Re: [Suit] Information model updates

Dick Brooks <dick@reliableenergyanalytics.com> Tue, 25 May 2021 22:13 UTC

Return-Path: <dick@reliableenergyanalytics.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 260D23A0ED7 for <suit@ietfa.amsl.com>; Tue, 25 May 2021 15:13:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.587
X-Spam-Level:
X-Spam-Status: No, score=-2.587 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_NONE=0.001, T_FILL_THIS_FORM_SHORT=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OB33Vbwjt4y2 for <suit@ietfa.amsl.com>; Tue, 25 May 2021 15:13:31 -0700 (PDT)
Received: from forward4-smtp.messagingengine.com (forward4-smtp.messagingengine.com [66.111.4.238]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E2163A0ECE for <suit@ietf.org>; Tue, 25 May 2021 15:13:31 -0700 (PDT)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailforward.nyi.internal (Postfix) with ESMTP id 71A7C19406C6; Tue, 25 May 2021 18:13:29 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute5.internal (MEProxy); Tue, 25 May 2021 18:13:29 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:reply-to:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; bh=3wcl8npuOqhQakBqn0Okrkg8Zcmn9fjbcKIPjWDlW/8=; b=KBKvvG7j +sx4U37kfMbKfqSrtzqY/3eQK8BHJs3hKrZAVC016hbvv5p7jEsvUFo+uGzAfceo PXdFTm69L+g4Afbm1NGQRAGMRXjvNuz4PS7uRU+WxxdNXBtuh+2raXF3nvUFjDS9 OSPqNF1qb01vVnh3Dl8xfEBYsMcsnN2wUzNB+1jyBqvkkYTohTdscZNnmKmUsPjf v5n4a2LF2IYNHuLnSDNTdIB4uR3d7gH3h0rUbmX18KNFpQ+0rCQT05yjY8oasZpC j6Ke5QGnYyqoEFFsmy7IBJ55FEm/cPGugyPlbl9iH6xVd2EX/jMGT/CI18G+x0kz 9khtRtgcXOiDfw==
X-ME-Sender: <xms:iXatYAZtgKOkhf8h9rNL7xOxliU4TEd26H-O_vLpxUIhu4TAiJy7hg> <xme:iXatYLbrH_1758Q2BCicXShH81jWNUh_UR1XEHfr2W1bvJyMiyaRQOpzhvBFp8Mcq 2t11ud9rVERqD3pzg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrvdekvddgtdeiucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne gfrhhlucfvnfffucdlqdeimdenucfjughrpehrhffvfhgjufffohfkgggtofhtsehrtdhg pedvtdejnecuhfhrohhmpedfffhitghkuceurhhoohhkshdfuceoughitghksehrvghlih grsghlvggvnhgvrhhghigrnhgrlhihthhitghsrdgtohhmqeenucggtffrrghtthgvrhhn peeutdeufeduvdejleelkeduleevveekjeetledthffhudeuvdelgfdvfeetudelleenuc ffohhmrghinheprhgvlhhirggslhgvvghnvghrghihrghnrghlhihtihgtshdrtghomhdp nhhtihgrrdhgohhvpdifhhhithgvhhhouhhsvgdrghhovhdpihgvthhfrdhorhhgpdgvnh gvrhhghigtvghnthhrrghlrdgtohhmpdhgihhthhhusgdrtghomhenucfkphepvdduiedr udelfedrudegvddrvddvnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrg hilhhfrhhomhepughitghksehrvghlihgrsghlvggvnhgvrhhghigrnhgrlhihthhitghs rdgtohhm
X-ME-Proxy: <xmx:iXatYK84hYvyatSjuszI7Re_012vkkeiO2tzkJ1KAt1ri6ZkS_iGgg> <xmx:iXatYKrI3WAB0i4ZE78XeyTNed6XpFPqniVUPChp_Zoze-N59RyR9g> <xmx:iXatYLrwsiUoq4RHhwWFGg9Th2ct0eLCCzm2v9j4_mYRPiJMKaV1yw> <xmx:iXatYFGflf8ppqZvyKd_abeMaB-ffqR2CDu6EPB-L3BVPXV3wnkn5g>
Received: from Warp9 (unknown [216.193.142.22]) by mail.messagingengine.com (Postfix) with ESMTPA; Tue, 25 May 2021 18:13:28 -0400 (EDT)
Reply-To: dick@reliableenergyanalytics.com
From: Dick Brooks <dick@reliableenergyanalytics.com>
To: 'Russ Housley' <housley@vigilsec.com>
Cc: 'suit' <suit@ietf.org>, 'Brendan Moran' <Brendan.Moran@arm.com>
References: <953A0DFE-D8C3-41B3-8AE3-53729378E00F@arm.com> <44670387-088C-4992-88FC-94B6F15752EE@vigilsec.com> <933f01d750a5$4393bae0$cabb30a0$@reliableenergyanalytics.com> <D4D48CC5-E9A3-47D8-A012-BB2B8A982F38@vigilsec.com> <93a501d750a7$ce12fb70$6a38f250$@reliableenergyanalytics.com> <3AC2D740-E230-42BB-92E4-4F2CC0B25E3C@vigilsec.com>
In-Reply-To: <3AC2D740-E230-42BB-92E4-4F2CC0B25E3C@vigilsec.com>
Date: Tue, 25 May 2021 18:13:24 -0400
Organization: Reliable Energy Analytics LLC
Message-ID: <b45d01d751b3$309eac60$91dc0520$@reliableenergyanalytics.com>
MIME-Version: 1.0
Content-Type: multipart/related; boundary="----=_NextPart_000_B45E_01D75191.A98F5650"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQDJ8Y05KEazaG0vQhpq6KAnOITvNwLfWPqlAa9WnJgA8kMwKgIxxHAwAc5vchSsw3fCYA==
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/DAY9JJb6XMGqwjoc54erlvJkjE4>
Subject: Re: [Suit] Information model updates
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 May 2021 22:13:37 -0000

Will do, Russ.

 

Just an FYI:

 

Here is a snippet from a discussion within NAESB today regarding supplier identification, signing key verification and the issuance of code signing keys. NAESB is in the process of updating it’s PKI standard as a first step to address this matter:

 

There is some support to use a dns:identifier within certain SBOM fields, here’s an SBOM example:

 

SPDXVersion: SPDX-2.2

DataLicense: CC0-1.0

SPDXID: SPDXRef-DOCUMENT

DocumentName: SAG-PM generated SBOM

DocumentNamespace: dns:softwareassuranceguardian.com

Creator: Organization: dns:reliableenergyanalytics.com

 

Using this example I could envision the DNS Zone file for reliableenergyanalytics.com

 

Having a DSA record identifying dns:ssl.com as an authorized signer for reliableenergyanalytics.com. This would enable a CA. i.e. GlobalSign, that receives a code signing CSR  to check reliableenergyanalytics.com DNS Zone file for a DSA record listing ssl.com as a authorized signer. 

 

This won’t solve the entire software supply chain issue with regard to identity and authorized signer verification, but it’s a good first step, that is missing today.

 

I’ll let you and the SUIT WG know if the concern I raised is already covered in draft-ietf-suit-manifest-13.

 

Thanks for looking into this.

 

Thanks,

 

Dick Brooks



 <https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™

 <http://www.reliableenergyanalytics.com/> http://www.reliableenergyanalytics.com

Email:  <mailto:dick@reliableenergyanalytics.com> dick@reliableenergyanalytics.com

Tel: +1 978-696-1788

 

From: Russ Housley <housley@vigilsec.com> 
Sent: Tuesday, May 25, 2021 5:22 PM
To: Dick Brooks <dick@reliableenergyanalytics.com>
Cc: suit <suit@ietf.org>; Brendan Moran <Brendan.Moran@arm.com>
Subject: Re: [Suit] Information model updates

 

Dick:

 

Please take a look at the current WG document (draft-ietf-suit-manifest-13).  I think that the discussion of dependencies and their processing is what you are asking about.

 

Russ

 





On May 24, 2021, at 10:19 AM, Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> > wrote:

 

Thanks, Russ. Sorry about that – here is the article contents – thanks for your insights and recommendation. Very interested in knowing your thoughts, especially regarding the DNS DSA concept.

 

We cannot secure the software supply chain without SBOM

 

A Software Bill of Materials (SBOM) <https://ntia.gov/sbom>  has received considerable attention since the Cybersecurity Executive order was released on May 12, 2021 <https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/>  calling on government agencies to require SBOM’s from software vendors, “(vii)   providing a purchaser a Software Bill of Materials (SBOM) for each product directly or by publishing it on a public website” 

The Executive Order goes on to describe an SBOM, with an emphasis on it’s component inventory capabilities, “Software Bill of Materials” or “SBOM” means a formal record containing the details and supply chain relationships of various components used in building software”, “It is analogous to a list of ingredients on food packaging.”

All of these claims are indeed accurate, however there is another essential and critically important element that SBOM’s provide, which is essential to secure the software supply chain; The identity of the software source supplier that produced and licensed the software, which can be verified using digital signing keys issued by trustworthy Certificate Authorities. 

Current practices used in the software supply chain do not require identification of the actual software supplier and licensor of a software package. Some practices require that software packages be digitally signed, however there is no verification or validation that the signer of a software package and the supplier/licensor are related, or that the supplier/licensor has authorized a given party to sign a software object on their behalf. This creates a false sense of security when parties rely on tools such as Microsoft’s signtool to validate a digital signature. Signtool does not validate that a digital signature is indeed authorized to sign a software product on behalf of the original source supplier/licensor – it has no way of verifying that a given signing key is authorized to sign a software package. Signtool will report a valid signature if the cryptographic verifications and trust chain reports produce successful results, which do not verify the authorization of a signing party and supplier arrangement. This issue is similar to a past scenario where Certificate Authorities were issuing SSL certificates to domains without authorization to do so, which resulted in the implementation of DNS CAA (IETF RFC 6844 <https://datatracker.ietf.org/doc/html/rfc6844> ) records to identify authorized parties to issue SSL certificates. A similar authorization scheme may be appropriate to authorize the issuance of digital certificates and signing keys to parties that have been authorized by a software supplier/licensor to sign software objects on their behalf.

The ability to determine trustworthiness is the key to securing the software supply chain. SBOM is the foundation for establishing this trust by specifying the identification of the actual source supplier/licensor of a software product. This supplier information can then be used to validate a digital signature applied to a software object by verifying the relationship of the software supplier and software signer using a trusted method to verify this relationship. A solution similar to DNS CAA, ref: “DNS Certification Authority Authorization (CAA) Resource Record”, IETF RFC 6844 <https://datatracker.ietf.org/doc/html/rfc6844>  may be worth exploring to address this need.
 
There is no doubt that securing the software supply chain requires a software consumer to verify the identity of a software source supplier and licensor of a software object. SBOM is a critical requirement in this process due to its standard method for identifying a software supplier/licensor of a software object. Having this SBOM supplier identifier will enable a software consumer to verify this party using digital signatures based on digital certificates issued by trusted Certificate Authorities.  What is missing today is a means to verify the authorization of a signing party by the software source supplier/licensor using trusted mechanisms, similar to RFC 6844. Perhaps, one day, we may see a DNS Digital Signature Authorization (DSA) record to meet this need. 
 

Thanks,

 

Dick Brooks

<image001.jpg>

 <https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™

 <http://www.reliableenergyanalytics.com/> http://www.reliableenergyanalytics.com

Email:  <mailto:dick@reliableenergyanalytics.com> dick@reliableenergyanalytics.com

Tel: +1 978-696-1788

 

From: Russ Housley <housley@vigilsec.com <mailto:housley@vigilsec.com> > 
Sent: Monday, May 24, 2021 10:14 AM
To: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> 
Cc: Brendan Moran <Brendan.Moran@arm.com <mailto:Brendan.Moran@arm.com> >; suit <suit@ietf.org <mailto:suit@ietf.org> >
Subject: Re: [Suit] Information model updates

 

Dick:

 

To read the article that you reference, I must join "The Energy Collective Group".  If you want us to consider your thoughts, you need to make them freely and openly available. Posting them here also has the desirable property that they get included in the mail archive of the WG discussion.

 

Russ






On May 24, 2021, at 10:01 AM, Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> > wrote:

 

Russ, et al,

 

               I’ve raised an issue with regard to software supplier identification and verification as part of a software supply chain verification. I haven’t been paying much attention to the SUIT and MUD work, so I would be curious to know if this issue also effects your work in this area. 

 

https://energycentral.com/c/ec/we-cannot-secure-software-supply-chain-without-sbom

 

Thanks,

 

Dick Brooks

<image001.jpg>

 <https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™

 <http://www.reliableenergyanalytics.com/> http://www.reliableenergyanalytics.com

Email:  <mailto:dick@reliableenergyanalytics.com> dick@reliableenergyanalytics.com

Tel: +1 978-696-1788

 

From: Suit <suit-bounces@ietf.org <mailto:suit-bounces@ietf.org> > On Behalf Of Russ Housley
Sent: Monday, May 24, 2021 9:55 AM
To: Brendan Moran <Brendan.Moran@arm.com <mailto:Brendan.Moran@arm.com> >
Cc: suit <suit@ietf.org <mailto:suit@ietf.org> >
Subject: Re: [Suit] Information model updates

 

The IESG is waiting for a revised Internet-Draft to be posted.

 

Russ







On May 13, 2021, at 6:06 AM, Brendan Moran <Brendan.Moran@arm.com <mailto:Brendan.Moran@arm.com> > wrote:

 

I’ve made a number of pull requests to the information model. These should address the issues raised by IESG review. 

 

See here for more information: https://github.com/suit-wg/information-model/pulls

 

Brendan

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you. 

_______________________________________________
Suit mailing list
Suit@ietf.org <mailto:Suit@ietf.org> 
https://www.ietf.org/mailman/listinfo/suit

 

_______________________________________________
Suit mailing list
 <mailto:Suit@ietf.org> Suit@ietf.org
 <https://www.ietf.org/mailman/listinfo/suit> https://www.ietf.org/mailman/listinfo/suit

 

_______________________________________________
Suit mailing list
 <mailto:Suit@ietf.org> Suit@ietf.org
 <https://www.ietf.org/mailman/listinfo/suit> https://www.ietf.org/mailman/listinfo/suit