Re: [Rats] Benjamin Kaduk's No Objection on draft-ietf-rats-yang-tpm-charra-17: (with COMMENT)
Henk Birkholz <henk.birkholz@sit.fraunhofer.de> Sun, 20 March 2022 07:57 UTC
Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 99DD83A09CC; Sun, 20 Mar 2022 00:57:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.909
X-Spam-Level:
X-Spam-Status: No, score=-0.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URI_WP_DIRINDEX=1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lD-0bBt-o-os; Sun, 20 Mar 2022 00:57:29 -0700 (PDT)
Received: from mail-edgeKA24.fraunhofer.de (mail-edgeka24.fraunhofer.de [153.96.1.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D88203A09D1; Sun, 20 Mar 2022 00:57:24 -0700 (PDT)
IronPort-SDR: O1q+KoOfGl4j8kpz9WwnXAaciasg72urB32pvR4W6Prc++5RanoXx/cYtE63ueNqkMT1sdiqoh E56R7zrvcOnRom61IoBO4HWTeIeknqLIX+Yb+dOq9hV15dPuGsTtS4Mw/P1mzF3pYOMdnFsICU wLxlw4DmHWo03qvQneIXzilguMDFfm16KF4zm0Mz77RRB2emVcbESYl8W6s3a8NNuvP7Nr1eAJ 1TBPEbEBtGhrbXuE0/dqgSK/Z/WXJ8STZCdB5ShzFFzZ1Bd9xABFaSUIM2qqotJsrL2B2hy/RO pm8=
X-IPAS-Result: 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
IronPort-PHdr: A9a23:W3n5Ix86RQG/GP9uWC3oyV9kXcBvk7n3PwtA7J0hhvoOd6m45J3tM QTZ4ukll17GW4jXqpcmw+rbuqztQyoMtJCGtn1RfJlFTRRQj8IQkkQpC9KEDkuuKvnsYmQ6E c1OWUUj8Wu8NB1OGdq4aUfbv3uy6jAfAFPzOFkdGw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,195,1643670000"; d="scan'208";a="40462494"
Received: from mail-mtaka28.fraunhofer.de ([153.96.1.28]) by mail-edgeKA24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Mar 2022 08:57:21 +0100
IronPort-SDR: 0+l2whTDCxVVhXdL+MhDNqMtMOdskq3rgnj1RcHbI0G+iuHGgTod9OxrFkCBSnX483XM5AuDuR o701zRbcTWM6UF0BymZpVMucoyMzE4ynLzkd/lghXlbozXYgwGhRZPS2eiOPm4y2KD3o8QWyoe QsHf6xMGSCrB+6yiEWxYIRqgVlXHjcNG125TPJBwzMPBXS9LZTKYOJmCVzSqF0vB3d7YsujgJU FLhyWCxkFKXholiY4H/auyDBViVEVINiKRl1WdM6ZG285usJ40tx+oVZ0fQFboBLBS8jvzQZ39 kSgbO74bpd9Ymt7wPfuV1eu7
X-IPAS-Result: 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
IronPort-PHdr: A9a23:NJFaeR+fYxestP9uWC3oyV9kXcBvk7n3PwtA7J0hhvoOd6m45J3tM QTZ4ukll17GW4jXqpcmw+rbuqztQyoMtJCGtn1RfJlFTRRQj8IQkkQpC9KEDkuuKvnsYmQ6E c1OWUUj8Wu8NB1OGdq4aUfbv3uy6jAfAFPzOFkdGw==
IronPort-Data: A9a23:iCbkh698wvT5Lqnyb7qrDrUDyXmTJUtcMsCJ2f8bNWPcYEJGY0x3z mpOWW7UPq6LY2v3Ld4jO9jjo0sG65PQm9dhTANr+StEQiMRo6IpJzg2wmQcn8+2BpeeJK6yx 5xGMrEsFOhtFTmB4EvF3oHJ9RGQ74nRLlbHILOCa3gZqTNMEn9700o4wbZh2+aEvPDga++zk YOqyyHgEAL9s9JEGjp8B3Wr8U4HUFza4Vv0j3RmDRx5lAa2e0o9UPrzEZqMw07QGeG4KAIaq 9Hrl9lV9kuBl/sk50jMfrzTKiXmSZaKVeSCZ+Y/t6WK2nB/SiIOPqkTDcVBRG4Qkmmzjftj0 c10t8GccQYmB/iZ8Agde0Ew/yBWJqha4PnKMXO/98KJxlDAc3zizu8oAExe0Y8wo7ssRzARs 6VHeXZUNE/ra+GemNpXTsFsi8IgasPqJoAfvXVy5SrYEbAoW5neRaXN69JCmjs97ixLNaaDP ZRAOWM1BPjGSxp3NWUOCZ8Zp/exn3nfSWBZqni64pNitgA/yyQ0itABKuH9edWGWMZ9m0eE4 G/K4gzRAxwBO/SexCaLtHW2iYfnkTnyVp5XFbCk+LtwiUGIg30aDhJTSUO+5PK5g1SkUvpeJ lAavC00osAa7kW3VZz2XxS5umWsvxMAVZxXCeJSwBuE1rH84guFCC4DVDEpQNotvcopRDol/ lSIhNjuQzdotdW9T3ub/abSsjK0NiUJBWAHbC4ACwAC5rHeTJob10+UC4c8Vffq35isQ2623 TXMp24wnbwOi84M2aihu1zK696xmqX0oscOzl2/dgqYAslRPeZJvqSktgrW6+huNoGcQgXTt XQIgZHBvvsPEdeDjiWQRuUKEryzofqIaWWOjVlqFpgn1jKs53/6IdEOum4jfh8xP5ZWYyLtb W/SpRhVus1ZMkyqWqkrMYi/PMInkPr7HtP/W/GINddDO8AjdAKO8Cx0S1SX2mThzBolna0lY MjJasewS3gAALlhzD24Sv1b3bJynnIywmbaRJbayRW70OPCNSDPFupfaAODN7lr4rmFrQPZ9 8dkG/GLkxgPAvfjZiT38JIIKQ5YJ3YMBafw955deNmFL1c0A2omEfLQnegsdoE5zaRYkuDEo iO0VkNCkgGtnnjbMUOHentjLr31VIt5rXU1MDZqMVvxgyovZoOm7aE+cZorfOB7pbI5kqMuF 6EIK5eaH/BCajXb4DBBP5Pzm4pvKUawjgWUMiv5PTUyI8x6SwrS9oO2dwfj7nJVXHPq7o5v/ Pj5iVKeGMBcARpnSs2QZuim0lWxunYQgqR+UhKQcNVUfUzt9qlsKjDw16NmfZtTdE+bnjbKh RyLBRo4pPXWp9Nn+tf+g63Z/ZyiFPFzHxYHEmTWhVps2fI2IoZ+LVd8bdu1
IronPort-HdrOrdr: A9a23:1KGHTK4m8Dm6tO7ZPgPXwVCBI+orL9Y04lQ7vn2ZFiY7TiXIra yTdaoguCMc6AxxZJkh8erwQJVoMkmsk6KdhrNhQotKPTOWxFdASbsN0WKM+UyEJ8STzJ8m6U 4kSdkCNDSSNykLsS+Z2njbLz9I+rDum8rJ9ITjJjVWPHpXgslbnnZE422gYypLrWd9dOME/d anl656T23KQwVoUi33PAhPY8Hz4/nw0L72ax8PABAqrCGIkDOT8bb/VzyVxA0XXT9jyaortT GtqX212oyT99WAjjPM3W7a6Jpb3PPn19t4HcSJzuwYMC/lhAqEbJloH5eCoDc2iuey70tCqq iHnz4Qe+BIr1/BdGC8phXgnyHmzTYV8nfnjWSVhHPyyPaJMg4SOo5kv8Z0YxHZ400vsJVXy6 RQxV+UsJJREFfpgDn9z8KgbWAlqmOE5V4Z1cIDhX1WVoUTLJVLq5YEwU9TGJAcWArn9YEcFv V0Bs203ocYTbqjVQGYgoBT+q3uYpxqdS32AHTq+/blnwS+pUoJjnfxn6ck7zI9HJFUcegy2w 2LCNUtqFh0dL5lUUtMPpZzfSKJMB25ffvtChPaHb21LtBOB5ryw6SHlIndotvaP6A18A==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,195,1643670000"; d="scan'208";a="85261812"
Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaKA28.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Mar 2022 08:57:18 +0100
Received: from XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.15; Sun, 20 Mar 2022 08:57:18 +0100
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (104.47.17.172) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.15 via Frontend Transport; Sun, 20 Mar 2022 08:57:18 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=k2fRXSltIzVFhLlG+LlOSsh6PuwKw/fcRG61hA1JwK4i/pAggjhQWcqU4zWsnKxMb8FlegWWTadjecdhj/Y9YTyg0I2arHCzd2pd2qjw1vng9PKRFNPwMmcbGnl/CZjWHORhp4cjSXB+M8MzbuaPCav9KGLBu3mDl3a+y78L8FuXrSGJ+Swr6LrmVWCx7NQrdhX+55chucKkzfvE30KuwYlcIoF1pf4CkbdeM5/kmWoJ0nQNFCacSBv8UByKBjdWn+nc+8YMLp060q7+XiB8RNBXp3wlQZ50pvWACqtrHNJkVDBXK5eZhDkG8PogEh5AaoyxmYYf0MDNJbbFSsFX+g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mXvO1Aviu3ag+76QSR16atNYvwS0dXyZQoXR+ixNSAU=; b=CC7mvN5+CZ4825ecPFFGHY41RWmDJD2/E7pj+LrWS/rZVwm/dugeB06klgaKv3OxJRomOloSfH2P5tXFsWVFvLjvLJQWlMNoEy+wtTodoUraOoEPSkIFxFgHBgfoWEalvqEt9K22ObU1/U0PIXp6QmoZwrsvC43wOIufW2jJL+x0oIqXc7MMgGdXBN1chMkeZtzWI2OOF35/6AQapqlJkgFEdOCurFs+MQ0mN3V4PgFL3t9gz7tfPpYP0nO/pGtj19NzuMcYTV3DQdbtHJ0uw8C+6sJV/ODL6oIqDRFJw656g4znP7lDwm9ISrT/iQcp91smL7kQQPijaRgG8f5ufw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mXvO1Aviu3ag+76QSR16atNYvwS0dXyZQoXR+ixNSAU=; b=fs3xzeRmc7vjhNbgPud0P8zf3FNZY1/XhGEPGOTE+WFxkgdp1QsPZpvnywMzdB45c/ovYIxhscBXHLkWdgnghdJPk5d/fgeaCPORvoevdwBLzUreb0icqWSlvP1SA3DS4VMMDU2soUbYaAqKODNLeH1rJWIHXb35eUamDdHI2KI=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=sit.fraunhofer.de;
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) by DB7P194MB0364.EURP194.PROD.OUTLOOK.COM (2603:10a6:5:24::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Sun, 20 Mar 2022 07:57:16 +0000
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::ec87:f3dc:70f7:2421]) by DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::ec87:f3dc:70f7:2421%5]) with mapi id 15.20.5081.022; Sun, 20 Mar 2022 07:57:16 +0000
Message-ID: <345037bd-0829-bb1e-e32a-7dcc489f873c@sit.fraunhofer.de>
Date: Sun, 20 Mar 2022 08:57:13 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
CC: draft-ietf-rats-yang-tpm-charra@ietf.org, rats-chairs@ietf.org, rats@ietf.org, ncamwing@cisco.com, nancy.winget@gmail.com
References: <164767418837.16564.2908503429890916253@ietfa.amsl.com>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
In-Reply-To: <164767418837.16564.2908503429890916253@ietfa.amsl.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: VI1PR04CA0114.eurprd04.prod.outlook.com (2603:10a6:803:64::49) To DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3fa5a317-9528-4f8f-b828-08da0a474029
X-MS-TrafficTypeDiagnostic: DB7P194MB0364:EE_
X-Microsoft-Antispam-PRVS: <DB7P194MB0364D3EF9B344F971E11E54CA8159@DB7P194MB0364.EURP194.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2P194MB1709.EURP194.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230001)(366004)(31686004)(8936002)(5660300002)(2906002)(44832011)(83380400001)(2616005)(31696002)(186003)(38100700002)(66476007)(8676002)(66946007)(86362001)(82960400001)(66556008)(4326008)(6486002)(966005)(110136005)(316002)(508600001)(6512007)(53546011)(6666004)(52116002)(6506007)(15398625002)(43620500001)(43740500002)(45980500001); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-MS-Exchange-CrossTenant-Network-Message-Id: 3fa5a317-9528-4f8f-b828-08da0a474029
X-MS-Exchange-CrossTenant-AuthSource: DU2P194MB1709.EURP194.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Mar 2022 07:57:16.3944 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: cHMIr+6anIN/9W8OfXzopU6R+qD3G9wN6+LTnfI/MUxsg+zR34L4jTkV7kLWkm5LaPK0Pc9oQddRcyP2ieFoTVJijn9coRcFeFcXgrG5NhQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7P194MB0364
X-OriginatorOrg: sit.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/c2QDkq0Tp2afoiLGfGkQSFZ5QEo>
Subject: Re: [Rats] Benjamin Kaduk's No Objection on draft-ietf-rats-yang-tpm-charra-17: (with COMMENT)
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Mar 2022 07:57:34 -0000
Hi Ben, I think we are very close now - just submitted -18. Please see in-line for the references to changes based on your comments and nits via commits to: > https://github.com/ietf-rats-wg/basic-yang-module/ Hochachtungsvoll, Henk On 19.03.22 08:16, Benjamin Kaduk via Datatracker wrote: > Benjamin Kaduk has entered the following ballot position for > draft-ietf-rats-yang-tpm-charra-17: No Objection > > When responding, please keep the subject line intact and reply to all > email addresses included in the To and CC lines. (Feel free to cut this > introductory paragraph, however.) > > > Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ > for more information about how to handle DISCUSS and COMMENT positions. > > > The document, along with other ballot positions, can be found here: > https://datatracker.ietf.org/doc/draft-ietf-rats-yang-tpm-charra/ > > > > ---------------------------------------------------------------------- > COMMENT: > ---------------------------------------------------------------------- > > I know that there is still a fair amount of editing effort underway, and > so am not concerned that some of my comments from the -16 remain > unaddressed. I will try to repeat them here along with a handful of new > comments, while posting an updated ballot position with the primary goal > of removing my DISCUSS. And we'll try resolve any open items until Monday! > > Many thanks for adding the appendices, they really help lay out how the > pieces fit together in a way that the external references used in the > -16 couldn't. Thanks! Now there is a thing to point to in the future :-) > > With regards to my previous discuss point (3), it seems that [ima-log] > still points ot the TCG "canonical event log" document with no mention > of Linux IMA. > Also, the string "netequip-boot-log" still appears in a YANG description > (where it can't be an xml2rfc reference) pointing to the linux IMA docs; > presumably we'd want it to point to Appendix B of [this RFC]. > > leaf event-number { > type uint32; > description > "Unique event number of this event which monotonically > increases. [...] Addresed in 05e20c6 > > I think we should say "within a given even log", maybe at the end of > this sentence. > > leaf-list event-data { > type binary; > description > "The event data size determined by event-size. For more > see "; Addressed in f5f1cc6 > > I think there was a botched edit here. > > grouping ima-event { > description > "Defines an hash log extend event for IMA measurements"; > reference > "ima-log: > https://www.trustedcomputinggroup.org/wp-content/uploads/ > TCG_IWG_CEL_v1_r0p30_13feb2021.pdf Section 4.3"; > > Is section 4.3 the best section to reference? I only see specifics > about, > e.g., the hash algorithm being encoded as a string later on, circa > §5.1.6. Addressed in 34505df (also including the nits below) > > leaf filename-hint { > type string; > description > "File that was measured"; > > Is this just the file name, a full path, either, ...? Addressed in 3712de3 > > identity TPM_ALG_SYMCIPHER { > if-feature "tpm20"; > base tpm20; > base symmetric; > description > "Object type for a symmetric block cipher"; > > Thanks for adding "base symmetric". Please confirm that "base > object_type" is not needed (as I thought I saw it in the TCG doc). Addressed in 05e20c6 > > NITS > > Section 1 > > to retrieve attestation Evidence. This is done by using a YANG RPC > to request a quote which exposes a rolling hash the security > measurements held internally within the TPM. > > "rolling hash of" Also addressed in 34505df > > Appendix B. IMA for Network Equipment Boot Logs > > Network equipment can generally implement similar IMA-protected > functions to generate measurements (Claims) about the boot process of > a device and enable corresponding remote attestation. Network > Equipment Boot Logs combine the measurement and logging of boot > components and operating system components (executables and files) > into a single log file in identical IMA format. > > "single log file in a format identical to the IMA format" > Also addressed in 34505df > >
- [Rats] Benjamin Kaduk's No Objection on draft-iet… Benjamin Kaduk via Datatracker
- Re: [Rats] Benjamin Kaduk's No Objection on draft… Henk Birkholz