[sacm] [sacmwg/draft-ietf-sacm-coswid] addressed comments from Roman Danyliw (#44)

David Waltermire <notifications@github.com> Mon, 12 July 2021 13:20 UTC

Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C62B3A1736 for <sacm@ietfa.amsl.com>; Mon, 12 Jul 2021 06:20:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.651
X-Spam-Level:
X-Spam-Status: No, score=-6.651 tagged_above=-999 required=5 tests=[DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S66Pk-PRjM9q for <sacm@ietfa.amsl.com>; Mon, 12 Jul 2021 06:20:00 -0700 (PDT)
Received: from smtp.github.com (out-25.smtp.github.com [192.30.252.208]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 090153A1730 for <sacm@ietf.org>; Mon, 12 Jul 2021 06:19:59 -0700 (PDT)
Received: from github.com (hubbernetes-node-087297b.ash1-iad.github.net [10.56.116.34]) by smtp.github.com (Postfix) with ESMTPA id 282E9840A8D for <sacm@ietf.org>; Mon, 12 Jul 2021 06:19:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1626095999; bh=HPSClWck2q+cNI9V+4DqvPJSFW/RV0WEqBtjtz4aQLs=; h=Date:From:Reply-To:To:Cc:Subject:List-ID:List-Archive:List-Post: List-Unsubscribe:From; b=q/UqQW1ycIR9JQIXVXYaldcZIpwCr4zsountCDtEBVJ4PPHPGfmDPs8CMV/32Hbq9 YKgAhSHXrh7ViROndzVM2bvUqLxtIFT0AC2WnVzz8ft004Ih3Wop3u4DpXJ3czi8Ve TTZWQ6yDC5bcMlOo95+d71X1gXTuc2lxqExSIYow=
Date: Mon, 12 Jul 2021 06:19:59 -0700
From: David Waltermire <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-coswid <reply+ACTMJUIHJIJ4AJ2YVVB3NXF67ARH7EVBNHHDQJVDS4@reply.github.com>
To: sacmwg/draft-ietf-sacm-coswid <draft-ietf-sacm-coswid@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-coswid/pull/44@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_60ec417f21a48_1663c6fc131950"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: david-waltermire-nist
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/tkvXO1e2zQwXhkiw5pbw-scTMt0>
Subject: [sacm] [sacmwg/draft-ietf-sacm-coswid] addressed comments from Roman Danyliw (#44)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jul 2021 13:20:05 -0000

Addressed the following comments:

&gt; ** [-15] Section 2.3  Are there any considerations that would need to 
&gt; be made for versioning CoSWID beyond the native support provided with CBOR?

[Per IETF 110] Add text on the order of native CDDL approach for handling version is used.  If a future version of SWID is published which alters the semantics of exists fields, a future version of CoSWID SHOULD (MUST?) use a different tag to represent it.

[daw: A new paragraph was added to section 2 detailing how index values are used to support revisions and extensions.]

&gt; ** [-15] Section 4.1 and 5.2.4.  [SEMVER] doesn&#39;t meet the threshold 
&gt; for a normative requirement and a &quot;specification required&quot; - it&#39;s just 
&gt; a website.  If this is used in SWID then that would be compelling argument to waiver it.
&gt; However, that should be explicitly stated here.  If it isn&#39;t, we 
&gt; should discuss it a bit more.
&gt; 
&gt; [-16: Can the ISO spec please be used as the basis for this reference 
&gt; (even it just points to the same website?)]

[Per IETF 110] see -16.  Use ISO SWID reference for the IANA registry and if desired, used [SEMVER] as an informal reference in the text

[daw: This has been done in section 4.1.]

&gt; ** [17] Section 6.*.  Various &quot;FIXME&quot; markers need to be populated.

[daw: The FIXME markers have been replaced with actual text.]

&gt; 
&gt; ** [-15] Section 6.  What are the normative requirements, if any, on 
&gt; signing the CoSWID?
&gt; 
&gt; [-17] Is there something in SWID preventing normative guidance that 
&gt; says SHOULD or MUST sign?

[daw: Section 7 now details the construction of a signed CoSWID. A SHOULD sign requirement was also added to section 7.]

[Per IETF 110] We discussed adding language on the order of &quot;This document specifies a data format and an associated integrity mechanism agnostic of a deployment.  Application which choose to use CoSWID will need to specify explicit guidance which security properties are needed and under which circumstances.&quot;  &gt; ** [-15] Section 6.  Per &quot;When an authoritative tag is signed, the software
&gt; provider can be authenticated as the originator of the signature&quot;, 
&gt; what is the binding between the software provider and the key used to 
&gt; provide the signature?  Put in another way, how do I know the 
&gt; signature on the CoSWID really belongs to the software provider?  Same for a supplementary tag?

[daw: Authenticating the signer is the software provider will require a match between a CoSWID entity and the signer. We are working out a means to do this.]

&gt; 
&gt; [-16] Thanks for the new text.  Unless more detailed will be provided, 
&gt; please add that provisioning and validation logic of these tags will 
&gt; be done via local policy and is outside the scope of this document]
2

[daw: Not sure which tags this applies to? Signing? All of section 2?]

&gt; 
&gt; [-17] Section 9. Per &quot;A trustworthy association between the signature 
&gt; and the originator of the signature can be established via trust 
&gt; anchors. A certification path between a trust anchor and a certificate 
&gt; including a pub-key enabling the validation of a tag signature can 
&gt; realize the assessment of trustworthiness of an authoritative tag.&quot;, 
&gt; this is true.  Additionally, there is also the problem of how to 
&gt; associate the right key with the software provider or party permitted 
&gt; to add tags.  This significant complexity does not need to be solved 
&gt; here, but please acknowledge that it is someone that needs to be addressed by the users, and is out of scope here.

[daw: done.]

&gt; 
&gt; ** [-15] Section 6.  Per &quot;Having a signed authoritative SWID/CoSWID 
&gt; tag can be useful when the information in the tag needs to be trusted 
&gt; such as when the tag is being used to convey reference integrity 
&gt; measurements for software components &quot;, when would this tag not need 
&gt; to be trusted?  Perhaps I misunderstood, but I thought the whole 
&gt; premise of using SWIDs/CoSWIDs in the SACM context was to support 
&gt; asset inventory (i.e., reference integrity measurement of software 
&gt; components).  I&#39;m not clear on the use case for unsigned tags - that 
&gt; said, I recognize that the SWID spec doesn&#39;t specify that either.

[daw: This confusing text has been removed.]

&gt; [-17] Please add caution that without an integrity scheme, any user or 
&gt; process that has write-access to the CoSWID tag can alter it.  As 
&gt; such, any consuming application need to treat this data with caution.

[daw: done.]

&gt; ** [-17] Section 9.  Per &quot;Thus, authoritative CoSWID tags can be 
&gt; trusted to represent authoritative information about the software 
&gt; component&quot;, this seems too strong of a statement and dependent on the 
&gt; custody of that tag.  If it isn&#39;t signed, little, if anything, 
&gt; extracted from CoSWID tag should be considered authoritative.

[daw: We added a note about this.]

&gt; 
&gt; ** [-17] Section 9. Nit. s/pub-key/public key/

[daw: Done.]

&gt; ** [-17] Section 9.  Per &quot;Input sanitization and loop detection are 
&gt; two ways that implementations can address this concern&quot;, and the use 
&gt; of signed tags whose signature is verified on use too.

[daw: Added signature validation as a way.]

Regards,
Roman

&gt; Regards,
&gt; Roman

You can view, comment on, or merge this pull request online at:

  https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/44

-- Commit Summary --

  * addressed comments from Roman Danyliw

-- File Changes --

    M draft-ietf-sacm-coswid.md (26)

-- Patch Links --

https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/44.patch
https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/44.diff

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/44