Re: [Rats] device attestation and ACME

Carl Wallace <carl@redhoundsoftware.com> Wed, 20 July 2022 23:07 UTC

Return-Path: <carl@redhoundsoftware.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21067C13192F for <rats@ietfa.amsl.com>; Wed, 20 Jul 2022 16:07:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhoundsoftware.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ijcjA53Y45Fc for <rats@ietfa.amsl.com>; Wed, 20 Jul 2022 16:07:35 -0700 (PDT)
Received: from mail-qt1-x831.google.com (mail-qt1-x831.google.com [IPv6:2607:f8b0:4864:20::831]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81715C15A731 for <rats@ietf.org>; Wed, 20 Jul 2022 16:07:35 -0700 (PDT)
Received: by mail-qt1-x831.google.com with SMTP id h22so146819qta.3 for <rats@ietf.org>; Wed, 20 Jul 2022 16:07:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhoundsoftware.com; s=google; h=user-agent:date:subject:from:to:message-id:thread-topic:references :in-reply-to:mime-version:content-transfer-encoding; bh=v6uW4k9wKvbJXDjJinm2r/lMGd+K4F5C5+oJiQavBfs=; b=rtWpYOSv8WwUf/2JiLcqjHzkvEilglvYuLPNqIJdUYgMMiF8Q8GcbflbwWQXwNRFNH thtq4v4sSYViSWGBLq9PxDyJk/DpaTro4C62jqTjclaMbI1DIQbECliYiLBjqTzY1UkJ ENAkmXmqEoQIdkVof0jpQOm4oLtR6DDr2OROc=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:user-agent:date:subject:from:to:message-id :thread-topic:references:in-reply-to:mime-version :content-transfer-encoding; bh=v6uW4k9wKvbJXDjJinm2r/lMGd+K4F5C5+oJiQavBfs=; b=2+Sh2Or56ycxR4f+nD9T2TSLLzpzGshgeOCGQh05YyS7zJ28uoSeBXvfWOMzPz++nM CsOTC9wggoYbi25dAu9vpVfWAkg6t+7bn03k7hhnIIi66oVJRihKOL3m91Z+sK0ccoJR 7BgMwkNOgAlpHiuJxBGsASX3FQCCQa1KdXT02QgzHZJKXbdiizBjwybRE1cNO+Qxu08s UOvsEuwziIvN5NnBpK472jQOG04SX2m61Qa/VGW2PEk+3y9+L8GC9PWBV5rW9SR3urFh 7wbK7TTpsqKyb4r36hTYEdOULoSVQrPsW0edlHfcgj+g8hFK0tqE73v4ljmaZfbxLwXM +fJA==
X-Gm-Message-State: AJIora+n3L/irW7UKhiUSg8vicAeDVQXijHv9usVpiY6w1llxVanFjAB B90zjmuaH0csgpNBiIe8Euy0qw==
X-Google-Smtp-Source: AGRyM1sm3j6woO8ept6YFHXTIf1TQ7LkTVV8s77Tl5Kx22LecJmor6tCzXMNPPLiOKgT4XDnOVeZlg==
X-Received: by 2002:ac8:5815:0:b0:31f:a54:c7ce with SMTP id g21-20020ac85815000000b0031f0a54c7cemr3514670qtg.21.1658358454451; Wed, 20 Jul 2022 16:07:34 -0700 (PDT)
Received: from [192.168.2.16] (pool-173-66-83-240.washdc.fios.verizon.net. [173.66.83.240]) by smtp.gmail.com with ESMTPSA id l11-20020ac84a8b000000b0031ec4b68ecasm303203qtq.11.2022.07.20.16.07.32 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 20 Jul 2022 16:07:33 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/16.63.22070801
Date: Wed, 20 Jul 2022 19:07:32 -0400
From: Carl Wallace <carl@redhoundsoftware.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, rats@ietf.org, acme@ietf.org
Message-ID: <B950BEDF-DF18-4AF0-95A1-0EF3C0A9EA6A@redhoundsoftware.com>
Thread-Topic: [Rats] device attestation and ACME
References: <1680731.1658356904@dooku>
In-Reply-To: <1680731.1658356904@dooku>
Mime-version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/ZA58Kcyr0yZX2wb_P2iYJWc2rLo>
Subject: Re: [Rats] device attestation and ACME
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Jul 2022 23:07:39 -0000

Distributing trust anchors to verify device attestations is one of the aims of https://datatracker.ietf.org/doc/html/draft-wallace-rats-concise-ta-stores-00. Note, there's also a LAMPS draft that borrows the WebAuthn format approach from this ACME device attestation draft but for use in extensions suitable for CMP, EST, SCEP, etc.

On 7/20/22, 6:41 PM, "RATS on behalf of Michael Richardson" <rats-bounces@ietf.org on behalf of mcr+ietf@sandelman.ca> wrote:


    I read acme-device-attest, and I guess the key part is a new device-attest-01
    method.

    https://www.ietf.org/archive/id/draft-bweeks-acme-device-attest-00.html#name-device-attestation-challeng

    tries to explain the format, and how the challenge is signed by the device.
    What I do not understand is any of the trust relationships between the ACME
    server and the manufacturer/provisionor of the Android Key Attestation/Chrome
    OS Verified Access/Trusted Platform Module.

    Why does the Enterprise trust the attestation key?

    -- 
    Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
     -= IPv6 IoT consulting =-



    _______________________________________________
    RATS mailing list
    RATS@ietf.org
    https://www.ietf.org/mailman/listinfo/rats