Re: [Rats] Review of draft-birkholz-rats-daa

Thomas Fossati <Thomas.Fossati@arm.com> Mon, 07 June 2021 10:08 UTC

Return-Path: <Thomas.Fossati@arm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C79AE3A0CDD; Mon, 7 Jun 2021 03:08:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.3
X-Spam-Level:
X-Spam-Status: No, score=-1.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_SBL=0.5, URIBL_SBL_A=0.1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=e+7gayhp; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=e+7gayhp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pL-fYuUlqJ83; Mon, 7 Jun 2021 03:08:36 -0700 (PDT)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70051.outbound.protection.outlook.com [40.107.7.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D3A1C3A0CE5; Mon, 7 Jun 2021 03:08:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gvwWc9k99qeQJYNRGJcvs8ModAULmSIp4X+lq79TIFg=; b=e+7gayhpS/fw5HhzZr0haGqVS0kJzLKWm3KLuWl7NwtVOUHAd/JX+gEBa7GSWv2bPUQd2gNYxLqzEePAAs9uexvoFpXXv+xoMAzfbfF5gKKccepyoLc8hThBYkf5hHPvmZ0NQdnjZB/2ANzQnbRRkrJc429ZtUI18PHR9w/VV1o=
Received: from DU2PR04CA0171.eurprd04.prod.outlook.com (2603:10a6:10:2b0::26) by AM9PR08MB5907.eurprd08.prod.outlook.com (2603:10a6:20b:2da::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.22; Mon, 7 Jun 2021 10:08:29 +0000
Received: from DB5EUR03FT063.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:2b0:cafe::ea) by DU2PR04CA0171.outlook.office365.com (2603:10a6:10:2b0::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.20 via Frontend Transport; Mon, 7 Jun 2021 10:08:29 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT063.mail.protection.outlook.com (10.152.20.209) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.21 via Frontend Transport; Mon, 7 Jun 2021 10:08:29 +0000
Received: ("Tessian outbound a5ae8c02e74f:v93"); Mon, 07 Jun 2021 10:08:28 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 76c52084b3ca4499
X-CR-MTA-TID: 64aa7808
Received: from b8c4f1d052f4.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 3B9DAEE6-D0A0-4495-8331-D36B73A96506.1; Mon, 07 Jun 2021 10:08:22 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b8c4f1d052f4.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 07 Jun 2021 10:08:22 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Jt70xoGxtse10IXSYpm/Bo1T5/W/DCKiaHNXMDOnRkBZy5mpVu5KA/WXahGY6xGkq32aU5k0MWgwvdimqEfbEIgI7BDMNt0TtZe49ze/rlqatVRxurvmCY8lRgTjE8LaoMlOCAU/vd43/TgmKPC/DBcfqaGrS4VvfAeU8QCwk39KbzZ0IAa8AlMkeGNh9hSl9jbg6R6DO8EA3ARvywik/cyPQF/5TzGz0/2DcfQEVRJoEDiazwDIq0EEypBYKefaR/wE/2bIXy7MOAi0xpKb0eKMvSMGRE954FSeUfdwdraH2s/f/3QSiW1O7RTgHTuEc5Q7e/hibvvONhp23TPKeA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gvwWc9k99qeQJYNRGJcvs8ModAULmSIp4X+lq79TIFg=; b=EwTSGA9un67Ekchbq/EeCHdt63kfFEFMU7O1qngcgDMkvxp2ZciMy1EDnisVD5LUi4jatBBqk9G4YMyi95VHi+GUxscq9p8pnu2BDP99jX9v0uXWZQmfKY6XKlYaLpOvPXZmmYKuE6PGUXGnGXQ3I8oxaWSBAsJurMWh0C85kuzHyR1NU0T9G/xTuc0c7OweEAwxl9xIr1AjOgU/m24UU3nYFnl1Aw3UobkfycN5lyOIx6zxK5VMsFe1Jnw3lgs8DeJ8FdEOiJSiYBUnGSUx4jTgLBPOERzrC3aIBq7T5iRDlMy3lhNNeIE/s6l11KBaYyn2h9V8j/byIJPjuY0AsA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gvwWc9k99qeQJYNRGJcvs8ModAULmSIp4X+lq79TIFg=; b=e+7gayhpS/fw5HhzZr0haGqVS0kJzLKWm3KLuWl7NwtVOUHAd/JX+gEBa7GSWv2bPUQd2gNYxLqzEePAAs9uexvoFpXXv+xoMAzfbfF5gKKccepyoLc8hThBYkf5hHPvmZ0NQdnjZB/2ANzQnbRRkrJc429ZtUI18PHR9w/VV1o=
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com (2603:10a6:10:251::8) by DB6PR0801MB1815.eurprd08.prod.outlook.com (2603:10a6:4:38::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.22; Mon, 7 Jun 2021 10:08:19 +0000
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::85d4:9a58:ebac:f9f8]) by DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::85d4:9a58:ebac:f9f8%9]) with mapi id 15.20.4195.030; Mon, 7 Jun 2021 10:08:19 +0000
From: Thomas Fossati <Thomas.Fossati@arm.com>
To: Christopher Newton <c.newton@surrey.ac.uk>, "draft-birkholz-rats-daa@ietf.org" <draft-birkholz-rats-daa@ietf.org>
CC: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "rats@ietf.org" <rats@ietf.org>, Liqun Chen <liqun.chen@surrey.ac.uk>, Thomas Fossati <Thomas.Fossati@arm.com>
Thread-Topic: Review of draft-birkholz-rats-daa
Thread-Index: AQHXUicvJq5JZhB/2Euw8worVT3R7qsHctdggAEDsQA=
Date: Mon, 07 Jun 2021 10:08:19 +0000
Message-ID: <EC9F436E-FF3E-4041-B8E2-F495ABA69332@arm.com>
References: <2AC24A3A-C295-4BAC-8007-4D0B75C6C60B@arm.com> <AM8PR06MB7441A92117EF3AB44B82DD65B8399@AM8PR06MB7441.eurprd06.prod.outlook.com>
In-Reply-To: <AM8PR06MB7441A92117EF3AB44B82DD65B8399@AM8PR06MB7441.eurprd06.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.49.21050901
Authentication-Results-Original: surrey.ac.uk; dkim=none (message not signed) header.d=none; surrey.ac.uk; dmarc=none action=none header.from=arm.com;
x-originating-ip: [82.12.10.179]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-Correlation-Id: d876eae1-3fe3-4e54-2176-08d9299c3299
x-ms-traffictypediagnostic: DB6PR0801MB1815:|AM9PR08MB5907:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS: <AM9PR08MB590756E78C0D8C4695AF0D2A9C389@AM9PR08MB5907.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB9PR08MB6524.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(396003)(376002)(346002)(136003)(39860400002)(26005)(54906003)(8676002)(110136005)(316002)(36756003)(8936002)(186003)(71200400001)(4326008)(2906002)(86362001)(6486002)(122000001)(38100700002)(2616005)(966005)(33656002)(478600001)(6506007)(6512007)(5660300002)(91956017)(53546011)(76116006)(66446008)(66476007)(66946007)(66556008)(64756008)(83380400001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <6DBD9EDF2CC4964CBF7D7D28117B5EC5@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1815
Original-Authentication-Results: surrey.ac.uk; dkim=none (message not signed) header.d=none; surrey.ac.uk; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT063.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 8c8528d3-123d-4d36-6166-08d9299c2ced
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(39860400002)(346002)(376002)(396003)(136003)(36840700001)(46966006)(36860700001)(6512007)(478600001)(82310400003)(316002)(4326008)(36756003)(450100002)(47076005)(70586007)(2906002)(966005)(54906003)(26005)(110136005)(5660300002)(33656002)(53546011)(6506007)(70206006)(8676002)(6486002)(186003)(2616005)(336012)(83380400001)(356005)(82740400003)(8936002)(81166007)(86362001); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Jun 2021 10:08:29.0059 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d876eae1-3fe3-4e54-2176-08d9299c3299
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT063.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB5907
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/cv9AlbETVszWjN5NdJrnUGn9bv8>
Subject: Re: [Rats] Review of draft-birkholz-rats-daa
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Jun 2021 10:08:41 -0000

Hi Chris,

Thank you for your explanation.

What I was trying to say, maybe not very clearly, is that if one
decomposes the DAA protocol into its two constituent phases, there seem
to be no need to add the DAA Issuer as an *explicit* role to the current
list [1].  The DAA Issuer can be expressed as a "meta" role that assumes
the RATS Verifier and RATS Endorser roles depending on context.

cheers, t

[1] https://ietf-rats-wg.github.io/architecture/draft-ietf-rats-architecture.html#name-roles

On 06/06/2021, 21:12, "Christopher Newton" <c.newton@surrey.ac.uk> wrote:
> > Is it really necessary to introduce the new "DAA Issuer" role?
> >
> > It seems to me that if the JOIN and SIGN phases are considered as
> > two separate attestation protocols, the Issuer could be mapped to a
> > couple of well-known RATS roles depending on the phase it is
> > involved in:
> > * Verifier for JOIN - plus an authorisation RP on top
> >   that grants the group credentials to the authenticated Attester;
> > * Endorser for SIGN.
>
> Yes, the DAA Issuer is a separate role. it is effectively a
> Certificate Authority for the DAA keys. The difference from a PKI CA
> is that the Verifier uses the public key of the DAA Issuer to directly
> verify the DAA signature. The signer's public key is not available to
> the verifier.
>
> For a TPM, the Endorser is the chip manufacturer who provides a PKI
> certificate for the TPM's endorsement key. However, the endorsement
> key cannot be used as a DAA key as it is an encryption key. it is only
> used to enable the DAA Issuer to authenticate the TPM in a deniable
> way. After the Issuer authenticates the TPM it provides a DAA
> credential to the DAA signing key. The Endorser can take on the role
> of the DAA Issuer, but this is not a requirement.
>
> We hope that this makes things a little clearer, we could add more
> detail in the RATS DAA document if this would help.
>
> Regards,
>
> Chris and Liqun.
>
>
> --
> Dr Christopher Newton
> Surrey Centre for Cyber Security
> Department of Computer Science
> University of Surrey
> Guildford, Surrey, GU2 7XH, UK
> --
>
> -----Original Message-----
> From: Thomas Fossati <Thomas.Fossati@arm.com>
> Sent: 26 May 2021 13:04
> To: draft-birkholz-rats-daa@ietf.org
> Cc: rats@ietf.org; Thomas Fossati <Thomas.Fossati@arm.com>
> Subject: Review of draft-birkholz-rats-daa
>
> Hi RATS-DAA authors,
>
> I have reviewed draft-birkholz-rats-daa-00 and I think this is a
> useful document, plus it is short and sweet.
>
> I may have a few editorial suggestions, but I'd like to ask one meta
> question first - apologies if this was brought up in previous
> conversations:
>
> Is it really necessary to introduce the new "DAA Issuer" role?
>
> It seems to me that if the JOIN and SIGN phases are considered as two
> separate attestation protocols, the Issuer could be mapped to a couple
> of well-known RATS roles depending on the phase it is involved in:
> * Verifier for JOIN - plus an authorisation RP on top that grants
>   the group credentials to the authenticated Attester;
> * Endorser for SIGN.
>
> Cheers, thank you.
>
> t





IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.