Re: [Rats] debug disable (was Re: Processing Endorsements and Evidence into Results)

Dave Thaler <dthaler@microsoft.com> Fri, 03 April 2020 19:15 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98AF83A0755 for <rats@ietfa.amsl.com>; Fri, 3 Apr 2020 12:15:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eIN5phqfbCmI for <rats@ietfa.amsl.com>; Fri, 3 Apr 2020 12:14:55 -0700 (PDT)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2121.outbound.protection.outlook.com [40.107.93.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 847603A0736 for <rats@ietf.org>; Fri, 3 Apr 2020 12:14:55 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ResSedGCOEwCB6uEWBVkwd7J2jHmmXBQiT3Qx8QgSkGW5FfRxU9ow5eKiBQY9LUbXTQxqlY2ZcssV2RfeU2mpN7EcuRdMzPBD0MCOMRtXbdgIRjZqfwFqkEOyLb0kd09i1ntEFUskYvmvKAxeFUl6ZYTddLAmlZBvXRfUmlcIfOdQHKWp2pULvkOaZmsUfdp2/5F8Z4zPC//UMpREe2w3EIFTaFf4D1BgHGYdUVYjr+LVG6sXtDdG9T0J3suVnghpdIM2lCLuiFs1ITK7MCBQG4XiEBXVUcfXDnWVfJsrxJN6ijXS13Oxabjhs44H39vJtgdGPvLi2BmKzGrabEQDw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HaST79Dj7J9FfugTHdjc6I1fdnAQQGwYSsyS5mOdnoI=; b=kEZfT2EaWrL0CJxq+/16AsivBFzxGPo2d5nK+g+EmyrpjF7h0cUNYItL3A50sEFXGvV1dWCF4cIK9sKRjtIVy8q2EgJzBvEOPN+1BTn7V2DPchZbwqcp5t0l1I2VfGYgbfGODFnnNAgOxpY3eLbeDGoWsgM/uOSjpOuvoHEpYfCk/RvirAo2Y5bRAnwZmLEw4Pf0z0wXjgVWOpwj7xsRq5hWmAJSdYyMlZvnMOcnL0l/FoBnepC4U8cu0hlmOzWuA/gAK4MoIW08CTT0vhDhyI5mmWp9b4Y854WcXLDxWLplatAcf8YTyjM+lkToznPtDR8qabno4UWvcGl9/OzA6w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HaST79Dj7J9FfugTHdjc6I1fdnAQQGwYSsyS5mOdnoI=; b=fERjvhMjaPXVcwsaeS20eeTbUhnJCOEDdQKFacTR0UgPdz27ITGTD3bMUgH47jBGXrUYjQ4JJvNhy4Zn/Kyn7Wj7GjfhTpEafZYIVLtAZ7ezbnabvE0Ed2zk2mjO25ZT4EpPdstlFYOFtMMT38Jw3VNwOCEhpFzBl/RhdAcF1Qs=
Received: from MW2PR2101MB1034.namprd21.prod.outlook.com (2603:10b6:302:a::10) by MW2PR2101MB1068.namprd21.prod.outlook.com (2603:10b6:302:a::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2900.2; Fri, 3 Apr 2020 19:14:46 +0000
Received: from MW2PR2101MB1034.namprd21.prod.outlook.com ([fe80::25fd:d901:ef7d:96e8]) by MW2PR2101MB1034.namprd21.prod.outlook.com ([fe80::25fd:d901:ef7d:96e8%5]) with mapi id 15.20.2900.002; Fri, 3 Apr 2020 19:14:46 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: Laurence Lundblade <lgl@island-resort.com>
CC: Ned Smith <ned.smith@intel.com>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: debug disable (was Re: [Rats] Processing Endorsements and Evidence into Results)
Thread-Index: AQHWCeIXkEkddm2qr0SPuskB8cHwiKhnxAyA
Date: Fri, 03 Apr 2020 19:14:45 +0000
Message-ID: <MW2PR2101MB1034C4B83AB2A0349B4DE44CA3C70@MW2PR2101MB1034.namprd21.prod.outlook.com>
References: <C3BC4E14-8BF8-4CD5-882B-F7AAF4B9155F@island-resort.com> <BB724659-3075-4ED2-8745-BACBD0D17C2B@island-resort.com> <B8790B3C-35FF-4709-837D-0BE609678104@intel.com> <BL0PR2101MB1027DAD1C277DF2255F4795AA3C70@BL0PR2101MB1027.namprd21.prod.outlook.com> <C2FB508E-9527-4ABA-82EA-99558B8B76FF@island-resort.com>
In-Reply-To: <C2FB508E-9527-4ABA-82EA-99558B8B76FF@island-resort.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dthaler@microsoft.com;
x-originating-ip: [2601:600:9780:16f0:9e4:140:d378:ab70]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 8e7c4d7d-d7c6-4c0a-da45-08d7d80345e6
x-ms-traffictypediagnostic: MW2PR2101MB1068:|MW2PR2101MB1068:
x-ld-processed: 72f988bf-86f1-41af-91ab-2d7cd011db47,ExtAddr
x-microsoft-antispam-prvs: <MW2PR2101MB1068883F39991731423F950BA3C70@MW2PR2101MB1068.namprd21.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:3631;
x-forefront-prvs: 0362BF9FDB
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW2PR2101MB1034.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10019020)(4636009)(136003)(376002)(346002)(39860400002)(366004)(396003)(86362001)(54906003)(7696005)(4326008)(8676002)(5660300002)(66476007)(53546011)(52536014)(64756008)(186003)(316002)(55016002)(66556008)(81166006)(9686003)(6506007)(966005)(66446008)(2906002)(81156014)(8936002)(66946007)(10290500003)(71200400001)(76116006)(8990500004)(33656002)(82950400001)(478600001)(82960400001)(6916009)(579004); DIR:OUT; SFP:1102;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ekL4NYu/2EESopCxVshIDBJsnZU9NiJsosKXjAXzQga/Lox4ls9Opc9aovp3FfgH6AI2rOLKlmTgZ6U9K3lE9yoe88HZfsvb57mLsJR27cHTENxHn1/UkiVL5xYV9Ht+7bhh3T4NB63y84SBFsExPl+A1ZCeAwWcHBXQx8E6VxcuTGCZF4fvDqgXroNWEsy0TzAFritqsxFCiIiLljdPVrik1hL+2HPvdoq6iTpYo4PaDHLNqunr88x3uLjnOjHRTqUZifcJUUsBWqSLwgJwBf00xUV7uiRX0knxkO26dbQ8U5iZpm7d1Ip1vhfU2j2OKPrB/1qSKWIkyS+CM+d6TphfG3BmKpVX/3JFxYB0/ARwcoxwqR5aaMq8PnQxjJsGMXD6ryGNcLbhRLtbet2XhihNHvrwZPxzED9ew96oHV8QFJkazda0xbmbnGNi3mL8Gr280yFzZf0H0/f+Z1dSQwnaC6P+xi945ZagtdTj3MMr9aHuclddp0kqb1R5m8stDcQDvIMYVbLRkR5xcsHD8Q==
x-ms-exchange-antispam-messagedata: O/MnlzHZalrx9vnsQjt5lJMFfww73a+T60zhWxruvlChCjcnspKIJdxdhdlvFtKuqHgCYeLgkE4wmNrpQkGRymkvTAVcinpz2Ojvj4AFWKMxE4owiVM0oRXi9pstFuS0DyTutKxG6Db/SkiEx6qS7xeQfW8EvtD0MUnTfAKuPh5CC1h69ak6fs98lHggfQOfkFfYseJBq6w+RVbVTicLlg==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MW2PR2101MB1034C4B83AB2A0349B4DE44CA3C70MW2PR2101MB1034_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8e7c4d7d-d7c6-4c0a-da45-08d7d80345e6
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Apr 2020 19:14:46.4203 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EYd9e3cbKyauvhPuT/bezyTpmMGBqoX4uRzN9Uc6uqCW/SGSxYxmg+v3XsGmmeoOUuPbJK9Tzto3q9DK9nUbvIIIAxLoBgOFn4iFij0x7kc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR2101MB1068
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/CxfSkGhJcXUrcU_PczNPlzeVvbU>
Subject: Re: [Rats] debug disable (was Re: Processing Endorsements and Evidence into Results)
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 19:15:01 -0000

“that’s not how debug for SW / apps usually works. There’s not usually config to turn debug on or off for individual apps.”

I can tell you that IS how it works for Intel processors, including apps that run in SGX enclaves.
So “usually” is perhaps a matter of perspective, or a matter that varies by chip vendor.

From: Laurence Lundblade <lgl@island-resort.com>
Sent: Friday, April 3, 2020 11:00 AM
To: Dave Thaler <dthaler@microsoft.com>
Cc: Ned Smith <ned.smith@intel.com>; rats@ietf.org
Subject: debug disable (was Re: [Rats] Processing Endorsements and Evidence into Results)

The latest debug disable text is here<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fietf-rats-wg%2Feat%2Fblob%2Fmaster%2Fdraft-ietf-rats-eat.md&data=02%7C01%7Cdthaler%40microsoft.com%7Ccc125ca1c90445f1433308d7d7f8da45%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637215336822524667&sdata=Tq0ty5ZdUg2CEQbrqhxRs2lSy2FXPkS5ktpdXdmKvks%3D&reserved=0> in GitHub but not yet in a released draft.

The “permanent disable” state still allows for the OEM (and only the OEM) to enable for things like RMA so it couldn't go in an endorsement. “full permanent disable” could, but only if the manufacturer really did it for every chip they shipped.

The debug facilities the claim is aimed at are HW and system facilities like JTAG, scan chain, Arm Coresight<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdeveloper.arm.com%2Fip-products%2Fsystem-ip%2Fcoresight-debug-and-trace&data=02%7C01%7Cdthaler%40microsoft.com%7Ccc125ca1c90445f1433308d7d7f8da45%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637215336822534662&sdata=VWtpD%2BT2BxIxdamCpIKesvGcezuiZ9Xn5NpZum76Is8%3D&reserved=0> and such.

Maybe for some app download systems it might make sense to make the app an Attestation Target and make claims about that app’s debug state, but that’s not how debug for SW / apps usually works. There’s not usually config to turn debug on or off for individual apps.

LL



On Apr 2, 2020, at 9:27 PM, Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org<mailto:dthaler=40microsoft.com@dmarc.ietf.org>> wrote:

Debug-disable is not (in general, but can be in specific cases) permanent for a device, it can vary by application on the same device,
and can vary over time as say software/firmware is patched or configured, so cannot in that case be in an endorsement.

Also I would expect that endorsements generally also carry some sort of expiration or validity period as well, which isn’t in Laurence’s example.
(And expiration time is an example of something that equality comparison against a “known good value” doesn’t work for.)

Dave

From: RATS <rats-bounces@ietf.org<mailto:rats-bounces@ietf.org>> On Behalf Of Smith, Ned
Sent: Thursday, April 2, 2020 9:20 PM
To: Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>; rats@ietf.org<mailto:rats@ietf.org>
Subject: Re: [Rats] Processing Endorsements and Evidence into Results

BTW: Since ‘debug-disable’ is permanent it could probably equally be included in Endorsement.
It is also reasonable that Verifier could downgrade ‘security level’ based on other claims and how they relate to policies. Security level in Evidence is an assertion the attester makes that has to be substantiated in some way. It could also be used exclusively as a conclusion in Results based on review of a bunch of other claims (in other words Attestation Results cold acquire additional claims beyond what originally existed in the intersection of Evidence and Endorsement.

Policies and or standardized profiles decide all these variables IMHO.

But the example seems to be illustrative (if that was the intent).

-Ned

From: RATS <rats-bounces@ietf.org<mailto:rats-bounces@ietf.org>> on behalf of Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>
Date: Thursday, April 2, 2020 at 4:16 PM
To: "rats@ietf.org<mailto:rats@ietf.org>" <rats@ietf.org<mailto:rats@ietf.org>>
Subject: Re: [Rats] Processing Endorsements and Evidence into Results

Let me make this much more concrete with an example. I’m using JSON representation of CWT/EAT/Endorsements with C-style comments for reading ease.

Endorsement
{
    “trust-evidence”: “all”,           // E0, I just made this up
    “field-upgradable”: true,          // E1, from draft-birkholz-rats-endorsement-eat-00
    “shielded-secret”: internal,       // E2, from draft-birkholz-rats-endorsement-eat-00
    “common-criteria”: https://www.commoncriteriaportal.org/files/epfiles/0879V3a_pdf.pdf<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.commoncriteriaportal.org%2Ffiles%2Fepfiles%2F0879V3a_pdf.pdf&data=02%7C01%7Cdthaler%40microsoft.com%7Ccc125ca1c90445f1433308d7d7f8da45%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637215336822534662&sdata=nsZC6mvYV9zlP7uRNMHQfmJz0dQQV6rFIS4B6CzJ1DY%3D&reserved=0>”,      // E3, from draft-birkholz-rats-endorsement-eat-00
}

Evidence
{
    “iat": 5734873409823,              // C1 time stamp for evidence creation time(eg) from EAT draft
    “security-level”: 4                // C2 the security level is “hardware” from EAT draft
    “debug-disable”: “permanent”       // C3 debug is permanently disabled for all but the OEM from EAT draft
}

Results
{
    “field-upgradable”: true,          // R1, from draft-birkholz-rats-endorsement-eat-00
    “shielded-secret”: internal,       // R2, from draft-birkholz-rats-endorsement-eat-00
    “common-criteria”: https://www.commoncriteriaportal.org/files/epfiles/0879V3a_pdf.pdf<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.commoncriteriaportal.org%2Ffiles%2Fepfiles%2F0879V3a_pdf.pdf&data=02%7C01%7Cdthaler%40microsoft.com%7Ccc125ca1c90445f1433308d7d7f8da45%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637215336822544656&sdata=lsMPnL5msEN1uX2ou2%2FQtvfs9rO%2BjgAkESghd7fJDk8%3D&reserved=0>”,      // R3, from draft-birkholz-rats-endorsement-eat-00
    “iat": 5734873409823,              // R4 time stamp for evidence creation time(eg)
    “security-level”: 4                // R5 the security level is “hardware”
    “debug-disable”: “permanent”       // R6 debug is permanently disabled for all but the OEM
}

In this example, the RP is probably feeding this into a risk engine so they want all the details.


Here’s another very abbreviated example with made up claim names:

Endorsement (not showing any signing)
{
    “expected-hash”: “TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZW”
}

Evidence
{
    “actual-hash”: “TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZW"
}

Results
{
    “verified”: true,
}

This all seems like the eventual logical result of the EAT, endorsements and architecture drafts to me.

LL




On Apr 2, 2020, at 12:36 PM, Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>> wrote:

Now that we have a first draft describing endorsements<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-birkholz-rats-endorsement-eat-00&data=02%7C01%7Cdthaler%40microsoft.com%7Ccc125ca1c90445f1433308d7d7f8da45%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637215336822544656&sdata=SW8xIOOAErhMdjKuNsNgBARAZQmHfOAQ7HuolO2ekV4%3D&reserved=0>, and they look like Evidence and Results, it seems interesting to consider some of how the verifier uses Endorsements (reference the architecture diagram below).

Let’s say there are three things in the endorsement, E1, E2 and E3, three things in the evidence, C1, C2 and C3 and three in the results, R1, R2 and R3.

Then three simpleton top-level cases:

1) An Endorsement is passed through and becomes a result: E1 — > R1
2) A Claim is passed through and becomes a results: C1 —> R2
3) Some endorsements combine with some claims to become a result: {E2, E3, C2, C3} —> R3

However that seems to be too simple and I think there has to be some sort of a primitive endorsement, call it E0, whose semantics are that some or all of the claims can always be believed. I think that means 2) doesn’t really exist, but has to be this:

2) Some claims can pass through with the use of the primitive E0 endorsement: {E0, C1} —> R2

One way E0 could be defined in the draft describing endorsements<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-birkholz-rats-endorsement-eat-00&data=02%7C01%7Cdthaler%40microsoft.com%7Ccc125ca1c90445f1433308d7d7f8da45%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637215336822554653&sdata=kidjLndIlonCynAiwdKXGgMg5bHAUKPYkXL%2BB2fpzE0%3D&reserved=0> is that it is a list of the labels of claims that are trusted to be passed through. For numeric labels  a range INT64_MAX to INT64_MIN (or -infinity to +infinity)  indicates all claims are trusted. It could also list specific ones that are trusted.

From the TEE, FIDO and Android Attestation views of the world where measurements aren’t a primary thing and secure/trusted boot is required and always on, a common model will be to pass everything through to create an aggregate result. It could be represented this way:

E1->R1
E2->R2
E3->R3
{E0,C1}->R4
{E0,C2}->R5
{E0,C3}->R6

I think this goes on to submodules too and has some relation to the attempted to propose a connection type.  Endorsements may be able to say how submodules are trusted. There might even be an E00 primitive that says the lead attester is allowed to say how submodules are trusted. This whole line of thinking was partly prompted by this issue<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fietf-rats-wg%2Feat%2Fissues%2F58&data=02%7C01%7Cdthaler%40microsoft.com%7Ccc125ca1c90445f1433308d7d7f8da45%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637215336822554653&sdata=nam1GKA%2BNGc31Lubnb%2BsT2xqe9Ft9vDtw4v4JL%2BrWKg%3D&reserved=0> against EAT and comments from Giri and Dave.

LL



                 ************   ************    *****************

                 * Endorser *   * Verifier *    * Relying Party *

                 ************   *  Owner   *    *  Owner        *

                       |        ************    *****************

                       |              |                 |

           Endorsements|              |                 |

                       |              |Appraisal        |

                       |              |Policy for       |

                       |              |Evidence         | Appraisal

                       |              |                 | Policy for

                       |              |                 | Attestation

                       |              |                 |  Result

                       v              v                 |

                     ..-----------------.                |

              .----->|     Verifier    |------.         |

              |      '-----------------'      |         |

              |                               |         |

              |                    Attestation|         |

              |                    Results    |         |

              | Evidence                      |         |

              |                               |         |

              |                               v         v

        ..----------.                      ..-----------------.

        | Attester |                      | Relying Party   |

        '----------'                      '-----------------'







_______________________________________________
RATS mailing list
RATS@ietf.org<mailto:RATS@ietf.org>
https://www.ietf.org/mailman/listinfo/rats<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Frats&data=02%7C01%7Cdthaler%40microsoft.com%7Ccc125ca1c90445f1433308d7d7f8da45%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637215336822564647&sdata=RR7tPQoY1JmQd5MEOCQyxxRs%2BpCkExAi0B%2BB53aSJhg%3D&reserved=0>

_______________________________________________
RATS mailing list
RATS@ietf.org<mailto:RATS@ietf.org>
https://www.ietf.org/mailman/listinfo/rats<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Frats&data=02%7C01%7Cdthaler%40microsoft.com%7Ccc125ca1c90445f1433308d7d7f8da45%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637215336822564647&sdata=RR7tPQoY1JmQd5MEOCQyxxRs%2BpCkExAi0B%2BB53aSJhg%3D&reserved=0>