Re: [Suit] suit-firmware-encryption-00
Dick Brooks <dick@reliableenergyanalytics.com> Wed, 02 June 2021 14:08 UTC
Return-Path: <dick@reliableenergyanalytics.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 604D33A4423
for <suit@ietfa.amsl.com>; Wed, 2 Jun 2021 07:08:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DC_PNG_UNO_LARGO=0.001, DKIM_SIGNED=0.1,
DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001,
SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=messagingengine.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id ObC3bojIKzs1 for <suit@ietfa.amsl.com>;
Wed, 2 Jun 2021 07:08:45 -0700 (PDT)
Received: from forward5-smtp.messagingengine.com
(forward5-smtp.messagingengine.com [66.111.4.239])
(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id A22AD3A4422
for <suit@ietf.org>; Wed, 2 Jun 2021 07:08:44 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
by mailforward.nyi.internal (Postfix) with ESMTP id 985FF19408FE;
Wed, 2 Jun 2021 10:08:42 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
by compute3.internal (MEProxy); Wed, 02 Jun 2021 10:08:42 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
messagingengine.com; h=cc:content-type:date:from:in-reply-to
:message-id:mime-version:references:reply-to:subject:to
:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=
fm2; bh=x6yRhxE4/TIqCp32v4J8D/Ud5miSMux4Mje5hcC1OE8=; b=DECNElG/
CERTmPM+bE+0fPEdIRxOzXAVllIfClyBPDbJk+hAHjgtMPMw6RF4J9b8K6EMrHXL
A1kNmuFO/nmpXMQZIlRbn8LfBIhruU1wqngMcyvhZ2QprtIg4/AsHpMNuYsgfAsQ
hGXaTfq3hvUU5H4IpXsKPgRH6Jts3L0GUn9u7dUyI81FgXz+RZ8rz9Y9R5011vPh
wsuyAyZ3wl2PxGlGYNRm6FKSIP23dBTbyMpDdzZnZZz0DENl4aFFZ35xQEJV8c7x
kO2BfjdotnzN14Dn5BfX4PDsaLaKuDi5HSOyJ6c6Ss8hjkjJI56mdloWoUtjwnab
sYBqqPnXX4nmdg==
X-ME-Sender: <xms:6ZC3YMlH-VSNtq-TsAGPOwGqWmuKxi6qKponRD-ZL7XcL0YMPhgdtQ>
<xme:6ZC3YL1C5Ofcgs-WBgZfdrORf2HR1NeapyfXwEjwzUTUfCGY24cxAMGq5Us0LtEwe
ISnlc0XkkRrbywbXg>
X-ME-Received: <xmr:6ZC3YKqQwjMyjrDomcIPssW5AxIKvkTXpIZYGI_iXGubEweJCwf3dyI>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrvdeljedgjeefucetufdoteggodetrfdotf
fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
cujfgurheprhfhvfhfjgfuffhokfggtgfothesrhdtghepvddtjeenucfhrhhomhepfdff
ihgtkhcuuehrohhokhhsfdcuoeguihgtkhesrhgvlhhirggslhgvvghnvghrghihrghnrg
hlhihtihgtshdrtghomheqnecuggftrfgrthhtvghrnhepffelheefhfehueegteekfefg
geffhfekhedtheeiueffgfetjedvgedtjeetgeejnecuffhomhgrihhnpehnvghrtgdrtg
homhdprhgvlhhirggslhgvvghnvghrghihrghnrghlhihtihgtshdrtghomhdpihgvthhf
rdhorhhgnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomh
epughitghksehrvghlihgrsghlvggvnhgvrhhghigrnhgrlhihthhitghsrdgtohhm
X-ME-Proxy: <xmx:6ZC3YInAa-U8t5QnY5ML5q9IYSdMYOj0qOQVlJzkF0szb8Bgq9ExFw>
<xmx:6ZC3YK3UawZX2RI0Mpc0eXZK0C0xjMaaEUziNDpGxr1eWWOKss9Asw>
<xmx:6ZC3YPuXXzNIvcQq8HLR6fsCb63yeaBlKsqnmDU0O2LFInAO8M0jDg>
<xmx:6pC3YIDqybn7K69WL9JcgKacWMIxv7Als48Y0lk2dfeo5fUQRUqS-Q>
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Wed,
2 Jun 2021 10:08:41 -0400 (EDT)
Reply-To: <dick@reliableenergyanalytics.com>
From: "Dick Brooks" <dick@reliableenergyanalytics.com>
To: "'Brendan Moran'" <Brendan.Moran@arm.com>
Cc: "'Hannes Tschofenig'" <Hannes.Tschofenig@arm.com>,
"'Russ Housley'" <housley@vigilsec.com>,
"'Michael Richardson'" <mcr+ietf@sandelman.ca>, "'suit'" <suit@ietf.org>
References: <19586.1622075797@localhost>
<DBBPR08MB5915CEC125579D78C108D540FA3F9@DBBPR08MB5915.eurprd08.prod.outlook.com>
<F6C86CC2-3AF8-4CC5-BB47-AC6579DAA0C4@vigilsec.com>
<13894.1622479289@localhost>
<64BDF7A0-4B70-4EB3-A764-2BD6CAA3921A@vigilsec.com>
<132601d7563d$7097f680$51c7e380$@reliableenergyanalytics.com>
<E2D893E5-8462-4F69-88D0-29167B6DB1B3@vigilsec.com>
<140a01d7563f$65d2a130$3177e390$@reliableenergyanalytics.com>
<DBBPR08MB591549CB964EA7E18C8640C2FA3F9@DBBPR08MB5915.eurprd08.prod.outlook.com>
<18b401d75657$880bfef0$9823fcd0$@reliableenergyanalytics.com>
<DBBPR08MB59158723623695EB0473637FFA3E9@DBBPR08MB5915.eurprd08.prod.outlook.com>
<223201d756d9$af8bddb0$0ea39910$@reliableenergyanalytics.com>
<DBBPR08MB5915C1F5529E8801DF5AFD09FA3E9@DBBPR08MB5915.eurprd08.prod.outlook.com>
<272401d756e8$c446ba90$4cd42fb0$@reliableenergyanalytics.com>
<DBBPR08MB59159E70B7ED1575EF82A745FA3E9@DBBPR08MB5915.eurprd08.prod.outlook.com>
<32f301d7570b$316490d0$942db270$@reliableenergyanalytics.com> <010627E5
-A66D-48D5-8F89-B1BC11F2714D@arm.com>
<031a01d757af$b5bdb100$21391300$@reliableenergyanalytics.com>
<C5221278-D5BB-4F71-B3B3-8EB654B6984B@arm.com>
<047901d757b3$20be8bc0$623ba340$@reliableenergyanalytics.com>
<B1D2DACA-3015-4036-841F-EAE6087CCB30@arm.com>
In-Reply-To: <B1D2DACA-3015-4036-841F-EAE6087CCB30@arm.com>
Date: Wed, 2 Jun 2021 10:08:36 -0400
Organization: Reliable Energy Analytics LLC
Message-ID: <07f701d757b8$ca773d10$5f65b730$@reliableenergyanalytics.com>
MIME-Version: 1.0
Content-Type: multipart/related;
boundary="----=_NextPart_000_07F8_01D75797.4368AA50"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQI/QDB0THmT0m+iwpMcIJ7U5AyVWwGeOG6MAhV23QADMtNZAgELPwAdAnBC4M8B5S+ZkQG9GBtkAvvy+dYCdoomoQLkXmLkAmxgmzgCFyi88ACA9OzHAiJ3M0ECElLqHAKt4GnUAh2n0ygBvvNDLQCpSuC9Ac0l59Go7EN5UA==
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/eySyBztFy6VuU0Cye1oxiwiGzMY>
Subject: Re: [Suit] suit-firmware-encryption-00
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>,
<mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>,
<mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Jun 2021 14:08:52 -0000
Brendan,
I understand your position.
I have my doubts that the approach you describe will pass a NERC audit for CIP-010-3 software verification requirements R1, part 1.6 requirement 1.6.1, because it requires sending the SW to the device, essentially changing the baseline, in violation of the NERC CIP standard, before performing the necessary identity verification; https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-010-3 <https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-010-3&title=Cyber%20Security%20%E2%80%94%20Configuration%20Change%20Management%20and%20Vulnerability%20Assessments&Jurisdiction=United%20States> &title=Cyber%20Security%20%E2%80%94%20Configuration%20Change%20Management%20and%20Vulnerability%20Assessments&Jurisdiction=United%20States
Thanks,
Dick Brooks
<https://reliableenergyanalytics.com/products> Never trust software, always verify and report! ™
<http://www.reliableenergyanalytics.com/> http://www.reliableenergyanalytics.com
Email: <mailto:dick@reliableenergyanalytics.com> dick@reliableenergyanalytics.com
Tel: +1 978-696-1788
From: Brendan Moran <Brendan.Moran@arm.com>
Sent: Wednesday, June 2, 2021 9:54 AM
To: Dick Brooks <dick@reliableenergyanalytics.com>
Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com>om>; Russ Housley <housley@vigilsec.com>om>; Michael Richardson <mcr+ietf@sandelman.ca>ca>; suit <suit@ietf.org>
Subject: Re: [Suit] suit-firmware-encryption-00
Hi Dick
Brendan,
You make an excellent point that the devices themselves have built in trust relationships that the device is capable of verifying.
The scenario I'm describing goes like this:
A SW vendor announces that a new security patch is available for download.
End use customer downloads the SW per vendor instructions.
Customer wants to perform a SCRM software supply chain risk assessment before installing the SW patch on a device.
What standard/formal process is available to the SW customer to verify that the signer of the SW patch was authorized to sign the package by the original software supplier?
I have not found any specific standard or formal practices that prescribe a method to verify the trust relationship between a software supplier and an authorized software code signer.
Really, this is just an extension of the device use-case. If the device reports to its management system (the SW Customer) what public keys it trusts, then the SW customer can verify a manifest prior to distribution. Regardless, if the device receives a manifest signed by an untrusted source, it can identify that when it checks the `kid` header in the signature. That means it can reject the manifest before even validating the signature. This means the device only pays the cost of receiving the manifest.
In any case, device operators (SW Customers) should have access to the public keys of any trust anchors so that they can do pre-distribution checks. (https://datatracker.ietf.org/doc/html/draft-ietf-suit-information-model-12#section-4.3.19)
Current code signing and verification practices allow any party to sign software and an "unauthorized signature" will be reported as verified by tools such as Microsoft's signtool. This is the security gap that needs to be plugged.
I don’t think we should take the policies used by signtool as an indication of how IoT devices built with SUIT will work. I think it’s more important to consider the SUIT threat model and security requirements.
A SW customer MUST be able to perform a SCRM risk assessment to ascertain some level of assurance that a SW package is trustworthy before any attempt to install. This is a current requirement of NERC CIP-010-3 software verification requirements.
Best Regards,
Brendan
Thanks,
Dick Brooks
Never trust software, always verify and report! ™
<http://www.reliableenergyanalytics.com/> http://www.reliableenergyanalytics.com
Email: <mailto:dick@reliableenergyanalytics.com> dick@reliableenergyanalytics.com
Tel: +1 978-696-1788
-----Original Message-----
From: Brendan Moran < <mailto:Brendan.Moran@arm.com> Brendan.Moran@arm.com>
Sent: Wednesday, June 2, 2021 9:13 AM
To: Dick Brooks < <mailto:dick@reliableenergyanalytics.com> dick@reliableenergyanalytics.com>
Cc: Hannes Tschofenig < <mailto:Hannes.Tschofenig@arm.com> Hannes.Tschofenig@arm.com>gt;; Russ Housley < <mailto:housley@vigilsec.com> housley@vigilsec.com>gt;; Michael Richardson < <mailto:mcr+ietf@sandelman.ca> mcr+ietf@sandelman.ca>gt;; <mailto:suit@ietf.org> suit@ietf.org
Subject: Re: [Suit] suit-firmware-encryption-00
Hi Dick,
To verify any signature, you have to get a public key from somewhere. If the recipient device doesn’t have the relevant public key, then the signature isn’t valid. The flaw that you describe is based entirely on a system that’s overeager to deliver public keys to devices without applying any ACL.
This is why we explicitly call out ACLs in the information model: https://datatracker.ietf.org/doc/html/draft-ietf-suit-information-model-12#section-4.3.13
Constrained devices have access to a constrained set of public keys. They have one trust anchor, sometimes two or three. However those trust anchors have specific duties. For example, one might be the trust anchor for firmware updates, a second might be for the remote management system, and a third might be for data reporting. If you have the ability to dynamically install new trust anchors, then you create a problem. This needs to be carefully considered.
But whatever the case, this is a security consideration. Manifests MUST be signed by known public keys. Public keys MUST have endorsements for specific capabilities on the target device. That mechanism is not in-scope for the manifest itself, but it is certainly in-scope for the manifest security considerations. The manifest security considerations are covered int he information model, which contains the section about ACLs.
Is that adequate coverage?
Best Regards,
Brendan
On 2 Jun 2021, at 14:03, Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> > wrote:
Brendan,
I agree that a trust anchor is specified in SUIT, however when you
look at the basis for this trust anchor (COSE) you find this
information
https://datatracker.ietf.org/doc/html/rfc8152#section-4.4
COSE's Signing and Verification process contains the following guidance:
In addition to performing the signature verification, the application
may also perform the appropriate checks to ensure that the key is
correctly paired with the signing identity and that the signing
identity is authorized before performing actions.
The problem seems to be that there is no formal/standard define method
for a SW consumer to verify that a signer has been authorized by the
original source supplier to sign software on their behalf. Anyone can
sign anyone's software package, and it is verified as successful by Microsoft's signtool.
This is a problem for the SCRM community.
Thanks,
Dick Brooks
Never trust software, always verify and report! T
http://www.reliableenergyanalytics.com
Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788
-----Original Message-----
From: Brendan Moran <Brendan.Moran@arm.com <mailto:Brendan.Moran@arm.com> >
Sent: Wednesday, June 2, 2021 8:53 AM
To: Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> >
Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com <mailto:Hannes.Tschofenig@arm.com> >; Russ Housley
<housley@vigilsec.com <mailto:housley@vigilsec.com> >; Michael Richardson <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >;
suit@ietf.org <mailto:suit@ietf.org>
Subject: Re: [Suit] suit-firmware-encryption-00
DB>> Currently software consumers do not have a standard method to
DB>> verify
that a signing party has been authorized to sign on behalf of a
software source supplier, when performing digital signature
verification on a software package. Many people "assume" that the
signing party is the software source supplier. A digital signature
alone is insufficient at identifying the software source supplier
because anyone with a code signing key can sign any software package,
as
demonstrated in this article:
https://energycentral.com/c/ec/who-ya-gonna-trust
This may well be true in the general case, but this is not true for SUIT.
SUIT manifests must be verified all the way back to a trust anchor.
https://datatracker.ietf.org/doc/html/draft-ietf-suit-manifest-13#section-5.
2
Delegation Chains allow a Recipient to establish a chain of trust
from a Trust Anchor to the signer of a manifest by validating
delegation claims. Each delegation claim is a [RFC8392] CBOR Web
Tokens (CWTs). The first claim in each list is signed by a Trust
Anchor. Each subsequent claim in a list is signed by the public key
claimed in the preceding list element. The last element in each list
claims a public key that can be used to verify a signature in the
Authentication Block (
Section 5.3).
See also
https://datatracker.ietf.org/doc/html/draft-ietf-suit-manifest-13#section-8.
3
This is also described in the information model:
https://datatracker.ietf.org/doc/html/draft-ietf-suit-information-mode
l-12#s
ection-3.25
See also REQ.SEC.ACCESS_CONTROL:
https://datatracker.ietf.org/doc/html/draft-ietf-suit-information-mode
l-12#s
ection-4.3.13
If a device grants different rights to different actors, then an
exercise of those rights MUST be validated against a list of rights
for the actor. This typically takes the form of an Access Control
List (ACL). ACLs are applied to two scenarios:
1. An ACL decides which elements of the manifest may be overridden
and by which actors.
2. An ACL decides which component identifier/storage identifier
pairs can be written by which actors.
Mitigates: THREAT.MFST.OVERRIDE (Section 4.2.13),
THREAT.UPD.UNAPPROVED (Section 4.2.11)
Best Regards,
Brendan
DB>> I plan to raise the need for a formal method to verify
DB>> authorized code
signing parties on behalf a software source supplier during digital
signature validation as a topic during NIST's EO workshop in 6/2-3.
(It is not unlikely that the delegation mechanism would benefit from
more
details...)
Ciao
Hannes
-----Original Message-----
From: Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> >
Sent: Tuesday, June 1, 2021 3:20 PM
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com <mailto:Hannes.Tschofenig@arm.com> >; 'Russ Housley'
<housley@vigilsec.com <mailto:housley@vigilsec.com> >
Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >; suit@ietf.org <mailto:suit@ietf.org>
Subject: RE: [Suit] suit-firmware-encryption-00
Hannes,
Will the SUIT manifest contain an attestation of a clean malware scan
that can be verifiably validated for the encrypted software in hand?
That would help, if a malware scan is not an option.
The other issue that needs to be addressed is the ability for a
software consumer to verify that the signing party of a software
object has been given authorization to sign code on behalf of a
software source supplier (VENDOR ID) in the manifest, using a
standard method - something similar to DNS CAA records, but for
digital signatures,
e.g. maybe DNS DSA records.
Ref: "Vendor ID is not intended to be a human-readable element. It
is intended for binary match/mismatch comparison only."
Thanks,
Dick Brooks
Never trust software, always verify and report! T
http://www.reliableenergyanalytics.com <http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788
-----Original Message-----
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com <mailto:Hannes.Tschofenig@arm.com> >
Sent: Tuesday, June 1, 2021 9:05 AM
To: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> ; 'Russ Housley'
<housley@vigilsec.com <mailto:housley@vigilsec.com> >
Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >; suit@ietf.org <mailto:suit@ietf.org>
Subject: RE: [Suit] suit-firmware-encryption-00
It is a challenge.
The SUIT manifest provides the capabilities to give authorized
parties extra information (via the manifest meta-data and software
description*) while providing less info to adversaries.
(*): I am assuming that the info offered via MUD, COSWID, and the
textual description is of any help to you. If it is not, then you
need to let us know what other pieces of information will have to be
included in the manifest to become valuable to make the risk assessment.
Ciao
Hannes
-----Original Message-----
From: Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> >
Sent: Tuesday, June 1, 2021 1:32 PM
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>om>; 'Russ Housley'
<housley@vigilsec.com <mailto:housley@vigilsec.com> >
Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >; suit@ietf.org <mailto:suit@ietf.org>
Subject: RE: [Suit] suit-firmware-encryption-00
Hannes,
I definitely see your point, it seems the real problem to solve is:
- How do we (1) prevent the bad guys from discovering SW details
(source
code) from binaries while simultaneously (2) providing end use
customers the ability to conduct malware scans, and other risk
management
functions?
If we encrypt a binary distribution we achieve 1 but not 2 If we do
not encrypt we achieve 2, but not 1
Are we really looking at a mutually exclusive choice?
Both of these objectives are trying to achieve the same thing: Keep
the bad guys from causing harm.
Thanks,
Dick Brooks
Never trust software, always verify and report! T
http://www.reliableenergyanalytics.com <http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788
-----Original Message-----
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com <mailto:Hannes.Tschofenig@arm.com> >
Sent: Tuesday, June 1, 2021 6:40 AM
To: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> ; 'Russ Housley'
<housley@vigilsec.com <mailto:housley@vigilsec.com> >
Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >; suit@ietf.org <mailto:suit@ietf.org>
Subject: RE: [Suit] suit-firmware-encryption-00
Dick, I understand your line of argument.
At the same time I want to create awareness for the attacker point of
view.
They need to get access to plaintext firmware of an embedded device
(unless the attacker already knows what the source was used). This is
why there are advanced disassemblers available (such as IDA Pro,
Binary Ninja, and Ghidra
-- to name a few).
As a way forward I am proposing to use the additional data carried in
the manifest for doing the SCRM risk assessment step. I believe that
this should work.
Ciao
Hannes
-----Original Message-----
From: Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> >
Sent: Monday, May 31, 2021 10:00 PM
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com <mailto:Hannes.Tschofenig@arm.com> >; 'Russ Housley'
<housley@vigilsec.com <mailto:housley@vigilsec.com> >
Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >; suit@ietf.org <mailto:suit@ietf.org>
Subject: RE: [Suit] suit-firmware-encryption-00
Thanks, Hannes. I just submitted a concern regarding the problem
encryption creates for malware scanning, which is one of the SCRM
risk assessment steps, performed before installation
Thanks,
Dick Brooks
Never trust software, always verify and report! T
http://www.reliableenergyanalytics.com <http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788
-----Original Message-----
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com <mailto:Hannes.Tschofenig@arm.com> >
Sent: Monday, May 31, 2021 3:57 PM
To: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> ; 'Russ Housley'
<housley@vigilsec.com <mailto:housley@vigilsec.com> >
Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >; suit@ietf.org <mailto:suit@ietf.org>
Subject: RE: [Suit] suit-firmware-encryption-00
Hi Dick,
with the SUIT manifest format I hope we can make information
available to trusted third parties (MUD, COSWID and alike) and at the
same time use encrypted binaries. Having access to the plaintext
binary is essential for adversaries to mount attacks. (Happy to give
a tutorial about how this
works.)
Like-wise differential updates may make it difficult for SCRM vendors
to make their analysis but the information in the manifest can help them.
Severable fields allows to remove information from the manifest
before it is sent to the device. This reduces overhead and prevents
untrusted parties from gathering information from the manifest.
Ciao
Hannes
-----Original Message-----
From: Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> >
Sent: Monday, May 31, 2021 7:07 PM
To: 'Russ Housley' <housley@vigilsec.com <mailto:housley@vigilsec.com> >
Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >; Hannes Tschofenig
<Hannes.Tschofenig@arm.com <mailto:Hannes.Tschofenig@arm.com> >; suit@ietf.org <mailto:suit@ietf.org>
Subject: RE: [Suit] suit-firmware-encryption-00
I agree, Russ.
Parties subject to the 5/12 Executive Order
(https://www.whitehouse.gov/briefing-room/presidential-actions/2021/0
5
/12/ex
ecutive-order-on-improving-the-nations-cybersecurity/) will likely
want to perform a proactive SCRM risk assessment prior to
installation, if my interpretation of the EO is accurate.
Thanks,
Dick Brooks
Never trust software, always verify and report! T
http://www.reliableenergyanalytics.com <http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788
-----Original Message-----
From: Russ Housley <housley@vigilsec.com <mailto:housley@vigilsec.com> >
Sent: Monday, May 31, 2021 12:56 PM
To: Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> >
Cc: Michael Richardson <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >; Hannes Tschofenig
<Hannes.Tschofenig@arm.com <mailto:Hannes.Tschofenig@arm.com> >; suit@ietf.org <mailto:suit@ietf.org>
Subject: Re: [Suit] suit-firmware-encryption-00
Dick:
Yes, and there are other use cases that require encryption.
Russ
On May 31, 2021, at 12:53 PM, Dick Brooks
<dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> > wrote:
" If a trustworthy party in the middle of the distribution path is
able to detect a problem with cleartext (but signed) firmware, they
can report a vulnerability and refuse to pass the update along."
This is precisely the function SCRM vendors are performing today.
Encrypting a binary object would be an impediment to software supply
chain risk assessment functions in place today.
Thanks,
Dick Brooks
Never trust software, always verify and report! T
http://www.reliableenergyanalytics.com <http://www.reliableenergyanalytics.com/>
Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
Tel: +1 978-696-1788
-----Original Message-----
From: Suit <suit-bounces@ietf.org <mailto:suit-bounces@ietf.org> > On Behalf Of Russ Housley
Sent: Monday, May 31, 2021 12:49 PM
To: Michael Richardson <mcr+ietf@sandelman.ca <mailto:mcr+ietf@sandelman.ca> >
Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com <mailto:Hannes.Tschofenig@arm.com> >; suit@ietf.org <mailto:suit@ietf.org>
Subject: Re: [Suit] suit-firmware-encryption-00
Michael:
I agree that there are also challenges with certification schemes
that prevent developers from seeing the source code (or from
publishing the source code). That's yet another issue.
SUIT is using signature for the authentication and integrity of
the firmware. If the signature remains in place, a party in the
middle of the distribution cannot insert any malware.
The encryption of the firmware keeps third parties from auditing
the software updates to determine if malware has been inserted at
the
"factory"
Both white and black hats are currently using binary diff systems
to look at patches. Black hats use this to develop exploits in the
gap between 9am EST and 9am PST!
I am suggesting that this is a "Security Consideration"
Yes, this is a reasonable thing to add to the Security Considerations.
If a trustworthy party in the middle of the distribution path is
able to detect a problem with cleartext (but signed) firmware, they
can report a vulnerability and refuse to pass the update along.
Russ
_______________________________________________
Suit mailing list
Suit@ietf.org <mailto:Suit@ietf.org>
https://www.ietf.org/mailman/listinfo/suit
IMPORTANT NOTICE: The contents of this email and any attachments are
confidential and may also be privileged. If you are not the intended
recipient, please notify the sender immediately and do not disclose
the contents to any other person, use it for any purpose, or store or
copy the information in any medium. Thank you.
IMPORTANT NOTICE: The contents of this email and any attachments are
confidential and may also be privileged. If you are not the intended
recipient, please notify the sender immediately and do not disclose
the contents to any other person, use it for any purpose, or store or
copy the information in any medium. Thank you.
IMPORTANT NOTICE: The contents of this email and any attachments are
confidential and may also be privileged. If you are not the intended
recipient, please notify the sender immediately and do not disclose
the contents to any other person, use it for any purpose, or store or
copy the information in any medium. Thank you.
IMPORTANT NOTICE: The contents of this email and any attachments are
confidential and may also be privileged. If you are not the intended
recipient, please notify the sender immediately and do not disclose
the contents to any other person, use it for any purpose, or store or
copy the information in any medium. Thank you.
_______________________________________________
Suit mailing list
Suit@ietf.org <mailto:Suit@ietf.org>
https://www.ietf.org/mailman/listinfo/suit
IMPORTANT NOTICE: The contents of this email and any attachments are
confidential and may also be privileged. If you are not the intended
recipient, please notify the sender immediately and do not disclose
the contents to any other person, use it for any purpose, or store or
copy the information in any medium. Thank you.
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
- [Suit] suit-firmware-encryption-00 Michael Richardson
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Carsten Bormann
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Laurence Lundblade
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Michael Richardson
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks