Re: [Rats] [CoRIM] The use case for TDX- and SEV-SNP-measured virtual firmware

Henk Birkholz <henk.birkholz@sit.fraunhofer.de> Wed, 10 January 2024 09:03 UTC

Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A4E2C14F619 for <rats@ietfa.amsl.com>; Wed, 10 Jan 2024 01:03:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-0.091, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sit.fraunhofer.de header.b="Mn65vRLZ"; dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com header.b="Ban8DRah"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NVPf5c0U-DFR for <rats@ietfa.amsl.com>; Wed, 10 Jan 2024 01:03:06 -0800 (PST)
Received: from mail-edgeF24.fraunhofer.de (mail-edgef24.fraunhofer.de [IPv6:2a03:db80:3004:d210::25:24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ACED9C1CFC4C for <rats@ietf.org>; Wed, 10 Jan 2024 01:03:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=sit.fraunhofer.de; i=@sit.fraunhofer.de; q=dns/txt; s=emailbd1; t=1704877385; x=1736413385; h=message-id:date:subject:to:cc:references:from: in-reply-to:content-transfer-encoding:mime-version; bh=ev7lMw7fXFYQVveDxGRIMjlTT++BsMBfDVQ2pMs8w/s=; b=Mn65vRLZsaNvIu/RoZD/kF+ArH0PyjZlfHZhZ1WJSAzHKu4PGb8vV0HN jf/7VBnsuhuPh6di05IxgeAUCR+1vvxUU5F6PcpuNQV+LZ+1gQd5ILvoE 64WXTRjNfrrI3mx6A/pcxZVpCYapg3CadZcAOLmcLCUADz9xK/kyDAKCL p+cZ/J9nOdv0+gQcdD3EMrYWOqHMDXbdZtMy3jbMRht837sFHTpqtr6rA TD7egMVP1aTFgvcm8K/6Uj5aOZfFai0V4v7ZAYaWFxdlgI4o5VUJ8dI3T byzaW1F0X7PCQ4fBRQY4RPtQKEm3pED9nAXiv4h9r7CaJ9Pq5wZKpfPUU A==;
X-CSE-ConnectionGUID: fGWZmJT7Q96DNeNbFWtvFg==
X-CSE-MsgGUID: FOWfvHUrSveL4tgJzgQWPg==
Authentication-Results: mail-edgeF24.fraunhofer.de; dkim=pass (signature verified) header.i=@fraunhofer.onmicrosoft.com
X-IPAS-Result: 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
IronPort-PHdr: A9a23:q1mrhhW3oivCoZ7OCQ8i/tMeSzPV8KyzVDF92vMcY89mbPH6rNzra VbE7LB2jFaTANuIo/kRkefSurDtVSsa7JKIoH0OI/kuHxNQh98fggogB8CIEwv8KvvrZDY9B 8NMSBlu+HToeVMAA8v6albOpWfoqDAIEwj5NQ17K/6wHYjXjs+t0Pu19YGWaAJN11/fKbMnA g+xqFf9v9Ub07B/IKQ8wQebh3ZTYO1ZyCZJCQC4mBDg68GsuaJy6ykCntME2ot+XL/hfqM+H 4wdKQ9jHnA+5MTtuhSGdgaJ6nYGe0k9khdDAFugjlnwXsLB7Sbl9cdwxwqAJeLKDo89Rz2h9 aQzalzFrToLGiJnrEjRl+5h04N4+Cu68k8aocbeNaucMqpSRKrdW+glAndmZ9QIZSNjLpqiR qIKJsg5YcR39qDXqQRe/ECQOBP2Gfju7T9C2lLJ+vwm36NxDxr63w0NLvwMq1LQ64urJakZY bCY1vXhwhGAX/0HhBH7tsvLLRFinOuxfKIgSfXe4BguTTuGqHqK953fY2yz6+YQmjmg1bVhV OmGrnY1uiBKoxP3geo01YLCqYUr6VTc8xlUh6YXF8OBdV5eTeOfE84D/zHfNpFxRNslWX0to ish17ka7IayZzNZoHxG7xvWavjCfoSH7zy5CKCfOz5lgnJidr+lwRq/ogCsyez5A9G9y00C7 jFEnd/Fqm0X2lTN59KGRPpw8gbp2TuG2w3JrOARCU4unLfdK5kvz6R2kZwWsE/ZGTTxllmwh 6iTHng=
X-Talos-CUID: 9a23:aapafG6ICLq3xg7t2dss+mErKMUHTiLknSn8BUKeA0hWVKO7RgrF
X-Talos-MUID: 9a23:pm7qJQ3RJwRXdyAOPnsmKaluKzUjzYORBl4trI89pcSgaTB/GSWStQuPTdpy
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.04,184,1695679200"; d="scan'208";a="67535005"
Received: from mail-mtadd25.fraunhofer.de ([192.102.167.25]) by mail-edgeF24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2024 10:02:57 +0100
X-CSE-ConnectionGUID: kekROZNYRee54IoC7Y8tbw==
X-CSE-MsgGUID: OvJI7bY9Rayj5Fd1FS82wQ==
IronPort-SDR: 659e5d3f_FBDGqRQfSjIDqPIyBYiufORge9AUyZpMsmH+QDdkSO38dgA 4Mm+ma92D1qox6D3eNVTG26uDTQKE/2EZvcRrlw==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:I+bj1RAE5Cn6gJ7+H2w2UyQUIUIY04WdBeZowoRy0uEGe/G55J2nJ 0zWv6gz3xfCCJ/W7/tUhuaRqa3kUHwN7cXk0jgOJZJWXgIDicIYkhZmB8iACEbhK+XtYTB8F 8NHBxd+qmq2NUVeBMHkPRjcuHSv6z4VFBjlcA1zI+X+AInJiMqrkuu1/s62AU1I0RSnZrYgA ByqoFfqq8MUjIB+eIM80QDArXYNWsgE7mRuOV+Vg1PA99+9rrtC1gkVhf877M9HV/fKOoEDC JFIBzQvNW84ofbmsxXOVyKjzXsRWWZF93gACQiQ3E73QdTcvzTZrPJS5GqlNNP/Tqo3ARbhw oJ2RDL01nsuMSMb4T72qZRJl/cIxXDprUlVyoiETLucNNxFQeTAWuoIHFhOfOpISQVoB6qeV 9ctILMoF+gH/9imiWYU9walBC6sDr/C9RgZmnOxjbMh7+cgPDDo3hcGG5VQ7mXap+WlGb1Oe O+Rj5nGnGjlaa0V2mj8q7XSTzEx8cmzUpshcJDpim8ADV3UtAnPj7HnIhrE7d5SsmmQxs94R /OOsG8M80ZcumekzegrtKrNnoQp5xfk1xdn+bslAPGFc00uMpa0VZpKsCeCMJFqB9kvWHxsp HMiw6Yd6vZTHQAPwZUjghvDYtCrKdXO7AjqSeCRJjl1njRpdeH3ixWz9B24w/bnHomv0VlMp zZYiNSEqH0X1hLS58TGAvtw90usw3COgijd8OhZJ0Azm6fBbZknx787jJ0ItkrfWCTxnS3L
IronPort-Data: A9a23:7m4096J0ndqcSrWGFE+RwpAlxSXFcZb7ZxGr2PjKsXjdYENS32YAz WNMD2GGb6nfNGr8fdpwOtuxoR8Du5PQyt9kSlMd+CA2RRqmiyZq6fd1jqvUF3nPRiEWZBs/t 63yUvGZcYZsCCea/0/xWlTYhSEU/bmSQbbhA/LzNCl0RAt1IA8skhsLd9QR2+aEuvDnRVvR0 T/Oi5eHYgP9gmYlaj58B5+r8XuDgtyi4Fv0gXRjPZinjHeG/1EJAZQWI72GLneQauG4ycbjG o4vZJnglo/o109F5uGNy94XQWVWKlLmBjViv1INM0SUbriukQRpukozHKJ0hU66EFxllfgpo DlGncTYpQvEosQglcxFOyS0HR2SMoVF9bz9BkqZgPaewhCaUnzHnMQ+EEspaNhwFuZfWQmi9 NQDLSwVKB2TjOLwzqiyV+9sgcouNo/nMevzuFk5kGqfXKlgGM+SBfyQure03x9o7ixKNfbTY clfYzt1bxTHZw9nIVYLTpwklfquhn7xficepF/9Sa8fujmOkFMvj+G2WDbTUvuUZ+QKlHfJn GvX/TnXDkg0D4zF1gPQpxpAgceKx0sXQrk6CL2/8/dxi1mSwGMaDh8RU1agifa8g0+6HdlYL iQ89ispq647+0iiXNSoA0W3p3mLuhNaUN1VO+E/4RuGjKvZ/wjfAXILJhZbYcA9nM47WTJs0 UWG9+4FHhQ27ebQGC3Yr+jF6GroZm4LKCkJIyEeRBYD497trZt1gh+nostfLZNZR+bdQFnY6 z6QpTU4h7IdgNRN0KO+/FvdhCmrqISPRQkwjjg7lEr5hu+gTNf9P9b62kuR9vtaMoeSQ3+Iu XVOyYDU7/kDAdvJ3GaBSfkEVuPhrfuUEizusXg2FbkY9hOp5yGCe6JU62pAP0tHCJsPVgLoR 07xgjlvwqFvEkGkV5IqXLLpOf8WlfDhMf/HSsHrasF/Z8ktVQ2fowBrS02i/0Hst0kOg6gPA Iqpd+SsAUlHDq49/j69Rroe44QK3QE7/3vYHrrg/iSk0J2fRX+bcqgEO12wddIE7LuIjQHW0 tRHPe6Y4kx7fMynRQeP6q8VD1QBDUZjNKDMs8YNK9KyeFt3Kl8uG9r64O0HebU8u493i+2R3 HW2enEA+WrFnXeddDm7MCFyWojOA6R6g2kwZxE3HFCS3HMmX4ajwYEfe7Yzfpgl7OZT9uF1f dZUZ/S/BulzdRqf9wQ/dZXdqKlQRCavjy+KPAunZ2EbVLxkTArr5NTlX1XO8A8jMymJjvY98 oaQjl7jfZk+RgpZHJn3btCrxAiPpnQzor95cHbJBdhxQ3/S1rZWBRb/tdINGPFUGy7/nmOb8 y20HSYnofL8pt5p0dvR2oGBgYSbM8p/OUt4DWDr1KuEMwva8lX+xoUaYuKDfG3eZljV44SnX /1elNvnAc0EnXFLkotyKKlqxqQA/OnSp6dW4wBnPXfTZXG5I+pEDljf+ucXrYxL5LtSmTXua 3K14tMAZIm4YpL0ImAeNC8OT7ql18hNvhLw8P5sAkHxxBEvzYq9SU8IYiW90n1MHoBUbrEg7 /wq4vMNygqFjREvDNaKowZU+0mILV0CS68XjY4bMqC6ljsUzkx+XrKEBh/U+J2vb/B+AnsuK BKQh4vAgO147WjGeHwRC3PM/LR8gbIjhRN092IBdm+5wof9uvwK3RNq4WsWSCZRxU55yO5dA DVgGHB0AqSsxA1WovZ/cVqiICx/ISGI21fQzgIJnVLJTkPzWW3qKnY8CNm3/0sY0jx9eB5H8 JGx1VTVUTTjV5z01S4cAERgq+LRSOJg0gj4nOGmAMW3MJ0oahX1gqKVRDQpqjm2JegTlUH4t e1R0+IoUpLCNAkUuLwdN4mW8Z8yWSK0DjVObt859ZxYAFyGXi+53Aa/DnyYe+RPFqTsylC5A ck/HfB/fU2y+wjWpw9KGJNWBaF/mcMow98wernLA2oimJnHpxpLtKPgzATPtFUJcf5Pz/lkc pjwcgicGFO+nXFXwm/BjPdVM1qCPOUrWlfO4/CXws4oSbQ4r+BeQWMj2OCVvlKUEjdd0TC6g QfhX5LSnstekdlCvo21Hqt6UlD+bZu5UemT6wm8vuhfdd6FY4+EqwoRrUKhJAhMe6cYX9Nsj 7mWrdrrxwX/sa0rV3zC0Yy0f0WTCR5egMIMWi4vEERnoA==
IronPort-HdrOrdr: A9a23:zX5wyKiEXfEIddq0IyjOVekb9nBQXtwji2hC6mlwRA09TyRQ// re5cjzsiWE7gr5OUtQ/uxoV5PsfZqxz/JICKgqTNWftWrdyQiVxeNZjbcKqgeIc0aVygc678 ZdmsNFZ+EYY2IVsS+D2njdLz9a+qjjzJyV
X-Talos-CUID: 9a23:Wo4mz2kgGi522hunipmtO6hjc+3XOX7Qz033EWmJM2tkFeG0TnTPyfN4mdU7zg==
X-Talos-MUID: 9a23:iAnXAwrJxSD6Ufrz5skezxZ8FuY36ZX/Mkkck8got5CqDnwqJA7I2Q==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.04,184,1695679200"; d="scan'208";a="195476713"
Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaDD25.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2024 10:02:55 +0100
Received: from XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28; Wed, 10 Jan 2024 10:02:55 +0100
Received: from DEU01-BE0-obe.outbound.protection.outlook.com (104.47.7.168) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28 via Frontend Transport; Wed, 10 Jan 2024 10:02:55 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BHaYXzC5EE2swrPZzGO7PwJ2gt8w556WGLdTPjaO+ap6zI8Zz4c8jTWb6sp3QPkEw0ZuszODguPR80T9+PCPpkcrycmwgtTD6v8s+fqQimS2AjPSrBu78hrTsoyJ5q7frwdv4wgshs+jgD5VHUbP8+6S53lUIcAnyuC2IZprrRfT1PfOEiT1m5PraYt7IGIxjLSofT76dmCk6hNUccuUdBgSz4EcC5qbGsRzGRuvNp+jVuqn/sPUYl4rIU5dh1VnqFxQVXcEZWP8EiTtpufAycW0JnGpKgf4sJxEPukdy0K8AetOJRQl4xnIbiUieCIowy2GPyRDOOSS9u1hrtSr2A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=X7ew+EewKrpGT+Wavakrk0J+EMudEt64AnuJy7IK0Qs=; b=dh3UjgpbTyjXD9qTSl7xhYCtRLFhRnsZz23KgoxGyFjmBXq7fJxFA1adZzbwhK0T7L1Z179ZuYzAFvi5yEous0cMBztiAco/Gy0vlykLnl/RzuHUtykNQ7u+oLtxuD6x8C+VdL5pLm6P2jCl9zwYSm+wCGXg7jHBglwthcfphKiYCEuDtKgzKsEMyMmNDdqjEyM4fCmmOiT9/g3HNzHVEN66kSwRFVzW5vfIfy0Wp4PJg7wzvwIiNTqXmP4+eCtvmuE4JDjlBkSzqNSjZjM9esq90r+SoEwKfYj+6NpEmCTVfonw8sRi0NiLniZZJ7UG0cHSEfE8IQjL0lEVWRhzHw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=X7ew+EewKrpGT+Wavakrk0J+EMudEt64AnuJy7IK0Qs=; b=Ban8DRahNSW/uOQz1ZgJDqvAAmAJP4JG1ABf7893FUr2usiOhb4EWO9td/8vsTkiEYFjsNl/66yfcX8Er4AgL+Xf95Nn6+k7i+UrUIx8PWgA9i2P+NGr6yR47NUjuA9SR7iicAMpzyISiC0/Ep7ccGoVKlpnTE/HJZvQUxMDUSk=
Received: from FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:4c::8) by BE1P281MB2083.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:35::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7181.17; Wed, 10 Jan 2024 09:02:53 +0000
Received: from FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM ([fe80::a3df:349f:8d92:1d7f]) by FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM ([fe80::a3df:349f:8d92:1d7f%4]) with mapi id 15.20.7159.020; Wed, 10 Jan 2024 09:02:52 +0000
Message-ID: <b8a215f8-56b6-7901-d087-610f1fbdbf7a@sit.fraunhofer.de>
Date: Wed, 10 Jan 2024 10:02:50 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.11.0
Content-Language: en-US
To: Tom Jones <thomasclinganjones@gmail.com>
CC: Dionna Amalie Glaze <dionnaglaze=40google.com@dmarc.ietf.org>, rats <rats@ietf.org>
References: <CAAH4kHak38yodUYUJGGPjor42PB5cNgHnC_h-c0F3T6KJapTjw@mail.gmail.com> <CAK2Cwb4zHtRTjb82njC1eUc-R83Fjpw39JNBfCT+tFNaLoTcRw@mail.gmail.com> <CAAH4kHYqYONbs4mODjJ_hRmhxrbzHup1pbUbVGWuijFf0tGyZA@mail.gmail.com> <4efe6901-ea7a-e24c-98f9-957289b6d1dc@sit.fraunhofer.de> <CAK2Cwb58BXdQ0K+nXWzcH6QPdfUVO-SdUSaKBiMq249X8enr+g@mail.gmail.com>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
In-Reply-To: <CAK2Cwb58BXdQ0K+nXWzcH6QPdfUVO-SdUSaKBiMq249X8enr+g@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: FR0P281CA0012.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:15::17) To FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:4c::8)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: FR0P281MB2879:EE_|BE1P281MB2083:EE_
X-MS-Office365-Filtering-Correlation-Id: e12a04e9-5692-4700-cb90-08dc11baed9c
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(396003)(346002)(366004)(39860400002)(376002)(136003)(230922051799003)(64100799003)(1800799012)(186009)(451199024)(8676002)(8936002)(478600001)(966005)(53546011)(6512007)(83380400001)(66556008)(66476007)(66946007)(6916009)(316002)(6506007)(30864003)(6486002)(31686004)(2616005)(66899024)(4326008)(54906003)(38100700002)(82960400001)(2906002)(5660300002)(26005)(44832011)(41300700001)(31696002)(86362001)(45980500001)(43740500002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-MS-Exchange-CrossTenant-Network-Message-Id: e12a04e9-5692-4700-cb90-08dc11baed9c
X-MS-Exchange-CrossTenant-AuthSource: FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Jan 2024 09:02:52.8907 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: h+B24eG8JIDXcV6AMl6bWvTMlStem1uzKH3vfPrzKo5t2gVse4v5gVJqA6AQnwfblqYvsrlCKwIvyda8rMHKHCJkDk8XKuZ1mODdWTlvQdI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BE1P281MB2083
X-OriginatorOrg: sit.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/sS-eHCRntBkiuFYuvhfLFZqszsU>
Subject: Re: [Rats] [CoRIM] The use case for TDX- and SEV-SNP-measured virtual firmware
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jan 2024 09:03:11 -0000

Hi Tom,

coming back to this assumption:

> I am the guy that gets this attestation and needs to make the trust decisions.

Well, in the RATS Architecture there are two types of policy at work: 
Appraisal policy for Evidence and Appraisal policy for Attestation 
Results. To some extend due to the various Evidence formats produced by 
different Attesters, but basically due to the intrinsic heterogeneity of 
Attesters or their operational state in general, the burden of appraisal 
of Evidence conducted by Verifiers is typically significant higher than 
the appraisal of Attestation Results conducted by Relying Parties.

(The AR4SI I-D is a place where homogenization of Attestation Results is 
under construction in the RATS WG.)

The key question here is: which role do you take on? If you are taking 
on the role of a Relying Party Owner, your trust decision making is 
hopefully limited to Verifier selection (and potentially implementation 
specific decisions added to that). If you are taking on the role of a 
Verifier Owner, the burden of checking some policy statements at least 
wrt some Endorsements (especially the mentioned RoT Endorsements, but 
also "TA Endorsements", sorry Carl! please correct me, if necessary) and 
Reference Integrity Manifests is on you. The easier these Conceptual 
Messages can be managed and processed, the burden of appraisal of 
Evidence is getting a lot lower - but it is always expected to be higher 
than that of a Relying Party, as it is literally off-loaded to the 
Verifier intentionally.


Viele Grüße,

Henk

On 10.01.24 00:30, Tom Jones wrote:
> This is the part that sounds like a hand wave
> 
> its job right, such that you can take the chip's signature of a
> virtual instance's boot state at face value, so long as the key
> certificate roots back to the manufacturer's published root of trust.
> 
> I am the guy that gets this attestation and needs to make the trust 
> decisions. How do I know what that means when I make the trust decision. 
> I hope that you are not going tell me to read some policy statement
> 
> At least in tls we have the CA!B for a min set of policies.
> 
> BTW I was the guy at Intel trying to build the very first of these back 
> in 1996 so I understand the problem.
> 
> thx ..Tom (mobile)
> 
> On Tue, Jan 9, 2024, 1:06 PM Henk Birkholz 
> <henk.birkholz@sit.fraunhofer.de 
> <mailto:henk.birkholz@sit.fraunhofer.de>> wrote:
> 
>     Hi Dionna,
> 
>     thank you for bringing the CVM goals here! I think they are a great
>     addition to the mix. Let's try to figure out some answers to your
>     questions step by step.
> 
>     You are touching on a lot of topics, so I am focusing on adding context
>     to the RATS side of things first and in the interest of the list's
>     subscribers only point quickly to one recent SCITT activity up front:
> 
>      >
>     https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture/pull/156 <https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture/pull/156>
> 
>     Pending the approval of that PR, the initial attempt to facilitate DIDs
>     as a first citizen identifier is a thing of the past.
> 
> 
>     So, RATS: please let me try to add some additional context about
>     in-toto
>     attestations in the context of RATS & CoRIM to start with, in the way
>     how I currently understand it.
> 
>     The attestations you refer to are described here, I think:
> 
>      > https://github.com/in-toto/attestation/tree/main/spec/v1
>     <https://github.com/in-toto/attestation/tree/main/spec/v1>
> 
>     In remote attestation land, the concept that can be found at that
>     pointer is potentially best compared with a RATS Endorsement or NIST's
>     3rd-Party Attestation and maybe also NIST's 1st-Party Attestation (a
>     "self-attestation"), I think. It seems not to be RATS Evidence, I
>     think,
>     which is the input to a RATS Verifier, and I am happy to exchange more
>     thoughts about that.
> 
>     in-toto attestations' outer layer are in-toto Envelopes with a JSON
>     encoding, which are signed using DSSE:
> 
>      >
>     https://github.com/secure-systems-lab/dsse/blob/v1.0.0/envelope.md
>     <https://github.com/secure-systems-lab/dsse/blob/v1.0.0/envelope.md>
> 
>     DSSE - Dead Simple Signing Envelope - is an alternative approach to
>     JOSE's JWS. Some reasoning about why it is defined as it is can be
>     found
>     here:
> 
>      > https://github.com/secure-systems-lab/dsse/#why-not
>     <https://github.com/secure-systems-lab/dsse/#why-not>
> 
>     In CoRIM work, we are also defining semantics that could be viewed as a
>     type of pre-defined set of predicates as defined by in-toto:
> 
>      > https://github.com/in-toto/attestation/tree/main/spec/predicates
>     <https://github.com/in-toto/attestation/tree/main/spec/predicates>
> 
>     I am an under the impression (maybe wrongfully so!) that the
>     similarities seem to end there.
> 
>     Two of CoRIM's goals - in a simplified nutshell - are compactness
>     combined with standardized signing. The JSON encoding prescribed by
>     in-toto seems to be going down a different path, but hypothetically it
>     might be possible to transfer all semantics covered in CoRIM into
>     in-toto predicates. The DSSE uses a signing scheme that seems to make
>     some unique choices on flexibility and extensibility, of which I would
>     be careful to assume that they can be simply adopted as is. I am happy
>     to exchange more thoughts on these topics, too.
> 
>     We definitely agree on the goal to not overly burden Verifiers with
>     respect to their duty of appraisal of Evidence. There is a lot more in
>     your email, but I am stopping here for now so that we can work through
>     your illustrated goals and corresponding questions iteratively, if that
>     is okay for you.
> 
> 
>     Viele Grüße,
> 
>     Henk
> 
>     p.s. I started the email off with your reply to Tom instead of your
>     initial email. Sorry!
> 
> 
>     On 09.01.24 20:34, Dionna Amalie Glaze wrote:
>      > On Mon, Jan 8, 2024 at 5:15 PM Tom Jones
>     <thomasclinganjones@gmail.com <mailto:thomasclinganjones@gmail.com>>
>     wrote:
>      >>
>      >> I don't understand the process that would allow a 3rd party
>     attestor to make any assertion about what happened in the Google
>     cloud (or any other cloud for that matter.)  Does anyone else
>     understand the basis for virtual instances being attested as secure?
>      >
>      > The process is by transferring trust to a third party attester that
>      > you do trust, and ensuring that the attested environment is heavily
>      > protected from host tampering. This is the idea behind Trusted
>      > Execution Environments, and is a very different threat model than
>      > folks typically work with.
>      > For AMD SEV-SNP or Intel TDX, you have to trust that the chip is
>     doing
>      > its job right, such that you can take the chip's signature of a
>      > virtual instance's boot state at face value, so long as the key
>      > certificate roots back to the manufacturer's published root of trust.
>      > What Google then certifies is what the measurement of the boot means,
>      > since we're providing the firmware. At first this will just be "we
>      > signed the measurement", but then we'll add claims like, "this
>      > measurement is producible through documented means on a binary that
>      > was built from sources X and toolchain container Y"
>      >   and then you can go further down the rabbit hole of if you
>     trust the
>      > builder, or if X + Y have the difficult-to-attain property that a
>      > clean rebuild yields exactly the same bits. You can audit the sources
>      > to establish trust in the firmware, and you can continue the "who
>      > built the toolchain container and do I trust them?" unfathomably long
>      > chain of builders building builders.
>      >
>      >> ..tom
>      >>
>      >>
>      >> On Mon, Jan 8, 2024 at 4:33 PM Dionna Amalie Glaze
>     <dionnaglaze=40google.com@dmarc.ietf.org
>     <mailto:40google.com@dmarc.ietf.org>> wrote:
>      >>>
>      >>> Hi y'all, I've touched on the issue of confidential VMs (CVMs)
>     a few times in my issues and emails to this list, but I'd like to
>     lay out exactly what we'd like to be able to enable with RATS.
>      >>>
>      >>> # Goals
>      >>>
>      >>> Our goal is for CVM hardware attestations of Google-provided
>     TCB to be linked to
>      >>> 1. verifiable authenticity: signed corim measurements
>      >>> 2. auditable measurements: the signed measurement also points
>     to a supply chain transparency report for the measured binary. A
>     document or software package we publish shows how to calculate the
>     measurement from the binary, and the transparency report binds the
>     binary to an auditable source tree at commit X built with toolchain
>     container Y, signed by an organizationally endorsed builder key that
>     the build follows SLSA L3 operational security requirements.
>      >>>
>      >>> and ephemeral claims, e.g.,
>      >>> 3. vulnerability reporting: short-lived certificates of
>     firmware status, like "has the most up to date security version
>     number" or "is subject to CVE xyz. Restart your instance to get on
>     the latest version". This could be modeled as a CoRIM endorsement of
>     a claim like "uptodate as of TIMESTAMP".
>      >>> 4. Platform security reporting: short-lived certificates of
>     platform firmware status, like "you can be sure that an
>     attestation's TCB is >= x anywhere in the fleet"
>      >>>
>      >>> # Supply chain standards
>      >>>
>      >>> There are further things you can do with the transparency
>     report like non-repudiation through hosting the build attestation
>     with a transparency service that has append-only logs after
>     identity-proofing, but there seems to be a fundamental disagreement
>     between the IETF SCITT workstream and the sigstore.dev
>     <http://sigstore.dev> project on how to achieve that, since SCITT
>     wants W3C DID identities, and sigstore.dev <http://sigstore.dev> is
>     already built to use OIDC. I don't know how that all is supposed to
>     be consonant with RATS, since there's nothing in the corim or eat
>     documents about using DID for identities. There is EAT binding to
>     OIDC tokens though. Is there anyone in the RATS group that is
>     participating in the SCITT effort that can explain this to me?
>      >>>
>      >>> The SLSA provenance schema itself is defined in terms of a
>     completely different attestation format called in-toto
>     (https://in-toto.io <https://in-toto.io>), and communication I've
>     had with them is that in-toto should be considered an alternative
>     carrier format to CoRIM to fit into the RATS framework. If we want
>     to link the reference measurement to an in-toto attestation, that
>     seems like something verifier-specific that we'd need to say, "hey
>     if you want to ensure the firmware measurement is not only signed,
>     but built transparently, then download the SLSA attestation in
>     dependent-rims. By the way if there's more than one thing in
>     dependent-rims, you can understand any url with prefix X to be a
>     firmware build attestation from Google" which is an unfortunate
>     complexity.
>      >>>
>      >>> # Modeling CVM attestation
>      >>>
>      >>> I'm trying to understand how to fit all these goals into the
>     RATS framework such that we can propose extensions to open source
>     verifiers that aren't overly burdensome or highly specific to each
>     particular package we want to provide reference values (and
>     provenances) for.
>      >>>
>      >>> In terms of the firmware measurement, we can deliver a CoRIM
>     through a UEFI variable pointed to by the NIST SP 800-155 unmeasured
>     event, and we can give the AMD SEV-SNP VCEK certificate through
>     extended guest request, but everything else seems to be up to the
>     verifier to collect independently of the VM.
>      >>>
>      >>> ## Evidence collection
>      >>>
>      >>> The way we're collecting attestations at the moment is through
>     a recommended software package
>     https://github.com/google/go-tpms-tools
>     <https://github.com/google/go-tpms-tools> that wraps up a vTPM quote
>     with a TEE quote and supporting certificates as a protocol buffer.
>     I'm not clear if this unsigned bundling process should be modeled as
>     any particular thing in the RATS framework. I think we're working
>     with the "passport model" of attestation.
>      >>>
>      >>> I don't have a sense of how the WG foresees how evidence should
>     be bundled to give to a verifier. I'm working from a vendor-specific
>     understanding at the moment that whatever verifier service you use,
>     you need to use their format and API, but of course ideally I'd like
>     this to be more of a federated arena where you can have n-of-k
>     verifiers say some evidence matches policy, and the evidence is not
>     too vendor-specific for that to be out of the question.
>      >>>
>      >>> ## CVM Profiles
>      >>>
>      >>> Whereas Google has an attestation verifier service that
>     generates an EAT with its own claims bound to an OIDC token (for the
>     Confidential Space product), we'd like to use more standard claims,
>     like AMD SEV-SNP measurement, Intel TDX MRTD, etc. Azure's
>     attestation service has their own x-ms-* extensions for this that
>     will hopefully help AMD and Intel align on how claims should be
>     proposed for the CoRIM format.
>      >>>
>      >>> Supposing we do get profiles from Intel and AMD for their CVM
>     attesting environments (more below), those environments sign quotes
>     / attestation reports that serve as evidence for the claims defined
>     in those profiles.
>      >>>
>      >>> I as a Reference Value Provider want to be able to provide a
>     document that says something that covers 1 and 2 up front like, "if
>     your AMD measurement is contained in {x, ...} or your TDX
>     measurement is contained in {y, ...}, then you're running
>     Google-authentic virtual firmware with security version n. The
>     firmware this measures can be found at z".
>      >>>
>      >>> My understanding of how to do this is for the firmware CoRIM to
>     have a single CoMID tag and the SLSA provenance linked from
>     dependent RIMs.
>      >>> The CoMID tag will have lang: en-us, tag-identity: some-uuid we
>     generate before signing, and triples-map containing some reference
>     triples.
>      >>> We have reference triples for both AMD and TDX by using
>     different environment-maps with different class fields.
>      >>> AMD SEV-SNP's class is up to AMD to profile, but let's just say
>     it's a class-id for the VCEK extension oid prefix
>     1.3.6.1.4.1.3704.1.1. The measurement-map for this can have an mkey
>     or not. If we had one, I'm unsure if it's something that Google
>     would define or if it's still up to AMD. If Google, we could use a
>     uuid that stands for Google Compute Engine?
>      >>> The mval as a measurement-values-map would then contain our AMD
>     firmware svn, and AMD profile-specific claims, but I think we'd just
>     give the measurements and some form of acceptable policy
>     specification. We just have one guest policy we apply everywhere,
>     but if that changes we probably need the AMD profile to have
>     expressions like ranges, lower- and upper-bounds for policy components.
>      >>> For Intel, they'd need a similar profile for the TDREPORT
>     components as claims.
>      >>>
>      >>> I say measurements and not measurement even though we're
>     talkabout about a single firmware binary because both AMD and TDX
>     can have multiple measurements based on the VM construction, such as
>     how many vCPUs it launched with (AMD has VMSAs and Intel has TDVPS).
>      >>> For now our security version number matches what we measure as
>     EV_S_CRTM_VERSION in PCR0, but that may change if there are
>     technology-specific changes.
>      >>>
>      >>> As far as I understand, the Intel profile for CoRIM only
>     supports the boot chain up to the quoting enclave (QE) in terms of
>     its TCB version, but the profile does not describe the QE as its own
>     attesting environment for SGX enclave or TDX VM. The attesting key
>     is generated in the QE and is signed by the PCE's hold on the PCK,
>     which is per-machine-per-TCB (ppid + pceid). The quote wraps around
>     the attesting key's signature for verification against their
>     non-x.509 format.
>      >>>
>      >>> AMD similarly does not have a profile for the SNP firmware as
>     an attesting environment for an SEV-SNP VM.
>      >>>
>      >>> # Evidence Appraisal
>      >>>
>      >>> Setting aside evidence formats, I want to really understand how
>     we go from a signed CoRIM and a CVM attestation to an attestation
>     result (which I'll handwave is some JWT representation of the
>     accepted claims).
>      >>>
>      >>> We somehow get the VCEK or PCK certificate and attestation
>     report / quote, and the Google firmware CoRIM to the verifier. The
>     verifier can verify the evidence back to the manufacturer with this
>     forwarded (or cached) collateral and introduce every quote/report
>     field as claims of the target environment.
>      >>> Let's say Google's code signing root key is in the trust
>     anchor, so any CoRIM we sign is trusted.
>      >>>
>      >>> If I read the CoRIM document about matching reference values
>     against evidence, the document starts talking about conditional
>     endorsements instead, which are a different triple from
>     reference-value-triples. We discussed a little in the Github issues
>     that reference values are a special kind of endorsement, but it's
>     still jarring. It goes on to say that reference-value-triples is
>     essentially redundant with the conditional-endorsement-triples, but
>     you can use either. Then there's "In the reference-triple-record
>     these are encoded together. In other triples multiple Reference
>     Values are represented more compactly by letting one environment-map
>     apply to multiple measurement-maps."
>      >>>
>      >>> It seems "Conditional Endorsement" is philosophical, and
>     "conditional-endorsement-triples" is one implementation of the idea,
>     and "Reference Value" is philosophical, but
>     "reference-value-triples" is one implementation of the idea. Another
>     implementation of "Reference Value" as an mkey of a
>     "conditional-endorsement-triples", and the mval is more explicit
>     about what claims are introduced. For "reference-value-triples", I
>     don't see any explicit representation of a claim, rather,
>     reference-value-triples lead to "authorized-by" getting added to
>     fields of an Accepted Claim Set entry which itself is only a
>     conceptual type to help understand appraisal, but not an actual
>     claim itself–is this where a profile-defined claim needs to clarify
>     meaning? I see this authorized-by as conceptually different from the
>     optional field of a measurement-map, since that is from the CoRIM
>     that I've signed and isn't part of an attestation result representation.
>      >>>
>      >>> If I'm looking at a JWT with an AMD profile claim about the
>     measurement value, I'd like another claim that the measurement value
>     is signed by Google, or a stronger claim that the measurement value
>     was signed by a trusted source, and the build provenance is [some
>     google URL to the SLSA provenance].
>      >>> Again though, if at all possible these claims should appeal
>     more broadly than just Google.
>      >>>
>      >>> --
>      >>> -Dionna Glaze, PhD (she/her)
>      >>> _______________________________________________
>      >>> RATS mailing list
>      >>> RATS@ietf.org <mailto:RATS@ietf.org>
>      >>> https://www.ietf.org/mailman/listinfo/rats
>     <https://www.ietf.org/mailman/listinfo/rats>
>      >
>      >
>      >
>