[Suit] FW: [Cscwg-public] Signature authorization checks for signed code (SBOM)

Dick Brooks <dick@reliableenergyanalytics.com> Mon, 14 June 2021 12:03 UTC

Return-Path: <dick@reliableenergyanalytics.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95F403A16CE for <suit@ietfa.amsl.com>; Mon, 14 Jun 2021 05:03:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UDu8AbjgrKJ1 for <suit@ietfa.amsl.com>; Mon, 14 Jun 2021 05:03:19 -0700 (PDT)
Received: from forward1-smtp.messagingengine.com (forward1-smtp.messagingengine.com [66.111.4.223]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 939E43A16BA for <suit@ietf.org>; Mon, 14 Jun 2021 05:03:19 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailforward.nyi.internal (Postfix) with ESMTP id 1E40A194070E for <suit@ietf.org>; Mon, 14 Jun 2021 08:03:16 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute4.internal (MEProxy); Mon, 14 Jun 2021 08:03:16 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:reply-to:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; bh=Zbvgq6xGpcJ17XgDqepoPcRUZ/OGU2JbXzi4w8r7YLk=; b=UivkRDa6 +AIKikuw9eywnNnJlySFk9Dx7Cwns3+xRPTKaIM8GZtRpW2V2rrHCrq0jQgouvn6 RJAf95GQZIa81dQbCnOn7olOumYx0A277WmWkf91BcEFdTz/UnPFqhBnNnRY8cjr p5fSwC9hkY1yfYFvjdZzObXs47CBwwY2LMq930mbmZIX4OhnjFxq03IitS6fiJoO 61o9TD6bbhlB+qppN99bK5ZISWSiM4U2fEq+iJe43ihaWPHT1tWH2hLO7PfqojdA 8vIs2iyE6ZRKVx5TBJ7xxjopLKZkBEORRPVh5/+ZU6jcarIo0rBewf+woaZ8/rev KWO/YJ6Rag6gOQ==
X-ME-Sender: <xms:g0XHYLz_rdrzK4o-X-yhOexRclfkXmf5QymvapJkqdMChLY-_Gr1Dg> <xme:g0XHYDTnHoGzn7Q2OvHmNehZHxD9ubUP1UuUHsOYxAejrD7egiU42U2Lx-Vo7pOEU zDknYgctFQu3HgccA>
X-ME-Received: <xmr:g0XHYFWBMfGNPVINl6QAq5MhZ5SUhk0rzUCoD5M19lW7xEbZGU0yOBg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrfedvhedggeefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucgfrhhlucfvnfffucdlqdeimdenucfjughrpehrhf fvfhgjufffohfkgggtofhtsehmtdhgpedvtddvnecuhfhrohhmpedfffhitghkuceurhho ohhkshdfuceoughitghksehrvghlihgrsghlvggvnhgvrhhghigrnhgrlhihthhitghsrd gtohhmqeenucggtffrrghtthgvrhhnpeefhfelhedttddtgfekledvvdekiedtveffgefg teevffeigeekhfefhfefleeuvdenucffohhmrghinheprhgvlhhirggslhgvvghnvghrgh ihrghnrghlhihtihgtshdrtghomhdpvghnvghrghihtggvnhhtrhgrlhdrtghomhdpnhht ihgrrdhgohhvpdifhhhithgvhhhouhhsvgdrghhovhdpihgvthhfrdhorhhgpdguohhird horhhgpdhglhhosggrlhhsihhgnhdrtghomhdplhhinhhkvgguihhnrdgtohhmpdhtfihi thhtvghrrdgtohhmpdhfrggtvggsohhokhdrtghomhdpihhnshhtrghgrhgrmhdrtghomh dphihouhhtuhgsvgdrtghomhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhep mhgrihhlfhhrohhmpeguihgtkhesrhgvlhhirggslhgvvghnvghrghihrghnrghlhihtih gtshdrtghomh
X-ME-Proxy: <xmx:g0XHYFjbhWHAtUm7K9Uk7c_gENCCgsWGXL7F-_3QtlcHQENiMzbbtA> <xmx:g0XHYNA4c4ra8bDWc5zl_ucpwJvfzaNLK5F4HYF2Hz-411USFurTzQ> <xmx:g0XHYOKswLhdvEwwG-2lAIUrUmFVEHTSkgVHzxXT2kAvz_Yx-7C1gA> <xmx:hEXHYAMmwIhwWyAY5DI5pqnuJYjGlOIJuaTWdTf2ajQ0ZjXJoUbFsA>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <suit@ietf.org>; Mon, 14 Jun 2021 08:03:15 -0400 (EDT)
Reply-To: dick@reliableenergyanalytics.com
From: Dick Brooks <dick@reliableenergyanalytics.com>
To: 'suit' <suit@ietf.org>
References: <KL1PR0302MB53480539A3E10D9ED34DCB56EC3B9@KL1PR0302MB5348.apcprd03.prod.outlook.com> <0100017a0980d8d0-b3b3f28a-5141-403b-a939-f2bd4f25f158-000000@email.amazonses.com>
In-Reply-To: <0100017a0980d8d0-b3b3f28a-5141-403b-a939-f2bd4f25f158-000000@email.amazonses.com>
Date: Mon, 14 Jun 2021 08:03:11 -0400
Organization: Reliable Energy Analytics LLC
Message-ID: <3ce201d76115$4213cb80$c63b6280$@reliableenergyanalytics.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_3CE3_01D760F3.BB022B80"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGi+msP8pYcqdWiD8P83652yJjxKQFP+N/sq3G1VfA=
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/9rLSNge-lnYOFaD-kHABmbMMnl8>
Subject: [Suit] FW: [Cscwg-public] Signature authorization checks for signed code (SBOM)
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jun 2021 12:03:26 -0000

FYI - CAB Forum code signing work group email regarding the issue of digital
signature verification and authorized parties.

 

Thanks,

 

Dick Brooks



Never trust software, always verify and report!
<https://reliableenergyanalytics.com/products>  T

http://www.reliableenergyanalytics.com
<http://www.reliableenergyanalytics.com/> 

Email: dick@reliableenergyanalytics.com
<mailto:dick@reliableenergyanalytics.com> 

Tel: +1 978-696-1788

 

From: Cscwg-public <cscwg-public-bounces@cabforum.org> On Behalf Of
Sebastian Schulz via Cscwg-public
Sent: Monday, June 14, 2021 3:51 AM
To: cscwg-public@cabforum.org
Subject: Re: [Cscwg-public] Signature authorization checks for signed code
(SBOM)

 

Hello All,

 

Attempting to send this again, as the previous E-Mail didn't seem to display
the message body. The below has been discussed on the meeting of June 3rd.
There no immediate action that could be taken but a comment is warranted
nevertheless. 

 

With the current state of technology, certificate issuers have no visibility
of the later use of CodeSigning certificates so that authorization checks
when signing code cannot be performed by certificate issuers. However, the
working group acknowledges that in addition to guaranteeing the authenticity
and integrity of code with digital signatures a guarantee that the signer is
an authorized party would contribute to the security of the whole ecosystem.
The working group would like to encourage any certificate consumer or even
third party who intends to address this problem to present their approach.

 

There's a special case for certificate issuer operated signing services,
where certificate issuers have visibility of the code that is being signed.
Such signing services will be discussed and addressed by the working group
in greater detail during the coming months. The authorization of an entity
to sign certain software/applications/code will not be a primary concern but
definitely receive some attention during the discussion as well.

 

Kind regards,

Seb

 

 

Sebastian Schulz
Product Manager Client Certificates

 

From: Sebastian Schulz 
Sent: 04 June 2021 09:53
To: cscwg-public@cabforum.org <mailto:cscwg-public@cabforum.org> 
Subject: Signature authorization checks for signed code (SBOM)

 

Hello All,

 

I wanted to bring something to your attention that a partner of ours has
shared with us. In short, in securing software supply chains there's some
concern about tools for the validation of code signing signatures (e.g.
SignTool) not taking into account whether the signer is actually authorized
to sign that software package. As a suggestion to resolving this problem, a
system similar to DNS CAA is being suggested (while being well aware that it
could not work the exact same way).

 

Full message below:

 

 

 

Copied from
https://energycentral.com/c/ec/we-cannot-secure-software-supply-chain-withou
t-sbom 

A Software Bill of Materials (SBOM) <https://ntia.gov/sbom>  has received
considerable attention since the Cybersecurity Executive order was released
on May 12, 2021
<https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/ex
ecutive-order-on-improving-the-nations-cybersecurity/>  calling on
government agencies to require SBOM's from software vendors, "(vii)
providing a purchaser a Software Bill of Materials (SBOM) for each product
directly or by publishing it on a public website" 

The Executive Order goes on to describe an SBOM, with an emphasis on it's
component inventory capabilities, "Software Bill of Materials" or "SBOM"
means a formal record containing the details and supply chain relationships
of various components used in building software", "It is analogous to a list
of ingredients on food packaging."

All of these claims are indeed accurate, however there is another essential
and critically important element that SBOM's provide, which is essential to
secure the software supply chain; The identity of the software source
supplier that produced and licensed the software, which can be verified
using digital signing keys issued by trustworthy Certificate Authorities. 

Current practices used in the software supply chain do not require
identification of the actual software supplier and licensor of a software
package. Some practices require that software packages be digitally signed,
however there is no verification or validation that the signer of a software
package and the supplier/licensor are related, or that the supplier/licensor
has authorized a given party to sign a software object on their behalf. This
creates a false sense of security when parties rely on tools such as
Microsoft's signtool to validate a digital signature. Signtool does not
validate that a digital signature belongs to a party authorized to sign a
software product on behalf of the original source supplier/licensor - it has
no way of verifying that a given signer is authorized to digitally sign a
software package. Signtool will report a valid signature if the
cryptographic verifications and trust chain reports produce successful
results, which do not verify the authorization of a signing party and
supplier arrangement. This issue is similar to a past scenario where
Certificate Authorities were issuing SSL certificates to domains without
authorization to do so, which resulted in the implementation of DNS CAA
(IETF RFC 6844 <https://datatracker.ietf.org/doc/html/rfc6844> ) records to
identify authorized parties to issue SSL certificates. A similar
authorization scheme may be appropriate to authorize the issuance of digital
certificates and signing keys to parties that have been authorized by a
software supplier/licensor to sign software objects on their behalf.

The ability to determine trustworthiness is the key to securing the software
supply chain. SBOM is the foundation for establishing this trust by
specifying the identification of the actual source supplier/licensor of a
software product. This supplier information can then be used to validate a
digital signature applied to a software object by verifying the relationship
of the software supplier and software signer using a trusted method to
verify this relationship. A solution similar to DNS CAA, ref: "DNS
Certification Authority Authorization (CAA) Resource Record", IETF RFC 6844
<https://datatracker.ietf.org/doc/html/rfc6844>  may be worth exploring to
address this need.

There is no doubt that securing the software supply chain requires a
software consumer to verify the identity of a software source supplier and
licensor of a software object. SBOM is a critical requirement in this
process due to its standard method for identifying a software
supplier/licensor of a software object. Having this SBOM supplier identifier
will enable a software consumer to verify this party using digital
signatures based on digital certificates issued by trusted Certificate
Authorities.  What is missing today is a means to verify the authorization
of a signing party by the software source supplier/licensor using trusted
mechanisms, similar to RFC 6844. Perhaps, one day, we may see a DNS Digital
Signature Authorization (DSA) record to meet this need. 

Everyone in the Energy industry really needs to follow this wise guidance
provided by NIST:

SP 800-161 R1: https://doi.org/10.6028/NIST.SP.800-161r1-draft  

SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY | CODE AUTHENTICATION 

Supplemental C-SCRM Guidance: The organization should ensure that code
authentication mechanisms such as digital signatures are implemented to
assure the integrity of software, firmware, and information.

This NIST guidance, combined with Software Supplier Identification
information contained in a digitally signed SBOM will go a long way to
addressing software supply chain issues.

Best,
Seb

 


Sebastian Schulz
Product Manager Client Certificates


 <http://www.globalsign.com/> 


Diestseveest 14, 3000 Leuven, Belgium
T +32 1652 0000 ext 5955 |  
Email: sebastian.schulz@globalsign.com
<mailto:masebastian.schulz@globalsign.comrk.freeman@globalsign.com>  


Connect on LinkedIn <https://www.linkedin.com/in/sebschulz/> 

Sign up to receive news and content from GlobalSign
<https://downloads.globalsign.com/acton/media/2674/preference-center-login> 

	

 <https://twitter.com/globalsign>
<http://www.linkedin.com/company/globalsign>
<http://www.facebook.com/globalsignssl>
<https://www.instagram.com/globalsign/>
<https://www.youtube.com/channel/UC8sZHRv5heWZpckgTAMBuJg> 


This e-mail message, including any attachments, is for the sole use of the
intended recipient(s) and may include trade secrets or privileged or
otherwise confidential information. Any unauthorized review, use,
forwarding, printing, copying, disclosure or distribution is strictly
prohibited. If you received this message in error, or have reason to believe
you are not authorized to receive it, please promptly delete this message,
destroy all copies, and notify the sender by e-mail.