Re: [Suit] How are firmware and firmware versions expressed in manifest?

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Sat, 06 June 2020 10:03 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E0EC3A1046 for <suit@ietfa.amsl.com>; Sat, 6 Jun 2020 03:03:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=9/Wbixb6; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=9/Wbixb6
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zSG7oUQgnbKX for <suit@ietfa.amsl.com>; Sat, 6 Jun 2020 03:03:21 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2055.outbound.protection.outlook.com [40.107.20.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF3243A1042 for <suit@ietf.org>; Sat, 6 Jun 2020 03:03:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Jrmcn5hiLHK1WHSGB52FVh2acguF2WFr14j4LQ190J4=; b=9/Wbixb69jG5WeKbnMnizxwMpMvBtnzHUT17G4bw0RKYYNeClmQhiK71D+Ix/6TTKisBKoucbC0XyhKdu9xtsLzvwqWFJbh9Kt0K+EvqWpZyq1rTRlr6QQW1Gx1YDj7NKU7sdVltOT2+OXQ5nJzlpN1BgoR2XPyaFaQEVm0PKfE=
Received: from AM6PR02CA0013.eurprd02.prod.outlook.com (2603:10a6:20b:6e::26) by VI1PR08MB5440.eurprd08.prod.outlook.com (2603:10a6:803:134::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.18; Sat, 6 Jun 2020 10:03:17 +0000
Received: from VE1EUR03FT029.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:6e:cafe::bf) by AM6PR02CA0013.outlook.office365.com (2603:10a6:20b:6e::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.18 via Frontend Transport; Sat, 6 Jun 2020 10:03:17 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT029.mail.protection.outlook.com (10.152.18.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.18 via Frontend Transport; Sat, 6 Jun 2020 10:03:17 +0000
Received: ("Tessian outbound 8bb15bb571b3:v59"); Sat, 06 Jun 2020 10:03:16 +0000
X-CR-MTA-TID: 64aa7808
Received: from fbdd9f294dc5.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 0754B70A-9FD9-4D6F-91FC-7B1AE2B15171.1; Sat, 06 Jun 2020 10:03:11 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id fbdd9f294dc5.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Sat, 06 Jun 2020 10:03:11 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=iaKtEb4/Wya8TJKvk7Hn3udWwVeHMNYgH8ZXQsNatxZcQuj0Kmo3MnN+2EkZLZgM6UueG4Wps5/tb22aiK+5k3j8BSvZ6tK7S5ei7CsArawRV1pmx3sMy2OY+g6T5wn20O1FmkWQhlcIiPaoCV6ItTKMLi73Rd2Po7zNZGe373aDM0HLvRzVgntrBLJ6gcQu50gAgL2vx0tomOHvFpsbpBQk0exOUn0H3lL+SpePsQpH5vAT/pqUTSoq1AdA9A9/7zWM3lgiSz0BM8zYj9Nv88Z+0JiDLhg6gU48gtW0f5nmUVmdii2Nob/HWF2xRwt4W3fNqRpxl9kvznrO4BXZnQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Jrmcn5hiLHK1WHSGB52FVh2acguF2WFr14j4LQ190J4=; b=J/COUUUc4qi37u9OwYkl20dQrdL+FyMwOEvralJpCvXXrUy9UO6hY7wp9PAY4b4FlWLJCYFhlu28zVadSRZL8Wy6MWM1YyCmj1aMngHnu7cN4Ms8c82bDxrr9KPHilmdeuZ+X4fikpVMhRcpBeu6gG66HDqvnM78M1ZvDMcOgcyHtZBA0EshLt23twGowHjLXBX9RxQOxc7Cerz5G/XRkXNCd3Q4RDbTFG0n8phxvT7c02QlEPaTc/VthkKbk7UcVdgpCgRQLblKMPTUqYBmunhns6mtWX3hErOIIv4j3GKvkRl4zq7J6k4ZTM8cDWvpckhwuf6GZjZLLQY7kyz0XA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Jrmcn5hiLHK1WHSGB52FVh2acguF2WFr14j4LQ190J4=; b=9/Wbixb69jG5WeKbnMnizxwMpMvBtnzHUT17G4bw0RKYYNeClmQhiK71D+Ix/6TTKisBKoucbC0XyhKdu9xtsLzvwqWFJbh9Kt0K+EvqWpZyq1rTRlr6QQW1Gx1YDj7NKU7sdVltOT2+OXQ5nJzlpN1BgoR2XPyaFaQEVm0PKfE=
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com (2603:10a6:208:106::13) by AM0PR08MB4947.eurprd08.prod.outlook.com (2603:10a6:208:158::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.18; Sat, 6 Jun 2020 10:03:10 +0000
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::39f5:e4d9:51ff:eae]) by AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::39f5:e4d9:51ff:eae%7]) with mapi id 15.20.3066.022; Sat, 6 Jun 2020 10:03:10 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Eliot Lear <lear@cisco.com>
CC: Michael Richardson <mcr@sandelman.ca>, Dick Brooks <dick@reliableenergyanalytics.com>, "suit@ietf.org" <suit@ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Thread-Topic: [Suit] How are firmware and firmware versions expressed in manifest?
Thread-Index: AdY5iIX3N33NtGULTtOAukxF+Y4+yAAR9vKAAC3Wx2AAEkCYgAAahNIAAAZpzwAAAp+aoAAIpk6AABYvlVAAAcXjAAAB5a2g
Date: Sat, 06 Jun 2020 10:03:10 +0000
Message-ID: <AM0PR08MB371644959A30C6390D4EE480FA870@AM0PR08MB3716.eurprd08.prod.outlook.com>
References: <AM0PR08MB371631B7C1E6B50DCA29049AFA880@AM0PR08MB3716.eurprd08.prod.outlook.com> <8b6d01d639d0$62614150$2723c3f0$@reliableenergyanalytics.com> <AM0PR08MB37166AD36B5AA36EA7D7CA9BFA890@AM0PR08MB3716.eurprd08.prod.outlook.com> <20437.1591317129@localhost> <1076601d63b3a$d53f5d90$7fbe18b0$@reliableenergyanalytics.com> <BF5D5E46-4A7C-44A7-8554-5DE1E03A3F21@cisco.com> <AM0PR08MB3716C555048993639B14D76FFA860@AM0PR08MB3716.eurprd08.prod.outlook.com> <5820.1591393073@localhost> <AM0PR08MB3716939E832E5483CB8575EBFA870@AM0PR08MB3716.eurprd08.prod.outlook.com> <04B8CB97-9BB2-49CC-A3EB-875596C1B134@cisco.com>
In-Reply-To: <04B8CB97-9BB2-49CC-A3EB-875596C1B134@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 64657aad-fb4c-410e-8c12-ee6fe227dbb5.1
x-checkrecipientchecked: true
Authentication-Results-Original: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [156.67.194.193]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: a605a8b2-ba19-4c50-5f2f-08d80a00d5b4
x-ms-traffictypediagnostic: AM0PR08MB4947:|VI1PR08MB5440:
X-Microsoft-Antispam-PRVS: <VI1PR08MB544006795F0F4C0273FE75ACFA870@VI1PR08MB5440.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:9508;OLM:9508;
x-forefront-prvs: 04267075BD
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: oYxLj2j4nbmJWgtULIIt/W3KhAGNAotkIznCgyFo97ZH5qvaTpNC8W3F4Gx8UXSJxrDMXSyFw1vUiqp2MeRI6xM6zUatLnHyOQsEXHrkiquoIKwrv/5cRjyPCkJHbxBYioCpSz+yKCu1Ux55iE2LM/ZHhh1WGakiv+yo6zrUhhh8LbEUp72oBa4Z3XvD5Iew09Li9k7h+OSFFDx60JwNQW/Z3JcO/1WgkjfSfHx4Cqod3EAoelpaFBkecLH/WN8U4aSUKVqz6dbDtbBA69NR9WkJusZO9UVX386+kBTYnjxbWAPoN1ZhlIW1SD6hjGZyFvUXJ9XC1mFXav41rTqMwO8FACjEigMYE+flFjTGgq/aYXmVBfI2XHpUaylWhBr4joweUkurp+sD2/i74RDucg==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR08MB3716.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(346002)(39860400002)(136003)(396003)(366004)(316002)(9686003)(186003)(53546011)(6916009)(71200400001)(5660300002)(26005)(54906003)(52536014)(6506007)(7696005)(86362001)(66446008)(76116006)(66476007)(66946007)(8936002)(66556008)(33656002)(64756008)(166002)(966005)(55016002)(478600001)(4326008)(83080400001)(2906002)(83380400001)(8676002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: aBbtXCEvGqeTkimiRxMXqbe7MHxceLq/EmZ2i8RyM9G+ojNFWPuFNRvSYl/rBWiZOJK1eKMPCtGcnASQCJaoTvvc1A2bE1RgAU5O301iWQ787nBdyQb2XWzw5rit37nQZQkWbzrHD7J/JJxX62ZSNVWI8C4z+NqPF8T6ckk6P+WskqJm/Bv1ocjtFAAiKzofQGyJw7mYxviDwS+xKf0L9xKUUbS2keZOxZ+87fQjY1b6AytsbqZUaEkplmFxBz8SDICO17c1u6yp/oclG/2moX6F0qcq3r8eJpeWOdTyUou1CAfqXB+1dCfDsLu7+eEFQ8I2Ci7zFpXrgFvM8gT5hzepVIFEy+KWfNsALcbO1KLh/e1ENKmweQFnZO4PmDmNtD4dyi3GOLPYexyvh3jjRRRXtZPnFcWE3qa/FQJLiCpCS2fTzPgRKcER6NQ/Xt/BAot786EFanrR1t0U3pZEbMbbxrroSdh1hoaYVxdFLq44RPylW/yzq2F4EfqCwoZA
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM0PR08MB371644959A30C6390D4EE480FA870AM0PR08MB3716eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4947
Original-Authentication-Results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT029.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(4636009)(396003)(39860400002)(136003)(346002)(376002)(46966005)(83380400001)(30864003)(166002)(5660300002)(478600001)(8676002)(82310400002)(83080400001)(8936002)(54906003)(82740400003)(356005)(33964004)(36906005)(53546011)(81166007)(6506007)(186003)(966005)(47076004)(316002)(26005)(336012)(52536014)(4326008)(9686003)(2906002)(6862004)(55016002)(70206006)(107886003)(33656002)(7696005)(70586007)(86362001); DIR:OUT; SFP:1101;
X-MS-Office365-Filtering-Correlation-Id-Prvs: 91fcf04a-f709-4620-f68a-08d80a00d197
X-Forefront-PRVS: 04267075BD
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: aziR0QFGRtF6i/id6tCW7kbkGC/1N33BbX0JwGK4J57Nm1ky0wfoB8ydwfcVoD65qDjYcDnnBr7SEwBczEUr8mLVhZA7Q0pyFWJF2qNT+Ip7fzGMGMR0eHiBLor+x1gOjEUeK78jF8JFuQB0ObsfBJu96j8uNRtiL6cha+2BY5K9WWte+sINUv15G4k0PjV4saFlrpZfWlkf2QqdHokKOerwkHWJatKOy2LlSaFamMMNbWQmuaStpu7meIcbQCqWmDNk6Q4lY60V+8nqiHX8lJ5ign4vBiDgOV1l1Wa/zGD6A31UeLrEIl0yhSe5MuC1mlQ+no1ySru/e3YlivImfuewpSGtZKjUshzuFDjs96BTHU14Zhk/GC2c47Rg1gs1W8hGKplMYqC8+eb+7UqRFwEv1Rol0OPcRce2ogF2LAwVzQCRqUjFAapVEmi2ltV0fM/FGZkfn9ZQ6T3WWjeUcyGfB0iwsqxL8lNhXqwTSEE=
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Jun 2020 10:03:17.3143 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a605a8b2-ba19-4c50-5f2f-08d80a00d5b4
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB5440
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/dnIPtEYP-IeU6tT708OQMgi3Fsk>
Subject: Re: [Suit] How are firmware and firmware versions expressed in manifest?
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 Jun 2020 10:03:24 -0000

Thanks, Eliot. This is very useful background on the terminology. I have hear about this NTIA effort but didn’t follow it.
I am not surprised that you already wrote a draft about it. Thanks for the pointer.

Ciao
Hannes

PS: I am still wondering how COSWID fits into all of this now.

From: Eliot Lear <lear@cisco.com>
Sent: Saturday, June 6, 2020 11:04 AM
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Cc: Michael Richardson <mcr@sandelman.ca>; Dick Brooks <dick@reliableenergyanalytics.com>; suit@ietf.org; Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Subject: Re: [Suit] How are firmware and firmware versions expressed in manifest?

The NTIA is conducting an effort relatied to this known as SBOM (Software Bill of Materials).  They are in trials with healthcare delivery organizations (HDOs) medical device manufacturers (MDMs) and software providers, including people from the Linux Foundation.  There are several different formats discussed, including Software ID Tags (SWID) (ISO-19770) and Software Package Data Exchange (SPDX) which looks very much like what you showed, Dick.  NTIA takes no position on what formats are used.  NIST is planning to move toward SWID as they transition away from the structure used in the National Vulnerability Database (NVD).  I take no position on which of these formats is better, so long as a downstream consumer can easily determine which format is being presented ;-)

The goal of SBOM is to provide transparency throughout the supply chain as to what is running on an IoT device.  SBOMs at a minimum are intended to provide a manifest, and then optionally some additional stuff like a dependency graph, licensing information, and maybe some additional security attributes such as access requirements, and links assertions about whether a particular component has a vulnerability or has been patched.

The US FDA is planning to require SBOMs as a part of pre-sales qualification.

There are great many open issues with regard to SBOMs, some of which this group and the TEEP folk may wish to pursue.  The biggest issue is around naming.  When referring to Java, is that com.sun.java or com.oracle.java or does it matter?  When referring to a supplier, is that IBM or Red Hat (or if it’s REALLY old software, Cygnus)?

A similar issue arises with versioning.  Is that openssl 1.0.1 version patched or unpatched and how does one know?

Another issue is how an SBOM is retrieved.  What is its well known location?  Does the BOM reside on the device, and is there an interface to retrieve it?  If not, where else is it?  Is it even retrievable?  Does it require permissions to do so if it resides at a vendor locale, and if so, how is versioning managed?

This is the basis for draft-lear-opsawg-mud-sbom-00.txt that Scott Rose from NIST and I put together, and would like to present at opsawg.  The goal of that draft is simply a means o discovery to determine how to retrieve an SBOM.  An example of how one would use this extension for an on-the-box approach in its simplest form would be that the manufacturer advertises a RESTful interface at /.well-known/sbom and returns its favorite format (let’s say SPDX).  The back end interface could be as simple as ‘cat /var/lib/dkpg/installed’ or perhaps a bit more complex using a more secure interface to retrieve a signed manifest.

Anyway, I provide this information mostly without fully understanding the context here, but it seems relevant, given the line of discussion.  NTIA project information can be found at https://www.ntia.doc.gov/SoftwareTransparency.

Eliot



On 6 Jun 2020, at 10:19, Hannes Tschofenig <Hannes.Tschofenig@arm.com<mailto:Hannes.Tschofenig@arm.com>> wrote:

I think the BOM terminology is misleading because hardware is not software. The bill of material to produce an IoT product typically does not change (unless you desolder parts) while the software and configuration will regularly change.

Leaving that aside, I believe someone active in COSWID needs to clarify what COSWID does. My understanding was that it documents the software libraries on devices. Whether it would be " libcurl 1.0.2" alone or all the libraries that are used to build "libcurl 1.0.2" is a granularity question that the COSWID specs should / could also answer. That's why I thought it would be useful to have it included in the manifest (as supplementary information; as a severable field).

If COSWID does not do this then someone needs to explain to me what purpose it serves.

Ciao
Hannes

-----Original Message-----
From: Michael Richardson <mcr@sandelman.ca<mailto:mcr@sandelman.ca>>
Sent: Friday, June 5, 2020 11:38 PM
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com<mailto:Hannes.Tschofenig@arm.com>>
Cc: Eliot Lear <lear@cisco.com<mailto:lear@cisco.com>>; Dick Brooks <dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>>; suit@ietf.org<mailto:suit@ietf.org>; Saad EL JAOUHARI <saadeljaou@gmail.com<mailto:saadeljaou@gmail.com>>; Henk Birkholz <henk.birkholz@sit.fraunhofer.de<mailto:henk.birkholz@sit.fraunhofer.de>>
Subject: Re: [Suit] How are firmware and firmware versions expressed in manifest?


Hannes Tschofenig <Hannes.Tschofenig@arm.com<mailto:Hannes.Tschofenig@arm.com>> wrote:

FWIW I thought that COSWID would provide information about the software
libraries on a device.

No, AFAIK, it just identifies the materials. (i.e. "libcurl 1.0.2")

Assembling them into a BOM requires another process:
 "curl 1.0.2" contains "libcurl 1.0.2", "curl-main",
                       "libssl 1.1.1f", "glibc 2.19", "pcre 1.0.2"

I could mis-understand though.

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
]     mcr@sandelman.ca<mailto:mcr@sandelman.ca>  http://www.sandelman.ca/        |   ruby on rails    [

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.