Re: [Rats] TPM background for RIV

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Tue, 25 August 2020 21:01 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33F253A0BE0 for <rats@ietfa.amsl.com>; Tue, 25 Aug 2020 14:01:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.803
X-Spam-Level:
X-Spam-Status: No, score=0.803 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id leobNF9T2NBr for <rats@ietfa.amsl.com>; Tue, 25 Aug 2020 14:01:24 -0700 (PDT)
Received: from mail-ej1-x62d.google.com (mail-ej1-x62d.google.com [IPv6:2a00:1450:4864:20::62d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30D943A0BDF for <rats@ietf.org>; Tue, 25 Aug 2020 14:01:24 -0700 (PDT)
Received: by mail-ej1-x62d.google.com with SMTP id d11so18164521ejt.13 for <rats@ietf.org>; Tue, 25 Aug 2020 14:01:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=UQBRRhAnKhQh6XncAkArQrB2K29meIbArT0QKLc/oe0=; b=chVMj6JIyKBfqideEE2iLAnV4OTiTbbvPjXq2W+KzFPNYTuwFBZJ0ZxA/CfInqRj+s dIVMgyjWJIk4WfdJJ38h2vnnGuJuXx9lG6uAwQdWMXDR9l2NCU9eiaSaEtv9z7Ybmgqa TYBUDhObGXXhfIP6S1TnwszISnK2ekek9T2jeU8XS/1zOp1gWMnnZGgfg206hPkCePc0 FzifvBF4ntsaWD+l/DCmF+KFhN23Cjs8h7kA282knIHMzj45x9/WYSlLpwKM+4c8rdze MUWVmLYSY/xV4G31KmktPKRTb81x486oeKFWUfyEbY3LW718ZryxzvZnEXwtBZmrGFoP k2zg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=UQBRRhAnKhQh6XncAkArQrB2K29meIbArT0QKLc/oe0=; b=c4xDz+2BgpaZA8QSxgVp6b4zS7kFN8w1O7aP4dJ31bTMIbdH91RjSUyywd6K+7o88n Swqv3m1BKVWqmc7GQutn5BFwfGts+DI7fgqCCn/zQF40VEwNNlX4RLHOIvRpeH0fDWea qUs1Ux2fLOBDzcwH2st9QFW8ZgjAjkUh7sgHc9lbH8R10kIzV+xYpOSrN31TeE0JJ1k/ LbdnlK/SN0+g/WHHJ2VKTJnQ04rpC/PkEYNCeB8jdJTq1qyfra20Knb0ZQtmaHDJNFVG kKCXDstHM5Lbs0+RGZgdeg3nPkZANTx+jMGQ0UQ3Mf6MFcCiX7BRHE6B+qQpdQOktGfi ORuA==
X-Gm-Message-State: AOAM530tY+DRQj8PWMi0KEwqgGvUqKdrssfw5r+aG4zsdAPgv1CgTVbB p3AAFaoIs4sreI/u/Q+aSMmw9F2XtSQ7n/kUocI=
X-Google-Smtp-Source: ABdhPJy/fHO75tNPmSsYBFgBA645OLrzdk2ob/n02ExrEP6gS2YlgNrTuzhI/u7JPxJrAIhgu2ZaWDxtGrC1gyVBMMc=
X-Received: by 2002:a17:906:1a07:: with SMTP id i7mr8047649ejf.122.1598389282679; Tue, 25 Aug 2020 14:01:22 -0700 (PDT)
MIME-Version: 1.0
References: <DM6PR05MB6889971FB32A359EFFF85D21BA570@DM6PR05MB6889.namprd05.prod.outlook.com> <BL0PR2101MB1027C26AA6CA901A4CAE5F43A3570@BL0PR2101MB1027.namprd21.prod.outlook.com>
In-Reply-To: <BL0PR2101MB1027C26AA6CA901A4CAE5F43A3570@BL0PR2101MB1027.namprd21.prod.outlook.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Tue, 25 Aug 2020 17:00:46 -0400
Message-ID: <CAHbuEH488GZVRN1A=oRXjMZK8zv9ztWe9NFmQNkQtwwe=DonnQ@mail.gmail.com>
To: Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>
Cc: Guy Fedorkow <gfedorkow=40juniper.net@dmarc.ietf.org>, "rats@ietf.org" <rats@ietf.org>, "Jessica Fitzgerald-McKay (jmfmckay@gmail.com)" <jmfmckay@gmail.com>, "Eric Voit (evoit)" <evoit@cisco.com>
Content-Type: multipart/alternative; boundary="0000000000006832a905adba01c9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/yxqbX5GGJU8XS4tetch959GzSxs>
Subject: Re: [Rats] TPM background for RIV
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Aug 2020 21:01:26 -0000

To me as well.  Which reference can I use to look at the formats for TPM
attestations?

Thanks,
Kathleen

On Tue, Aug 25, 2020 at 4:53 PM Dave Thaler <dthaler=
40microsoft.com@dmarc.ietf.org> wrote:

> That looks like a great improvement to me.
>
>
>
> Dave
>
>
>
> *From:* RATS <rats-bounces@ietf.org> *On Behalf Of * Guy Fedorkow
> *Sent:* Tuesday, August 25, 2020 12:16 PM
> *To:* rats@ietf.org
> *Cc:* Jessica Fitzgerald-McKay (jmfmckay@gmail.com) <jmfmckay@gmail..com>;
> Eric Voit (evoit) <evoit@cisco.com>
> *Subject:* [Rats] TPM background for RIV
>
>
>
> A recent reviewer of the RIV document (that would be a RIViewer) pointed
> out that the doc assumes that the fundamental behavior of a TPM for
> attestation is already well known by the reader.  Of course that may not be
> the case.
>
>   Rather than add more tutorial material to be body of the document, I’d
> like to suggest adding the following subsection to the existing appendices,
> with cross references in a couple places in the doc.
>
>   Let me know if this looks like it would be helpful to new readers.
>
>   Thanks
>
> /guy
>
>
>
>
>
>
>
> *Appendix
>
>
>
> **Using a TPM for Attestation
>
>
>
>   The Trusted Platform Module and surrounding ecosystem provide three
> interlocking capabilities to enable secure collection of evidence from a
> remote device, Platform Configuration Registers (PCRs), a Quote mechanism,
> and a standardized Event Log.
>
>
>
>   Each TPM has at least sixteen PCRs, each one large enough to hold one
> hash value (SHA-1, SHA-256, and other algorithms can be used for this
> hashing depending on TPM version).  PCRs can’t be accessed directly from
> outside the chip, but the TPM interface provides a way to “extend” a new
> security measurement hash into any PCR, a process by which the existing
> value in the PCR is hashed with the new security measurement hash, and the
> result placed back into the same PCR.  The result is a composite
> fingerprint of all the security measurements extended into each PCR since
> the system was reset.
>
>
>
>   Every time a PCR is extended, an entry should be added to the
> corresponding Event Log.  Logs contain the security measurement hash plus
> informative fields offering hints as to what event it was that generated
> the security measurement.  The Event Log itself is protected against
> accidental manipulation, but it is implicitly tamper-evident – any
> verification process can read the security measurement hash from the log
> events, compute the composite value and compare that to what ended up in
> the PCR.   If there’s a discrepancy, the logs do not provide an accurate
> view of what was placed into the PCR.
>
>
>
>   The TPM provides another mechanism called a Quote that can read the
> current value of the PCRs and package them into a data structure signed by
> an Attestation Key (which is private key that is known only to the TPM).
>
>
>
> The Verifier uses the Quote and Log together.  The Quote, containing the
> composite hash of the complete sequence of security measurement hashes, is
> used to verify the integrity of the Event Log.  Each hash in the validated
> Quote can then be compared to corresponding expected values in the set of
> Reference Integrity Measurements to validate overall system integrity.
>
>
>
>   Information about PCRs and Quotes can be found in {{TPM1.2}} and
> {{TPM2.0}}.  Although there are several log formats, an example can be
> found in {{XX}}
>
>
>
>
>
> Juniper Business Use Only
> _______________________________________________
> RATS mailing list
> RATS@ietf.org
> https://www.ietf.org/mailman/listinfo/rats
>


-- 

Best regards,
Kathleen