Re: [Suit] Wording for integrated payload size

Brendan Moran <Brendan.Moran@arm.com> Thu, 16 January 2020 15:32 UTC

Return-Path: <Brendan.Moran@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 735EA120251 for <suit@ietfa.amsl.com>; Thu, 16 Jan 2020 07:32:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=9V7G4pqM; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=armh.onmicrosoft.com header.b=TJFCiNkQ
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YpA3dsQzCRiE for <suit@ietfa.amsl.com>; Thu, 16 Jan 2020 07:32:31 -0800 (PST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2083.outbound.protection.outlook.com [40.107.22.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 775A31201CE for <suit@ietf.org>; Thu, 16 Jan 2020 07:32:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tB0Vld2vnrgpr4VfhcTgORYqwfujm564jIvURx6X14g=; b=9V7G4pqMyxxyZpBoxU+OYxfceXkz1ctmMsNE6zPMvveOxL8SSZuvLqLTBzjqVUd+M+kcGWe80ED5coR5i5Zg+/RTgqBNy6wHsg9I7+DVcCflvIdSekX27FdD8k+IuVRHMOYvnvBvqyVIk1XMk7vTZHcG134+5wCTv/jz05pSgA0=
Received: from VI1PR08CA0189.eurprd08.prod.outlook.com (2603:10a6:800:d2::19) by VE1PR08MB5120.eurprd08.prod.outlook.com (2603:10a6:803:108::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2623.9; Thu, 16 Jan 2020 15:32:27 +0000
Received: from DB5EUR03FT008.eop-EUR03.prod.protection.outlook.com (2a01:111:f400:7e0a::203) by VI1PR08CA0189.outlook.office365.com (2603:10a6:800:d2::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.18 via Frontend Transport; Thu, 16 Jan 2020 15:32:27 +0000
Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT008.mail.protection.outlook.com (10.152.20.98) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2602.11 via Frontend Transport; Thu, 16 Jan 2020 15:32:27 +0000
Received: ("Tessian outbound ca1df68f3668:v40"); Thu, 16 Jan 2020 15:32:25 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 21460689c7d44e9e
X-CR-MTA-TID: 64aa7808
Received: from a9d5f99fd28e.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id C05BEDC9-0BB4-466B-84A0-6D9204E2D30E.1; Thu, 16 Jan 2020 15:32:20 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id a9d5f99fd28e.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 16 Jan 2020 15:32:20 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HTvkOGipdR81nJYAjzVNCBqVw6/3S44d7qRyOdkDeDThgMuDvTTQohhUdLGndkaSJ+8/ZhFDoKA4PM+m4goUjHUd0lrUZvN96Np9fDoACZnABNPSvscnOY4YF1MDL9BxsubiGYe7htMokIE96cW3qWrh3xi9WFdaRxH+KzrJ1awf/nL8+vIp9rIrL6TH2ocsw374+w8OYe/Uzm6AVH8oSSzk25uSb7DBsRmLSGEDsVss7StFKAMYYZ5nthBZgJTGokkR9+obMSZibEdwreBZsTobB0bG6oPmuw6yRb0MpG4DttE8yFrWsy5dUgYq9qWisCuXjUlKTl8zGDaC+Jn1gw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=e8KP51DAoJdWz3V7YzfrmeXwrCdPwVaJ8dB+voO2Mto=; b=d4bF4ARQNU65Ow5j061eQLjKCmta3uXpYufLepsd5sHmr2F7V6ZJyo8/XQPGEyQnBeGplpphPWQOtHXSGycf8E6cVqBJ7zTKISTX0lX4m7BsyPmSxGC3GabBbUPvFUhMXoffgwUMlGJ5fVmMYrEreR/x04lA3e66kTSjUUcj3KXrUt5D46OKzdpHkkb3CBRA+jyv8PkLP7XSdg0DLn0iiZm/kJ9R+Aupflw9L6ZRJKwg4UL/U6yQnYm7uGADRZSFEK0FreDXlTyLTJR56g9gYwILSGS9P4JWeCaDh2hbe9qUvvTkrabMJJXOgMPmshx8xSjStKqoKLVVC6/NNax7bA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=e8KP51DAoJdWz3V7YzfrmeXwrCdPwVaJ8dB+voO2Mto=; b=TJFCiNkQQRXeK69urkq1Q9GsDN7o8snxyYKSvj2pBQ+AjbyLc7ZtGFoQTeDWosrANDuG5NTrMhwkiBnrmQdJeJwaxBnbOnT/7EdWtM73h9O+DQ1B5p4HBQRm3TQ66XQcvX/cjskrNg01sOISfnFW9VtqOoqQZYI+RkUi+oFQ9Ns=
Received: from DB6PR0801MB1879.eurprd08.prod.outlook.com (10.168.84.137) by DB6PR0801MB1639.eurprd08.prod.outlook.com (10.169.227.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.20; Thu, 16 Jan 2020 15:32:18 +0000
Received: from DB6PR0801MB1879.eurprd08.prod.outlook.com ([fe80::50fd:7956:2885:503d]) by DB6PR0801MB1879.eurprd08.prod.outlook.com ([fe80::50fd:7956:2885:503d%3]) with mapi id 15.20.2644.015; Thu, 16 Jan 2020 15:32:18 +0000
From: Brendan Moran <Brendan.Moran@arm.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
CC: suit <suit@ietf.org>, Dave Thaler <dthaler@microsoft.com>
Thread-Topic: [Suit] Wording for integrated payload size
Thread-Index: AQHVrEAJ810bu5nmR0yDzlF5CgRTAKe1T4IAgAj8UICAAH6rAIAI32qAgCYB3YA=
Date: Thu, 16 Jan 2020 15:32:18 +0000
Message-ID: <7BC31B76-76AF-49B6-BF56-2E153C7B0424@arm.com>
References: <734509A8-7562-4B47-AAE5-54F840C4A298@arm.com> <MWHPR21MB0784F574BE1FFD50743040FCA35A0@MWHPR21MB0784.namprd21.prod.outlook.com> <3EC3D5C9-1475-4659-BCE5-FEFFD7144248@arm.com> <16551.1576611482@localhost> <621E962F-2F2B-4778-B211-90F2E6FB65CE@arm.com>
In-Reply-To: <621E962F-2F2B-4778-B211-90F2E6FB65CE@arm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3601.0.10)
Authentication-Results-Original: spf=none (sender IP is ) smtp.mailfrom=Brendan.Moran@arm.com;
x-originating-ip: [217.140.106.49]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: a950e7b8-2430-403f-f577-08d79a994ad2
X-MS-TrafficTypeDiagnostic: DB6PR0801MB1639:|VE1PR08MB5120:
X-Microsoft-Antispam-PRVS: <VE1PR08MB5120BA530D7F3AD28E61EF46EA360@VE1PR08MB5120.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
x-forefront-prvs: 02843AA9E0
X-Forefront-Antispam-Report-Untrusted: SFV:NSPM; SFS:(10009020)(4636009)(376002)(346002)(136003)(39860400002)(396003)(366004)(40434004)(189003)(199004)(966005)(36756003)(478600001)(316002)(6486002)(91956017)(76116006)(53546011)(71200400001)(6506007)(26005)(2616005)(186003)(81166006)(2906002)(8936002)(5660300002)(8676002)(81156014)(6512007)(66476007)(66556008)(64756008)(66446008)(4326008)(66946007)(33656002)(86362001)(54906003); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6PR0801MB1639; H:DB6PR0801MB1879.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: waQnbNfRZfsgijxyvLfDHwrHBuvRntDErFF72SDJc7vfW2DkTdN3HiteTqz3QyAl/diTgOIGVdUw6AG+vbsWvP5LMaSjaNH5KJug6j37gwE6NIsCoJEgvuNdG2EVuKyG9I1m3K9iUXyNg52SQzzsmY+8l/qWJTLrfWYJLmlntsfMHVRYd6/TjvgJ9+A3HWaeyf53O039fr2MLqyUKOXNnVRIS+fyp84XN73VfK4aAb3WOCB8UXRa2inEt1wD615kS1Qm1ZKi1qJZEZI7RMjENheMbtmoUPK2Q0Ggokko67o8GlbSfTXrMkQFBKier9iNEfF531KlT0x9djTaSHkiLJGDW85a+DS91k79xMCjYEyRpHfiEZISfzMB+EqTgcskCArpep1O0bdrzlbZHf0ly5+RUfieo1uLEnJXQY/W7E5oXUfuYcvqJId7qrpU3nW9FKL8hFwup8G15EIwBP4+SxNj0F/GLev5uiChmDsht+ws31tOzoP+nGN/rXUXbvbiVBeoYcr7NGzARYXbWc8BsjyF22Kkt+VDhv1BRPb23Fc=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_7BC31B7676AF49B6BF562E153C7B0424armcom_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1639
Original-Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Brendan.Moran@arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT008.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; IPV:CAL; SCL:-1; CTRY:IE; EFV:NLI; SFV:NSPM; SFS:(10009020)(4636009)(376002)(136003)(346002)(39860400002)(396003)(40434004)(189003)(199004)(356004)(6486002)(86362001)(70206006)(6512007)(70586007)(5660300002)(4326008)(81156014)(2616005)(8676002)(81166006)(316002)(54906003)(336012)(186003)(26005)(8936002)(6506007)(53546011)(33964004)(966005)(26826003)(478600001)(6862004)(36756003)(107886003)(45080400002)(2906002)(33656002); DIR:OUT; SFP:1101; SCL:1; SRVR:VE1PR08MB5120; H:64aa7808-outbound-1.mta.getcheckrecipient.com; FPR:; SPF:Pass; LANG:en; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; MX:1; A:1;
X-MS-Office365-Filtering-Correlation-Id-Prvs: 2cf0620a-de4e-4c15-5f69-08d79a9945c9
X-Forefront-PRVS: 02843AA9E0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Jan 2020 15:32:27.1497 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a950e7b8-2430-403f-f577-08d79a994ad2
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5120
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/1_LzvTBnmiOzDlC_LAogCbEQpV4>
Subject: Re: [Suit] Wording for integrated payload size
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jan 2020 15:32:37 -0000

If there is no objection, I’d like to submit this paragraph in an update to the information model. I think this is the last outstanding element that needs to be cleared before this document can be accepted.

Best Regards,
Brendan

On 23 Dec 2019, at 11:07, Brendan Moran <Brendan.Moran@arm.com<mailto:Brendan.Moran@arm.com>> wrote:

When I talk about holding memory invariant, I’m referring to another part of the information model. Specifically, REQ.SEC.MFST.CONST. I mistakenly used “invariant” rather than “immutable” in the snippet that I shared.

Is this version clearer?

Best Regards,
Brendan

When an integrated payload is provided, this increases the size of the manifest. Manifest size can cause several processing and storage concerns that require careful consideration. The payload can prevent the whole manifest from being contained in a single network packet, which can cause fragmentation and the loss of portions of the manifest in lossy networks. This causes the need for reassembly and retransmission logic. The manifest must be held immutable between verification and processing (see [REQ.SEC.MFST.CONST](#req-sec-mfst-const)), so a larger manifest will consume more memory with immutability guarantees, for example internal RAM or NVRAM, or external secure memory. If the manifest exceeds the available immutable memory, then it must be processed modularly, evaluating each of: delegation chains, the security container, and the actual manifest, which includes verifying the integrated payload. If the security model calls for downloading the manifest and validating it before storing to NVRAM in order to prevent wear to NVRAM and energy expenditure in NVRAM, then either increasing memory allocated to manifest storage or modular processing of the received manifest may be required. While the manifest has been organised to enable this type of processing, it creates additional complexity in the parser. If the manifest is stored in NVRAM prior to processing, the integrated payload may cause the manifest to exceed the available storage. Because the manifest is received prior to validation of applicability, authority, or correctness, integrated payloads cause the recipient to expend network bandwidth and energy that may not be required if the manifest is discarded and these costs vary with the size of the integrated payload.


On 17 Dec 2019, at 19:38, Michael Richardson <mcr+ietf@sandelman.ca<mailto:mcr+ietf@sandelman.ca>> wrote:


Brendan Moran <Brendan.Moran@arm.com<mailto:Brendan.Moran@arm.com>> wrote:
I see why the use of RAM as a requirement is surprising. There are two
requirements here. I believe that one of them is required and one is
optional.

It is required that the manifest be held invariant between verification and
processing. This could mean storing in internal RAM or NVRAM, storing in a
secure external memory, etc.

I think that you are also attempting to defend against hardware attacks where
the contents of memory get changed mid-process.  That's not *explicitely*
stated in the text.

But, it's why you speak about internal RAM (vs RAM), and I guess "secure
external memory" means that it has some cryptographic checks not attackable
From outside the SoC.

Maybe the attempt to abstract the text is detracting from understanding?

--
Michael Richardson <mcr+IETF@sandelman.ca<mailto:mcr+IETF@sandelman.ca>>, Sandelman Software Works
-= IPv6 IoT consulting =-




IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
_______________________________________________
Suit mailing list
Suit@ietf.org<mailto:Suit@ietf.org>
https://www.ietf.org/mailman/listinfo/suit

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you. IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.