Re: [Suit] Information model updates

Brendan Moran <Brendan.Moran@arm.com> Thu, 03 June 2021 11:16 UTC

Return-Path: <Brendan.Moran@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 637D23A34AC for <suit@ietfa.amsl.com>; Thu, 3 Jun 2021 04:16:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=5vxgmNdt; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=5vxgmNdt
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bkGU42C4wOeC for <suit@ietfa.amsl.com>; Thu, 3 Jun 2021 04:16:21 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40088.outbound.protection.outlook.com [40.107.4.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A2EF3A34AA for <suit@ietf.org>; Thu, 3 Jun 2021 04:16:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wx9c0oiMNdB430eYUUMVZXvOH1+ke/aKKzH/VH6X4o8=; b=5vxgmNdt0ijlNLiz5LOLsuSc417whsay2KIOr2i8T32Mjq2S2RrUncSbNqHFKVzmftFo2YkK+VYC0c2lsMViR9NOhxoEDBIzFrlIWxVcY4hashP4vgZ2rLEBkO4x9sVRABMbrHMifW1jrlmGP0AOSdgNFa4dvNmRLhQ1SPj4Z0I=
Received: from DU2PR04CA0295.eurprd04.prod.outlook.com (2603:10a6:10:28c::30) by VI1PR0802MB2560.eurprd08.prod.outlook.com (2603:10a6:800:ad::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.27; Thu, 3 Jun 2021 11:16:16 +0000
Received: from DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:28c:cafe::c8) by DU2PR04CA0295.outlook.office365.com (2603:10a6:10:28c::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.15 via Frontend Transport; Thu, 3 Jun 2021 11:16:16 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT034.mail.protection.outlook.com (10.152.20.87) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.21 via Frontend Transport; Thu, 3 Jun 2021 11:16:16 +0000
Received: ("Tessian outbound bf434e582664:v93"); Thu, 03 Jun 2021 11:16:16 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 42c51984770fd2a3
X-CR-MTA-TID: 64aa7808
Received: from 91e8cbdb0880.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id C951D28F-7547-4316-96AA-656640FED1E0.1; Thu, 03 Jun 2021 11:16:08 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 91e8cbdb0880.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 03 Jun 2021 11:16:08 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Vr6jurkwGjNev/uRDkjEG6Hkl6SLez722yiqH3c5ygKuMJ+hbMrc3gXfwUijVgdfBfBMp9KYEf+HV+F6fWuUvZv28rlf9jwyB7bAap4dj/9qv4wO42NyrMQOxKQz+TckJ/jqfgQm21r4J1jUdOuTCWT8o90vjzdPNuORYF9NnOb831AEd156H+KpgDNMtH+d6I3YDn2XxCZExltd3NLrIxyYi4BJOSi80BPj807rVa+Ui0aZ+PpTzTk32K8RfinCdbqD1OEQnG8MpnlN/FQjIBUyd+q+ebMXw9m1v6Uf2FeLZQXD5XBS/u/jUqd+09TPfmdFg4jY5dgyO9RCfeOi8w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wx9c0oiMNdB430eYUUMVZXvOH1+ke/aKKzH/VH6X4o8=; b=M9DJK3wWp8FSXIkGB4Unggu/Aj+OhpVsCZ28/TxgaVPzuipox1WjUTyNWUuVtUSTzsn129U8Dg2DYzbBRgDVX87xkjteuM5TuJ+6GUXmGsTeXFmQBHuu6WM913k8IMqlwWTzWjvofvu9XiPFj2L5aaSLgldmiFohv3sp9a0luMKIgpbnpLrdUgSXGHt8HY/GdrFenqkuFKwaMMErIkEvd7wlVxpMo1qpKlSDUDEbSKR7dkDstqnd8zElAhEMvaxXy3s7WUmuOwGZzlkVfdy+O+BadvBWx0PnA8F6RncMMsLc6wF6p5TOwGpJN8OE/DFnnJmlSPNpAv1G3MlWfSLnbA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wx9c0oiMNdB430eYUUMVZXvOH1+ke/aKKzH/VH6X4o8=; b=5vxgmNdt0ijlNLiz5LOLsuSc417whsay2KIOr2i8T32Mjq2S2RrUncSbNqHFKVzmftFo2YkK+VYC0c2lsMViR9NOhxoEDBIzFrlIWxVcY4hashP4vgZ2rLEBkO4x9sVRABMbrHMifW1jrlmGP0AOSdgNFa4dvNmRLhQ1SPj4Z0I=
Received: from DBAPR08MB5576.eurprd08.prod.outlook.com (2603:10a6:10:1ae::11) by DB6PR0802MB2181.eurprd08.prod.outlook.com (2603:10a6:4:82::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.20; Thu, 3 Jun 2021 11:16:05 +0000
Received: from DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::488c:be63:d9fe:b0e0]) by DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::488c:be63:d9fe:b0e0%7]) with mapi id 15.20.4195.022; Thu, 3 Jun 2021 11:16:05 +0000
From: Brendan Moran <Brendan.Moran@arm.com>
To: "dick@reliableenergyanalytics.com" <dick@reliableenergyanalytics.com>
CC: Russ Housley <housley@vigilsec.com>, suit <suit@ietf.org>
Thread-Topic: [Suit] Information model updates
Thread-Index: AQHXR9+azD0f2ObdDkOh3MQyPUlMOKryuRMAgAABsICAAAOlgIAAAXAAgAIIeACAAA5MAIAA4VMAgAMkUICAADgsAIAJL4QA
Date: Thu, 03 Jun 2021 11:16:05 +0000
Message-ID: <7B575C58-7F68-4F8C-9BE3-118EFB601A98@arm.com>
References: <953A0DFE-D8C3-41B3-8AE3-53729378E00F@arm.com> <44670387-088C-4992-88FC-94B6F15752EE@vigilsec.com> <933f01d750a5$4393bae0$cabb30a0$@reliableenergyanalytics.com> <D4D48CC5-E9A3-47D8-A012-BB2B8A982F38@vigilsec.com> <93a501d750a7$ce12fb70$6a38f250$@reliableenergyanalytics.com> <3AC2D740-E230-42BB-92E4-4F2CC0B25E3C@vigilsec.com> <b45d01d751b3$309eac60$91dc0520$@reliableenergyanalytics.com> <babd01d75223$d9e3b1b0$8dab1510$@reliableenergyanalytics.com> <f86601d753b6$023a08b0$06ae1a10$@reliableenergyanalytics.com> <1039d01d753d2$181e5e80$485b1b80$@reliableenergyanalytics.com>
In-Reply-To: <1039d01d753d2$181e5e80$485b1b80$@reliableenergyanalytics.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.100.0.2.22)
Authentication-Results-Original: reliableenergyanalytics.com; dkim=none (message not signed) header.d=none;reliableenergyanalytics.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [80.7.184.196]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-Correlation-Id: c2b365bb-47b0-45b8-5579-08d92681014c
x-ms-traffictypediagnostic: DB6PR0802MB2181:|VI1PR0802MB2560:
X-Microsoft-Antispam-PRVS: <VI1PR0802MB2560233C1B78BD5F915B9F24EA3C9@VI1PR0802MB2560.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBAPR08MB5576.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(366004)(39850400004)(376002)(136003)(396003)(122000001)(38100700002)(966005)(53546011)(6916009)(30864003)(4326008)(36756003)(15650500001)(45080400002)(26005)(71200400001)(76116006)(5660300002)(8936002)(8676002)(2906002)(66946007)(66476007)(64756008)(91956017)(478600001)(66446008)(66556008)(86362001)(6512007)(316002)(2616005)(6486002)(54906003)(83380400001)(166002)(33656002)(186003)(21615005)(66574015)(6506007)(45980500001)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_7B575C587F684F8C9BE3118EFB601A98armcom_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2181
Original-Authentication-Results: reliableenergyanalytics.com; dkim=none (message not signed) header.d=none;reliableenergyanalytics.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 48e2ccb5-d195-4cc8-6312-08d92680faeb
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: sh/aZVjk3vZqwNR3v4CRO9F4n6+5rL4/q0e1bseKW4bX9xklhSlTmz/CHg4Z6IR5xU/yKe6QiGs/4x0H83+UxGeVZ5IphusNcFb0dpj41aM695O6ia1Iqn+C06r+mklcO/A2fomSmxE5Id7VNyc8DpMjB9QpXQiz3/VIw1jTmuy6BBLZWl786jxLrsuNyHdEO4M9yw0d2U5GxM+XufJYANqxE0rRnPNCfDiBwM0U8UJdQk7xCkNOvHt5laN7G1NQhM1FOPkuFYiUYYFKJRyT7+kxUtsqnFZPwcFrQ1eYjj+URIDNZ/Ru17mAR8V+NIjTXKShCDR7mwMZTKDsVz1EOjQh16yUz6UZbL7enwV6DH4OQIG6XL6T1dI+jmdIj6PttN3XMK15XnYTEUqyjHIwSFnSrM9/lRpywvS0G6BxLa9hrcH56zobQiKG2+RxTEt8DB3UQB6kyehVxQqjndMZMD2NfYaZ+pkP4dlyrm3zXEdLshjbyagDvV3X+ZHn1xvkmLIGk41MK7ccg6Vi1e8K8w0O16Q3nl4ngxXX3MaL7j6gOROoixCGBQ5Mj69Xa7T7ZQeM/1qMcSpeQLtml2UPpMb5A9NvvuGuiShYvUNUQTmdrRkg/Zd72xzBWugCWkF+LLNnUrJg81zQBC+9qtPaSBYSZbF9pdNAYUqrLul/5FjdfIFrSb5fFU2cSWhJoAa0Cym3Btm9lwwU2kz6yCN2cs962HzQtwk+Cj3x8Bc1I5FX+3dA/tLvJUQR+sKZWJMaY9ECFrIyjGq5aPeOPhN60gpx+hGwld5KMMLAAFOj2oXsRwT0/tSomJlHcEQ4SCHL
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(396003)(136003)(376002)(346002)(39850400004)(46966006)(36840700001)(36860700001)(4326008)(5660300002)(336012)(2906002)(15650500001)(83380400001)(45080400002)(70586007)(6506007)(21615005)(26005)(70206006)(36756003)(356005)(6862004)(66574015)(166002)(966005)(33964004)(54906003)(316002)(82310400003)(6512007)(33656002)(478600001)(53546011)(8936002)(8676002)(6486002)(47076005)(186003)(2616005)(86362001)(82740400003)(81166007)(30864003)(559001)(579004); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Jun 2021 11:16:16.3972 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: c2b365bb-47b0-45b8-5579-08d92681014c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2560
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/UGmEPHy4lIhq-qkC1hQz2YnwjoM>
Subject: Re: [Suit] Information model updates
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Jun 2021 11:16:28 -0000

Hi Dick,

I’m not sure if I’ve answered this in the parallel discussion we were having on malware scan attestation, but I’ll address it here too.

Logically, every way that we approach this is a de-facto delegation scheme:


  1.  The Trust Provisioning Authority (TPA) delegates some authority to Trust Anchors (TA) by installing those TAs in the device with some mechanism to specify what permissions they have. Permissions may be, for example:
     *   Authorship rights to individual software components
     *   Authorship rights to groups of components
     *   Qualification Rights (verification that SW works for intended purpose)
     *   Malware Attestation Rights
     *   Distribution Rights (authorisation to override certain parts of a manifest, enabling the Trust Anchor or its delegate to redirect fetches from public to private infrastructure, for example)
  2.  Each TA may delegate some or all of its permissions to a subordinate authority (SA)
  3.  Each SA may delegate some or all of its permissions to a further SA.
  4.  Each SA may sign a manifest.

We have not been prescriptive about the exact mechanism for 1. because there are many, equally valid ways for it to be done. For example, this may be done by:

  1.  Installing a TA in a specific location with predefined permissions
  2.  Referencing a TA Subject Key Identifier in an Access Control List, signed by the TPA
  3.  Signing a TA “certificate” including key usage fields with the TPA’s private key.

Each of these approaches is equally valid and allows a verifier to work backwards from the manifest directly to the TPA, as the ultimate authority.

To accomplish this, the verifier is required to:

  1.  Verify each delegation chain:
     *   Extract the first delegation CWT, containing the first SA
     *   Verify the CWT against the specified TA
     *   Compute the permissions of the first SA using the TA permissions and the delegation CWT
     *   Extract the next delegation CWT
     *   Verify the CWT against the previous SA
     *   Compute the permissions of the next SA using the previous SA permissions and the delegation CWT
     *   If there are more CWTs to process, go to 4, otherwise:
     *   Compute the final SA permissions
  2.  Verify the manifest authenticity & authority
     *   Verify each manifest signature against the specified SA (typically the final SA of a chain)
     *   Compute the aggregate manifest permissions:
        *   This is the union of the permissions of every signer of the manifest.
  3.  Process the manifest
     *   For each command in the manifest:
        *   Verify that the manifest has adequate permissions to perform the specified operation on the specified component identifier
        *   Perform the command
     *   Where a dependency manifest is encountered:
        *   Dependency permissions are the union of the dependency manifest’s aggregate permissions and all dependent manifests’ aggregate permissions

This enables a full chain of trust with explicit permissions all the way back to the TPA. Hopefully this explains the process. Is there a place that this needs to be more fully explained?

Best Regards,
Brendan




On 28 May 2021, at 15:59, Dick Brooks <dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>> wrote:

As I was tracing back the verification process in the Manifest https://datatracker.ietf.org/doc/html/draft-ietf-suit-manifest-13
https://datatracker.ietf.org/doc/html/draft-ietf-suit-manifest-13#section-5.2

This eventually led me to COSE’s Signing and Verification process<https://datatracker.ietf.org/doc/html/rfc8152#section-4.4>, which contains the following guidance:

In addition to performing the signature verification, the application
   may also perform the appropriate checks to ensure that the key is
   correctly paired with the signing identity and that the signing
   identity is authorized before performing actions.

This is where I hit the dead end – I could not find guidance on the  appropriate checks to ensure that the key is
   correctly paired with the signing identity and that the signing
   identity is authorized before performing actions

Any insights on what are the appropriate checks would be greatly appreciated. Thanks in advance.

Thanks,

Dick Brooks
<image001.jpg>
Never trust software, always verify and report!<https://reliableenergyanalytics.com/products>http://www.reliableenergyanalytics.com<http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788

From: Dick Brooks <dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>>
Sent: Friday, May 28, 2021 7:39 AM
To: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>; 'Russ Housley' <housley@vigilsec.com<mailto:housley@vigilsec.com>>
Cc: 'suit' <suit@ietf.org<mailto:suit@ietf.org>>; 'Brendan Moran' <Brendan.Moran@arm.com<mailto:Brendan.Moran@arm.com>>
Subject: RE: [Suit] Information model updates

Russ and SUIT WG members,

I’m continuing to research how trust in a digital signature -> software supplier is being established and verified. And I have a question regarding the SUIT architecture.

The need for validation is made clear in the Architecture<https://www.rfc-editor.org/rfc/rfc9019.html>:

Authentication ensures that the device can cryptographically identify the author(s) creating firmware images and manifests. Authenticated identities may be used as input to the authorization process. Not all entities creating and signing manifests have the same permissions. A device needs to determine whether the requested action is indeed covered by the permission of the party that signed the manifest. Informing the device about the permissions of the different parties also happens in an out-of-band fashion and is a duty of the Trust Provisioning Authority.

I looked further for some guidance on how a Trust Provisioning Authority is expected to ensure that a signing party has received permission to sign a firmware update from the original software supplier. I didn’t find anything in this regard.

Can you point me to some information regarding the verification steps a TPA is required to implement to ensure that a signing party has been authorized to sign a software object on behalf of the original developer/licensor of a software object?

It appears the device relies on the TPA’s assertion that a signature on software is indeed authorized and trustworthy without performing any checks on it’s own that this is indeed the case. Is my understanding correct?

Lastly, what party is expected to perform TPA roles/responsibilities – Certificate Authorities?

Thanks,

Dick Brooks
<image001.jpg>
Never trust software, always verify and report!<https://reliableenergyanalytics.com/products>http://www.reliableenergyanalytics.com<http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788

From: Dick Brooks <dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>>
Sent: Wednesday, May 26, 2021 7:40 AM
To: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>; 'Russ Housley' <housley@vigilsec.com<mailto:housley@vigilsec.com>>
Cc: 'suit' <suit@ietf.org<mailto:suit@ietf.org>>; 'Brendan Moran' <Brendan.Moran@arm.com<mailto:Brendan.Moran@arm.com>>
Subject: RE: [Suit] Information model updates

Russ,

I looked through draft 13 and I didn’t see anything explicit. It looks like the information model (https://datatracker.ietf.org/doc/html/draft-ietf-suit-information-model-11#section-4)  touches this subject, but I don’t see any materials that explicitly provides guidance regarding: “how to verify that a signing party is authorized to sign software licensed/produced by party X and is considered a trusted party. “

This verification step would need to occur during digital signature verification to confirm that the signing party has been authorized to sign software on behalf of party X.

If you think this is not an appropriate topic for this WG then I can take it off list. Any insights you or the WG can offer is appreciated.

Please accept my apologies if this is not a proper topic for the suit WG.

Thanks,

Dick Brooks
<image001.jpg>
Never trust software, always verify and report!<https://reliableenergyanalytics.com/products>http://www.reliableenergyanalytics.com<http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788

From: Suit <suit-bounces@ietf.org<mailto:suit-bounces@ietf.org>> On Behalf Of Dick Brooks
Sent: Tuesday, May 25, 2021 6:13 PM
To: 'Russ Housley' <housley@vigilsec.com<mailto:housley@vigilsec.com>>
Cc: 'suit' <suit@ietf.org<mailto:suit@ietf.org>>; 'Brendan Moran' <Brendan.Moran@arm.com<mailto:Brendan.Moran@arm.com>>
Subject: Re: [Suit] Information model updates

Will do, Russ.

Just an FYI:

Here is a snippet from a discussion within NAESB today regarding supplier identification, signing key verification and the issuance of code signing keys. NAESB is in the process of updating it’s PKI standard as a first step to address this matter:

There is some support to use a dns:identifier within certain SBOM fields, here’s an SBOM example:

SPDXVersion: SPDX-2.2
DataLicense: CC0-1.0
SPDXID: SPDXRef-DOCUMENT
DocumentName: SAG-PM generated SBOM
DocumentNamespace: dns:softwareassuranceguardian.com<http://softwareassuranceguardian.com>
Creator: Organization: dns:reliableenergyanalytics.com<http://reliableenergyanalytics.com>

Using this example I could envision the DNS Zone file for reliableenergyanalytics.com<http://reliableenergyanalytics.com>

Having a DSA record identifying dns:ssl.com<http://ssl.com> as an authorized signer for reliableenergyanalytics.com<http://reliableenergyanalytics.com>. This would enable a CA. i.e. GlobalSign, that receives a code signing CSR  to check reliableenergyanalytics.com<http://reliableenergyanalytics.com> DNS Zone file for a DSA record listing ssl.com<http://ssl.com> as a authorized signer.

This won’t solve the entire software supply chain issue with regard to identity and authorized signer verification, but it’s a good first step, that is missing today.

I’ll let you and the SUIT WG know if the concern I raised is already covered in draft-ietf-suit-manifest-13.

Thanks for looking into this.

Thanks,

Dick Brooks
<image001.jpg>
Never trust software, always verify and report!<https://reliableenergyanalytics.com/products>http://www.reliableenergyanalytics.com<http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788

From: Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>>
Sent: Tuesday, May 25, 2021 5:22 PM
To: Dick Brooks <dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>>
Cc: suit <suit@ietf.org<mailto:suit@ietf.org>>; Brendan Moran <Brendan.Moran@arm.com<mailto:Brendan.Moran@arm.com>>
Subject: Re: [Suit] Information model updates

Dick:

Please take a look at the current WG document (draft-ietf-suit-manifest-13).  I think that the discussion of dependencies and their processing is what you are asking about.

Russ


On May 24, 2021, at 10:19 AM, Dick Brooks <dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>> wrote:

Thanks, Russ. Sorry about that – here is the article contents – thanks for your insights and recommendation. Very interested in knowing your thoughts, especially regarding the DNS DSA concept.

We cannot secure the software supply chain without SBOM

A Software Bill of Materials (SBOM)<https://ntia.gov/sbom> has received considerable attention since the Cybersecurity Executive order was released on May 12, 2021<https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/> calling on government agencies to require SBOM’s from software vendors, “(vii)   providing a purchaser a Software Bill of Materials (SBOM) for each product directly or by publishing it on a public website”
The Executive Order goes on to describe an SBOM, with an emphasis on it’s component inventory capabilities, “Software Bill of Materials” or “SBOM” means a formal record containing the details and supply chain relationships of various components used in building software”, “It is analogous to a list of ingredients on food packaging.”
All of these claims are indeed accurate, however there is another essential and critically important element that SBOM’s provide, which is essential to secure the software supply chain; The identity of the software source supplier that produced and licensed the software, which can be verified using digital signing keys issued by trustworthy Certificate Authorities.
Current practices used in the software supply chain do not require identification of the actual software supplier and licensor of a software package. Some practices require that software packages be digitally signed, however there is no verification or validation that the signer of a software package and the supplier/licensor are related, or that the supplier/licensor has authorized a given party to sign a software object on their behalf. This creates a false sense of security when parties rely on tools such as Microsoft’s signtool to validate a digital signature. Signtool does not validate that a digital signature is indeed authorized to sign a software product on behalf of the original source supplier/licensor – it has no way of verifying that a given signing key is authorized to sign a software package. Signtool will report a valid signature if the cryptographic verifications and trust chain reports produce successful results, which do not verify the authorization of a signing party and supplier arrangement. This issue is similar to a past scenario where Certificate Authorities were issuing SSL certificates to domains without authorization to do so, which resulted in the implementation of DNS CAA (IETF RFC 6844<https://datatracker.ietf.org/doc/html/rfc6844>) records to identify authorized parties to issue SSL certificates. A similar authorization scheme may be appropriate to authorize the issuance of digital certificates and signing keys to parties that have been authorized by a software supplier/licensor to sign software objects on their behalf.

The ability to determine trustworthiness is the key to securing the software supply chain. SBOM is the foundation for establishing this trust by specifying the identification of the actual source supplier/licensor of a software product. This supplier information can then be used to validate a digital signature applied to a software object by verifying the relationship of the software supplier and software signer using a trusted method to verify this relationship. A solution similar to DNS CAA, ref: “DNS Certification Authority Authorization (CAA) Resource Record”, IETF RFC 6844<https://datatracker.ietf.org/doc/html/rfc6844> may be worth exploring to address this need.



There is no doubt that securing the software supply chain requires a software consumer to verify the identity of a software source supplier and licensor of a software object. SBOM is a critical requirement in this process due to its standard method for identifying a software supplier/licensor of a software object. Having this SBOM supplier identifier will enable a software consumer to verify this party using digital signatures based on digital certificates issued by trusted Certificate Authorities.  What is missing today is a means to verify the authorization of a signing party by the software source supplier/licensor using trusted mechanisms, similar to RFC 6844. Perhaps, one day, we may see a DNS Digital Signature Authorization (DSA) record to meet this need.



Thanks,

Dick Brooks
<image001.jpg>
Never trust software, always verify and report!<https://reliableenergyanalytics.com/products>http://www.reliableenergyanalytics.com<http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788

From: Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>>
Sent: Monday, May 24, 2021 10:14 AM
To: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>
Cc: Brendan Moran <Brendan.Moran@arm.com<mailto:Brendan.Moran@arm.com>>; suit <suit@ietf.org<mailto:suit@ietf.org>>
Subject: Re: [Suit] Information model updates

Dick:

To read the article that you reference, I must join "The Energy Collective Group".  If you want us to consider your thoughts, you need to make them freely and openly available. Posting them here also has the desirable property that they get included in the mail archive of the WG discussion.

Russ

On May 24, 2021, at 10:01 AM, Dick Brooks <dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>> wrote:

Russ, et al,

               I’ve raised an issue with regard to software supplier identification and verification as part of a software supply chain verification. I haven’t been paying much attention to the SUIT and MUD work, so I would be curious to know if this issue also effects your work in this area.

https://energycentral.com/c/ec/we-cannot-secure-software-supply-chain-without-sbom

Thanks,

Dick Brooks
<image001.jpg>
Never trust software, always verify and report!<https://reliableenergyanalytics.com/products>http://www.reliableenergyanalytics.com<http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788

From: Suit <suit-bounces@ietf.org<mailto:suit-bounces@ietf.org>> On Behalf Of Russ Housley
Sent: Monday, May 24, 2021 9:55 AM
To: Brendan Moran <Brendan.Moran@arm.com<mailto:Brendan.Moran@arm.com>>
Cc: suit <suit@ietf.org<mailto:suit@ietf.org>>
Subject: Re: [Suit] Information model updates

The IESG is waiting for a revised Internet-Draft to be posted.

Russ

On May 13, 2021, at 6:06 AM, Brendan Moran <Brendan.Moran@arm.com<mailto:Brendan.Moran@arm.com>> wrote:

I’ve made a number of pull requests to the information model. These should address the issues raised by IESG review.

See here for more information: https://github.com/suit-wg/information-model/pulls

Brendan
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
_______________________________________________
Suit mailing list
Suit@ietf.org<mailto:Suit@ietf.org>
https://www.ietf.org/mailman/listinfo/suit

_______________________________________________
Suit mailing list
Suit@ietf.org<mailto:Suit@ietf.org>
https://www.ietf.org/mailman/listinfo/suit

_______________________________________________
Suit mailing list
Suit@ietf.org<mailto:Suit@ietf.org>
https://www.ietf.org/mailman/listinfo/suit

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.