Re: [Rats] [Teep] EAT claims needed by TEEP

Henk Birkholz <henk.birkholz@sit.fraunhofer.de> Thu, 11 November 2021 13:01 UTC

Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A21F13A0FCD; Thu, 11 Nov 2021 05:01:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.028
X-Spam-Level:
X-Spam-Status: No, score=-5.028 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-3.33, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=fraunhofer.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MuMTGzhKpInx; Thu, 11 Nov 2021 05:01:49 -0800 (PST)
Received: from mail-edgeS23.fraunhofer.de (mail-edges23.fraunhofer.de [153.97.7.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 833D63A0FCC; Thu, 11 Nov 2021 05:01:47 -0800 (PST)
IronPort-SDR: fIPxFGhbKCl9hpQdW7OvCg50SgeDxgObqU9yRZ6a8L4AW9PFW0FhMol3adVQLVceHsV8398U9t pbPXhzxLAa2Q==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:y78WkxZhIogQJPtkEwGlaO7/LTAhhN3EVzX9orIriLNLJ6Kk+Zmqf EnS/u5kg1KBW4LHo+lFhOzbv+GFOyQA7J+NvWpEfMlKUBkI2skTlhYrVciCD0CzJfX2bis8S cJFUlIt/3yyPUVPXsjkYFiHuXyuqzAIEwj5NQ17K/6zFoOB5/k=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.87,226,1631570400"; d="scan'208";a="33305902"
Received: from mail-mtaka28.fraunhofer.de ([153.96.1.28]) by mail-edgeS23.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Nov 2021 14:01:18 +0100
IronPort-SDR: zPALyyng3n6Qvyd44IuKwALPXy6lcxZ3JAu1Jac5jDaCJN73YoqLTg8stPRzTv5SeRIYnPBFto GcKqURlKEpVHy5iz6VeGT45YqFBpR7Jelno//oli+fb297V8Z1zZ8QmjX2PAxyEV72zHG4Z3q4 aI/o52WrxLzTYgt/jgXImGb0wET31ux/Raa+1zIjFdK1LIangKQcTwF6bcXcjbi5LW1oARlcPg LCOhMrzWfe5Veap/j8VjrNrBv3xUEtpcRIELCFPv4C/3yih8jzdu9Iub9c4UUZdz3h+AbL/Co8 r4kle2MyysEJVkOQM+tc/qZu
X-IPAS-Result: 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
IronPort-PHdr: A9a23:Euvl/RZUBhYO9iFj6WFcsyv/LTAhhN3EVzX9orIriLNLJ6Kk+Zmqf EnS/u5kg1KBW4LHo+lFhOzbv+GFOyQA7J+NvWpEfMlKUBkI2skTlhYrVciCD0CzJfX2bis8S cJFUlIt/3yyPUVPXsjkYFiHuXyuqzAIEwj5NQ17K/6zFoOB5/k=
IronPort-Data: A9a23:ayVQiax8RvOJ5BN0dDN6t+cPwCrEfRIJ4+MujC+fZmUNrF6WrkUHm mtOWW/VOPbbYDf8eN4ibtm+8xtQvcTQyIcwGwdtpFhgHilAwSbn6Xt1DatQ0we6dJCroJdPt p1GAjX4BJlvCCKa+n9BC5C5xZVG/fjgqoHUVaiUZUideSc+EH140Es6wrZg6mJVqYHR7z2l6 YuaT/L3ZQfNNw5cagr4PIra9XuDFNyr0N8plgRWicJj5TcypFFJZH4rHpxdGlOjKmVi8k5Wc M6YpF2x1juxEx7AkbpJmJ6jGqEBaua60QRjFhO6VoD66iWuqBDe3Y5iLvUtSm5LqAynnu0pw 8lJjY6KZQsma/ikdOQ1C3G0Egl7OqdH/LKBLGi0sYqd1UTbdXvrzfh0Sk07VWEa0r8qWicfq rpBd25LMErra+GemNpXTsFsi8IgasPqJoAfvXVy5SrYEbAoW5neRaXN69JCmjs97ixLNamEP 5JAMGUyBPjGSyx+FWUONqIhpdv2nGH6aARbhQO5goNitgA/yyQrieO0a4qEEjCQfu1Pl1qDj mPL42q/BQsVXPST1TqM9n+2rurOljn8Q4UcCPuz8fsCqEGey3Q7CRAKWx28u/bRoku1QZFeJ lAa0jEnq6Q/8EmiSJ/2VnWQpHGAlh8HX9NWH6gg5RqK0LaS6AGcbkAGSTJGbtsptOcvWT1sz 0KAm9juADkpu7qQIU9x7Z/N8Gj3aHdQdDBcIHFeCxUApdKlrps6kxTPSdhuCui5g7UZBA0c3 RjTticPpJwPrvcl1pjj9kzDuyCWipTGG1tdChrsYkqp6QZwZYiAboOu6ETG4fsoEGp/ZgTf1 JTjs5TPhN3iHa1hhwTQGb9cTerBC+KtYWGN2AYH84wJrWz1k0NPa7y89xlSCS9U3issIGKyJ R6M/FoOutoNZj20aOl8JYyrAtksza/uGM6jWv28gjtyjnpZKlPvEMJGPxX4M4XRfK4Ezf5X1 XCzLZ7EMJriIf47pAdavs9EuVPR+ggwxHnIWbfwxAm93LyVaRa9EOlebgbQP7hhtPnb/m05F uqz0ePVlX2zt8WhO0HqHXI7dghTRZTGLcCv8JAOKrLrzvRORDh9UaC5LUwdl3xNxf0Oz7yYr xlRq2dUxUfjnnbHJB7CZHd5c7jvQJBwtnQ2IT5EALpb8ydLXGpb149GL8FfVeB+rIRLlKcoJ 9FYKp7oKqkeFVzvpW9HBbGj99MKSfherV/XV8ZTSGNnL8AIqs2g0oKMQzYDAwFSVHfq7pVn/ OX7vu4ZKLJaLzlf4A/tQKrH5zuMUbI1wb4as5LgLoYBdUPy3pJtLiCt3PY7L9tVdkfYxyfc2 RyfHBEYoufAuck5/YCR16yDqo6oFcp4H1ZbRjWKs+zpaHOCpmfzk5VdVOuofCzGUD2m8quVZ dJTk6P2PsoBkQsYqIF7Cbtqkfkz6oK39b9XxwhpBlvRaFGvBu8yK3WKx5AQ5LZM2vlXowKrX EKI9NRAf7mEYZu3HFkULQsjT+KCyfBNxmiMt6toeh2i6XYurrSdUEhUMx2dswBnLeN4YNE/3 OMsmM8K8Ajh2BAkBdaxiHwG/Wq7KHFdAb4ssYsXAdOwhwcmlgNCbJjbBnOk6Z2DcY8RYEwtK D6QiezPl79cgETYemc1FX/D0PAbiZlX4EJGy1oLJlKonNvZh6ZrjUMLrmltFlxYnkddzuZ+G ml3LEkpd6+AyDFl2ZpYVGe2FgAdWRCUph7rx10SmDGLRkWkTDeXfjRgYqPcowVArDwZIGId4 rTewyDrSz/3esH20CYoH0Jo8qSxQdt0/wzEucamA8XcQ8hkO2W42Pf2aDpasQbjDOMwmFbD+ btg8tF2ZPCpLiUXuaA6V9SX2Ll4pMpo/4CerSyNJJ80IFw=
IronPort-HdrOrdr: A9a23:8FAut67iQuKmim1HXgPXwV+BI+orL9Y04lQ7vn2ZFiY7TiXIra yTdaoguCMc6AxxZJkh8erwXJVoMkmsiaKdhrNhQotKPTOWxVdASbsN0WKM+UyZJ8STzJ866U 4kSdkFNDSSNykLsS+Z2njALz9I+rDum8rJ9ISuvEuFDzsaDJ2Ihz0JezpzeXcGJjWua6BJca Z0qvA33AZJLh8sH7qG7zQ+LqT+T5qhruOQXTc2QzocrCWehzKh77D3VzCewxclSjtKhZMv63 LMnQDV7riq96jT8G6T60bjq7Bt3PfxwNpKA8KBzuATNzXXkw6tIKBsQaeLsjwZqPymrHwqjN 7PiRE9ONkb0QKfQkiF5T/WnyXw2jcn7HHvjXeenHvYuMT8AAk3DsJQ7LgpOSfx2g4FhpVRwa hL12WWu958FhXbhhnw4NDOSlVDile0iWBKq59Rs1VvFa8lLJNBp40W+01YVL0aGjjh1YwhGO 5ySOnB+fdtd0+AZXyxhBgu/DWVZAV3Iv66eDlHhiTMuAIm20yRjnFohfD3p01wtq7UEPJ/lq L52qcBrsAHciZZV9MlOA47e7rDNoX6e2OEDIujGyWUKEg5AQO4l3fW2sR+2Aj4Qu1E8HMN8K 6xJm+w81RCI37TNQ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.87,226,1631570400"; d="scan'208";a="72001175"
Received: from 153-97-176-62.vm.c.fraunhofer.de (HELO mobile.exch.fraunhofer.de) ([153.97.176.62]) by mail-mtaKA28.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Nov 2021 14:01:14 +0100
Received: from XCH-HYBRID-01.ads.fraunhofer.de (10.225.8.57) by XCH-HYBRID-01.ads.fraunhofer.de (10.225.8.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.858.15; Thu, 11 Nov 2021 14:01:14 +0100
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (10.225.8.37) by XCH-HYBRID-01.ads.fraunhofer.de (10.225.8.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.858.15 via Frontend Transport; Thu, 11 Nov 2021 14:01:14 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Lne46GPlxYUyXhp+ETU9bmpCUucvQF3sKXLUxPl2YqH6yLrCW6HeFB8oYp+9atpe6rCmepSf9MFZulDROgAdiMWLlxQNRs03u8q/7bGSyeQdrU3fT9GT8M02J1WBletLntZzDvwGaKo6mPcweM4A1NRf3vSntQyMzb/diGqY75m5eUFDyCs6e+H9BB5yNZzyUMIRuxwuT3ICXXrGIi20jfHMN14jN8p0oCr9PohTp8Clr/i07erp6Zx7Henk63fKfXcb6yqVcxqAXUQroz33nVZb0W9Lj7zYVRl+fgcztV4qMAvoe09VG2CrjOL88wirnSMKW1eavlPlBeqeVhoXIA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RMSiBrUKrsMdBUaL1qhSyaUX3ErUIqa2iOiqs+6UTwI=; b=fs7X+kaoJZWwHaPly+m0REoJh6u8oC5RzmCQ+hMW8+dN2Bm9RX6/z2XE6zsvfjanWzKJlaaW5f8poi4hUSUzqgcksU10hO7pWt985cBJ6EiMVVenFBI5DujFLOEQzDFlripgQT1h9FZOJVaPrwj5GW33nKMFKiBNxzn2NDRCeehSMn2XgEbrFZaiP5AuDp8eL+DYq89UUrT5jCLHolVEP7sNVi0fYTh/UwXeYtjc4OqV7A5f2NPtuR1JMtLjsQZIfOej0qxievKSzRpmMRy2RWeE9OCdO6oPXWG3X1VOtoMA104cg+FxitUq+VA6PXhRPVjCCKaT/6Zw4iX+luCFsw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RMSiBrUKrsMdBUaL1qhSyaUX3ErUIqa2iOiqs+6UTwI=; b=R+miTwWI5504pSIA7XZjrZaQos1+EXbb7Te0e0CEiXrJCFk1aqgEU3PzDlfCna/BLF3SK1Z3w9y5t9KcgiLhGzWfN7yRMHt/X9PZYhpUuE7foPeb48JJk8GfeR5gNpracDwYVhJDooXXIdKjB+40qFrPV/lopSPR0VpxGnB5pw0=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=sit.fraunhofer.de;
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) by DBBP194MB1179.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:1e9::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4690.16; Thu, 11 Nov 2021 13:01:08 +0000
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::6886:56ac:1f26:7706]) by DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::6886:56ac:1f26:7706%8]) with mapi id 15.20.4669.016; Thu, 11 Nov 2021 13:01:07 +0000
To: Jeremy O'Donoghue <jodonogh@qti.qualcomm.com>, Brendan Moran <Brendan.Moran@arm.com>, Laurence Lundblade <lgl@island-resort.com>
CC: Michael Richardson <mcr+ietf@sandelman.ca>, teep <teep@ietf.org>, Dave Thaler <dthaler@microsoft.com>, "rats@ietf.org" <rats@ietf.org>
References: <BL0PR2101MB102770B8E03B95A44497004CA3190@BL0PR2101MB1027.namprd21.prod.outlook.com> <2D53BD60-4FA8-4153-B28B-585E902845AE@island-resort.com> <AM6PR08MB423141370A5CE9DEF6C732C69C140@AM6PR08MB4231.eurprd08.prod.outlook.com> <3370D92E-23C2-41C3-B86F-A65C168E9082@island-resort.com> <AM6PR08MB42311D76B24E866812171BDC9C140@AM6PR08MB4231.eurprd08.prod.outlook.com> <CH2PR21MB14640330E3DA58D2144659F7A3919@CH2PR21MB1464.namprd21.prod.outlook.com> <C9FCDB94-1734-4F6C-B6D9-DDB384827E06@island-resort.com> <CH2PR21MB146427B07435A5F36DAE5782A3919@CH2PR21MB1464.namprd21.prod.outlook.com> <27150.1636465193@localhost> <A40BE985-E12E-4B5E-8995-F4408134AEE4@island-resort.com> <398725.1636575788@dooku> <CH2PR21MB14646282D207490FD0C6D69BA3939@CH2PR21MB1464.namprd21.prod.outlook.com> <43D84D56-26B1-4726-A3AC-E918071592BB@island-resort.com> <EF42F5C1-91CC-4965-ABEF-FEDDE04454BF@arm.com> <PH0PR02MB72563446B396CC589FAC710AF2949@PH0PR02MB7256.namprd02.prod.outlook.com>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Message-ID: <7ac10246-cc27-d564-609b-bf4ee034eae9@sit.fraunhofer.de>
Date: Thu, 11 Nov 2021 14:01:05 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0
In-Reply-To: <PH0PR02MB72563446B396CC589FAC710AF2949@PH0PR02MB7256.namprd02.prod.outlook.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: AM6P194CA0064.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:84::41) To DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9)
MIME-Version: 1.0
Received: from [192.168.16.50] (79.206.148.28) by AM6P194CA0064.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:84::41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4690.18 via Frontend Transport; Thu, 11 Nov 2021 13:01:07 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 21815bf0-ce7c-46eb-59d8-08d9a51353b9
X-MS-TrafficTypeDiagnostic: DBBP194MB1179:
X-LD-Processed: f930300c-c97d-4019-be03-add650a171c4,ExtAddr
X-Microsoft-Antispam-PRVS: <DBBP194MB1179AAFE637FAB257237295CA8949@DBBP194MB1179.EURP194.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:8882;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2P194MB1709.EURP194.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(366004)(83380400001)(4326008)(186003)(8676002)(66476007)(31686004)(86362001)(110136005)(6486002)(8936002)(956004)(508600001)(45080400002)(66556008)(52116002)(66946007)(53546011)(966005)(2616005)(82960400001)(2906002)(316002)(5660300002)(26005)(44832011)(16576012)(31696002)(54906003)(38100700002)(38350700002)(45980500001)(43740500002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: wzp84BpDFdoNmU3qB1QmxV7mCNxmD4uvld0r43E6hK1Oc3MI+v/YV0up4Zuj84S4oJzLdeKlHeUQiEj7hsB7DjsYaK1QAyQ+fwHtNjakMM5e8eyNuLHQ+k0H0D2qfS9nrCV8VK/gtFsPXaQtGUszp5zjB7u7oZNSuB2qkHsAJH9s6c2Faw/UiiFORbK57KwTCSfgdXcIPJLXFKv6VFo35BsRws320hkSG46enHPee31dhSEJ0ar0gX5jF3s4Rdj0pRv2/e1frZ432mIzCf2W+likPlG7XrPAC1ziVwYIa0K4ikYV4SZFNZkzNq+L1lL8K7UFWPmsrz0UQ2ve3QODvpsn1thayP4woWA3Mx/qeeUy/c5PwXvcqe3ivqdwmB+3aPS/lRsFpj4dZZEK9b02iuLTZGKpFr3a7TybpYp5sT8wfK2LMcZHHgA90sX57RTY18KriqdUmZ4MUkOZgTY21eKNw4JZIB6i3SF/GKifo0iH95R4ZwWyy5rY2g02J6etTS6pdT6xUoYQnCutn6uzy6ePk+CoaWst7ZKbPrFA6nNM6KN0vRzNrOsetXja68evAbqGUHOxAurX0n81WzE/mcecREvZN3cd65Pr32IbWprDmh3VUB/itr8y48Qear3aS9ci1GHgHPtlpAmdKgmJFBf/SxV1uyZJ1iZy0BzWRpf3FtdzcYpNLWaDOpvL8A839TkXOjQosrXIVqqqe2FQX5DvJsG1p6RAF1NZtiNFhw45HrUxF4D4n7WEfiNR3D29HbJVfBmATPe9oZaGjX7tZlOQqzxiAoqn9kDO1nzPUPgrawEHvRMqDcTdi5RS9/3JKyNdhirPPp7Ija2diMcj/XNAx2eMVTqSRFxZViX9YN6OyDqZ8HqIkhJG6ZFEs75MSUSQynVw2KG76Yb2vPL2mv9z/nSZu7vd50VS0YY5On8GQFFNfsyw1hcxCJEYMeEEhYlEpUYeY6sGMNwnHox9UoK2wtC5Za15SY6ZNbhA94UqjyvSW6L4r5caw3f8zCeL2tj7MdrATUavY1Lxwiqi/malQz4vySz5/FpwH4IfkV1GkndqJH/mElP0ZlMgSe0pk3p9KitDRabqeoKnE9VuVKir4ZNiiQBKDW1nGkH+XGc6KrJgJXQHqllDqImBGC8A3XqZoVAvFTj7pc5MC45mSEh7xsl/hYbdsQNrx0zfl/7APfqu6o1jfymiiCg2p7UXxNioulkQaUGVEGkyrnvd//9C0dbQvp7U8rjA0xgJoOsQIRPF06EgK2hQq8Y1kGSGTSWILEHdskpPpf/EIGkfrqMcMyfpofMX308EPAUr13YkvsJsaIznBgYlN3vp7BNzVQXOAEJjLP+tTsavEwd8aRVdh1gLUQDzlB1FzoxM1ZvwAMBBdzPPgd9fTq10YBfjQlemp0FEycQX249TECXqS24HZ1TzAoTjDfX3x6nRoQ9r4X9sKNJtrusVDySBQw2oSvbxrzHHwkj75MlJGkjvUvFTnq2jfrpDufAHVmRfbvnaZ9pNX6fN9YSD3/QqvfjYVeaqOTUpBgn6/PrJB1/S5lEiehQ2PrYkAzhQ5IM5Z/qfF3SGHk6AsDrQ+lBOX4zNX8qPeL2b7tKmbRLr94HoeSdnsDVGAqde1UR9bF5Kin0emr4tKUU6q2tSccXuWyuhTiT/1WQj1qiMgJLV1lDNEQ==
X-MS-Exchange-CrossTenant-Network-Message-Id: 21815bf0-ce7c-46eb-59d8-08d9a51353b9
X-MS-Exchange-CrossTenant-AuthSource: DU2P194MB1709.EURP194.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Nov 2021 13:01:07.8697 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: wF5qUZ5iL13EHWehfpf5DYXx9VCKbcTKVkaAYRuZil+9ysNWWeS7aUTD3k65zoqTkJGdAXxTnWGYg/ey+kD2Jgqbn+Y60Hdj2rPq7EsvFU4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBP194MB1179
X-OriginatorOrg: sit.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/x6QC2nedtvsYDR0u7oMbravTZYQ>
Subject: Re: [Rats] [Teep] EAT claims needed by TEEP
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Nov 2021 13:01:55 -0000

Thanks Jeremy for you thorough summary,

the extensible type-choice highlighted by Thomas - and extended by your 
proposal - is based on:

> https://github.com/ietf-rats/ietf-corim-cddl/blob/main/concise-mid-tag.cddl

To Brendan's point here:

> https://github.com/ietf-rats-wg/eat/pull/139#issuecomment-966230941

Trying to alter the semantics of SUIT-related information elements in 
order to generalize to a CWT Claim registry applicable scope might 
exceed feasibility. I am not against specifying a Claim with a string 
value that intends to identify a kind of hardware class in a given scope 
in the EAT I-D. But years ago (before chartering RATS) some decisions 
were made in EAT to work with a flat list of Claims and not a taxonomy 
of assertions, which now leaves us with the issue that we cannot cram 
all the semantics into a single Claim nor can we define subclass trees 
of assertions.

In summary, we can define a HW class Claim in EAT that uses a string 
value now and move forward. The other HW class identifiers can be 
handled by the corresponding documents where they are specified and 
used. Adding corresponding CWT Claims registry requests when these 
documents progress seems sensible to me.

What do others think?

Viele Grüße,

Henk

On 11.11.21 13:21, Jeremy O'Donoghue wrote:
> Almost every point that has been made is reasonable, but I think we are 
> typing to boil the ocean if we attempt to create a universal (or even 
> “very widely applicable” HW class in EAT). Unfortunately we also have 
> existing standards for HW where human readable strings form all/part of 
> a normative HW definition – I do not think it is reasonable to simply 
> disallow them, even if the approach is, as Brendan rightly states, not 
> ideal.
> 
> Since the thread started by stating that being able to attest a TEE is a 
> good idea, I will add that one relevant example where strings are used 
> in this way is the GlobalPlatform TEE Management Framework (and 
> GlobalPlatform OTrP management framework). These definitions cannot be 
> changed in a backward-incompatible way (GlobalPlatform interoperability 
> rules), so we are already in a position where what are almost certainly 
> the most extensively commercially deployed TEE management frameworks in 
> the world have a normative structure which employs strings (for those 
> interested the relevant claims are in sections 9.1.3, 9.1.4, 9.1.5 and 
> 9.1.6 of the GlobalPlatform TEE Management Framework)
> 
> To summarize what I have proposed in the PR 
> (https://github.com/ietf-rats-wg/eat/pull/139/commits/d4e19b4a091cbbd6f94545688e2d1fc33c39a136 
> <https://github.com/ietf-rats-wg/eat/pull/139/commits/d4e19b4a091cbbd6f94545688e2d1fc33c39a136>).
> 
>   * EAT should define two or three ways to encode HW class which are
>     known to be collision-resistant. Thomas Fossati has suggested OID,
>     UUID and URL in the PR, and this seems reasonable to me.
>   * EAT should allow profiles to extend the HW class type.
>       o My suggestion is that this pluggable type should be CBOR encoded
>         so that a verifier that does not know how to decode a particular
>         pluggable type can at least treat it is a somewhat-significant
>         stream of bytes.
>       o Further, plugable type SHOULD be used in conjunction with
>         profile claim
>       o Where pluggable type is used with profile claim, the combination
>         profile claim + bstr encoding of pluggable type SHALL uniquely
>         identify HW
> 
> I think this places us in a reasonable position from a standardization 
> perspective without trying to cover all bases, and remembering that 
> having a mechanism to enable EAT to be used with existing schemes that 
> may have infelicitous characteristics is a useful goal.
> 
> In CDDL my proposal looks like:
> 
> hardware-class-label => $hardware-class-type
> 
> $hardware-class-type /= tagged-oid
> 
> $hardware-class-type /= tagged-uuid
> 
> $hardware-class-type /= tagged-url
> 
> $hardware-class-type /= bytes .cbor pluggable-x-hw-class-type
> 
> Best regards
> 
> Jeremy
> 
> On 11/11/2021, 11:28, "TEEP" <teep-bounces@ietf.org> wrote:
> 
> *WARNING:*This email originated from outside of Qualcomm. Please be wary 
> of any links or attachments, and do not enable macros.
> 
> Strings are not the right choice for machine readable fields. There are 
> extremely good reasons not to use them. Please do not use strings for 
> model IDs.
> 
> When you have a string, it is inevitable that someone in marketing will 
> realise that it’s human-readable. The next step is that it must be 
> controlled to preserve brand image. When this happens, it is also 
> inevitable that *wildly incompatible hardware* with *the same function* 
> will be forced into the same “model number.”
> 
> By making model identification explicitly non-parseable by humans, we 
> prohibit its use as a controllable, human facing identifier. This 
> ensures that it has a better chance of being used correctly as a means 
> to distinguish between mutually incompatible versions.
> 
> Human readable strings used as machine-readable distinguishing tokens 
> are a bad idea. Don’t do it.
> 
> Brendan
> 
> 
> 
>     On 10 Nov 2021, at 21:25, Laurence Lundblade <lgl@island-resort.com
>     <mailto:lgl@island-resort.com>> wrote:
> 
>     An advantage of a string over a UUID is that it can be very short if
>     that’s all the OEM needs, “S”, “3, “X” and “Y” in the case of Tesla.
> 
>     LL
> 
> 
> 
>         On Nov 10, 2021, at 1:03 PM, Dave Thaler <dthaler@microsoft.com
>         <mailto:dthaler@microsoft.com>> wrote:
> 
>         If it's a string, I think it should be up to the vendor
>         specified by the oemid,
>         rather than by a vendor-agnostic profile.
>         If it's a UUID then that's not needed.
> 
>         Personally I would argue for treating it as opaque in either case
>         and a verifier should only compare it for equality, rather than
>         permitting
>         semantic structure in it.   That's because I think some hardware
>         implementation
>         may fillvin values that can be used for multiple profiles.
> 
>         Dave
> 
>         -----Original Message-----
>         From: RATS <rats-bounces@ietf.org
>         <mailto:rats-bounces@ietf.org>> On Behalf Of Michael Richardson
>         Sent: Wednesday, November 10, 2021 12:23 PM
>         To: Laurence Lundblade <lgl@island-resort.com
>         <mailto:lgl@island-resort.com>>;rats@ietf.org
>         <mailto:rats@ietf.org>; teep <teep@ietf.org <mailto:teep@ietf.org>>
>         Subject: Re: [Rats] EAT claims needed by TEEP
> 
> 
>         Laurence Lundblade <lgl@island-resort.com
>         <mailto:lgl@island-resort.com>> wrote:
> 
>             Appreciate the comments.  Think it is important to keep this
>             generic
>             since it is going in EAT. TEEP can have specific ways it
>             uses HW class,
>             but don't think we should be referencing TEEP in EAT.
> 
> 
>         Then I suggest that:
> 
>              "There is no global scheme or format for this claim."
>         ->
>              "The format for this scheme will need to be specified
>         within profiles that
>               use it."
> 
>         --
>         ]               Never tell me the odds!                 | ipv6
>         mesh networks [
>         ]   Michael Richardson, Sandelman Software Works        |
>         network architect  [
>         ] mcr@sandelman.ca
>         <mailto:mcr@sandelman.ca>https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.sandelman.ca%2F&amp;data=04%7C01%7Cdthaler%40microsoft.com%7C47461df1d4ae4c6cc7f208d9a487f27c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637721726675767230%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=%2BOIH8fZw6zju18DcoR9hQ4HkrtDsMkhTXwQTitkKsSQ%3D&amp;reserved=0
>         <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.sandelman.ca%2F&amp;data=04%7C01%7Cdthaler%40microsoft.com%7C47461df1d4ae4c6cc7f208d9a487f27c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637721726675767230%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=%2BOIH8fZw6zju18DcoR9hQ4HkrtDsMkhTXwQTitkKsSQ%3D&amp;reserved=0>       |
>            ruby on rails    [
> 
> 
>         --
>         Michael Richardson <mcr+IETF@sandelman.ca
>         <mailto:mcr+IETF@sandelman.ca>>, Sandelman Software Works  -=
>         IPv6 IoT consulting =-
> 
>     _______________________________________________
>     TEEP mailing list
>     TEEP@ietf.org <mailto:TEEP@ietf.org>
>     https://www.ietf.org/mailman/listinfo/teep
> 
> IMPORTANT NOTICE: The contents of this email and any attachments are 
> confidential and may also be privileged. If you are not the intended 
> recipient, please notify the sender immediately and do not disclose the 
> contents to any other person, use it for any purpose, or store or copy 
> the information in any medium. Thank you.
> 
> 
> _______________________________________________
> TEEP mailing list
> TEEP@ietf.org
> https://www.ietf.org/mailman/listinfo/teep
>