Re: [Rats] Serialization formats for attestation results

Michael Richardson <mcr+ietf@sandelman.ca> Sat, 07 March 2020 21:24 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 09D0E3A1AA8 for <rats@ietfa.amsl.com>; Sat, 7 Mar 2020 13:24:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level:
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4oos9p5XCB5T for <rats@ietfa.amsl.com>; Sat, 7 Mar 2020 13:24:49 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B5D563A1AA5 for <rats@ietf.org>; Sat, 7 Mar 2020 13:24:49 -0800 (PST)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 0D5983897D; Sat, 7 Mar 2020 16:23:38 -0500 (EST)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 9C542733; Sat, 7 Mar 2020 16:24:47 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Laurence Lundblade <lgl@island-resort.com>
cc: "Smith, Ned" <ned.smith@intel.com>, "rats@ietf.org" <rats@ietf.org>
In-Reply-To: <F7ED01F8-31BF-4627-801D-BE0AE57CB61C@island-resort.com>
References: <41203417-EF88-4A43-8556-2665F2A6B09F@island-resort.com> <E0AE76F4-8AAE-427B-AF76-E5AB3CA66070@intel.com> <CAHbuEH5pr8Cw6pd-jzGZ281Dz8kibGMtSnCo4KpP6-3HesgKJQ@mail.gmail.com> <63304E99-E120-4025-A4FB-AAA326796300@island-resort.com> <19724.1583535153@localhost> <D7F44491-4D6A-4EA3-BC4A-615F11255968@intel.com> <F7ED01F8-31BF-4627-801D-BE0AE57CB61C@island-resort.com>
X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 25.1.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Date: Sat, 07 Mar 2020 16:24:47 -0500
Message-ID: <12503.1583616287@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/arE4rTOU40qJPGhfiz12tXR1Mws>
Subject: Re: [Rats] Serialization formats for attestation results
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Mar 2020 21:24:52 -0000

Laurence Lundblade <lgl@island-resort.com> wrote:
    > Here’s how I’d expect a lot of the X.509 PKI’s to work.

    > 0) A root cert (a form / part of endorsement) is generated by the manufacturer / endorser and is given to the verifier.

    > 1) The manufacturer puts the private part of a key pair into the attester. It can be in any format including some raw format or some BER encoded format or even COSE format. It will just be used to sign evidence, so the best is probably some raw format. For ECDSA, best is probably just a 256-bit number.

    > 2) The manufacturer puts one or more X.509 certs into the attester including one with the corresponding public key.

    > 3) The attester signs evidence  with the private key

    > 4) The attester bundles the X.509 certs into the COSE headers. See
    > https://tools.ietf.org/html/draft-ietf-cose-x509-05

In draft-selander-ace-ake-authz we are looking at a way to pass the key by
reference rather than value, since bytes really count.

    > 5) The verifier walks the cert chain from the COSE headers up to the root

    > Net-net, the attester copies X.509 certs around, but never looks inside
    > so no BER code is needed.

We are in complete agreement.


--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-