Re: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)

Giridhar Mandyam <mandyam@qti.qualcomm.com> Sat, 04 June 2022 15:33 UTC

Return-Path: <mandyam@qti.qualcomm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 135A3C159486 for <rats@ietfa.amsl.com>; Sat, 4 Jun 2022 08:33:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level:
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=qti.qualcomm.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xqMFjBR9TPJR for <rats@ietfa.amsl.com>; Sat, 4 Jun 2022 08:32:59 -0700 (PDT)
Received: from esa.hc3962-90.iphmx.com (esa.hc3962-90.iphmx.com [216.71.140.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE067C14F73B for <rats@ietf.org>; Sat, 4 Jun 2022 08:32:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qti.qualcomm.com; i=@qti.qualcomm.com; q=dns/txt; s=qccesdkim1; t=1654356779; x=1654961579; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=NEw9jvQEidj2bR3TAa/6GCF1GHptF1CQ3M+dempTRtk=; b=VXmq/DP/mwAamnZXMAX35B4z2FRYjYb3boYButjLtrZbr5zH0VgS5KtF y/KwlTwlygBlYrbf+H7fEJZfpy3OwRTZniQJHUIpF7A87drvDahmDECWN oL4EbN/PZ30wiXAyAXMCgMF4TEOLCsGpDQahJpv4GTZMqm12KpH8rTvnM A=;
Received: from mail-bn7nam10lp2109.outbound.protection.outlook.com (HELO NAM10-BN7-obe.outbound.protection.outlook.com) ([104.47.70.109]) by ob1.hc3962-90.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Jun 2022 15:32:57 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dJqB0QiKu2dSbNvmD1XgtG0711U/FxZiAmNBkWymAZOBhPJEMBecVssa4T4lZ4cxfU64MXYTmnc4us5J+SaR930Qej4pdGrf3Moig4LD5bSSoDBxISpHpY5jQfVD7bnh6H65z5alip7Vdx0/2G6LnP+r/xNG4PHiMQsZ9ADahpESSCKszvXgoRl+EO8eJ8ejGRWFlnVGBCC4/NWFkNzd3YFOaqJnFsc6lTjKFtPwqXIogEIkHMVYZrW8Z3LgQVTCRuDUDZcQANUx1ODb9l9mJY0HFzCEB/JbacPoKIDR7VCEck1CPJSrHjv/aJlyDKYVpvylxYh2y8D8b55Cxl1t7g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NEw9jvQEidj2bR3TAa/6GCF1GHptF1CQ3M+dempTRtk=; b=RS7kcazyypOu9QLCSHeHHeKZiZsVUqu07Ju78h4lgHAU7LdQvtZmZUQXXkh739oQLo6Yb5ZKw6tYV6RCQqQYLy2wxxURlZrwPsuRrug6ptwvSFVJRk0aGwHL9C5BLPFN3nFYqzi5qeha4cssMnoiDABjqFIzHLndPKUmxj88WkwxfW9XEEvxxqvJ7KNwOnl6VEBKSvZqSAWyF/RQhJt2Bbpt7yeuNKTTYzlPHyLrqXCK1FZma4mmWObSbZwOYI2SpLd7pksCqnSFKg3XDg+/xEUHBicg05IkdfMCPBAMK1Z6o+fj6Br1AHLKDTXcUUl158v6FSH+ccByHI0/3Z5fnA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=qti.qualcomm.com; dmarc=pass action=none header.from=qti.qualcomm.com; dkim=pass header.d=qti.qualcomm.com; arc=none
Received: from SJ0PR02MB8353.namprd02.prod.outlook.com (2603:10b6:a03:3e4::7) by CH2PR02MB6357.namprd02.prod.outlook.com (2603:10b6:610:7::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5314.17; Sat, 4 Jun 2022 15:32:53 +0000
Received: from SJ0PR02MB8353.namprd02.prod.outlook.com ([fe80::416:c75d:6a2a:9e19]) by SJ0PR02MB8353.namprd02.prod.outlook.com ([fe80::416:c75d:6a2a:9e19%4]) with mapi id 15.20.5314.018; Sat, 4 Jun 2022 15:32:52 +0000
From: Giridhar Mandyam <mandyam@qti.qualcomm.com>
To: "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)
Thread-Index: AQHYdfnhH+Yo1uYlM06yTBHRvLqR7K08VgYAgAAG1cCAAAmJgIAAEc0AgAAJ4ACAABVfAIABbA4AgAACgICAAA6qAIAAGBgAgAAGIPCAAABUQIABMY3A
Date: Sat, 04 Jun 2022 15:32:52 +0000
Message-ID: <SJ0PR02MB8353E9DA5528AFA663E130C981A09@SJ0PR02MB8353.namprd02.prod.outlook.com>
References: <45618431-7329-4F31-941F-A39BBC9D575F@cisco.com> <BYAPR11MB3125EB2DEC4CE5136AC903F9A1DF9@BYAPR11MB3125.namprd11.prod.outlook.com> <7FD4FE54-7A16-4E92-BDDC-878D726095E6@island-resort.com> <900bf8d8-0b00-cc98-fd82-786dc9c18901@sit.fraunhofer.de> <SJ0PR02MB8353B7216358275E4BF3923081DF9@SJ0PR02MB8353.namprd02.prod.outlook.com> <AB42EABD-FE7A-4DF0-8909-A6D304E292C5@intel.com> <BL0PR11MB3122AA0245129AAB021F0E5DA1DE9@BL0PR11MB3122.namprd11.prod.outlook.com> <c98b992b-5efb-d46f-81d5-d3711941dbb9@sit.fraunhofer.de> <B2C05847-4A5C-4179-AE00-A5F9BACC5121@island-resort.com> <PH0PR02MB725621CB633C322367FD4935F2DE9@PH0PR02MB7256.namprd02.prod.outlook.com> <SJ0PR02MB83536AE654BEDBAE653F803381DE9@SJ0PR02MB8353.namprd02.prod.outlook.com> <C0C0C756-214C-43C8-8EE2-AD4CFF71C0A0@intel.com> <SJ0PR02MB8353CC2F1A9D2BC089F6BBBD81A19@SJ0PR02MB8353.namprd02.prod.outlook.com> <C448C94A-72A2-4C9E-A932-E44EE3E29738@intel.com> <SJ0PR02MB8353F45B4569872BA596A23981A19@SJ0PR02MB8353.namprd02.prod.outlook.com> <BL0PR11MB31227B352C51D7E67D8315EBA1A19@BL0PR11MB3122.namprd11.prod.outlook.com> <BL0PR11MB3122896F67A5C6736CBBEB1DA1A19@BL0PR11MB3122.namprd11.prod.outlook.com>
In-Reply-To: <BL0PR11MB3122896F67A5C6736CBBEB1DA1A19@BL0PR11MB3122.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=qti.qualcomm.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a0195501-a629-4ad3-92cd-08da463f7d6d
x-ms-traffictypediagnostic: CH2PR02MB6357:EE_
x-microsoft-antispam-prvs: <CH2PR02MB635785FFA1B48E09920015B981A09@CH2PR02MB6357.namprd02.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR02MB8353.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(7696005)(316002)(38100700002)(6506007)(9686003)(86362001)(71200400001)(53546011)(508600001)(15650500001)(966005)(6916009)(52536014)(76116006)(66476007)(66946007)(66446008)(66556008)(186003)(55016003)(8676002)(8936002)(2906002)(5660300002)(38070700005)(122000001)(64756008)(33656002)(26005)(83380400001)(15398625002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: qti.qualcomm.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR02MB8353.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a0195501-a629-4ad3-92cd-08da463f7d6d
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jun 2022 15:32:52.7240 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 98e9ba89-e1a1-4e38-9007-8bdabc25de1d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: hk7wyx7RMMlaxDjUahriHG1NQXiHJPYZlXB7DRvl2p5BTw4gydtv2QDa8tG7/7I0rJ6dKIuWMdYGhQK6AZLw5fg3PkDKpW9/hHWIcohX1ns=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR02MB6357
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/rVKNPqV43AWfd_Dtwb1_8zMXMio>
Subject: Re: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jun 2022 15:33:04 -0000

Thanks Eric and Ned.  I believe we are getting closer to a resolution, and I think that the source of varied opinions on the use of sec level is based on a difference in terminology between the ARM/RISC-V and TPM (x86) worlds.  

Note that other SDO's such as FIDO which make use of remote attestation don't even use the term endorsement except in the context of TPM (specifically EK in https://www.w3.org/TR/webauthn-2/#sctn-defined-attestation-formats).  In-band transmission of cert-chains (e.g. x5c in https://www.w3.org/TR/webauthn-2/#sctn-packed-attestation) may constitute an endorsement, but I personally did not make such a correspondence until endorsement was defined in the RATS arch. doc, but the FIDO specs pre-dated the RATS work.

Let me see if I can summarize what is being suggested, and see if there is agreement.

a) Sec level is an endorsement.  The claim name and standard text should need to be modified to indicate this clearly.

b) Sec level can be sent in the context of the attestation token.  Note that this is important, as with some EAT deployments that I have worked on there is no easy way for a verifier to obtain the endorsement other than in-band.  Moreover, data efficiency is important (particularly for power-limited attesters) and therefore one-shot attestation and verification is a requirement (i.e. it should not take 2 separate token transmissions for the verifier to obtain the endorsement from the device).

Now to where there may be a difference in understanding:

> There is also the issue of ensuring that an indirectly provided Endorser claim is legitimately bound to the exact type of Attester making parallel EAT 
claims.  So both sets of signed Evidence would need to include information that can be assessed to evaluate whether the relationship between the two signed blobs is legitimate.

I think the sec level claim can be signed along with other attestation evidence claims by the attestation keypair.  It does not need to be signed separately and with a manufacturer keypair.  This is because the manufacturer in all likelihood is the CA, and therefore the cert chain that corresponds to the attestation keypair is already signed using the manufacturer root.  In other words, the relationship requirement as stated above should be met.  If an RP requires a 3rd-party endorsement for the level of security assurance provided by the entity, then they can ignore this claim as part of their appraisal policy.    

I would also note that by signing with the attestation keypair that anti-replay protection is possible (which may be important for endorsements depending on appraisal policy).  I don't see a similar protection in https://trustedcomputinggroup.org/wp-content/uploads/IWG_Platform_Certificate_Profile_v1p1_r19_pub_fixed.pdfm but it might be there.

-Giri



-----Original Message-----
From: Eric Voit (evoit) <evoit@cisco.com> 
Sent: Friday, June 3, 2022 2:37 PM
To: Giridhar Mandyam <mandyam@qti.qualcomm.com>; Smith, Ned <ned.smith@intel.com>
Cc: rats@ietf.org
Subject: RE: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)

> From: Giridhar Mandyam, June 3, 2022 4:56 PM
~
> So does this mean that security level as an EAT would be OK if conveyed as a
> X.509 and signed by a manufacturer key that is distinct from the attestation 
> key?

As this is just an indirect way of getting the information from an endorser, 
this would be fine.   I would prefer the more accurate name of 
"endorsed-security-level" to make it completely clear to a Relying Party that 
such a claim cannot come from Attesters or Verifiers.

> Note that  the EAT attestation key itself can be signed by the manufacturer
> already (see https://datatracker.ietf.org/doc/html/draft-ietf-cose-x509-08).

There is also the issue of ensuring that an indirectly provided Endorser claim 
is legitimately bound to the exact type of Attester making parallel EAT 
claims.  So both sets of signed Evidence would need to include information 
that can be assessed to evaluate whether the relationship between the two 
signed blobs is legitimate.

Eric