Re: [Rats] Why variability is needed (Re: EAT Profiles)

"Smith, Ned" <ned.smith@intel.com> Mon, 19 September 2022 17:27 UTC

Return-Path: <ned.smith@intel.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 043C0C14CF09 for <rats@ietfa.amsl.com>; Mon, 19 Sep 2022 10:27:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.676
X-Spam-Level:
X-Spam-Status: No, score=-7.676 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.571, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=intel.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bLSB3ymXm0t3 for <rats@ietfa.amsl.com>; Mon, 19 Sep 2022 10:26:55 -0700 (PDT)
Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84D52C14F730 for <rats@ietf.org>; Mon, 19 Sep 2022 10:26:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1663608415; x=1695144415; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=iLgEA2iCWmwT0D/TzN1MDtIQc+XhImezdvDi3cr4JVc=; b=hvSQhiJfHO9hDXsrjlA+serlEY1wBR1HYBx9DTcqKcx5Byv8rxbA6EmM WbIAAQYmN5i5kJm95kir7Rq1aAtNrpLZE5KgLaPgrexjpSSguUfHZb1pk nbNHyZlsMLsga+Jrx0WKxk9hqBahIxXV2c5Sk1NznuiZ5LASvuT7PCUQ3 hItJZouXv1SkdbVDA2BNPlYyylQ0zIlXhmvsAtYTqAxUTyuHpFuNlivg7 TEnut1zbk3sqZwQdNu/9//l9FG6n74rc+ue/9KabpG2G0v6Q0cmnDQJaC M1Dd19rqvWgrOo4BMv54/cUfUXhRH6fwKh9d+rY1cUW93QuBlK60vly9B A==;
X-IronPort-AV: E=McAfee;i="6500,9779,10475"; a="299455953"
X-IronPort-AV: E=Sophos;i="5.93,328,1654585200"; d="scan'208";a="299455953"
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Sep 2022 10:26:54 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.93,328,1654585200"; d="scan'208";a="651764995"
Received: from orsmsx601.amr.corp.intel.com ([10.22.229.14]) by orsmga001.jf.intel.com with ESMTP; 19 Sep 2022 10:26:54 -0700
Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 19 Sep 2022 10:26:54 -0700
Received: from orsmsx608.amr.corp.intel.com (10.22.229.21) by ORSMSX611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 19 Sep 2022 10:26:53 -0700
Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx608.amr.corp.intel.com (10.22.229.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31 via Frontend Transport; Mon, 19 Sep 2022 10:26:53 -0700
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (104.47.70.106) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2375.31; Mon, 19 Sep 2022 10:26:53 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SvTLGxUHWWu4lJTyRx60JeNzJcOiY/3jq7pxTbRHXbGJQrVzUZLdqs8aRyTnlpbMWTDFPtDDJSPrRrjlxxkpde1Riys/jBOOI83pcZHZWFu7hSRjOLlUOeAJw9AEIzaiy/DIEzL8O2cMU0ywg/eSSeT1BSHUQaWmIExIyPX3HJmGTrOxm5TrZlxtyejtgIKGPewMR7XXhyjx1hEp/Zmx0fR05hqTK/PSd1PcvU1tqHpFHvcIxjurhv+mm/sMLJ++zENbLKUNpZFnOHUPwp+t7SGLk2vXeoJBCM31ds3bb3z24tJvKiACtNdKjAei2S9rLc/p2kFwS7U0mZWXmJs5Sg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iLgEA2iCWmwT0D/TzN1MDtIQc+XhImezdvDi3cr4JVc=; b=jTG78ue1N5GEBN5hCaFo/3z0hL+VsFW5I1R9LEJeizINl1NWw6xYERkrFzeAE9Eo8nsHae1rGQuXnbHU9X2bc6pGHmHosuchDpeYe0aZIkPLe9C5aGQQuUbwJuioXjlMeSUfCHGRJncDkXmwKfvdTxyuQLVKEPGYNpSBTsZxWYd06BUCC1nhmi5mKToiqWNQlyV/4Lain/85Pk1vYOLw1Db97o/SfJ8y//FMp+u3qXi8ZY272qN3rmmB+G24ZYs4DKtTf1q0s9PsBkBRF60taZNnIcH3S2x09pIy6BvQPcEkey+RNqSyABP4ZxmjLvQNP7FSD/3W1tcfae5Y6AWWEw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
Received: from CO1PR11MB5169.namprd11.prod.outlook.com (2603:10b6:303:95::19) by SA2PR11MB5033.namprd11.prod.outlook.com (2603:10b6:806:115::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5632.19; Mon, 19 Sep 2022 17:26:51 +0000
Received: from CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::7056:c22:10bd:3da]) by CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::7056:c22:10bd:3da%5]) with mapi id 15.20.5632.021; Mon, 19 Sep 2022 17:26:51 +0000
From: "Smith, Ned" <ned.smith@intel.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, Laurence Lundblade <lgl@island-resort.com>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] Why variability is needed (Re: EAT Profiles)
Thread-Index: AQHYyfly8e+8u9mJlE2y0vl6j6NwVa3j3giAgAKyrQA=
Date: Mon, 19 Sep 2022 17:26:51 +0000
Message-ID: <A5B115D8-2EE1-484B-80A0-627820683C1F@intel.com>
References: <71934.1663019954@dooku> <6D74BAE0-3B37-4A1F-9966-96EB60B9D675@island-resort.com> <240776.1663329145@dooku> <B48D92C7-9304-4B28-BDA5-8C447CF951B8@island-resort.com> <396614.1663434889@dooku>
In-Reply-To: <396614.1663434889@dooku>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.65.22091101
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB5169:EE_|SA2PR11MB5033:EE_
x-ms-office365-filtering-correlation-id: 67f37e8a-fd46-4268-11fd-08da9a6423c6
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: qmwSTyQhqkXoyuZt+GOBh/6reGECEpyASSvSzt3BWlWVVy6rt+MWb3PXAuddH8cVFSJuQt+YKpeMY2sHkgZ4wX7peoKpazKQzCBvzYpgqq5bd7e9d2vASPjGmpI+VAUSmUBFf2UYkYuB/mcTi6i6LuKDaVvDt0Q2L+lyWkmCN0jSeIciKSX1WOl7cpE365h4ZOglSrWZr/C1BxAS3fYvBomysZfeZ+BEIIUl4nHIUGiVuAxsfUuKyk0oWLCa54mtaz1AzKiUOtwQ9ze3U7nIB0x0tnOSARDv1ro65Kg7BMZw5ycWM/sO2sf/iE6KziTAh2QITsKEaGyaeZk1upzQOdDoE1bdvCbAKwtVWfXLRFtMi5fiUoRP68WjTZiDGfY93+/JQA1pDrIZy8jLqi+etKcjdHc4X7Fa8uknYbnmsblImqA/4Gx+sOdkBJNzDpHSyGBtzQBs8+VmELjhBK2xxakA9RF49rhjUNtajKqY6Kjd4JrBsMidrVXSN9v/U6P8vZzG+SHO+TnE2dKkZwlPk/eLniKzJiS1E3fLGaEm7Uz8HkrscWhIGFJkIjQUBPAxQwmRLUHYs4HOgjzO3S+W89MzpSz/Tb4d6MDqO/CjbmQHqM85HFzWRxnS6maNcZqTAPzwr4WJCx4ISnKb6zriQSe91llAEiN2e9NDivoXrv+7+GRePe5h5TiuoQCGcfQOHG41BoFs6Mt0XNGnGLP/hltL+iK1Ht/5SiUBBuzUrvIKQ/JVKskOf1z+YEsieKPYrhLmEAaoJGEfYOkl0NVVnKyTMcsiL7Q8MDtF82r6zVccs+NNwGkyM6lzvh3XbroD0a5Aqjk8j/qO6HgLfQpZAg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB5169.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(39860400002)(396003)(366004)(346002)(376002)(136003)(451199015)(5660300002)(82960400001)(83380400001)(122000001)(71200400001)(6512007)(26005)(2906002)(316002)(110136005)(33656002)(478600001)(6486002)(38070700005)(38100700002)(186003)(41300700001)(2616005)(86362001)(8936002)(91956017)(76116006)(64756008)(66476007)(66556008)(66446008)(36756003)(966005)(8676002)(66946007)(6506007)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <05A5012964708F49B4184E33F4921F38@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB5169.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 67f37e8a-fd46-4268-11fd-08da9a6423c6
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Sep 2022 17:26:51.3624 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mm8zSXiYOnhQVxRnw1Ypce+QUmXtgXkNXhi7ku1aGCcdSXhUl4DEKNKC6Cdb8ncfdoljvCXPcyVNbrbT7C2Vmg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR11MB5033
X-OriginatorOrg: intel.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/l0ZMYq_ZKe6s1vNqyGN6qx03ktM>
Subject: Re: [Rats] Why variability is needed (Re: EAT Profiles)
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Sep 2022 17:27:00 -0000

See inline [nms]

On 9/17/22, 10:15 AM, "RATS on behalf of Michael Richardson" <rats-bounces@ietf.org on behalf of mcr+ietf@sandelman.ca> wrote:


    Laurence Lundblade <lgl@island-resort.com> wrote:
        > Here’s use cases that diverge from 6.3 to serve as examples that cover
        > just about everything listed in 6.3

    > Composite of pure HW attester and TEE/HLOS attester
    > - HW uses non-preferred encoding of integers to output registers directly
    > - HW is simpler because an indefinite length map is used to hold the Claims-Set

    Okay, so could we call the first profile "Purple" and the one of the HW
    attester above "Brown", and name them in the EAT document?
[nms] Since a profile is a URI it would be more correct terminology to say "a URI that expresses a color". The point is the URI doesn't tell the Verifier how to process the profile. Something more is required such as a CDDL description of the profile or a human who reads the profile and writes code that implements the profile. I don't think it makes sense to define a profile (which is specific to a use case, user, vendor) in the EAT spec which is trying to be a building block specification.

    > JSON attester - Some one doesn’t use CBOR

    Well, yes, but isn't not using CBOR, so it's automatically not a CBOR
    Protocol.  It's "Blue"

        > Chinese Attester - Must use Chinese crypto
        > Don’t trust NIST - Want Edwards algorithm. See TEEP profile.

    I don't think that profiles should name crypto algorithms.
    Please see RFC https://www.rfc-editor.org/rfc/rfc8247.html for what we should
    do, if we really need to write down MTIs.  I don't think we can/should though.
[nms] This comes down to two lines in the EAT spec regarding the scope of profiles which on their surface seem contradictory. One line indicates a profile is a subset or constraint on EAT. The next line says a profile could be a superset of EAT essentially. While I can find arguments for supporting both statements, they seem contradictory as a way of constraining the scope to facilitate interoperability. The profile is the last word on interoperability while the EAT draft promises some degree of code resuse.

        > Multiple signing for PQ - Use COSE_Sign instead of COSE_Sign1 to sign
        > with a PQ algorithm (e.g. LMS) and widely supported algorithm
        > (e.g. ECDSA) (I know someone doing this)

    I agree that this is a difficult part.
    I'd prefer the EAT said that things that verify EATS (i.e. Verifiers and RPs)
    MUST support both COSE_Sign and COSE_Sign1.
[nms] The rationale being, that a Verifier that can support multiple profiles (specifically one that requires COSE_Sign the other COSE_Sign1) would need to support both. If Verifiers are specialized to a particular use case (say the "blue" profile that only needs COSE_Sign1), then why should they be required to include code for COSE_Sign if it's never exercised?
If interoperability is the primary focus of profiles, then interoperability guarantees in EAT should be backpedaled or at least aligned with CWT and JWT (which don't guarantee interop of something not in the RFC). 
[nms] Additionally, it is possible that an unsigned token or even disparate EAT claims are incorporated into a structure that is signed by some other signed object such as XMLDSIG, X.509 cert, conveyance protocols etc... A requirement to mandate use of COSE_x would alienate these alternative forms which are anticipated by the RATS Architecture.

        > Time-based freshness - A highly constrained environment has trusted
        > time and wants avoid sending a nonce

    Seems like a reasonable thing to be able to say.
    I'd still like EAT to offer a clearer palette.

        > X.509-based keys/endorsements - Rather than using a kid, the leaf cert
        > / endorsement is included per draft-ietf-cose-x509

    "If kid is absent, but x5c is present, then a verifier may assume ..."

        > Privacy/confidentiality required - The use case requires the encryption
        > of the EAT - Also may want to explicitly disallow UEID because it is
        > PII

    That seems both out of scope (the encryption is will need to be bolted on),
    and entirely reasonable for the user to list forbidden claims.
[nms] +1 - it is reasonable for a conveyance mechanism to apply confidentiality

        > EAT carried by a tag-using CBOR protocol - The protocol carrying the
        > EAT wishes to use the CWT/COSE tag numbers to identify the item as CWT
        > and the type of protection it wants

    Can you give me an example here?
    Will this user register then own CBOR Tag?  (What's a CWT Tag?  I think a typo..)

    I'm pushing for EAT specifying somewhere between four and ten variations
    (with clear names), rather than allowing NxMxPxQxZ combinations to exist.
[nms] Terminology like "CBOR protocol" is ambiguous and should be reworded. 
[nms] The CBOR RFC defines tagging (e.g., #6.xyz) which seems different than what is being described above. Maybe "CWT/COSE tag" is ambiguous wording.

    --
    Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
     -= IPv6 IoT consulting =-