DbfQed tDug==
X-Gm-Message-State: APjAAAW42tbyEWDk/wDm+/i+etSeiTcOtm9m27l5ZLGRGH+qsDjU2o/z ka/+Z2cF+9ZY8/5zTz+ueBEh15NY
X-Google-Smtp-Source: APXvYqx0ZzkgKinbNEVvLLEF81b9Fcpzzr2A+ENJFYnFsDHFmifJiO3Q6/50d+Tv3kq5uE/PWGo9Mg==
X-Received: by 2002:a5d:6682:: with SMTP id l2mr35352727wru.33.1554015666076; Sun, 31 Mar 2019 00:01:06 -0700 (PDT)
Received: from [192.168.1.79] (25.131.146.77.rev.sfr.net. [77.146.131.25]) by smtp.googlemail.com with ESMTPSA id j3sm15689173wre.51.2019.03.31.00.01.04 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 31 Mar 2019 00:01:04 -0700 (PDT)
To: Carl Wallace <carl@redhoundsoftware.com>, Michael Richardson <mcr+ietf@sandelman.ca>
Cc: "rats@ietf.org" <rats@ietf.org>
References: <MW2PR00MB03963ABEB87211AD28A16240A6490@MW2PR00MB0396.namprd00.prod.outlook.com> <12503.1552447661@localhost> <58E37DB5-098C-4387-9A52-4AECD0F69F25@island-resort.com> <6495.1553219901@dooku.sandelman.ca> <BA6E28A7-0F6A-46A8-AB1B-A64B9229F149@intel.com> <507.1553725386@dooku.sandelman.ca> <24C0968B-32B0-4EF1-99C8-61D3F0955BA1@intel.com> <793F9A34-050F-4914-AF4B-08C072730A06@island-resort.com> <D8C23800.D851F%carl@redhoundsoftware.com> <19652.1553943890@dooku.sandelman.ca> <D8C50A67.D8999%carl@redhoundsoftware.com>
From: Anders Rundgren <anders.rundgren.net@gmail.com>
Message-ID: <79ccb2d7-09a3-913d-f47d-1e702a23b341@gmail.com>
Date: Sun, 31 Mar 2019 09:00:59 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <D8C50A67.D8999%carl@redhoundsoftware.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/Yr_pSI0DyQCybrl_dGnpPMg2ErQ>
Subject: Re: [Rats] More use cases for draft-richardson-rats-usecases-00
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 31 Mar 2019 07:01:11 -0000

On 2019-03-30 17:03, Carl Wallace wrote:
> Makes sense to me to capture current artifacts. Maybe in an appendix to
> the use cases draft.

For completeness you should consider mentioning that there are two quite different platform attestation concepts:
- Static: FIDO, Android, and current TEEP architecture
- Session based: Used by some smart card schemes and SKS/KeyGen2 (https://github.com/ietf-teep/architecture/issues/52)

> 
> On 3/30/19, 7:04 AM, "Michael Richardson" <mcr+ietf@sandelman.ca> wrote:
> 
>>
>> Carl Wallace <carl@redhoundsoftware.com> wrote:
>>     > Example attestations from Android devices, Yubikey devices and
>> Surface
>>     > Pro virtual smart cards can be found here:
>>     > https://github.com/Purebred/SampleAttestations. These are
>> accompanied
>>     > by SCEP requests that include the attestations and the resulting
>>     > certificates. The attestations were generated and used as part of
>>     > issuing device and end user certificates where the public key was
>> the
>>     > focus of the attestation. The Android and Yubikey attestations take
>> the
>>     > form of X.509 certificates (packaged as certs-only SignedData). The
>>     > Surface Pro attestations take the form of CMC requests.
>>
>> I think that seeing the examples is very useful to extract common pieces.
>> Do you think it's useful to include some in the use case document?
>>
>> -- 
>> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>> -= IPv6 IoT consulting =-
>>
>>
>>
> 
> 
> _______________________________________________
> RATS mailing list
> RATS@ietf.org
> https://www.ietf.org/mailman/listinfo/rats
>