[secdir] Re: draft-ietf-suit-report-14 ietf last call Secdir review
Akira Tsukamoto | OPENCHIP <akira.tsukamoto@openchip.com> Mon, 06 October 2025 07:32 UTC
Return-Path: <akira.tsukamoto@openchip.com>
X-Original-To: secdir@mail2.ietf.org
Delivered-To: secdir@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 675A96DD28A2; Mon, 6 Oct 2025 00:32:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=openchip.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NTmj0qLs3rqf; Mon, 6 Oct 2025 00:32:35 -0700 (PDT)
Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazon11020094.outbound.protection.outlook.com [52.101.69.94]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 1A8856DD289A; Mon, 6 Oct 2025 00:32:34 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dk6fKsi9eMSOz03o6xXCW249GF2CH/X112HX8BIalWAsRtv3dxVvfkp5yoEyem7C776pjvLDzpLFNo8elfcrGSLgJj7gkeWb9M/85Yt2F4t+twqN4w+ZTi5l90AK5MZp8Qb1KAkUlE8r4U6SzaEXw+dEBpWSq3967jmc07WVSkaVv9oSvPLiijcRzubID+UUe0p3dDm0lbFtTy0IGCC3jHurM6ovSg4aGQ5LcyL27j9M4xGY3sxjCq51RX9veJjMSpRCWYb6gZUHHVKBLGl33OApDlcoVGMibxo93L9QCZv5fgrEVJDa6PPHcTmtuPfDy2hp+UbFak8yPq0aVLKCiA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=FlardmRjO1Ogfdn7JMEe7YXiZYZDHkXwft5oTjlELe8=; b=I/BJsKEygoNt4CKFwEV5ODwYOFdA+uaFkOlnFSE9cCifsICAOzWtbQIp5oKaC0xcPDcdHWFL9ZPxJNXO2Mrwn8LAFofrwuVaLmiswRZqMjXVHVk4hy+0o6zWoVhp440fEQjCLL6W0KXABpHklW187ajTuU1b/wxVznCrZV4qpqPVSLCSJk6Y4n28qYTxtgCHeTp7oNjJPXcfirjhEcS41inh1l8L9nbY/6Acvxx5ZTbwNGDDfEh8VRj3XTBCdHxNoCzg0oUhA84+XQt5HmnFXMTTNzE1LJX4ENmozbRe0DThgHyovnSFCMwL28zW0SQQ8z6VGXSw6jgIpDnvfz5dOw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=openchip.com; dmarc=pass action=none header.from=openchip.com; dkim=pass header.d=openchip.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=openchip.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FlardmRjO1Ogfdn7JMEe7YXiZYZDHkXwft5oTjlELe8=; b=gKl77kFyxl4pTf2Zm6BWJlV35GVAL03KOAtMJdEanCfaGvt3VKy4mSXFTG0yp5sCOs4Pcp9RmyTzS3wxF231JvecURN4dNHTnaG+E7gReo7rSwMcQklBbPXvMg/HuIH/ZqX2TKb9bslUTpLoqABTxG1yDXONvizDWPU9HheZ1tL0KWlVUCY3l/SyLqzV+Baj3CpV7S0SoPZe60bhPsVne30/N5J7HBxOY1b5DVr75T8vctEmliyjQewTXz5PTxX2n9fFoTKTjFr+wwMxzqOcdBGUK6nZ8c2baxYxP7/IphrJ2o7CKBFQMz/IAv8SLRlVgmuvUZ6QyQYf8X8xYNJQCw==
Received: from VI0P192MB2516.EURP192.PROD.OUTLOOK.COM (2603:10a6:800:2a6::17) by VI0P192MB3199.EURP192.PROD.OUTLOOK.COM (2603:10a6:800:2d7::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9182.20; Mon, 6 Oct 2025 07:32:26 +0000
Received: from VI0P192MB2516.EURP192.PROD.OUTLOOK.COM ([fe80::95d1:2ca2:b998:5bda]) by VI0P192MB2516.EURP192.PROD.OUTLOOK.COM ([fe80::95d1:2ca2:b998:5bda%6]) with mapi id 15.20.9182.017; Mon, 6 Oct 2025 07:32:26 +0000
From: Akira Tsukamoto | OPENCHIP <akira.tsukamoto@openchip.com>
To: Brendan Moran <brendan.moran.ietf@gmail.com>, Russ Housley <housley@vigilsec.com>
Thread-Topic: [secdir] Re: draft-ietf-suit-report-14 ietf last call Secdir review
Thread-Index: AQHcJvW2jfhlNYJZ80eh2SPMaZOW/bS02HTz
Date: Mon, 06 Oct 2025 07:32:26 +0000
Message-ID: <VI0P192MB251674C300D9BCB1EC786C6B8CE3A@VI0P192MB2516.EURP192.PROD.OUTLOOK.COM>
References: <175460160369.618.18122085543723534498@dt-datatracker-6f95f9d9c-8g9j6> <CAPmVn1NR88aBNUBn718BoJ82qBzisuOAD2__mtLwCewE9ZLWbA@mail.gmail.com>
In-Reply-To: <CAPmVn1NR88aBNUBn718BoJ82qBzisuOAD2__mtLwCewE9ZLWbA@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=openchip.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: VI0P192MB2516:EE_|VI0P192MB3199:EE_
x-ms-office365-filtering-correlation-id: 6b0fb128-01aa-4925-b5a2-08de04aa7f66
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|4022899009|7053199007|38070700021|13003099007|8096899003;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:zh-cn;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI0P192MB2516.EURP192.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(4022899009)(7053199007)(38070700021)(13003099007)(8096899003);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_VI0P192MB251674C300D9BCB1EC786C6B8CE3AVI0P192MB2516EURP_"
MIME-Version: 1.0
X-OriginatorOrg: openchip.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: VI0P192MB2516.EURP192.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 6b0fb128-01aa-4925-b5a2-08de04aa7f66
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Oct 2025 07:32:26.1024 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: dfdd4aff-e2c9-4e1a-8642-7f6cc6bbbe6d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 3WB5men8UpnO0YhZ+JP/+VIzmRjQYa2oe4gGoKUOR80qplVo8Z6/ZiTWGHNQQoikJrZ2Etz+6cty9+SH9IzO9LWRxDRF2cfvQcQI3JJeqpg=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI0P192MB3199
Message-ID-Hash: H6PJJLDKNKTVFL2L3MGAAUAJ5WFJO67O
X-Message-ID-Hash: H6PJJLDKNKTVFL2L3MGAAUAJ5WFJO67O
X-MailFrom: akira.tsukamoto@openchip.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-secdir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-suit-report.all@ietf.org" <draft-ietf-suit-report.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "suit@ietf.org" <suit@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [secdir] Re: draft-ietf-suit-report-14 ietf last call Secdir review
List-Id: Security Area Directorate <secdir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/pyaQE50CgggSE5ArM8b1wGJmhP0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Owner: <mailto:secdir-owner@ietf.org>
List-Post: <mailto:secdir@ietf.org>
List-Subscribe: <mailto:secdir-join@ietf.org>
List-Unsubscribe: <mailto:secdir-leave@ietf.org>
Hi Russ, Gentle ping? Akira ________________________________ From: Brendan Moran <brendan.moran.ietf@gmail.com> Sent: Tuesday, September 16, 2025 12:35 To: Russ Housley <housley@vigilsec.com> Cc: secdir@ietf.org <secdir@ietf.org>; draft-ietf-suit-report.all@ietf.org <draft-ietf-suit-report.all@ietf.org>; last-call@ietf.org <last-call@ietf.org>; suit@ietf.org <suit@ietf.org> Subject: [secdir] Re: draft-ietf-suit-report-14 ietf last call Secdir review Hi Russ, Thank you for your review. I have now published draft-ietf-suit-report-15, which I believe addresses the issues identified in this review. Please see my comments, inline. Best Regards, Brendan On Thu, Aug 7, 2025 at 10:20 PM Russ Housley via Datatracker <noreply@ietf.org> wrote: > > Document: draft-ietf-suit-report > Title: Secure Reporting of Update Status > Reviewer: Russ Housley > Review result: Not Ready > > I reviewed this document as part of the Security Directorate's ongoing > effort to review all IETF documents being processed by the IESG. These > comments were written primarily for the benefit of the Security Area > Directors. Document authors, document editors, and WG chairs should > treat these comments just like any other IETF Last Call comments. > > Document: draft-ietf-suit-report-14 > Reviewer: Russ Housley > Review Date: 2025-08-07 > IETF LC End Date: 2025-08-11 > IESG Telechat date: Unknown > > Summary: Not Ready > > > Major Concerns: > > Section 5: I do not understand the meaning of "Manifest Processor & Report > Generator". This is part of a MUST statement, and it is unclear what is > required. The new language for this section follows. I believe that it is clearer and should resolve this concern. For the SUIT_Report to be usable as Attestation Evidence, the environment that generated the SUIT_Report also needs to be measured. Typically, this means that the software that executes the commands in the Manifest (the Manifest Processor) must be measured; similarly, the piece of software that assembles the measurements, taken by the Manifest Processor, into the SUIT_Report (the Report Generator) must also be measured. Any bootloaders or operating systems that facilitate the running of the Manifest Processor or Report Generator also need to be measured in order to demonstrate the integrity of the measuring environment. Therefore, if a Remote Attestation format that conveys Attestation Evidence, such as an Entity Attestation Token (EAT, see [RFC9711]), contains a SUIT_Report, then it MUST also include an integrity measurement of the Manifest Processor, the Report Generator and any bootloader or OS environment that ran before or during the execution of both. > Section 5: The last paragraph begins with "This information is not intended". > I cannot determine what information is being referenced, , and it is unclear > what SHOULD be translated into general-purpose claims. This paragraph has been substantially expanded. Instead of vague statements, the language is now more precise. Hopefully the new language, below, will resolve this concern. For a Verifier to consume the SUIT_Report, it requires a copy of the SUIT_Manifest. The Verifier then replays the SUIT_Manifest, using the SUIT_Report to resolve whether each condition is met. It identifies each measurement that is required by attestation policy and records this measurement as an Attestation Claim. It evaluates whether the SUIT_Report correctly matches the SUIT_Manifest as an element of evaluating trustworthiness. For example there are several indicators that would show that a SUIT_Report does not match a SUIT_Manifest. If any of the following (not an exhaustive list) occur, then the Manifest Processor that created the report is not trustworthy: * Hash of SUIT_Manifest at suit-report-manifest-uri does not match suit-report-manifest-digest * A SUIT_Record is issued for a SUIT_Command_Sequence that does not exist in the SUIT_Manifest at suit-report-manifest-uri. * A SUIT_Record is identified at an offset that is not a condition and does not have a reporting policy that would indicate a SUIT_Record is needed. Many architectures require multiple Verifiers, for example where one Verifier handles hardware trust, and another handles software trust, especially the evaluation of software authenticity and freshness. Some Verifiers may not be capable of processing a SUIT_Report and, for separation of roles, it may be preferable to divide that responsibility. In this case, the Verifier of the SUIT_Report should perform an Evidence Transformation [I-D.ietf-rats-evidence-trans] and produce general purpose Measurement Results Claims that can be consumed by a downstream Verifier, for example a Verifying Relying Party, that does not understand SUIT_Reports. > Section 7: This section does not have any information that will assist an > implementer. It does not explain what makes an EAT measurements type > more consumable than a SUIT_Report on its own. If this section is kept, > it should include a reference to EAT; the reference is several pages earlier. In combination with the above, Section 7 has been expanded as follows: The Entity Attestation Token (EAT, see [RFC9711]) is a secure container for conveying Attestation Evidence, such as measurements, and Attestation Results. The SUIT_Report is a form of measurement done by the SUIT Manifest Processor as it attempts to invoke a manifest or install a manifest. As a result, the SUIT_Report can be captured in an EAT measurements type. The log-based structure of the SUIT_Report is not conducive to processing by a typical Relying Party: it contains only a list of waypoints through the SUIT Manifest--unless system parameter records are included--and requires additional information (the SUIT_Manifest) to reconstruct the values that must have been present at each test. A Verifier in possession of the SUIT_Manifest can reconstruct the measurements that would produce the waypoints in the SUIT_Report. The Verifier SHOULD convert a SUIT_Report into a more consumable version of the EAT claim by, for example, constructing a measurement results claim that contains the digest of a component, the vendor ID & class ID of a component, etc. > > Minor Concerns: > > Section 4: It is not clear which algorithm will be used to compute > the SUIT_Digest. The structure is defined in [I-D.ietf-suit-manifest], > and I copy it here: > > SUIT_Digest = [ > suit-digest-algorithm-id : suit-cose-hash-algs, > suit-digest-bytes : bstr, > * $$SUIT_Digest-extensions > ] > > For example, is the party that produces the SUIT_Reference that contains > the SUIT_Digest expected to use the same hash algorithm as was used in > the SUIT_Manifest? This is now is spelt out explicitly: suit-report-manifest-digest provides a SUIT_Digest (as defined in [I-D.ietf-suit-manifest]) that is the characteristic digest of the Root manifest. This digest MUST be the same digest as is held in the first element of SUIT_Authentication in the referenced Manifest_Envelope. > Section 5: What does the term "well-informed" really mean here? I read > the sentence without this term an come away with the same understanding. > Can this be dropped? Yes, you are right. This probably could be dropped. Unfortunately, I missed that in the latest version. Would you like an update to address this? > Nits: > > Section 3: s/well, however this/well; however, this/ Fixed. > Section 4: s/of SUIT_Records/of SUIT_Records as defined in Section 3/ Fixed. > Section 5: s/SUIT_report/SUIT_Report/ Fixed. > > > _______________________________________________ secdir mailing list -- secdir@ietf.org To unsubscribe send an email to secdir-leave@ietf.org wiki: https://eur06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwiki.ietf.org%2Fgroup%2Fsecdir%2FSecDirReview&data=05%7C02%7Cakira.tsukamoto%40openchip.com%7C63e6fa14df6643f91a4908ddf50cd637%7Cdfdd4affe2c94e1a86427f6cc6bbbe6d%7C0%7C0%7C638936157692824028%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=dHBfZ4uQnzNgU%2BHfOnUWsMWd4fSzoJuLVYGAvKssZYU%3D&reserved=0<https://wiki.ietf.org/group/secdir/SecDirReview> The content, data, and any attached documents to this email are addressed exclusively to the addressee and are confidential and/or may be subject to a non-disclosure agreement. Any use, forwarding, disclosure, and/or copying, in whole or in part, without authorization is prohibited. If you have received this email in error, we apologize and, please notify the sender or Openchip immediately, and delete it from your system. El contenido, los datos y cualquier documento adjunto a este correo electrónico están dirigidos exclusivamente al destinatario y son confidenciales y/o pueden estar sujetas a un acuerdo de no revelación. Está prohibido cualquier uso, reenvío, divulgación o copia, total o parcial, sin autorización. Si has recibido este correo por error, te pedimos disculpas y agradecemos que lo notifiques de inmediato al remitente o a Openchip, y lo elimines de tu sistema. El contingut, les dades i qualsevol document adjunt a aquest correu electrònic estan dirigits exclusivament al destinatari i són confidencials i/o poden estar subjectes a un acord de no revelació. Està prohibit qualsevol ús, reenviament, divulgació o còpia, total o parcial, sense autorització. Si has rebut aquest correu per error, et demanem disculpes i agraïm que ho notifiquis d'immediat al remitent o a Openchip, i l'eliminis del teu sistema
- [secdir] draft-ietf-suit-report-14 ietf last call… Russ Housley via Datatracker
- [secdir] Re: draft-ietf-suit-report-14 ietf last … Brendan Moran
- [secdir] Re: draft-ietf-suit-report-14 ietf last … Akira Tsukamoto | OPENCHIP