Re: [Suit] Reliably getting TEE properties

Dave Thaler <dthaler@microsoft.com> Fri, 25 March 2022 20:04 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 489B83A07BA; Fri, 25 Mar 2022 13:04:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.11
X-Spam-Level:
X-Spam-Status: No, score=-2.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fZovvvif0cwx; Fri, 25 Mar 2022 13:04:13 -0700 (PDT)
Received: from na01-obe.outbound.protection.outlook.com (mail-eus2azlp170100001.outbound.protection.outlook.com [IPv6:2a01:111:f403:c110::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8AFF3A07C0; Fri, 25 Mar 2022 13:04:12 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AwZVuglajF4PjQG7z9w2lJMqvpnXUqeMk5GP1uCNwE6sFTPms8cUcRXqyIKPq89sTaOoUZcsziiqkYynuIuIUflN+SeX4YHOzk7pRw4j2CBodvFYtIbga66wkicA02SA8v01vd2468eCV0pd/PtwPIkKdfvehdP6amDAyoVZtHIdhNyaePkPWXIR4kPFzGMLUh0vA4yKoYixAJHd3yp9kzFdp/uPx+CpQHrRzNQZXAUGKlyiBi6GJWAmLkM3mWXmfzQzHi56fHgzdX8L+iQP3GHXa3Xn8Oa5brQqXTnozX6c4prjHCVi0lELKzMx/ElCQEek/8plvrErsKMv9eamqw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=enXDcsu1WmPTBRs4p9Zor71oyE6B3l/RSTY5dgYyS5I=; b=OV1uzFepQI+JZgcpV3rysedWakCkyXxWkfKDHGYF28wJoeDgJZENQFnGpXLNx7/nLb0pHxRaIuRPmjBeNpT2yYPARDjpAt8Ir62rL/5XmQx2cltRwDngv1VTzdjjPzZlWJgFjJy0iiQAXUGUewZc5rW7ozo7gAHhF/5ENILmuE7kKdsmAR1UDB2iB/2oFHRifGreWx6uXQjfGDFC68lJqgQ/WhRxW5L9S+NuB6SCs86SYt+NCwJ14t96c0YJca5oQAyFj+NDdwakz7+VM8gptL1gjYUtfmfTTG6uyDNrkXlEvjAcPCDwuO/98lIEnUV7T9iDa987dDb2UBMpYPxJPQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=enXDcsu1WmPTBRs4p9Zor71oyE6B3l/RSTY5dgYyS5I=; b=KT0vdjJFCPpLcMa8Q5MHdIAo6/RW6najcRQEGIO+v5EGbIcvv2DHKnduIaO1bHFYNr6cQNCOuOLVSA8OnjU4HoMC+GEuVUQazyix1LnyMOdyIrYnXZWzCHX65JaYkvktsaNgT7Gk9ESZ6smndASf1CaiSPcUONqV1S5IMHCyn5M=
Received: from CH2PR21MB1464.namprd21.prod.outlook.com (2603:10b6:610:89::16) by BYAPR21MB1670.namprd21.prod.outlook.com (2603:10b6:a02:c4::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.11; Fri, 25 Mar 2022 20:04:06 +0000
Received: from CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::4107:361b:c80c:5545]) by CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::4107:361b:c80c:5545%6]) with mapi id 15.20.5123.011; Fri, 25 Mar 2022 20:04:05 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: "teep@ietf.org" <teep@ietf.org>, "suit@ietf.org" <suit@ietf.org>
Thread-Topic: Reliably getting TEE properties
Thread-Index: Adg/icpqObuyF4JjSKeB7uQZBs8QugA+QXvQ
Date: Fri, 25 Mar 2022 20:04:05 +0000
Message-ID: <CH2PR21MB14640D5C5C37EFD216EB1979A31A9@CH2PR21MB1464.namprd21.prod.outlook.com>
References: <CH2PR21MB14645C4490FFC796D43A1034A3199@CH2PR21MB1464.namprd21.prod.outlook.com>
In-Reply-To: <CH2PR21MB14645C4490FFC796D43A1034A3199@CH2PR21MB1464.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=fa416331-3fe1-478e-8947-4ac634fbfbcc; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-24T14:16:24Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f4802963-9620-46ec-bc44-08da0e9a9d31
x-ms-traffictypediagnostic: BYAPR21MB1670:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <BYAPR21MB16703DF36CEDB87DE1EA4F2DA31A9@BYAPR21MB1670.namprd21.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR21MB1464.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(451199009)(8990500004)(8676002)(450100002)(76116006)(86362001)(66446008)(66556008)(66946007)(66476007)(64756008)(38100700002)(33656002)(38070700005)(26005)(82950400001)(186003)(82960400001)(110136005)(316002)(122000001)(6506007)(7696005)(3480700007)(55016003)(53546011)(9686003)(71200400001)(166002)(508600001)(966005)(2906002)(10290500003)(8936002)(5660300002)(52536014)(83380400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH2PR21MB14640D5C5C37EFD216EB1979A31A9CH2PR21MB1464namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR21MB1464.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f4802963-9620-46ec-bc44-08da0e9a9d31
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Mar 2022 20:04:05.0831 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: LqlvTPkhbIL8hEmV+4e8seJIrY15a4+IIuJF0belHH7iDX077yh7e4QYU8OVU+0u9kA18snSNvIzmouxTltXBEAQA0RQMdZj4vtVxBhJJhw=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR21MB1670
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/fNo7VOAzjGmnURd2wbwCBMrhZFA>
Subject: Re: [Suit] Reliably getting TEE properties
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 20:04:17 -0000

Adding SUIT WG and quoting Russ's related email on the SUIT list here:



> -----Original Message-----

> From: Suit <suit-bounces@ietf.org<mailto:suit-bounces@ietf.org>> On Behalf Of Russ Housley

> Sent: Friday, March 25, 2022 12:05 PM

> To: suit <suit@ietf.org<mailto:suit@ietf.org>>

> Subject: [Suit] SUIT-related Claims

>

> When we ran out of time at the end of the IETF 113 session, four options for
> handling SUIT-related claims were outlined.  The way forward may have an impact
> on RATS and TEEP as well as SUIT, so we should resolve this issue as promptly as
> possible.

>

> * Dave Thaler: There are four possible ways to use SUIT reports:

>            * (AS): Use SUIT report AS an evidence format instead of eat

>            * (IN): Use SUIT report encapsulated IN an eat (what is on Brendan's slide)

>            * (TO): Use SUIT report to translate claims TO an eat (e.g., what Brendan
> mentioned might do to translate info to attestation result fields)

>            * (WITH): Use SUIT report separate from (i.e., WITH) attestation, e.g., send in a message to a relying party where the message has both evidence and the suit report in separate parts of the message

> * Dave Thaler: Today in TEEP there is no requirement that a TEEP Agent must generate SUIT reports at boot time, only at Update time.  Should there be?  Requiring #1 or #2 would introduce such a requirement.

> * Dave Thaler: Should we add SUIT reports to the QueryResponse message in TEEP to allow #4?

>

> Please continue this discussion on the mailing list.



Original post to teep is below.



-----Original Message-----
From: TEEP <teep-bounces@ietf.org> On Behalf Of Dave Thaler
Sent: Thursday, March 24, 2022 7:26 AM
To: teep@ietf.org
Subject: [Teep] Reliably getting TEE properties



I just filed issue https://github.com/ietf-teep/teep-protocol/issues/189

based on thinking about the discussion Brendan and I were having at the tail end of the SUIT WG meeting today.



Currently evidence in the QueryResponse is an optional field, and the QueryRequest can specify the attestation bit to request it.  Since the evidence is not mandatory, the QueryResponse today has no reliable way to learn the device identifying information and TEE identifying information (to use the terms in the architecture draft), which seem critical to the task of being able to determine which Trusted Components to install in the TEE.



Options:

1. Make evidence mandatory in the QueryResponse and remove the attestation bit from data-items-requested
2. Make attestation mandatory but allow it to be either passed inside the TEEP protocol or in a transport protocol (e.g., HTTPS terminating inside the TEE as in model C of figure 5 in the architecture draft). The attestation bit shouldn't be needed in data-items-requested here either since an implementation could know whether the transport included it inside the TEE or not.

3. Make use of SUIT Reports in the QueryResponse mandatory and put the system information there. This means that a TAM would be able to access them without relying on a Verifier to put relevant claims in Attestation Results so could ease interop with more Verifiers.   The only downside I see is that today it is not a

requirement that SUIT Reports be generated at "boot" time (meaning start time for whatever components are relevant) on a TEEP device, and this option would make that a requirement.

4. Some hybrid that allows more than one of the above in implementations but only uses one in any particular message exchange.



I have to admit that I do see advantages in option 3 as noted above, and so I filed
https://github.com/ietf-teep/teep-protocol/pull/187
with what that might look like if we go that route though I temporarily made suit reports optional so it's technically option 4, but if we go with option 3, I will update to make them mandatory.



Looking for feedback from the WG and especially from other implementers.



Dave