Re: [Rats] challenges of building dependant specifications against Internet-Drafts -- a way forward for EAT
Simon Frost <Simon.Frost@arm.com> Thu, 10 December 2020 18:11 UTC
Return-Path: <Simon.Frost@arm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C88D63A102A for <rats@ietfa.amsl.com>; Thu, 10 Dec 2020 10:11:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=ZQS7hlB/; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=ZQS7hlB/
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tMul6ma3dQIm for <rats@ietfa.amsl.com>; Thu, 10 Dec 2020 10:11:28 -0800 (PST)
Received: from FRA01-PR2-obe.outbound.protection.outlook.com (mail-eopbgr120077.outbound.protection.outlook.com [40.107.12.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85F5A3A101E for <rats@ietf.org>; Thu, 10 Dec 2020 10:11:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iWs5Hu7mM7ZL01eTJ6boqYiyP7Xt1dUfd/x0HiXUtJA=; b=ZQS7hlB/sAsySaHKXYXV4M1hujgHOJBlydpU6/+QlylfJmdokQsxewtmQwiMZtXPurLdxdp2tGA0Kn6gRFnZRDZZkgPvosliW59awRLZtzKL4y8vohbbZraa/QL9O711aIKXeCJQa2H1/Bc8qUByZ/XFCiJhieTkCsqGfT4fAeY=
Received: from DB7PR02CA0020.eurprd02.prod.outlook.com (2603:10a6:10:52::33) by PR2PR08MB4793.eurprd08.prod.outlook.com (2603:10a6:101:1f::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12; Thu, 10 Dec 2020 18:11:24 +0000
Received: from DB5EUR03FT026.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:52:cafe::83) by DB7PR02CA0020.outlook.office365.com (2603:10a6:10:52::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12 via Frontend Transport; Thu, 10 Dec 2020 18:11:24 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT026.mail.protection.outlook.com (10.152.20.159) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12 via Frontend Transport; Thu, 10 Dec 2020 18:11:24 +0000
Received: ("Tessian outbound 665ba7fbdfd9:v71"); Thu, 10 Dec 2020 18:11:23 +0000
X-CR-MTA-TID: 64aa7808
Received: from 73a7ff0a8851.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 03239F2D-176E-459A-BE4D-BCA750E9F20A.1; Thu, 10 Dec 2020 18:11:18 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 73a7ff0a8851.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 10 Dec 2020 18:11:18 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HbUHcsA6CIVeJ4yJ2E4MV+dETMpnJmbzQUvzRIxBvx9A84oczbSUcFSrWcll3jzO4XTzV2iiY3lDNnY+kZALJhyl/qVpLl9JmNE4VIXDK+jMBrCkTcNg+Xi4NqqKbl3yldNioVjp8W932CqxgLfl1nt9X88UuK4jJxaFiFIw/qix7lmDV8bB8+HrsVwDXO8i4HWSGdZiIEZ6a7tLaycsDhQQPA7CnJ9JKn+4XGB/X56kBi49nDSfdWx4+FKCWYOaOi3rwmWbGGX4GO4Ll0WV/GT0jjlEUwX2c0nP7EXEKE5XCSU5Kp5vj5FbDznelKYlHYDv15XWtJff8of1oSBiDg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iWs5Hu7mM7ZL01eTJ6boqYiyP7Xt1dUfd/x0HiXUtJA=; b=PmUQ/PnD5LSh+rfE+n9El+yJReHkd45cTje7gihBDdp8izJKnDmwKwmReIlU35FZNMKx5cRyYOPZEVIQjpdvnwL8y191OpzsyMqigp9Kt6s3jfbLzRwjD0TkT5WOWFhpzuCdoKJlXk77G1O7m+bEeekWdfS6nscanyo9cnhac/DkpmIIvtEIyj3UO68k/T7LkZT2yFsDl8gVXCqqJ9IxH94PFQXJC9CI+KFEtYQM1l1/JuwqG6Ws8I8M4arW0oh/4gEDBe69BOwTWG4ZbYYe4oNDamsaBvr+1jbZA39hTpH69V3AqWOiPsk8FqmQUwob2jJDfZFykVk4Cr4xSrhGUA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iWs5Hu7mM7ZL01eTJ6boqYiyP7Xt1dUfd/x0HiXUtJA=; b=ZQS7hlB/sAsySaHKXYXV4M1hujgHOJBlydpU6/+QlylfJmdokQsxewtmQwiMZtXPurLdxdp2tGA0Kn6gRFnZRDZZkgPvosliW59awRLZtzKL4y8vohbbZraa/QL9O711aIKXeCJQa2H1/Bc8qUByZ/XFCiJhieTkCsqGfT4fAeY=
Received: from AM6PR08MB3429.eurprd08.prod.outlook.com (2603:10a6:20b:49::19) by AM6PR08MB4392.eurprd08.prod.outlook.com (2603:10a6:20b:bf::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.17; Thu, 10 Dec 2020 18:11:17 +0000
Received: from AM6PR08MB3429.eurprd08.prod.outlook.com ([fe80::70aa:dedb:5b80:1d30]) by AM6PR08MB3429.eurprd08.prod.outlook.com ([fe80::70aa:dedb:5b80:1d30%5]) with mapi id 15.20.3654.013; Thu, 10 Dec 2020 18:11:17 +0000
From: Simon Frost <Simon.Frost@arm.com>
To: Laurence Lundblade <lgl@island-resort.com>, Michael Richardson <mcr+ietf@sandelman.ca>, "Nancy Cam-Winget (ncamwing)" <ncamwing=40cisco.com@dmarc.ietf.org>, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, "Smith, Ned" <ned.smith@intel.com>
CC: "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] challenges of building dependant specifications against Internet-Drafts -- a way forward for EAT
Thread-Index: AQHWzx/ZanAguVfCjE2XB+On2ujm3A==
Date: Thu, 10 Dec 2020 18:11:17 +0000
Message-ID: <AM6PR08MB34297B962E5283C5953BE72DEFCB0@AM6PR08MB3429.eurprd08.prod.outlook.com>
References: <24519.1606681083@localhost> <BL0PR11MB312296BEFD428C6D9CE9A5DEA1F50@BL0PR11MB3122.namprd11.prod.outlook.com> <AM0PR08MB371606D3753BED36E71A5754FAF50@AM0PR08MB3716.eurprd08.prod.outlook.com> <BL0PR11MB3122D35683FD909A3C80E4DEA1F50@BL0PR11MB3122.namprd11.prod.outlook.com> <3849.1606759884@localhost> <B9175A1C-C024-463F-B438-36C7DDEBD1A8@island-resort.com> <24158.1606778219@localhost> <AD1F4237-A5AC-4DF5-B48A-D0C5CD1DF9A1@island-resort.com>
In-Reply-To: <AD1F4237-A5AC-4DF5-B48A-D0C5CD1DF9A1@island-resort.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: F2930ECF5589864597A687E2C35F92CC.0
x-checkrecipientchecked: true
Authentication-Results-Original: island-resort.com; dkim=none (message not signed) header.d=none;island-resort.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [212.69.61.73]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 78314a2e-ded8-487e-eb6f-08d89d37011e
x-ms-traffictypediagnostic: AM6PR08MB4392:|PR2PR08MB4793:
X-Microsoft-Antispam-PRVS: <PR2PR08MB4793606173F1A39DF1F7C79AEFCB0@PR2PR08MB4793.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:3276;OLM:6430;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 97RgAsLNEIwXSlykN9jTHfpP7bNrTb5U0sneA3zDXlX5XUcQsYo7NYHdnd7ui74sKKI1AIz3cnQRPj1X8MVy3be9HBNuV/kTvrKVDn/ubW7HT0ayrtH861qR05PwzQmoLr17CGFSb08zLfgcop0lf9rny2rrHJSu8FFGTs9fp+FHxwqn47awdvy1kawHe46HI6g54r6p2gY7ytCZmW27wzNsgg6tLZu/QUJatP6Am3afUoY8+xRB8vW9lr9QhhW2dKn/hnUafeJJLimaqbhHI3CxVFxGdQkAGJjipa6Nyrxj5Sz4N0aEyyRCleBG29EBweEPqV8GHG4tR5ra6O5p5TagkIdtBouE+2MJlEvSMkMJi8XXLtJioWifI3AkahrvQ6fjJRAQlUVy+PA8/37Hew==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB3429.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(366004)(376002)(396003)(39860400002)(346002)(66476007)(110136005)(8676002)(53546011)(186003)(966005)(6506007)(478600001)(71200400001)(76116006)(66556008)(316002)(66946007)(2906002)(66574015)(8936002)(5660300002)(83380400001)(166002)(64756008)(66446008)(4326008)(86362001)(52536014)(55016002)(33656002)(9686003)(26005)(7696005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM6PR08MB34297B962E5283C5953BE72DEFCB0AM6PR08MB3429eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4392
Original-Authentication-Results: island-resort.com; dkim=none (message not signed) header.d=none;island-resort.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 12071f81-b800-4781-31c9-08d89d36fd75
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: cnz/SMdvkYhZWA4aV09totvvi5S3RcDAFtIMyZxDcIDNG5eP4qscyt0iuE/J3dOUKRat6oo7Q/A4pWPjgMwSqjzTOVuEmcKCWdDFPrEl3COIyrFGwbvzXPRldtTcXjTZ+jaUnxIAi82YeLKQjo1+a3/IXYUOsoVZzQjC0AwBl1CM/TSmNBJZ9DHONpXpwLfA16bqxrnZaW89VksKwsr0/MgwPzQzYfcEu9QsVT6/oe+/D34kUq96jEw6GfIdgTslZwzcF9222we/oRhqICDXRn9qzIQ2Gogf9Sr1RMUxvhje7Cnu19bjfiTwAcCO8xnYk4kMDDHGsvBvQR0JRuRKdtjMZfdTHUpRMjz3HOAOI3J1ndaOqHeKLblYjDKwzUw9MsUZv6Ksa7AVU/nbWc0TKA78nJcbKwuflOEk3L2t5WtVRoIU5nbvQTeoVYcCvJx1Htl7dTgpiQ/aFzTMawvaxDtYZ+fhiwQOFvOtAhe8he4=
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(346002)(396003)(376002)(39860400002)(136003)(46966005)(4326008)(336012)(53546011)(6506007)(70206006)(478600001)(8936002)(52536014)(70586007)(166002)(110136005)(356005)(7696005)(966005)(81166007)(66574015)(83380400001)(26005)(33964004)(316002)(33656002)(5660300002)(82310400003)(82740400003)(47076004)(186003)(55016002)(8676002)(9686003)(2906002)(86362001); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Dec 2020 18:11:24.0420 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 78314a2e-ded8-487e-eb6f-08d89d37011e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR2PR08MB4793
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/5KUPmBNY7jTDiEJP9m6_mUgTcxk>
Subject: Re: [Rats] challenges of building dependant specifications against Internet-Drafts -- a way forward for EAT
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Dec 2020 18:11:31 -0000
I can confirm approval from the Arm team to register these standard claims. Thanks Simon From: Laurence Lundblade <lgl@island-resort.com> Sent: 04 December 2020 19:57 To: Michael Richardson <mcr+ietf@sandelman.ca>; Nancy Cam-Winget (ncamwing) <ncamwing=40cisco.com@dmarc.ietf.org>; Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>; Smith, Ned <ned.smith@intel.com> Cc: rats@ietf.org Subject: Re: [Rats] challenges of building dependant specifications against Internet-Drafts -- a way forward for EAT So I read RFC 7120 which is super clear and exactly what is needed. It lines up with my third proposal. We will ask IANA to pre-register claims in the Standards Action space of the CWT registry and also in the JWT registry. Or rather per the 7120, the WG chairs determine consensus here, then will ask the AD(s) and then ask IANA. Is there consensus on pre-registration of these? Name Description CWT JWT Type nonce Nonce 10 <already registered> byte string ueid Universal Entity ID 11 ueid byte string oemid OEM ID 13 oemid byte string seclevel Security Level 14 seclevel integer secboot Secure boot 15 secboot integer dbgstat Debug status 16 dbgstat integer location Location 17 location map submods Submodules Section 20 submods map These have all been in the EAT document for a long time and are described well in draft-ietf-rats-eat-06. They are fairly well understood and have either no open issues or only small open issues in GitHub against them. They include the most essential claims (nonce, ueid, oemid & submods) to implement an EAT. I have chosen not to ask for the others because I don’t think they are as essential or as well understood yet and thus don’t meet the criteria in RFC 7120. CWT numbers aren’t contiguous so as to line up with examples that have been in the EAT draft for a while. I’ve shortened the JWT claims keys to less than 8 per RFC 7519. If approved and registered, we’ll quickly publish a new EAT draft. LL On Nov 30, 2020, at 3:16 PM, Michael Richardson <mcr+ietf@sandelman.ca<mailto:mcr+ietf@sandelman.ca>> wrote: Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>> wrote: The trouble is that I think many claims should be in the Standards Action range (-255 to 255). For example, nonce, ueid, submods section, location, CoSWID and probably a few others should be in the standard space. If I were IANA I would hesitate to register these in the Standards Action range until the EAT document is further along. The WG can ask for Early Allocation. It should do it immediately, so that the Expert will provided feedback immediately. It also seems poor practice to unilaterally pre-assign Standards Action range claims in an EAT draft and then use them in a bunch of implementations. Those numbers could be assigned to some one else before EAT is an RFC. You can do that if a registry you are just creating. But, yes, you can't do that if you are using CWT. Register them in the Specification Required space (255 to 65535) once and for all. That will result in 3-byte map labels rather than 1-byte map labels, but there’s no transition. Finally, a third proposal: Maybe we can convince IANA to pre-register a small clear set in the standard space? Perhaps just nonce and UEID. Please go read RFC7120. -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works | IoT architect [ ] mcr@sandelman.ca<mailto:mcr@sandelman.ca> http://www.sandelman.ca/ | ruby on rails [ _______________________________________________ RATS mailing list RATS@ietf.org<mailto:RATS@ietf.org> https://www.ietf.org/mailman/listinfo/rats IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
- [Rats] challenges of building dependant specifica… Michael Richardson
- Re: [Rats] challenges of building dependant speci… Hannes Tschofenig
- Re: [Rats] challenges of building dependant speci… Michael Richardson
- Re: [Rats] challenges of building dependant speci… Hannes Tschofenig
- Re: [Rats] challenges of building dependant speci… Eric Voit (evoit)
- Re: [Rats] challenges of building dependant speci… Hannes Tschofenig
- Re: [Rats] challenges of building dependant speci… Eric Voit (evoit)
- Re: [Rats] challenges of building dependant speci… Hannes Tschofenig
- Re: [Rats] challenges of building dependant speci… Michael Richardson
- Re: [Rats] challenges of building dependant speci… Laurence Lundblade
- Re: [Rats] challenges of building dependant speci… Michael Richardson
- Re: [Rats] challenges of building dependant speci… Laurence Lundblade
- Re: [Rats] challenges of building dependant speci… Simon Frost
- Re: [Rats] challenges of building dependant speci… Giridhar Mandyam