Re: [Suit] suit-firmware-encryption-00

Brendan Moran <Brendan.Moran@arm.com> Wed, 02 June 2021 12:57 UTC

Return-Path: <Brendan.Moran@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 874C03A4228 for <suit@ietfa.amsl.com>; Wed, 2 Jun 2021 05:57:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=eB3PB7Bf; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=eB3PB7Bf
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZGmYBmauMV7g for <suit@ietfa.amsl.com>; Wed, 2 Jun 2021 05:57:52 -0700 (PDT)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2067.outbound.protection.outlook.com [40.107.21.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EAF773A4225 for <suit@ietf.org>; Wed, 2 Jun 2021 05:57:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h47n8zp3ZaeOcpB08Q6xHykiTL8IUwm0WnFTP8ohCV0=; b=eB3PB7BfaPSx/Lp6WB+Q6SGwLxk++hHSA4yAcbM85v95oRJ4DuLyZpj5ZlaN/dysoeBvEBJxhFTgs6Zk9+kTAMjhOmpqpfjnZ+fc0LpMQITX/atzu/O5gKoftB46FLOiL1fjRkA6C3Y/bez2Wum3NwA+oiSwwYu0vaqTLEA2Fvo=
Received: from DB6PR0202CA0006.eurprd02.prod.outlook.com (2603:10a6:4:29::16) by AM9PR08MB7031.eurprd08.prod.outlook.com (2603:10a6:20b:41d::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.22; Wed, 2 Jun 2021 12:57:49 +0000
Received: from DB5EUR03FT042.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:29:cafe::6d) by DB6PR0202CA0006.outlook.office365.com (2603:10a6:4:29::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.22 via Frontend Transport; Wed, 2 Jun 2021 12:57:48 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT042.mail.protection.outlook.com (10.152.21.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.21 via Frontend Transport; Wed, 2 Jun 2021 12:57:48 +0000
Received: ("Tessian outbound 2977cc564e34:v93"); Wed, 02 Jun 2021 12:57:48 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: bca8bb5d25237d5c
X-CR-MTA-TID: 64aa7808
Received: from b72a9ed2c8f7.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 628C3805-FE4E-415B-A312-FFC318130AAF.1; Wed, 02 Jun 2021 12:57:38 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b72a9ed2c8f7.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 02 Jun 2021 12:57:38 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TvZ9EPJR9HS/zJUfdSYvo5WgPX7LJzRaEpVSWPgVs6BH1/MKnfhYX36o9at9x/AB9QRZzgwDkOm7DL9aCgOJJVjuvnlVqOtnhM5l0fEgG2A7hEbCMt0b2E3D2utZiCrVcJo1pw1ONdjyKbfn3QFyWUA80DI2JEhmCgnhrjufv1FZaOFUxXtNfMem0kDG8Wci4KeeKXV4nAqSTp1KxnKmdc7WnoCsrMzJYH4FpTefIP6fGNcSkERGyd+CbV2ST9ALhXKgggBYO+hK4rj2930NSHIxW0DDrsyfH11IdyWw0KKavJDxCz4K7wEA9iEwp5vhP87UQXR/hGQM85AJJqWAEw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h47n8zp3ZaeOcpB08Q6xHykiTL8IUwm0WnFTP8ohCV0=; b=Ds30bmaf0wfvXto4CS4BzIS3RQUMnYbENg8ip/8N2bff9Olo2I60wyBZn5wEVoe2BqKDWS2JbedG6AMC1+Jz9M4KbvcIzCWUhVWHaDWjX/HhzFziBe9Zp/LNhujt/w4m16A/iHEO2r7iMbNsyfEAnmfZiHmQDHCGqXpYdLT9TMTig2XPg1FKYaFc566tINzItiVGzYXsUcPSmQESARgu8+l9SLkrQF8k/9RPvrFweL7c32l+vqsLWHHVK7Ecyw8Aa70fR/KrcrQRi0DwbMBr2Gln0VORSSuXkS37NGygBVaH0pY8WLmaAZtd6CCKJmW51ollnvrnS34lbQ4JS0lx9Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h47n8zp3ZaeOcpB08Q6xHykiTL8IUwm0WnFTP8ohCV0=; b=eB3PB7BfaPSx/Lp6WB+Q6SGwLxk++hHSA4yAcbM85v95oRJ4DuLyZpj5ZlaN/dysoeBvEBJxhFTgs6Zk9+kTAMjhOmpqpfjnZ+fc0LpMQITX/atzu/O5gKoftB46FLOiL1fjRkA6C3Y/bez2Wum3NwA+oiSwwYu0vaqTLEA2Fvo=
Received: from DBAPR08MB5576.eurprd08.prod.outlook.com (2603:10a6:10:1ae::11) by DBBPR08MB4428.eurprd08.prod.outlook.com (2603:10a6:10:ce::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.21; Wed, 2 Jun 2021 12:57:36 +0000
Received: from DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::488c:be63:d9fe:b0e0]) by DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::488c:be63:d9fe:b0e0%7]) with mapi id 15.20.4173.030; Wed, 2 Jun 2021 12:57:35 +0000
From: Brendan Moran <Brendan.Moran@arm.com>
To: "dick@reliableenergyanalytics.com" <dick@reliableenergyanalytics.com>
CC: Hannes Tschofenig <Hannes.Tschofenig@arm.com>, Michael Richardson <mcr+ietf@sandelman.ca>, Russ Housley <housley@vigilsec.com>, "suit@ietf.org" <suit@ietf.org>
Thread-Topic: [Suit] suit-firmware-encryption-00
Thread-Index: AQHXUy5zvx3nHIfq0kuzjZIH4a2amqr9uSuAgAAS7gCAAAUmgIAAM+0AgAACh4CAAqkygIAAAq4AgAADx4A=
Date: Wed, 02 Jun 2021 12:57:35 +0000
Message-ID: <6A6A113D-E11D-41B3-8834-76370D36880D@arm.com>
References: <19586.1622075797@localhost> <DBBPR08MB5915CEC125579D78C108D540FA3F9@DBBPR08MB5915.eurprd08.prod.outlook.com> <F6C86CC2-3AF8-4CC5-BB47-AC6579DAA0C4@vigilsec.com> <13894.1622479289@localhost> <DBBPR08MB59153D31EE75D565A64B4F79FA3F9@DBBPR08MB5915.eurprd08.prod.outlook.com> <186901d75657$0ab645a0$2022d0e0$@reliableenergyanalytics.com> <1B50DDD2-2B47-4044-B812-30BE0D80B31D@arm.com> <021201d757ac$fb26bb90$f17432b0$@reliableenergyanalytics.com>
In-Reply-To: <021201d757ac$fb26bb90$f17432b0$@reliableenergyanalytics.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.100.0.2.22)
Authentication-Results-Original: reliableenergyanalytics.com; dkim=none (message not signed) header.d=none;reliableenergyanalytics.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [80.7.184.196]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-Correlation-Id: df60761c-982e-49f3-31d1-08d925c60655
x-ms-traffictypediagnostic: DBBPR08MB4428:|AM9PR08MB7031:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS: <AM9PR08MB7031B79B101D3EDC55594747EA3D9@AM9PR08MB7031.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:8273;OLM:8273;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: YS3PLrPcuObBTioZC3mVRvcN4PvQwYApBFE7UaCMzlRcAtvxKoWUG8fmxumskZdNhTE3IkWTsJkPSbAbZ/pF5T0geXtIECX5DVitZ3mix/staZauWDWRZGAvEw3KpUGQoB2Xd87FVyEgNOmwj2mOqZaW2Hqj3nGx5kIk1WK3ry623M0Hjb2qK55ZSBaCorO/Oe9jZmeAe0bUXQf2x0pIaSkUF4S9VXntAdnvFnUxdgJfsFe7YmJEA+VZ0twfxdIopiCrE2MmHiWwNbR0FYghw+ldWmDWOJnEnBBFli9esTm0nNa6srFcLp16+VFZYVXaWeXefr25M86gZKBxg4ep+g+MHCK7dvuSFn3HbkuDp+L56kyWcjs6F5yLjsunv9ypeo56Wl+EHLkVr1oM7swE4Gm3suX9k7iCtL5Q+AgVQVsGPHWB7AwQ0GjxA1Q3A1Z76CI5MMkGUBs086ulG/b6DmjDihWgwiX3zjdwk2E0t8bA+pKddOx6W4/G20tlFqnCyC8kinzQQHMTj4bd/WfO98ssMq027y4biAvG/XHsH4RqxAJlPigb1m6HhFKsfRGfnbe5xMXKyAuZFcJAZUpO6wqmPYIjM9apuWq9pkpfHVU0dkriU3YuEyNiYYGwNZLo5SLANY7uUgktXLi6+ympUxBSlJs3rXuTS81zhdaHDN5DDllrCuxpzMxVVhSfuHXDYmR3Cdpxrh4NS10S6VBqDma45ZsXV9S4fmifeBMg1JuT3YnSwvXWqmQ6v6hN841iD/8swOEhwXixKc4Kp86Hv3JwDqEirVh1JcQYkokq0Sy9gJFHrUjSYT1ePq410yr1
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBAPR08MB5576.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(366004)(39850400004)(396003)(376002)(346002)(33656002)(83380400001)(2616005)(316002)(6916009)(86362001)(66574015)(186003)(53546011)(6512007)(6506007)(26005)(5660300002)(91956017)(2906002)(8676002)(66446008)(66946007)(64756008)(66476007)(76116006)(66556008)(6486002)(122000001)(36756003)(54906003)(966005)(8936002)(478600001)(71200400001)(38100700002)(4326008)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <3BBD28FBFBD3884882035BC6B448624F@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4428
Original-Authentication-Results: reliableenergyanalytics.com; dkim=none (message not signed) header.d=none;reliableenergyanalytics.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT042.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 703eb501-b42a-45b5-080c-08d925c5fe8b
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(396003)(346002)(39850400004)(136003)(376002)(36840700001)(46966006)(36860700001)(86362001)(36756003)(33656002)(186003)(6486002)(2906002)(6862004)(8676002)(66574015)(26005)(54906003)(356005)(81166007)(2616005)(53546011)(6512007)(6506007)(83380400001)(316002)(8936002)(966005)(478600001)(82310400003)(70586007)(70206006)(5660300002)(336012)(47076005)(4326008)(82740400003); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Jun 2021 12:57:48.9544 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: df60761c-982e-49f3-31d1-08d925c60655
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT042.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7031
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/Z_kjio9onW7Gbq8pzuWVvpx0-Tk>
Subject: Re: [Suit] suit-firmware-encryption-00
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Jun 2021 12:57:58 -0000

I do not understand the security story of this extension. How is it authenticated? If it is not authenticated, then I, as an adversary, can simply add it myself. So, this means that your malware attestation looks a lot like an endorsement. If it’s an endorsement, then the malware evaluation provider can simply sign the manifest.

Is there some additional benefit that I’m not seeing?

Best Regards,
Brendan

> On 2 Jun 2021, at 13:44, Dick Brooks <dick@reliableenergyanalytics.com> wrote:
>
> Thanks for your insights Brendan.
>
> I believe Hannes addressed this concern by suggesting an extension attesting to the results of a malware scan, performed by the original software source supplier prior to encryption, that a SW consumer can trust.
> This would provide the end use customer with the information they need to assess trustworthiness for an encrypted object, with regard to the presence of malware, as part of a software supply chain risk assessment.
>
> Do you agree that this is an acceptable compromise?
>
>
> Thanks,
>
> Dick Brooks
>
> Never trust software, always verify and report! ™
> http://www.reliableenergyanalytics.com
> Email: dick@reliableenergyanalytics.com
> Tel: +1 978-696-1788
>
> -----Original Message-----
> From: Brendan Moran <Brendan.Moran@arm.com>
> Sent: Wednesday, June 2, 2021 8:34 AM
> To: Dick Brooks <dick@reliableenergyanalytics.com>
> Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; Michael Richardson <mcr+ietf@sandelman.ca>; Russ Housley <housley@vigilsec.com>; suit@ietf.org
> Subject: Re: [Suit] suit-firmware-encryption-00
>
> Encryption support is not optional. It’s mandatory. Many organisations will not consent to their binaries being publicly available. This is easy to demonstrate: most MCUs support read-out protection. We can’t simply remove encrypted payload support because it changes the audit story. Instead, firmware authors must cooperate with auditors.
>
> Best Regards,
> Brendan
>
>> On 31 May 2021, at 20:56, Dick Brooks <dick@reliableenergyanalytics.com> wrote:
>>
>> I believe encryption would "get in the way of" a malware scan
>> performed during a software supply chain risk assessment.
>>
>>
>> Thanks,
>>
>> Dick Brooks
>>
>> Never trust software, always verify and report! T
>> http://www.reliableenergyanalytics.com
>> Email: dick@reliableenergyanalytics.com
>> Tel: +1 978-696-1788
>>
>> -----Original Message-----
>> From: Suit <suit-bounces@ietf.org> On Behalf Of Hannes Tschofenig
>> Sent: Monday, May 31, 2021 3:47 PM
>> To: Michael Richardson <mcr+ietf@sandelman.ca>; Russ Housley
>> <housley@vigilsec.com>; suit@ietf.org
>> Subject: Re: [Suit] suit-firmware-encryption-00
>>
>> Hi Michael,
>>
>>>> SUIT is using signature for the authentication and integrity of the
>>>> firmware.  If the signature remains in place, a party in the middle
>> of
>>>> the distribution cannot insert any malware.
>>
>>> The encryption of the firmware keeps third parties from auditing the
>> software updates to determine if malware has been inserted at the "factory"
>>> Both white and black hats are currently using binary diff systems to
>>> look
>> at patches.  Black hats use this to develop exploits in the gap
>> between 9am EST and 9am PST!
>>> I am suggesting that this is a "Security Consideration"
>>
>> A description of the software is contained in the COSWID and, as
>> Brendan suggests, in a MUD file that is included with the manifest
>> (see https://datatracker.ietf.org/doc/html/draft-moran-suit-mud).
>> Furthermore, I can imagine that those authorized to audit the software
>> can do so either based on the source code or by giving them access to
>> the binary.
>>
>> Ciao
>> Hannes
>>
>> IMPORTANT NOTICE: The contents of this email and any attachments are
>> confidential and may also be privileged. If you are not the intended
>> recipient, please notify the sender immediately and do not disclose
>> the contents to any other person, use it for any purpose, or store or
>> copy the information in any medium. Thank you.
>> _______________________________________________
>> Suit mailing list
>> Suit@ietf.org
>> https://www.ietf.org/mailman/listinfo/suit
>>
>> _______________________________________________
>> Suit mailing list
>> Suit@ietf.org
>> https://www.ietf.org/mailman/listinfo/suit
>
> IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
>

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.