Re: [Rats] [Suit] [sacm] CoSWID and EAT and CWT

Laurence Lundblade <lgl@island-resort.com> Tue, 03 December 2019 02:17 UTC

Return-Path: <lgl@island-resort.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B01161200F3 for <rats@ietfa.amsl.com>; Mon, 2 Dec 2019 18:17:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E2lhPcCuzZ3Q for <rats@ietfa.amsl.com>; Mon, 2 Dec 2019 18:17:12 -0800 (PST)
Received: from p3plsmtpa07-02.prod.phx3.secureserver.net (p3plsmtpa07-02.prod.phx3.secureserver.net [173.201.192.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1F271200F1 for <rats@ietf.org>; Mon, 2 Dec 2019 18:17:12 -0800 (PST)
Received: from [192.168.1.76] ([76.167.193.86]) by :SMTPAUTH: with ESMTPA id bxkViCQ3mcEJHbxkViikUB; Mon, 02 Dec 2019 19:17:12 -0700
From: Laurence Lundblade <lgl@island-resort.com>
Message-Id: <091DFC7E-E49A-4B32-8F29-576910AF0891@island-resort.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_B4767A4F-7585-470C-872E-07BDD517CA07"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 02 Dec 2019 18:17:11 -0800
In-Reply-To: <F7783A24-302A-4D6B-9030-9AFAD71E4597@intel.com>
Cc: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, Michael Richardson <mcr+ietf@sandelman.ca>, "rats@ietf.org" <rats@ietf.org>, "suit@ietf.org" <suit@ietf.org>, sacm <sacm@ietf.org>
To: "Smith, Ned" <ned.smith@intel.com>
References: <F23B6DE1-3343-4553-AF1C-832EA7B7B238@arm.com> <27435.1575305487@localhost> <CAHbuEH7t7qAiDRBOrRL0inqzB4htvyyPBrd-iT3kKcFN1=PdQg@mail.gmail.com> <F7783A24-302A-4D6B-9030-9AFAD71E4597@intel.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-CMAE-Envelope: MS4wfPzLAI0cFgHKKyVo9TBr+xuYy3qowyHtUf34rYpGxrs09hTwrUw1tpMAyKDSLAFUsGosOLu9KIiXS8c41ckLSTfDjxFdIJXlBGEX9rLrIgjV6N8+GyAR nB0KyZox1lxx1VlLOYpKK9EV1Ly7f/fEOXw4DqBnAbTqs0g4kWKT4cqZFgGxkdVDNU8LQXGLsJwBD3UzKmGZtBGGsQB51htQkcjf3yFdntrxcHFglMScpcpC A4llEIGMWlRhHPnn26EE5A9Fy1bjfWUIaKD2Sb1X/BOHy3bouhP9wcM0/gpCgoXHBZuDYUevlc3mtFEJamlxuQ==
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/f5FDcbta0DaC89OaWV1z2b_6V0k>
Subject: Re: [Rats] [Suit] [sacm] CoSWID and EAT and CWT
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Dec 2019 02:17:15 -0000

Hi Ned,

I think of CoSWID has a “data structure” or such that can get defined once and re used for various use cases, attestation related and not attestation related. EAT is one attestation use case. Maybe evidence is another attestation use case, maybe not. There are certainly the use cases it was created for before EAT came along.

> On Dec 2, 2019, at 5:38 PM, Smith, Ned <ned.smith@intel.com> wrote:
> 
> EAT is a payload that can be exchanged between an Attester-Verifier or Verifier-RelyingParty.
> [Co]SWID is a payload that can be exchanged between Endorser-Verifier or (possibly?) Attester-Verifier.
>  
> It is the latter use case context (Attester-Verifier) that is potentially confusing because it presumes the [Co]SWID payload should be wrapped by an EAT.

In EAT, I think of a CoSWID appears as a claim along side the other claims. It’s a big complicated / nest claim, but it is a claim. I don’t think of it as wrapped.  It is necessary to sit along side the other claims in EAT for EAT to do its job.


>  
> The architecture slides presented at Singapore showed Attester-Verifier interactions supporting multiple signed formats. Therefore, it could be reasonable to consider [Co]SWID as yet another payload format the Verifier needs to handle.

It doesn’t seem helpful to create another attestation format that is marginally different and confusingly related to EAT.

Maybe there are use cases other than attestation where a CoSWID is signed CWT-style, but I think they are other use cases for other working groups to decide on.


>  
> Another consideration might question whether it makes sense for [Co]SWID to be regarded as Evidence. Maybe it should be restricted to Endorsements?

There are clear EAT-based use cases that want SW inventory in the attestation. ARM’s PSA is like this. Pretty sure the hum in Singapore was in favor of that. Seems also that Cisco wants that for their routers. So, definitely not restricted to Endorsements.


>  
> The SWID documentation seems to suggest that SWID structures should be maintained on the Attester and updated when SW/FW updates occur. Possibly, the installer is working with two objects SUIT manifests and [Co]SWID structures keeping both maintained on the Attester? If this is the case, then it might make sense to consider unifying them? That might be the context for some of the list activity surrounding SUIT manifest and [Co]SWID?

I have little opinion about whether SUIT manifest and CoSWID should be merged somehow, but it seems that SWID and CoSWID have massive use case outside of SUIT and Attestation.

I would hope you could create a CoSWID to represent the SW on the MacOS device I’m using right now. It would be a big one. It certainly doesn’t use SUIT and never will.

>  
> The important distinction from the perspective of the RATS architecture is that Endorsements (signed by a mfg – aka “Endorser”) are still Endorsements even if they are stored on the Attester and conveyed to a Verifier over a conveyance protocol that supports conveyance of Evidence. Evidence and Endorsements are signed by different keys. How they are conveyed isn’t interesting to the Verifier per se. except where freshness is a consideration.

Yes. :-)

Never occurred to me that Endorsements would flow that way, but seems like a useful option!

(That said, I’m not sure that the format of an Endorsement is in our charter)

LL




> -Ned
>  
> From: Suit <suit-bounces@ietf.org <mailto:suit-bounces@ietf.org>> on behalf of Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com <mailto:kathleen.moriarty.ietf@gmail.com>>
> Date: Monday, December 2, 2019 at 10:16 AM
> To: Michael Richardson <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca>>
> Cc: "rats@ietf.org <mailto:rats@ietf.org>" <rats@ietf.org <mailto:rats@ietf.org>>, "suit@ietf.org <mailto:suit@ietf.org>" <suit@ietf.org <mailto:suit@ietf.org>>, sacm <sacm@ietf.org <mailto:sacm@ietf.org>>
> Subject: Re: [Suit] [Rats] [sacm] CoSWID and EAT and CWT
>  
>  
>  
> On Mon, Dec 2, 2019 at 11:51 AM Michael Richardson <mcr+ietf@sandelman.ca <mailto:mcr%2Bietf@sandelman.ca>> wrote:
>> 
>> Brendan Moran <Brendan.Moran@arm.com <mailto:Brendan.Moran@arm.com>> wrote:
>>     > Thanks for bringing this to my attention. I'm not sure that I
>>     > understand the goal of using a CWT for a CoSWID or a SUIT
>>     > manifest. Would you be able to elaborate on why we should use CWT?
>> 
>> I'm also in need of a diagram of how CoSWID and SUIT manifests and RATS EAT
>> interact.   I feel that the (optional) layer of signature in the CoSWID is
>> causing us to lose the forest for the trees...
>  
> I see why you might want a CoSWID or SWID in a CWT or EAT, but don't see the mapping for SUIT being preferred to CoSWID or SWID.
>  
> Best regards,
> Kathleen 
>> 
>> --
>> ]               Never tell me the odds!                 | ipv6 mesh networks [
>> ]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
>> ]     mcr@sandelman.ca <mailto:mcr@sandelman.ca>  http://www.sandelman.ca/ <http://www.sandelman.ca/>        |   ruby on rails    [
>> 
>> 
>> 
>> 
>> --
>> Michael Richardson <mcr+IETF@sandelman.ca <mailto:mcr%2BIETF@sandelman.ca>>, Sandelman Software Works
>>  -= IPv6 IoT consulting =-
>> 
>> 
>> 
>> _______________________________________________
>> RATS mailing list
>> RATS@ietf.org <mailto:RATS@ietf.org>
>> https://www.ietf.org/mailman/listinfo/rats <https://www.ietf.org/mailman/listinfo/rats>
> 
>  
> -- 
>  
> Best regards,
> Kathleen
> _______________________________________________
> RATS mailing list
> RATS@ietf.org <mailto:RATS@ietf.org>
> https://www.ietf.org/mailman/listinfo/rats <https://www.ietf.org/mailman/listinfo/rats>