Re: [Rats] Last Call: <draft-ietf-rats-yang-tpm-charra-12.txt> (A YANG Data Model for Challenge-Response-based Remote Attestation Procedures using TPMs) to Proposed Standard

tom petch <daedulus@btconnect.com> Fri, 25 March 2022 15:36 UTC

Return-Path: <daedulus@btconnect.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 225363A17B1; Fri, 25 Mar 2022 08:36:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, NICE_REPLY_A=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ea6PQtpCiAXN; Fri, 25 Mar 2022 08:36:32 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-db3eur04on0716.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0c::716]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE5873A17B2; Fri, 25 Mar 2022 08:36:20 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eiVkJxmkpBqVCZJuN9uuWpadsSDRNvwOdAA8ig+5FB01deal18sf+82YU4z6zPeXDzE7rEAnzNxvXx/tpdDB2ys9yy565gqt5CrLTUXQTjQW0JLd1eQ93/HQoAlvhRRd21ODRYVn1jzF8nxNnJkfvZZnxkLWSWS4sgm9qvJ10UIIYtnZyWfIRoln5jGVj4nm4T3Wu4tBa40Nf8kb3/LJU5LDE7PckeP/GPhTnMvDhZm+LXPxkU7L08+tMfJnPJtezvQJlMFVK9zojIKHM+XCoJSETs9QV/5kXKOKIjk++BMGCwkNA6yEPEw4mL1eBLrKGiGqGHRIuYvXuaasIzaOqg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/VWWn/L50T6dTua+1puV5zrT/cCfIQFxpBjeDV2gLbQ=; b=JnhNSEumcVAdASokG1lubbSwnvlI2GYG7+cF7ehEAwXeIToRe6KgaNSzY4saATq3sHbKugtZSNdgRC2Yd5ywPCyAIH+9jrDWW/W5Hs1QP3Dwic3JLrTMwNGvgboRL7VjqVb+tnul1zEpFYNfWjwpSjmDbzZcxLRGsa+Jwq1OkKfGNiJS1Uw7xbExCRO9seyEic/wPvX5XGLA/aBz7ggVVY/D3y7zyIOLD2FXz7t/CuAXsRwVypWCK7RMwcQyoDW0FURN4eK+CS4RQqRAwOgfbcfWDd1tWJDygigUjqnZFy1uV1bmOuYvxi7nNqtCkjBMzCk0xF44gQOBZI9JYiONMA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/VWWn/L50T6dTua+1puV5zrT/cCfIQFxpBjeDV2gLbQ=; b=JlDcT3hPTWG+9UgUrDgqSmdD7T+ezD5gP4OXw+TFPF+sMWptewvYe5i48GrK6i31305E9vPgepVIbHoT1L9YsuRSH9fQQ+XffrcYET6u05R8CBRbxzxuA/QZu7SImEHGTh3xwE4apmoNX9kiKsf90gh6XznH3Iv+nTgrOL7jVHg=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=btconnect.com;
Received: from VI1PR07MB6704.eurprd07.prod.outlook.com (2603:10a6:800:18b::8) by AM0PR0702MB3652.eurprd07.prod.outlook.com (2603:10a6:208:17::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.15; Fri, 25 Mar 2022 15:36:14 +0000
Received: from VI1PR07MB6704.eurprd07.prod.outlook.com ([fe80::3031:882f:4f62:e707]) by VI1PR07MB6704.eurprd07.prod.outlook.com ([fe80::3031:882f:4f62:e707%8]) with mapi id 15.20.5102.019; Fri, 25 Mar 2022 15:36:14 +0000
To: "Eric Voit (evoit)" <evoit@cisco.com>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
References: <164217699418.11825.9399537345020124861@ietfa.amsl.com> <61E7F4E1.90002@btconnect.com> <BL0PR11MB3122393BC167FDFA512EB43DA1229@BL0PR11MB3122.namprd11.prod.outlook.com> <62063C61.2020008@btconnect.com> <62064DC8.1000505@btconnect.com>
Cc: "rdd@cert.org" <rdd@cert.org>, "rats-chairs@ietf.org" <rats-chairs@ietf.org>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "rats@ietf.org" <rats@ietf.org>, "nancy.winget@gmail.com" <nancy.winget@gmail.com>, "draft-ietf-rats-yang-tpm-charra@ietf.org" <draft-ietf-rats-yang-tpm-charra@ietf.org>
From: tom petch <daedulus@btconnect.com>
Message-ID: <623DE16B.3090502@btconnect.com>
Date: Fri, 25 Mar 2022 15:36:11 +0000
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
In-Reply-To: <62064DC8.1000505@btconnect.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: LO2P123CA0057.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1::21) To VI1PR07MB6704.eurprd07.prod.outlook.com (2603:10a6:800:18b::8)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 536c89e1-d6ab-4a0d-a848-08da0e75323c
X-MS-TrafficTypeDiagnostic: AM0PR0702MB3652:EE_
X-Microsoft-Antispam-PRVS: <AM0PR0702MB3652173BAF895D05F2911D6BC61A9@AM0PR0702MB3652.eurprd07.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR07MB6704.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(66476007)(4326008)(2906002)(5660300002)(8676002)(4001150100001)(66946007)(8936002)(33656002)(6666004)(86362001)(316002)(110136005)(36756003)(6486002)(508600001)(966005)(66556008)(66574015)(54906003)(52116002)(87266011)(6512007)(53546011)(82960400001)(186003)(2616005)(6506007)(26005)(38100700002)(83380400001)(38350700002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 536c89e1-d6ab-4a0d-a848-08da0e75323c
X-MS-Exchange-CrossTenant-AuthSource: VI1PR07MB6704.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 15:36:14.6598 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /b2wrZP2Og8MZWPfEhxWypZd96cEAqns6xHlyj9oCHOsoc+iMHhXFo/yHUNo79AhlTj3iWCx/FGzfV+d+Mr6Xw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0702MB3652
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/Z1L9pYQG7_8MX0Q0PNWXT8Ycmkw>
Subject: Re: [Rats] Last Call: <draft-ietf-rats-yang-tpm-charra-12.txt> (A YANG Data Model for Challenge-Response-based Remote Attestation Procedures using TPMs) to Proposed Standard
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 15:36:45 -0000

On 11/02/2022 11:51, tom petch wrote:
> On 11/02/2022 10:37, tom petch wrote:
>
> Eric

Eric

Me again.

Looking at -18:
- the changes from my comment about YANG import needing a Normative 
Reference hasn't quite had the effect I intended.  Yes, as per RFC8407, 
the Normative Reference is there but the YANG 'reference 'statement is not
e.g. from tcpm-yang-tcp
      import ietf-inet-types {
        prefix "inet";
        reference
          "RFC 6991: Common YANG Data Types.";
      }
      import ietf-netconf-acm {
        prefix nacm;
        reference
          "RFC 8341: Network Configuration Access Control Model";
      }
Where the reference is to an I-D, the usual practice is still to include 
a reference e.g.
      import ietf-tcp-common {
        prefix "tcpcmn";
        reference
          "I-D.ietf-netconf-tcp-client-server: YANG Groupings for TCP
           Clients and TCP Servers.";

Also I see 'Ref AAAA Appendix B' with no note as to what AAAA is or will 
be; perhaps an RFC Editor note would clarify

Tom Petch

> And following up on my other comments
>
>     <CODE BEGINS> file "ietf-tpm-remote-attestation@2022-11-16.yang"
> interesting date
>
> YANG 'import' must have a YANG 'reference' clause
> e.g.
>     import ietf-inet-types {
>       prefix inet;
>       reference "RFC6991: Common YANG Data Types";
>
>
> TLP in the YANG modules is out of date.
>
> Copyright references 2021
>
>  >>        "Defines a specific instance of an event log entry
>  >>         and corresponding to the information used to
>  >>         extended the PCR";
>
> / and corresponding to the information used to
> extended the PCR/ corresponding to the information used to extend the PCR/
> perhaps
>
> My thinking on NACM was that the statement would actually appear in the
> YANG as you can see in draft-ietf-tcpm-yang-tcp
>
> Tom Petch
>
>
>> On 28/01/2022 20:56, Eric Voit (evoit) wrote:
>>> Hi Tom,
>>> Hi Henk,
>>>
>>> Tom: from your other thread, the requested references from the YANG
>>> model
>>> have been updated throughout the document as requested.   We will post
>>> a new
>>> version as soon as the other topics below are covered to your
>>> satisfaction.
>>>
>>> Henk: there is one change I hope you can help with.  Search on **Henk.
>>>
>>>> From: tom petch, January 19, 2022 6:24 AM
>>>>
>>>> These comments are separate from my previous comments on references
>>>> in the
>>>> YANG modules.  That said,
>>>>
>>>> 'import' in YANG module must have a YANG reference clause which must
>>>> be a
>>>> Normative Reference in the I-D Reference.
>>>
>>> This has been updated as part of references fix from your other
>>> email.  And
>>> new text inserted prior to each YANG model describes the embedded
>>> references
>>> from the draft's Normative list.
>>>
>>>> ietf-hardware must has a prefix of 'hw' as per RFC8348  throughout
>>>> the I-D
>>>
>>> Change made.
>>>
>>>> /http:datatracker/https:/datatracker/
>>>> in both modules
>>>
>>> Change made.
>>>
>>>>          reference
>>>>            "draft-ietf-rats-yang-tpm-charra";
>>>> perhaps
>>>>          reference
>>>>            "RFC XXXX: A YANG Data Model for Challenge-Response-based
>>>> Remote
>>>> Attestation Procedures using TPMs";
>>>
>>> Change made.
>>>
>>>>        identity attested_event_log_type {
>>>>          description
>>>>            "Base identity allowing categorization of the reasons why
>>>> and
>>> /and/an/ ?
>>>
>>> Change made.
>>>
>>>>          leaf TPMS_QUOTE_INFO {
>>>> most YANG identifiers have been changed to lower case; should this
>>>> one be?
>>>
>>> Multiple review discussions have driven this to be upper case because
>>> there
>>> is a 1:1 correspondence with an identical object defined by TCG.
>>>
>>>>        grouping boot-event-log {
>>>> could do with more explanation and/or references for this.
>>>
>>> I made the group description:
>>>        "Defines a specific instance of an event log entry
>>>         and corresponding to the information used to
>>>         extended the PCR";
>>>
>>> e.g. are there
>>>> semantics for the uint32 event-type?
>>>
>>> ** Henk, can you improve this ietf-tpm-remote-attestation.yang leaf
>>> description with a reference:
>>>
>>>      leaf event-type {
>>>          type uint32;
>>>          description
>>>            "log event type";
>>>      }
>>>
>>>> Security Considerations mention the use of NACM; should the RPC have a
>>>> default deny-all?
>>>
>>> Added "with a default setting of deny-all".
>>>
>>>>              leaf physical-index {
>>>> should this reference the YANG RFC8348 rather than the SMI equivalent?
>>>
>>> It could.  The initial requirement was driven by someone who wanted to
>>> allow
>>> operations to make an easy mapping to corresponding Entity MIB data they
>>> currently used.  In the end the populated info will be the same.
>>>
>>>>              leaf manufacturer {
>>>> these are often modelled as Privat Enterprise Numbers as registered
>>>> with
>>> IANA -
>>>> see e.g. draft-ietf-dots-telemetry
>>>
>>> This could be done.  Nobody in the WG suggested a purpose for
>>> leveraging a
>>> mechanized list of values here.  I expect the major use would be for
>>> manual
>>> debugging / manual checking if something went wrong.  Certainly a formal
>>> list could be maintained.  It just didn't seem important yet.
>>>
>>>>          reference
>>>>            "RFC XXXX: tbd";
>>>> as above
>>>
>>> Updated.
>>>
>>>>        identity tpm20 {
>>>>          if-feature "tpm12";
>>>> looks odd - if correct then worth an explanatory note
>>>
>>> Fixed.
>>>
>>> Eric
>>>
>>>> Tom Petch
>>>>
>>>> On 14/01/2022 16:16, The IESG wrote:
>>>>>
>>>>> The IESG has received a request from the Remote ATtestation ProcedureS
>>>>> WG
>>>>> (rats) to consider the following document: - 'A YANG Data Model for
>>>>> Challenge-Response-based Remote Attestation
>>>>>      Procedures using TPMs'
>>>>>     <draft-ietf-rats-yang-tpm-charra-12.txt> as Proposed Standard
>>>>>
>>>>> The IESG plans to make a decision in the next few weeks, and solicits
>>>>> final comments on this action. Please send substantive comments to the
>>>>> last-call@ietf.org mailing lists by 2022-01-28. Exceptionally,
>>>>> comments may be sent to iesg@ietf.org instead. In either case, please
>>>>> retain the beginning of the Subject line to allow automated sorting.
>>>>>
>>>>> Abstract
>>>>>
>>>>>
>>>>>      This document defines YANG RPCs and a small number of
>>>>> configuration
>>>>>      nodes required to retrieve attestation evidence about integrity
>>>>>      measurements from a device, following the operational context
>>> defined
>>>>>      in TPM-based Network Device Remote Integrity Verification.
>>>>>      Complementary measurement logs are also provided by the YANG
>>>>> RPCs,
>>>>>      originating from one or more roots of trust for measurement
>>>>> (RTMs).
>>>>>      The module defined requires at least one TPM 1.2 or TPM 2.0 as
>>>>> well
>>>>>      as a corresponding TPM Software Stack (TSS), included in the
>>>>> device
>>>>>      components of the composite device the YANG server is running on.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> The file can be obtained via
>>>>> https://datatracker.ietf.org/doc/draft-ietf-rats-yang-tpm-charra/
>>>>>
>>>>>
>>>>>
>>>>> No IPR declarations have been submitted directly on this I-D.
>>>>>
>>>>>
>>>>> The document contains these normative downward references.
>>>>> See RFC 3967 for additional information:
>>>>>       draft-ietf-rats-tpm-based-network-device-attest: TPM-based
>>>>> Network
>>>> Device Remote Integrity Verification (None - Internet Engineering Task
>>> Force
>>>> (IETF))
>>>>>       draft-ietf-rats-architecture: Remote Attestation Procedures
>>>>> Architecture (None - Internet Engineering Task Force (IETF))
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> IETF-Announce mailing list
>>>>> IETF-Announce@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/ietf-announce
>>>>> .
>>>>>