Re: [Suit] Wording for integrated payload size

Brendan Moran <Brendan.Moran@arm.com> Tue, 17 December 2019 12:04 UTC

Return-Path: <Brendan.Moran@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26D9A1201CE for <suit@ietfa.amsl.com>; Tue, 17 Dec 2019 04:04:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=e0pGZ5oH; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=armh.onmicrosoft.com header.b=4tyPo/99
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GHNBiOfm6RM3 for <suit@ietfa.amsl.com>; Tue, 17 Dec 2019 04:04:53 -0800 (PST)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-eopbgr140057.outbound.protection.outlook.com [40.107.14.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFEE31201E5 for <suit@ietf.org>; Tue, 17 Dec 2019 04:04:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oBLJMPubovAIjtdy2w/M0TVs6ud98FpO5yfgYTo0pE4=; b=e0pGZ5oHr18SK/vLbk0sxOkYR92MBBaMi4U+mM2LeuBPBi1P8fki6+63rnBiU1jH6ddy3exKlAnfL686u+7mRKhMz4aMwf7uZQ2X6ZQerjt88cYDyUmL76fPwDU26wfI35coqXO4QqxgyN6oEMCxLPjsJaIm7jvrrz1FNAw7k0M=
Received: from VI1PR08CA0142.eurprd08.prod.outlook.com (2603:10a6:800:d5::20) by AM0PR08MB4514.eurprd08.prod.outlook.com (2603:10a6:208:13a::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2538.15; Tue, 17 Dec 2019 12:04:50 +0000
Received: from AM5EUR03FT041.eop-EUR03.prod.protection.outlook.com (2a01:111:f400:7e08::203) by VI1PR08CA0142.outlook.office365.com (2603:10a6:800:d5::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2538.15 via Frontend Transport; Tue, 17 Dec 2019 12:04:50 +0000
Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT041.mail.protection.outlook.com (10.152.17.186) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2538.18 via Frontend Transport; Tue, 17 Dec 2019 12:04:49 +0000
Received: ("Tessian outbound 1da651c29646:v40"); Tue, 17 Dec 2019 12:04:49 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: be11a983df364e87
X-CR-MTA-TID: 64aa7808
Received: from fd828c69c6e9.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 1C9B2806-E46C-429A-A33A-251BD1747116.1; Tue, 17 Dec 2019 12:04:44 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id fd828c69c6e9.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 17 Dec 2019 12:04:44 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XHnOEMKWgXVtE4HIchbAu1sUnL8vC6LfxdbE/5Dw+9ku13sgwICdSOftMlfxHNJe9H0Ucxpd9hpxHB+6Ec1xIX/y3/0Fg6Xi/3jWjsauR+muBOaGOKYtFi8k27TCe/P6oAtgQ9GJbCdxGu5KKkXdtqdjpM9GKHFUlN3ifqustLXiQeUvdwAC88oTXoMmyTXVjEUg9/u2Q3TTcrP0ViXBmv+O6uqqfj8XLs0QjVAIk6wnuB/IU7t6/aQ2j+CCgkBrZJE6qujsP4g6KEWbEkG06XnJaPvFs/T03Im1wo5ZwrlDNx0f1KhuYdjPcmt9JY0dh6veL2kXduE8BuLRqfN2KQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=f7Csa4lQm5PprCI6JX55EGrhDLWT6ecvgZCVbsPJBmw=; b=KcVn3irfHvOT/TY+6yTcRkA0pvVfTh850YScVRXcYr68I+TwnWlWZn4CGVkZbupwqBubtGWhzoXTnSgX4PMK3dUjL0ShozEeaqbZal4GUEFba4LkNAseqMoEXLP5SjffF0wEV1aKpnx3EkbZpIbooqvtEsJPAGHRL/28YUgFll7cfgC+cUYNTJdQJCLwWXHB8horTH2Qg56E2ApO2PVjUGr9p82JERSRycDy8lBUIWcGX/Aey8f9cFNFepsH1ByxRnd+H8W0Vy2nISk7RGeM9omEskqdHKfxf10dH/3aY4eSEBO5dICGT8fLVQY9TfqwpIOhDD4+pDvAPTSO10Mh4g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=f7Csa4lQm5PprCI6JX55EGrhDLWT6ecvgZCVbsPJBmw=; b=4tyPo/99O5KrhFYw14s7kVoIM+Fq6a205FiCteW1IFzrZteVxne4UYLT4OvDyyGR+33w9R1DEluW0mPiQbE5Yahh6d7ptzzQH5REkGqqp+K8JU/47ELqxi61qBBLhlccpvLC/5vfnFz2Anjl3q5vq1xPlUcuYaBwHkLYtjdw8+M=
Received: from DB6PR0801MB1879.eurprd08.prod.outlook.com (10.168.84.137) by DB6PR0801MB1784.eurprd08.prod.outlook.com (10.169.226.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2538.14; Tue, 17 Dec 2019 12:04:42 +0000
Received: from DB6PR0801MB1879.eurprd08.prod.outlook.com ([fe80::ac0d:8d0f:7729:da46]) by DB6PR0801MB1879.eurprd08.prod.outlook.com ([fe80::ac0d:8d0f:7729:da46%3]) with mapi id 15.20.2538.019; Tue, 17 Dec 2019 12:04:42 +0000
From: Brendan Moran <Brendan.Moran@arm.com>
To: Dave Thaler <dthaler@microsoft.com>
CC: suit <suit@ietf.org>
Thread-Topic: Wording for integrated payload size
Thread-Index: AQHVrEAJ810bu5nmR0yDzlF5CgRTAKe1T4IAgAj8UIA=
Date: Tue, 17 Dec 2019 12:04:42 +0000
Message-ID: <3EC3D5C9-1475-4659-BCE5-FEFFD7144248@arm.com>
References: <734509A8-7562-4B47-AAE5-54F840C4A298@arm.com> <MWHPR21MB0784F574BE1FFD50743040FCA35A0@MWHPR21MB0784.namprd21.prod.outlook.com>
In-Reply-To: <MWHPR21MB0784F574BE1FFD50743040FCA35A0@MWHPR21MB0784.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3601.0.10)
Authentication-Results-Original: spf=none (sender IP is ) smtp.mailfrom=Brendan.Moran@arm.com;
x-originating-ip: [217.140.106.54]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: f3f73410-8736-4258-6de0-08d782e95160
X-MS-TrafficTypeDiagnostic: DB6PR0801MB1784:|AM0PR08MB4514:
X-Microsoft-Antispam-PRVS: <AM0PR08MB4514E531690AF5E76B24B747EA500@AM0PR08MB4514.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
x-ms-oob-tlc-oobclassifiers: OLM:4502;OLM:4502;
x-forefront-prvs: 02543CD7CD
X-Forefront-Antispam-Report-Untrusted: SFV:NSPM; SFS:(10009020)(4636009)(396003)(136003)(376002)(346002)(39860400002)(366004)(13464003)(40434004)(189003)(199004)(6506007)(966005)(33656002)(2616005)(71200400001)(2906002)(8936002)(53546011)(36756003)(6512007)(8676002)(26005)(5660300002)(6486002)(186003)(6916009)(45080400002)(86362001)(91956017)(66556008)(66946007)(64756008)(66476007)(76116006)(81156014)(81166006)(478600001)(66446008)(316002)(4326008); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6PR0801MB1784; H:DB6PR0801MB1879.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_3EC3D5C914754659BCE5FEFFD7144248armcom_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1784
Original-Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Brendan.Moran@arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT041.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; IPV:CAL; SCL:-1; CTRY:IE; EFV:NLI; SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(136003)(396003)(376002)(346002)(13464003)(199004)(189003)(40434004)(8936002)(6862004)(36906005)(316002)(4326008)(33656002)(478600001)(45080400002)(70206006)(8676002)(81156014)(81166006)(26826003)(336012)(356004)(6486002)(70586007)(966005)(6512007)(86362001)(36756003)(33964004)(26005)(5660300002)(76130400001)(2616005)(30864003)(2906002)(53546011)(6506007)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:AM0PR08MB4514; H:64aa7808-outbound-1.mta.getcheckrecipient.com; FPR:; SPF:Pass; LANG:en; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; A:1; MX:1;
X-MS-Office365-Filtering-Correlation-Id-Prvs: d9008d3e-619e-441d-c365-08d782e94ce3
X-Forefront-PRVS: 02543CD7CD
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Dec 2019 12:04:49.9708 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f3f73410-8736-4258-6de0-08d782e95160
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4514
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/mQTG03icvvA0HzBBrgKU1DFsldY>
Subject: Re: [Suit] Wording for integrated payload size
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Dec 2019 12:04:58 -0000

Russ,

I see why the use of RAM as a requirement is surprising. There are two requirements here. I believe that one of them is required and one is optional.

It is required that the manifest be held invariant between verification and processing. This could mean storing in internal RAM or NVRAM, storing in a secure external memory, etc.
It is desirable, depending on system factors, to ensure that a manifest is verified prior to storing to NVRAM. This is most pertinent when the NVRAM wears or when NVRAM writes are energy expensive. This, however, is a download & update concern, not a bootloader concern.

Here’s a rephrased version of the previous excerpt.

Best Regards,
Brendan

When an integrated payload is provided, this increases the size of the manifest. Manifest size can cause several processing and storage concerns that require careful consideration. The payload can prevent the whole manifest from being contained in a single network packet, which can cause fragmentation and the loss of portions of the manifest in lossy networks. This causes the need for reassembly and retransmission logic. The manifest must be held invariant between verification and processing, so a larger manifest will consume more memory with invariance guarantees, for example internal RAM or NVRAM, or external secure memory. If the manifest exceeds the available invariant memory, then it must be processed modularly, evaluating each of: delegation chains, the security container, and the actual manifest, which includes verifying the integrated payload. If the security model calls for downloading the manifest and validating it before storing to NVRAM in order to prevent wear to NVRAM and energy expenditure in NVRAM, then either increasing memory allocated to manifest storage or modular processing of the received manifest may be required. While the manifest has been organised to enable this type of processing, it creates additional complexity in the parser. If the manifest is stored in NVRAM prior to processing, the integrated payload may cause the manifest to exceed the available storage. Because the manifest is received prior to validation of applicability, authority, or correctness, integrated payloads cause the recipient to expend network bandwidth and energy that may not be required if the manifest is discarded and these costs vary with the size of the integrated payload.

On 11 Dec 2019, at 18:51, Dave Thaler <dthaler@microsoft.com<mailto:dthaler@microsoft.com>> wrote:

Grammatical comment:  "stored to" reads oddly to me.
I'd suggest replacing with either "stored in" or "saved to".

Dave

-----Original Message-----
From: Suit <suit-bounces@ietf.org<mailto:suit-bounces@ietf.org>> On Behalf Of Brendan Moran
Sent: Friday, December 6, 2019 6:19 AM
To: suit <suit@ietf.org<mailto:suit@ietf.org>>
Subject: [Suit] Wording for integrated payload size

To finalise the information model, we need to address the issue raised at ietf106: how big can an integrated payload be? The suggestion made at the meeting was that no specific requirement should be made, but that the information model needed some text to explain the tradeoffs in size of payload. Here is my proposal for that text.


Best Regards,
Brendan


When an integrated payload is provided, this increases the size of the manifest. Manifest size can cause several processing and storage concerns that require careful consideration. The payload can prevent the whole manifest from being contained in a single network packet, which can cause fragmentation and the loss of portions of the manifest in lossy networks. This causes the need for reassembly and retransmission logic. If the manifest is too large to fit in RAM, then it must be processed modularly; first evaluating delegation chains, then the security container, then processing the actual manifest, which includes verifying the integrated payload. While the manifest has been organised to enable this type of processing, it creates additional complexity in the parser. If the manifest is stored to nonvolatile storage prior to processing, the integrated payload may cause the manifest to exceed the available storage. Because the manifest is received prior to validation of applicability,  authority, or correctness, integrated payloads cause the recipient to expend network bandwidth and energy that may not be required if the manifest is discarded and these costs vary with the size of the integrated payload.
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.

_______________________________________________
Suit mailing list
Suit@ietf.org<mailto:Suit@ietf.org>
https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsuit&amp;data=02%7C01%7Cdthaler%40microsoft.com%7C9d5dbf0c98c845d1453508d77a573609%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637112387316385698&amp;sdata=jvELlCP5PxSIqjoHOAG1NZkXyyn8oc2CPuOm6g5WaTs%3D&amp;reserved=0

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.