Re: [Suit] CEK Distribution Method

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Sat, 03 March 2018 07:05 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD996120454 for <suit@ietfa.amsl.com>; Fri, 2 Mar 2018 23:05:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.909
X-Spam-Level:
X-Spam-Status: No, score=-2.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=-1, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DxTg5B0k66sS for <suit@ietfa.amsl.com>; Fri, 2 Mar 2018 23:05:21 -0800 (PST)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0051.outbound.protection.outlook.com [104.47.1.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 074E1127863 for <suit@ietf.org>; Fri, 2 Mar 2018 23:05:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=w3SeYo20h8lsHLeg1EtyVOmMlssKf9Erys8WpKLVbZg=; b=G5WXihmyp0fFM5uQ34HHkgzhHYKDMyhDwmE0toyUMSug7LWpVLcP9J724rqbx3oEQ+Y78QDWnka8OoisEjDQuZ4bc9jk07EDA21u5Z1x52zs/ret9pdbeH5BTWlmLjF9wHopmu0lYafucbMDOYx4dS5xk+jwM/aH6l0vgYg3Ogw=
Received: from AM4PR0801MB2706.eurprd08.prod.outlook.com (10.167.90.148) by AM4PR0801MB1521.eurprd08.prod.outlook.com (10.168.5.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.548.13; Sat, 3 Mar 2018 07:05:19 +0000
Received: from AM4PR0801MB2706.eurprd08.prod.outlook.com ([fe80::7954:44ac:aab4:bc2c]) by AM4PR0801MB2706.eurprd08.prod.outlook.com ([fe80::7954:44ac:aab4:bc2c%14]) with mapi id 15.20.0548.014; Sat, 3 Mar 2018 07:05:19 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: "Markus.Gueller@infineon.com" <Markus.Gueller@infineon.com>, Brendan Moran <Brendan.Moran@arm.com>, "suit@ietf.org" <suit@ietf.org>
Thread-Topic: CEK Distribution Method
Thread-Index: AdOyCm7Bc920ww+7Q4unKVT0TnRUMQAsmgmg
Date: Sat, 03 Mar 2018 07:05:18 +0000
Message-ID: <AM4PR0801MB2706D8254F9F2313F33A48BFFAC40@AM4PR0801MB2706.eurprd08.prod.outlook.com>
References: <6cd67759bf1d4b26a99197802b82f891@infineon.com>
In-Reply-To: <6cd67759bf1d4b26a99197802b82f891@infineon.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com;
x-originating-ip: [80.92.122.126]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR0801MB1521; 7:GWVXs3OZFQEpseqaqFEx5O2iG2cJs/2/Vldz833sL5gincvO+M/IGunu+NHYgT/u/tAGUBq32RPBd0M+xCbaAaA5AmraEicDfP/+q7JscmRC71S2Usutux81eh+3irGMQpJVkoOlJDHNIQwzuT7+OMXSwnOM+GNoGZU34RW7FHh6DNJ/8DnwbK+E0lKZShmdXel1Y1Z6Pt/2RAZr/01mQDDkCRG04QAdkSNLdLN95cb45OYxbM0I9EVlqQEi4rmE
x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: adb52f94-82bd-4682-db16-08d580d51fa4
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603307)(7153060)(7193020); SRVR:AM4PR0801MB1521;
x-ms-traffictypediagnostic: AM4PR0801MB1521:
x-microsoft-antispam-prvs: <AM4PR0801MB15214729CD31718FAB15B083FAC40@AM4PR0801MB1521.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(192374486261705)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040501)(2401047)(8121501046)(5005006)(3231220)(944501244)(52105095)(93006095)(93001095)(3002001)(10201501046)(6055026)(6041288)(20161123560045)(20161123564045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(6072148)(201708071742011); SRVR:AM4PR0801MB1521; BCL:0; PCL:0; RULEID:; SRVR:AM4PR0801MB1521;
x-forefront-prvs: 0600F93FE1
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(376002)(346002)(39860400002)(396003)(39380400002)(40434004)(51914003)(189003)(199004)(54896002)(33656002)(68736007)(6306002)(72206003)(14454004)(97736004)(9686003)(478600001)(9326002)(3660700001)(106356001)(105586002)(74316002)(3480700004)(25786009)(5660300001)(7116003)(7736002)(3280700002)(26005)(186003)(55016002)(316002)(102836004)(53546011)(59450400001)(6506007)(8676002)(8936002)(81156014)(81166006)(229853002)(99286004)(6436002)(790700001)(7696005)(6116002)(3846002)(86362001)(5890100001)(5250100002)(2501003)(2906002)(53936002)(110136005)(2900100001)(66066001)(2950100002)(561944003)(76176011)(6246003); DIR:OUT; SFP:1101; SCL:1; SRVR:AM4PR0801MB1521; H:AM4PR0801MB2706.eurprd08.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: r0a875KBmThXq9TPryY9GinKFGGdZ87sszXadYCuFU4EH9EfbafiUttHrKpdoM/MdiUoA1ATfZ+C/cgx4FSkVqna+fIkK0hiPcFzX3ZO3/IduF3vA1odItCqSR2J+tK0BUShJloFcQ39cGINTZ5iP6oonWkTBK4NYsWUvPfAGxA=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_AM4PR0801MB2706D8254F9F2313F33A48BFFAC40AM4PR0801MB2706_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: adb52f94-82bd-4682-db16-08d580d51fa4
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2018 07:05:18.9298 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0801MB1521
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/J7f2xtZtaI-T6_mzrOC3Y-PRD3o>
Subject: Re: [Suit] CEK Distribution Method
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Mar 2018 07:05:23 -0000

Hi Markus,

I guess we will have to look into the symmetric key mechanism in the near future and I have taken your wording changes into account when submitting the -02 version. Thanks for the text proposals.

Ciao
Hannes

From: Markus.Gueller@infineon.com [mailto:Markus.Gueller@infineon.com]
Sent: 02 March 2018 11:51
To: Hannes Tschofenig; Brendan Moran; suit@ietf.org
Subject: CEK Distribution Method


Hannes,



I added comments regarding your suggestion, question to CEK Distribution Method marked with [mg].



Thanks,

Markus

Page 9, Section 4 Architecture

It states: "
For confidentiality protection of firmware images the author needs
      to be in possession of the certificate/public key of a device."

There are also Symmetric Key Options (Recipient Algorithms) for Content Encryption Key (CEK) Distribution, which is actually already stated in the manifest draft .
-Therefore the above sentence should be updated to reflect, clarify also usage of symmetric keys as an additional option for confidentiality protection!?

[Hannes] I believe this is correct since the use of a key transport mechanism would require the use of public key encryption of the content encryption key. The CEK would then be used to encrypt the firmware image itself. This would still require the author to know the public keys of all the device.

The pure use of symmetric keys has only been envisioned but not described so far.

[mg] Regarding your point that it has not been described so far I had a different understanding when I browsed through the manifest.
That was actually my original motivation for that comment to have consistency between what is stated in the architecture and in the manifest.
The current manifest version, Page 8, Secion 3.2 states:
" Encryption is handled by the COSE_Encrypt structure.  Most encryption
   modes are already supported via the COSE_Encrypt structure, only per-
   device pre-shared keys (or per-device ECDH derivation of pre-shared
   keys) needs to be described."

'Most encryption modes are already supported via the COSE_Encrypt structure'
implied to me that one can use any Mode defined in COSE_Encrypt including symmetric keys to 'protect' the CEK.
Also the text 'only per- device pre-shared keys' implied usage of symmetric keys to me.

This has been described in the initial FUD manifest version, which had explicit text describing pre-shared keys :
Encryption using a symmetric key (mode="preSharedKey").  The
      assumption is that the symmetric key is pre-provisioned (in an
      out-of-band fashion) on the IoT device and also available to the
      developer.

In addition to have consistency with the manifest, I don't see why SUIT should limit the options provided by COSE  (e.g. stated in section 5.1.1) or CMS to Public Key only (Key Transport using RSA or Key Agreement using ECC) for CEK Distribution.
Therefore I would still propose the text in section 4 to something like this:

"For confidentiality protection of firmware images the author needs
      to be in possession of the certificate/public key or a pre-shared key of a device."





[Hannes] This is a good idea. I added the following text:
...

A.6.15.  Manifest Field: Key Table



   Encrypting firmware images requires symmetric content encryption keys

   to be provided in the manifest, which themselves have to be encrypted

   using the public keys of devices.


   Implements: Security Requirement MFSR7

[mg] What you describe is a good option, but not the only one. As stated above I would prefer not to limit it only to public keys and keep it more generic.
In addition the Heading 'Key Table' is also one option to do that, but not the only one.
Here is a proposal for more generic text, considering what you suggested as an example:

A.6.15.  Manifest Field: Content Key Distribution Method
Encrypting firmware images requires symmetric content encryption keys.
Since there are several methods to protect or distribute the symmetric content encryption keys, the manifest contains a field for the Content Key Distribution Method.
One examples for such a Content Key Distribution Method is the usage of Key Tables, pointing to content encryption keys, which themselves are encrypted using the public keys of devices.

Implements: Security Requirement MFSR7.

Would this be acceptable?
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.