Re: [Rats] Android comments on EAT draft

Shawn Willden <swillden@google.com> Thu, 16 May 2019 21:15 UTC

Return-Path: <swillden@google.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 485FB12030E for <rats@ietfa.amsl.com>; Thu, 16 May 2019 14:15:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.509
X-Spam-Level:
X-Spam-Status: No, score=-17.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cktBT21LtGjl for <rats@ietfa.amsl.com>; Thu, 16 May 2019 14:15:14 -0700 (PDT)
Received: from mail-yw1-xc36.google.com (mail-yw1-xc36.google.com [IPv6:2607:f8b0:4864:20::c36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03B40120310 for <rats@ietf.org>; Thu, 16 May 2019 14:15:14 -0700 (PDT)
Received: by mail-yw1-xc36.google.com with SMTP id 18so1916601ywe.7 for <rats@ietf.org>; Thu, 16 May 2019 14:15:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/QrYTsD2fK/urTpsOZ0N5gxgnX4HwoFzbnu+CxMGHVA=; b=kmNxsMeqbm5ldTQsP7Z1n6wN8QapTSB1sDmeotaF06Rl8wzEJSH4mlJixR2iIOCwBu OnBEy+z4EJK9yExECM7zqeJNoS8WhnYtvcoBqUccRVSm5Rvts3fKG6xRtPT+SaEbPQGr bYZEejqDFL4WtaYCyMPlu+YsC80f0tqMZ+01FhQF1vQRyyC1GaYT3xMOVRfwex+Mtwe1 y7+HlChbrSHvDvAi0+2Wo6aoZnMaZywu9Z1UfwonEPqtOh6i0h2O3/+LRtDs3a9FUcFL p/DWbUnJTOOMibPICoxKSPfQvV4l5du3BNXejoQoXisO7TdYS8nTlC5NICfwUD/6cqq1 f0Tg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/QrYTsD2fK/urTpsOZ0N5gxgnX4HwoFzbnu+CxMGHVA=; b=kKECdyeAuxXjwmu/wOsf7uQp6y03vJPmo0XwJLUupK1a2rQdL4jFAjhN2d8wt+du+t 0LGS1LlRU5qlc06IS8AEqAe3y/ObyKZp0DG5f98CFCu1NIIlff8Au3yKyd7WPAfspzWh 9odL/jgNYuCWiMRJ79TiCZf7pjBPnv+Qd6MQSBMcyiPEpU+mKQ3H4d/9BkMpqVJcf/O7 GIzxnSicjAow9tZceXzXMvwN3RURkGT73tlijR+mkPXY7dP3MbtdDzbOuCmz6tAF+wxD 3nIsVLVMpzepT4lg+R9dp2bJktGYi2QWSBvimjP7i+odtSvSHeHiTkSo9JOFQh5D9Hpf Gyzw==
X-Gm-Message-State: APjAAAXMYc5wh8QmfOesADufnGwy8UTfmoOGumGC31UQ4p2NJWAvWmcX IMwBjFic2MooQXVWuF0j4+BOeRvCdPMndEUb7NY7f7YG7cg=
X-Google-Smtp-Source: APXvYqzRCN/tFFTV37wIi82vxoHcZJlERLFnTU4ykugseyC/I4SkygulULHzftBZNBRZB4iu6Nl48CU857BFef+5IvM=
X-Received: by 2002:a0d:c146:: with SMTP id c67mr23710791ywd.82.1558041312870; Thu, 16 May 2019 14:15:12 -0700 (PDT)
MIME-Version: 1.0
References: <CAFyqnhVJ-ps4bdhsyQDOHdzHVZsXeK7_kCDXxUVUcuyDzWS3uA@mail.gmail.com> <35459D73-3D08-4E0B-814B-780AD60DD600@island-resort.com> <HE1PR0801MB1643AA2E129098E2C65F9163EF0A0@HE1PR0801MB1643.eurprd08.prod.outlook.com> <CAFyqnhX9f5s21roZvz_VcfR+sd3E89SYmunZKX-2JMC4Rqy_cw@mail.gmail.com>
In-Reply-To: <CAFyqnhX9f5s21roZvz_VcfR+sd3E89SYmunZKX-2JMC4Rqy_cw@mail.gmail.com>
From: Shawn Willden <swillden@google.com>
Date: Thu, 16 May 2019 15:15:01 -0600
Message-ID: <CAFyqnhXzoo9+2pu1qboPSiHr7YTzfRjOcJj3oEpOX_uFWbRyKA@mail.gmail.com>
To: Simon Frost <Simon.Frost@arm.com>
Cc: Laurence Lundblade <lgl@island-resort.com>, "rats@ietf.org" <rats@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000004ae4058907c33f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/jyU6Oa-l4QpCsx3GfAbH_I_JVkY>
Subject: Re: [Rats] Android comments on EAT draft
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 May 2019 21:15:16 -0000

Oh, I should also mention that in R I think we're going to add a claim to
present security certifications, for example Common Criteria Secure IC
Profile PP84, probably in multiple assurance levels (though PP84 is EAL4
plus AVA_VAN.5), and perhaps some others.

*From: *Shawn Willden <swillden@google.com>
*Date: *Thu, May 16, 2019 at 3:11 PM
*To: *Simon Frost
*Cc: *Laurence Lundblade, rats@ietf.org

*From: *Simon Frost <Simon.Frost@arm.com>
>
>> As an example, have a look at the draft ‘profile’ we put together for an
>> Arm PSA attestation (
>> https://www.ietf.org/id/draft-tschofenig-rats-psa-token-01.txt) and let
>> us know where that does or doesn’t cover your software needs.
>>
>
> I'll do that.
>
> I would be very interested in reading your set of claims necessary to
>> describe a key as that use case has also been expressed for our usage.
>>
>
> Sure, here's a list of everything currently included in Android key
> attestations (excluding device info items and some elements that are
> redundant, also specified in the enclosing X.509 certificate):
>
>
>    - Purpose:  one or more of SIGN, ENCRYPT and WRAP_KEY.
>    - Digest: one or more of MD5, SHA1, SHA-256, SHA-324, SHA-512; which
>    digest(s) can be used for message digesting (MD5 and SHA1 are only for
>    legacy compatibility).
>    - Padding:  (RSA only) one or more of RSA_PKCS1_1_5_ENCRYPT, RSA_OAEP,
>    RSA_PKCS1_1_5_SIGN and RSA_PSS
>    - Rollback resistance: Boolean, if true, indicates that when the key
>    is deleted it is guaranteed never to be usable again
>    - No auth required:  Indicates key can be used without user
>    authentication.  If this is present, user auth type and auth timeout must
>    not be present.
>    - User auth type:  Indicates type of required user authentication
>    (password/biometric)
>    - Auth timeout: Indicates time in seconds during which key can be used
>    after user authentication (absence indicates key requires authentication
>    for each key usage).
>    - Allow while on body: Applicable only to wearables, and only for keys
>    that require authentication with a timeout.  Indicates that the key
>    immediately becomes unusable when the device is removed from the body, even
>    if timeout has not yet expired.
>    - Origin:  Where the key originated, one of GENERATED (in device;
>    exists nowhere else), DERIVED (in device, but also derivable by some
>    off-device entity), IMPORTED (imported in plaintext), SECURELY_IMPORTED
>    (imported in encrypted form), UNKNOWN
>    - Application ID:  Which Android app created the key
>
> A note about purpose, digest, padding: the idea is that AndroidKeyStore
> only allows keys to be used in the mode(s) that were declared when the key
> was created.  Any attempt to use the keys in any other way (e.g. sign with
> a n RSA key that has only the ENCRYPT purpose) will be rejected by the
> TEE/SE.
>
> I think Android R will add support for ECDH, so that will add some
> associated claims, and we may also add an option for secure export of key
> material, assuming the key was configured to allow it at creation/import
> time.  That will add some associated claims as well, including the public
> key(s) to which exports may be encrypted.
>
> --
> Shawn Willden | Staff Software Engineer | swillden@google.com |
>  720-924-6645
>


-- 
Shawn Willden | Staff Software Engineer | swillden@google.com | 720-924-6645