Re: [Suit] suit-firmware-encryption-00

Brendan Moran <Brendan.Moran@arm.com> Wed, 02 June 2021 13:13 UTC

Return-Path: <Brendan.Moran@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04DBA3A429F for <suit@ietfa.amsl.com>; Wed, 2 Jun 2021 06:13:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=l92m7YCd; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=l92m7YCd
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yGXqb7BHmZ-E for <suit@ietfa.amsl.com>; Wed, 2 Jun 2021 06:13:39 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30070.outbound.protection.outlook.com [40.107.3.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D80F33A429B for <suit@ietf.org>; Wed, 2 Jun 2021 06:13:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Kkz5Um2SPAyfq23P60TAYrUsX9efeWJe1jXLgMSm264=; b=l92m7YCdGJt9g72A2D0STvFZXFwZ8tn4j/GpSY5yt86ZlvcI1KrjE1HF4rcCSRmXKvSD1MOKzalqhv0KSvJ4rcoyUMUolcIB57vxMrMZLSmA/6o2uFAbZfssvVYlhnRZddJ6GrDKdprByLLFfyvt7BuTEprpm/SiKAugtEzZ+wU=
Received: from DB6P193CA0018.EURP193.PROD.OUTLOOK.COM (2603:10a6:6:29::28) by PA4PR08MB5920.eurprd08.prod.outlook.com (2603:10a6:102:ea::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.20; Wed, 2 Jun 2021 13:13:33 +0000
Received: from DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com (2603:10a6:6:29:cafe::b0) by DB6P193CA0018.outlook.office365.com (2603:10a6:6:29::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.20 via Frontend Transport; Wed, 2 Jun 2021 13:13:33 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT046.mail.protection.outlook.com (10.152.21.230) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4150.30 via Frontend Transport; Wed, 2 Jun 2021 13:13:33 +0000
Received: ("Tessian outbound a5ae8c02e74f:v93"); Wed, 02 Jun 2021 13:13:33 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: af207fb7157b38a1
X-CR-MTA-TID: 64aa7808
Received: from a332f8975132.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id CDFDEA33-84D8-4EB2-8073-D6150D9ABC65.1; Wed, 02 Jun 2021 13:13:22 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id a332f8975132.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 02 Jun 2021 13:13:22 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ePDlgySjqO1+JIutKr1A4cWCVohU65ld+8QgnjyU+8HXpg/WihaYpckdvH4C6DZjFd6wFwqvL/HBiVkSKvl12j8VjgUFD1oOkQZyXx/IrcVm49gyrkk9NaeQouDmX37VegqKxGIT1E7rbm2wLy7cB8Dn3d9YeQVOfkWLeoKZHWsFPx5z8XmASeHA5IgBNM++ojpm+ria+kf/hIe1h4Y46bxDHX0I+6i1Qum2s+/FYB1vhxGcOeoYHVayHOM0+w93Qu2AJSkIHVPyVVyzoDvYEk55SwQLU6oILsoQyiXgdddExzmOTqlOefCvJGc+xXA8YoFkohhuuMXbOeZbRNh+7g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Kkz5Um2SPAyfq23P60TAYrUsX9efeWJe1jXLgMSm264=; b=IiUx7iMVdwYvUVedb8pMt/XKg2SQMWpbmmYxo5+amPvVhvxO7fRti7d1L+ASTHOPqHXozYK8V38bK91lyXmPp1kl7Sv4Y7QRZ/b1SwM5/2XZBE1qs37UP3HNoyfSxk8FZYqJkRy4iP9YnQ6cjmJO40cbQlNBHTlgkDR1EyLcAK001GQKivgdfXSkrRBrBR4Yhnh74gvyBboVQHgUQJMX7FLZFHaaS907Y+TCkQeSoR55xuWouTBvX6CtNdTFkrFSRORrdOutyLBzMLXttsNgiUoAcS6PxSfV9dBcB51MKbTUr8j6ShmnR/QimOASBCXK6wXEodY6svJJ97QR0oae/A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Kkz5Um2SPAyfq23P60TAYrUsX9efeWJe1jXLgMSm264=; b=l92m7YCdGJt9g72A2D0STvFZXFwZ8tn4j/GpSY5yt86ZlvcI1KrjE1HF4rcCSRmXKvSD1MOKzalqhv0KSvJ4rcoyUMUolcIB57vxMrMZLSmA/6o2uFAbZfssvVYlhnRZddJ6GrDKdprByLLFfyvt7BuTEprpm/SiKAugtEzZ+wU=
Received: from DBAPR08MB5576.eurprd08.prod.outlook.com (2603:10a6:10:1ae::11) by DBBPR08MB6041.eurprd08.prod.outlook.com (2603:10a6:10:206::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.22; Wed, 2 Jun 2021 13:13:20 +0000
Received: from DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::488c:be63:d9fe:b0e0]) by DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::488c:be63:d9fe:b0e0%7]) with mapi id 15.20.4173.030; Wed, 2 Jun 2021 13:13:20 +0000
From: Brendan Moran <Brendan.Moran@arm.com>
To: Dick Brooks <dick@reliableenergyanalytics.com>
CC: Hannes Tschofenig <Hannes.Tschofenig@arm.com>, Russ Housley <housley@vigilsec.com>, Michael Richardson <mcr+ietf@sandelman.ca>, "suit@ietf.org" <suit@ietf.org>
Thread-Topic: [Suit] suit-firmware-encryption-00
Thread-Index: AQHXUy5zvx3nHIfq0kuzjZIH4a2amqr9uSuAgAAS7gCAAAUmgIAAAfoAgAABRQCAAADUAIAAAxaAgAAvdwCAAADOgIAA9f8AgAAOUACAABoAgIAABCqAgAAty4CAABcQAIABRg2AgAAC+gCAAAK3gA==
Date: Wed, 02 Jun 2021 13:13:20 +0000
Message-ID: <C5221278-D5BB-4F71-B3B3-8EB654B6984B@arm.com>
References: <19586.1622075797@localhost> <DBBPR08MB5915CEC125579D78C108D540FA3F9@DBBPR08MB5915.eurprd08.prod.outlook.com> <F6C86CC2-3AF8-4CC5-BB47-AC6579DAA0C4@vigilsec.com> <13894.1622479289@localhost> <64BDF7A0-4B70-4EB3-A764-2BD6CAA3921A@vigilsec.com> <132601d7563d$7097f680$51c7e380$@reliableenergyanalytics.com> <E2D893E5-8462-4F69-88D0-29167B6DB1B3@vigilsec.com> <140a01d7563f$65d2a130$3177e390$@reliableenergyanalytics.com> <DBBPR08MB591549CB964EA7E18C8640C2FA3F9@DBBPR08MB5915.eurprd08.prod.outlook.com> <18b401d75657$880bfef0$9823fcd0$@reliableenergyanalytics.com> <DBBPR08MB59158723623695EB0473637FFA3E9@DBBPR08MB5915.eurprd08.prod.outlook.com> <223201d756d9$af8bddb0$0ea39910$@reliableenergyanalytics.com> <DBBPR08MB5915C1F5529E8801DF5AFD09FA3E9@DBBPR08MB5915.eurprd08.prod.outlook.com> <272401d756e8$c446ba90$4cd42fb0$@reliableenergyanalytics.com> <DBBPR08MB59159E70B7ED1575EF82A745FA3E9@DBBPR08MB5915.eurprd08.prod.outlook.com> <32f301d7570b$316490d0$942db270$@reliableenergyanalytics.com> <010627E5 -A66D-48D5-8F89-B1BC11F2714D@arm.com> <031a01d757af$b5bdb100$21391300$@reliableenergyanalytics.com>
In-Reply-To: <031a01d757af$b5bdb100$21391300$@reliableenergyanalytics.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.100.0.2.22)
Authentication-Results-Original: reliableenergyanalytics.com; dkim=none (message not signed) header.d=none;reliableenergyanalytics.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [80.7.184.196]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-Correlation-Id: c133d4e1-036e-47d6-afb9-08d925c83915
x-ms-traffictypediagnostic: DBBPR08MB6041:|PA4PR08MB5920:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS: <PA4PR08MB59203A09AB7AC92E6BC3584DEA3D9@PA4PR08MB5920.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:4941;OLM:4941;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBAPR08MB5576.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39850400004)(366004)(376002)(136003)(396003)(346002)(66556008)(6916009)(53546011)(66476007)(64756008)(76116006)(66946007)(66446008)(2906002)(6506007)(26005)(8676002)(8936002)(54906003)(478600001)(91956017)(83380400001)(966005)(38100700002)(186003)(86362001)(71200400001)(5660300002)(122000001)(66574015)(6512007)(2616005)(6486002)(33656002)(30864003)(36756003)(4326008)(316002)(45080400002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 42PIseCe5xYmgmWeXwhIKzdAtYZdt+BaAeACD1UyuNp2dvzg61uhLN7J/A/PijKJa37IAsyBez/0H8aOWSiKKcvvos0oNNqGVW9wnDqhQBja4Wm6+5gQjKtn6g1g7bYmFN34Y9Qr7depkLYllepA8Z45tMiztM2dCkVCil/Z1LD8e1Yb5pH2Z+SwJ9Q3d05foZ2xNHsHj0GQvKYJSJsYrtG9H4vvEGsSIQvG+DR4vp5gt82Dy9jPylGwiZH8LaD90qMFBENjeenrrPzEW+Lv5r7ntmEp4HGF9EFufl8NpGVw6QqlCEG4SaauoA6T8VBPC6CH8VYg1D6pv+fdfHH8jx4skIut4zEw1KAPjeK+xHsCUz1tiySOYnlG8AAdNO5cpDT0MXNfc5GZCWLT0fXKUolx495fkMeDVXabVH/9jYZvB0+vTQRElrnBeiIsBBrYuFXxVLzJ3gsOF32PFzEQD956R4LD0Lz5+rFN3S7bYwjydIyzvpjfX9NFfy6oMWn4bBkzZRvCPXko1d0/MMnxKi6nESM+HCKP2cK1sZk0Pu6iF5lZjJVFV52Qy7iQjeF6v9iTDVpfQTBICFlLWHj0H3Zaj4JJmffxWeKqXgILsTAwxtG9DIJL60ai6oWv2eW+QGnNRkyXRa9zQFriRiDq7wsrsG1WREdouMD7nLikwXAQC0P3+cg2BjD0nfNae6eExfeFNnVBJdCpMtzuAvcz4pXlUyKq1AT4+TR84YXVvbenAg6XBjeuZ9k09uJ+kPcUUWdJGK0a5jwSXCNkVlpvdwc8+qeKAKZvARwSwCGOYf0VsqXCPLToKZpJdI8HCqrEwf0RJ8mB2f393TvtCpQO09tvYTFy+nVMi7IVp22HbeGZaAMqY1YvQDemgY/XdmaaiFamxEkmR/kj6+29l8ICjelXfRgC7n6KTUJN+cGRiSCST6YMXvJxQ0BN/hlDm9/mahzib3Gmfp2BU0xvS3OVSBKS++loeHsvs7TT1MWU3psXYFwfCE7sF0pGvZNVC4bDgw2obkB17mTkNpvb3fgU+bNhH6z+g2eifXBiMJ6U9xuMJ1YvRJ1jVYWZYXZHeCdKRzaW3Yofo77LebbP41eNIJWJPjvpkBGNyaRf6Gs0NpRft2Y1OGVobluhiFOL+cf065iiNyWcRloIW0lvDHuizogePYgP4GWlt4thdb6+6EmuqLCcVkvj57MUh2X5qF+CyiQpOv93uGKR0X8FYld4ZDb5g7LLoZQ0DnkuFxdy2G43t2AmdaVKKLBV6BdZlEA6RJ2SJv4jZLwxecv2SvrzTyA4SGNYAhN0EyFxc8H/L2LFkgOhztv5jwSnXbdy0ikG
Content-Type: text/plain; charset="utf-8"
Content-ID: <275925A7B2D3324BA64736BC9788728B@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB6041
Original-Authentication-Results: reliableenergyanalytics.com; dkim=none (message not signed) header.d=none;reliableenergyanalytics.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 69502e2c-edbf-49e4-4140-08d925c83182
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(376002)(136003)(39850400004)(346002)(396003)(46966006)(36840700001)(966005)(86362001)(316002)(45080400002)(70586007)(5660300002)(70206006)(8936002)(26005)(81166007)(336012)(47076005)(8676002)(478600001)(36860700001)(82310400003)(36756003)(6512007)(2616005)(33656002)(30864003)(6486002)(186003)(82740400003)(54906003)(66574015)(83380400001)(6862004)(356005)(53546011)(6506007)(4326008)(2906002); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Jun 2021 13:13:33.0955 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: c133d4e1-036e-47d6-afb9-08d925c83915
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB5920
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/qhypPk4s0Z2C8McYlxhAvZZU7Z8>
Subject: Re: [Suit] suit-firmware-encryption-00
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Jun 2021 13:13:45 -0000

Hi Dick,

To verify any signature, you have to get a public key from somewhere. If the recipient device doesn’t have the relevant public key, then the signature isn’t valid. The flaw that you describe is based entirely on a system that’s overeager to deliver public keys to devices without applying any ACL.

This is why we explicitly call out ACLs in the information model: https://datatracker.ietf.org/doc/html/draft-ietf-suit-information-model-12#section-4.3.13

Constrained devices have access to a constrained set of public keys. They have one trust anchor, sometimes two or three. However those trust anchors have specific duties. For example, one might be the trust anchor for firmware updates, a second might be for the remote management system, and a third might be for data reporting. If you have the ability to dynamically install new trust anchors, then you create a problem. This needs to be carefully considered.

But whatever the case, this is a security consideration. Manifests MUST be signed by known public keys. Public keys MUST have endorsements for specific capabilities on the target device. That mechanism is not in-scope for the manifest itself, but it is certainly in-scope for the manifest security considerations. The manifest security considerations are covered int he information model, which contains the section about ACLs.

Is that adequate coverage?

Best Regards,
Brendan

> On 2 Jun 2021, at 14:03, Dick Brooks <dick@reliableenergyanalytics.com> wrote:
>
> Brendan,
>
> I agree that a trust anchor is specified in SUIT, however when you look at
> the basis for this trust anchor (COSE) you find this information
>
> https://datatracker.ietf.org/doc/html/rfc8152#section-4.4
> COSE's Signing and Verification process contains the following guidance:
>
>  In addition to performing the signature verification, the application
>   may also perform the appropriate checks to ensure that the key is
>   correctly paired with the signing identity and that the signing
>   identity is authorized before performing actions.
>
> The problem seems to be that there is no formal/standard define method for a
> SW consumer to verify that a signer has been authorized by the original
> source supplier to sign software on their behalf. Anyone can sign anyone's
> software package, and it is verified as successful by Microsoft's signtool.
> This is a problem for the SCRM community.
>
> Thanks,
>
> Dick Brooks
>
> Never trust software, always verify and report! T
> http://www.reliableenergyanalytics.com
> Email: dick@reliableenergyanalytics.com
> Tel: +1 978-696-1788
>
> -----Original Message-----
> From: Brendan Moran <Brendan.Moran@arm.com>
> Sent: Wednesday, June 2, 2021 8:53 AM
> To: Dick Brooks <dick@reliableenergyanalytics.com>
> Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; Russ Housley
> <housley@vigilsec.com>; Michael Richardson <mcr+ietf@sandelman.ca>;
> suit@ietf.org
> Subject: Re: [Suit] suit-firmware-encryption-00
>
>
>
>> DB>> Currently software consumers do not have a standard method to
>> DB>> verify
>> that a signing party has been authorized to sign on behalf of a
>> software source supplier, when performing digital signature
>> verification on a software package. Many people "assume" that the
>> signing party is the software source supplier.  A digital signature
>> alone is insufficient at identifying the software source supplier
>> because anyone with a code signing key can sign any software package, as
> demonstrated in this article:
>> https://energycentral.com/c/ec/who-ya-gonna-trust
>
> This may well be true in the general case, but this is not true for SUIT.
> SUIT manifests must be verified all the way back to a trust anchor.
>
> https://datatracker.ietf.org/doc/html/draft-ietf-suit-manifest-13#section-5.
> 2
>
>>   Delegation Chains allow a Recipient to establish a chain of trust
>>   from a Trust Anchor to the signer of a manifest by validating
>>   delegation claims.  Each delegation claim is a [RFC8392] CBOR Web
>>   Tokens (CWTs).  The first claim in each list is signed by a Trust
>>   Anchor.  Each subsequent claim in a list is signed by the public key
>>   claimed in the preceding list element.  The last element in each list
>>   claims a public key that can be used to verify a signature in the
>>   Authentication Block (
>> Section 5.3).
> See also
> https://datatracker.ietf.org/doc/html/draft-ietf-suit-manifest-13#section-8.
> 3
>
> This is also described in the information model:
> https://datatracker.ietf.org/doc/html/draft-ietf-suit-information-model-12#s
> ection-3.25
>
> See also REQ.SEC.ACCESS_CONTROL:
> https://datatracker.ietf.org/doc/html/draft-ietf-suit-information-model-12#s
> ection-4.3.13
>
>>   If a device grants different rights to different actors, then an
>>   exercise of those rights MUST be validated against a list of rights
>>   for the actor.  This typically takes the form of an Access Control
>>   List (ACL).  ACLs are applied to two scenarios:
>>
>>   1.  An ACL decides which elements of the manifest may be overridden
>>       and by which actors.
>>
>>   2.  An ACL decides which component identifier/storage identifier
>>       pairs can be written by which actors.
>>
>>   Mitigates: THREAT.MFST.OVERRIDE (Section 4.2.13),
>>   THREAT.UPD.UNAPPROVED (Section 4.2.11)
>
> Best Regards,
> Brendan
>
>
>> DB>> I plan to raise the need for a formal method to verify authorized
>> DB>> code
>> signing parties on behalf a software source supplier during digital
>> signature validation as a topic during NIST's EO workshop in 6/2-3.
>>
>> (It is not unlikely that the delegation mechanism would benefit from
>> more
>> details...)
>>
>> Ciao
>> Hannes
>>
>> -----Original Message-----
>> From: Dick Brooks <dick@reliableenergyanalytics.com>
>> Sent: Tuesday, June 1, 2021 3:20 PM
>> To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; 'Russ Housley'
>> <housley@vigilsec.com>
>> Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca>; suit@ietf.org
>> Subject: RE: [Suit] suit-firmware-encryption-00
>>
>> Hannes,
>>
>> Will the SUIT manifest contain an attestation of a clean malware scan
>> that can be verifiably validated for the encrypted software in hand?
>> That would help, if a malware scan is not an option.
>>
>> The other issue that needs to be addressed is the ability for a
>> software consumer to verify that the signing party of a software
>> object has been given authorization to sign code on behalf of a
>> software source supplier (VENDOR ID) in the manifest, using a standard
>> method - something similar to DNS CAA records, but for digital signatures,
> e.g. maybe DNS DSA records.
>>
>> Ref: "Vendor ID is not intended to be a human-readable element.  It is
>> intended for binary match/mismatch comparison only."
>>
>> Thanks,
>>
>> Dick Brooks
>>
>> Never trust software, always verify and report! T
>> http://www.reliableenergyanalytics.com
>> Email: dick@reliableenergyanalytics.com
>> Tel: +1 978-696-1788
>>
>> -----Original Message-----
>> From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
>> Sent: Tuesday, June 1, 2021 9:05 AM
>> To: dick@reliableenergyanalytics.com; 'Russ Housley'
>> <housley@vigilsec.com>
>> Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca>; suit@ietf.org
>> Subject: RE: [Suit] suit-firmware-encryption-00
>>
>> It is a challenge.
>>
>> The SUIT manifest provides the capabilities to give authorized parties
>> extra information (via the manifest meta-data and software
>> description*) while providing less info to adversaries.
>>
>> (*): I am assuming that the info offered via MUD, COSWID, and the
>> textual description is of any help to you. If it is not, then you need
>> to let us know what other pieces of information will have to be
>> included in the manifest to become valuable to make the risk assessment.
>>
>> Ciao
>> Hannes
>>
>> -----Original Message-----
>> From: Dick Brooks <dick@reliableenergyanalytics.com>
>> Sent: Tuesday, June 1, 2021 1:32 PM
>> To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; 'Russ Housley'
>> <housley@vigilsec.com>
>> Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca>; suit@ietf.org
>> Subject: RE: [Suit] suit-firmware-encryption-00
>>
>> Hannes,
>>
>> I definitely see your point, it seems the real problem to solve is:
>> - How do we (1) prevent the bad guys from discovering SW details
>> (source
>> code) from binaries while simultaneously (2) providing end use
>> customers the ability to conduct malware scans, and other risk management
> functions?
>>
>> If we encrypt a binary distribution we achieve 1 but not 2 If we do
>> not encrypt we achieve 2, but not 1
>>
>> Are we really looking at a mutually exclusive choice?
>>
>> Both of these objectives are trying to achieve the same thing: Keep
>> the bad guys from causing harm.
>>
>> Thanks,
>>
>> Dick Brooks
>>
>> Never trust software, always verify and report! T
>> http://www.reliableenergyanalytics.com
>> Email: dick@reliableenergyanalytics.com
>> Tel: +1 978-696-1788
>>
>> -----Original Message-----
>> From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
>> Sent: Tuesday, June 1, 2021 6:40 AM
>> To: dick@reliableenergyanalytics.com; 'Russ Housley'
>> <housley@vigilsec.com>
>> Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca>; suit@ietf.org
>> Subject: RE: [Suit] suit-firmware-encryption-00
>>
>> Dick, I understand your line of argument.
>>
>> At the same time I want to create awareness for the attacker point of
> view.
>> They need to get access to plaintext firmware of an embedded device
>> (unless the attacker already knows what the source was used). This is
>> why there are advanced disassemblers available (such as IDA Pro,
>> Binary Ninja, and Ghidra
>> -- to name a few).
>>
>> As a way forward I am proposing to use the additional data carried in
>> the manifest for doing the SCRM risk assessment step. I believe that
>> this should work.
>>
>> Ciao
>> Hannes
>>
>> -----Original Message-----
>> From: Dick Brooks <dick@reliableenergyanalytics.com>
>> Sent: Monday, May 31, 2021 10:00 PM
>> To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; 'Russ Housley'
>> <housley@vigilsec.com>
>> Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca>; suit@ietf.org
>> Subject: RE: [Suit] suit-firmware-encryption-00
>>
>> Thanks, Hannes. I just submitted a concern regarding the problem
>> encryption creates for malware scanning, which is one of the SCRM risk
>> assessment steps, performed before installation
>>
>> Thanks,
>>
>> Dick Brooks
>>
>> Never trust software, always verify and report! T
>> http://www.reliableenergyanalytics.com
>> Email: dick@reliableenergyanalytics.com
>> Tel: +1 978-696-1788
>>
>> -----Original Message-----
>> From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
>> Sent: Monday, May 31, 2021 3:57 PM
>> To: dick@reliableenergyanalytics.com; 'Russ Housley'
>> <housley@vigilsec.com>
>> Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca>; suit@ietf.org
>> Subject: RE: [Suit] suit-firmware-encryption-00
>>
>> Hi Dick,
>>
>> with the SUIT manifest format I hope we can make information available
>> to trusted third parties (MUD, COSWID and alike) and at the same time
>> use encrypted binaries. Having access to the plaintext binary is
>> essential for adversaries to mount attacks. (Happy to give a tutorial
>> about how this
>> works.)
>>
>> Like-wise differential updates may make it difficult for SCRM vendors
>> to make their analysis but the information in the manifest can help them.
>>
>> Severable fields allows to remove information from the manifest before
>> it is sent to the device. This reduces overhead and prevents untrusted
>> parties from gathering information from the manifest.
>>
>> Ciao
>> Hannes
>>
>> -----Original Message-----
>> From: Dick Brooks <dick@reliableenergyanalytics.com>
>> Sent: Monday, May 31, 2021 7:07 PM
>> To: 'Russ Housley' <housley@vigilsec.com>
>> Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca>; Hannes Tschofenig
>> <Hannes.Tschofenig@arm.com>; suit@ietf.org
>> Subject: RE: [Suit] suit-firmware-encryption-00
>>
>> I agree, Russ.
>>
>> Parties subject to the 5/12 Executive Order
>> (https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05
>> /12/ex
>> ecutive-order-on-improving-the-nations-cybersecurity/) will likely
>> want to perform a proactive SCRM risk assessment prior to
>> installation, if my interpretation of the EO is accurate.
>>
>> Thanks,
>>
>> Dick Brooks
>>
>> Never trust software, always verify and report! T
>> http://www.reliableenergyanalytics.com
>> Email: dick@reliableenergyanalytics.com
>> Tel: +1 978-696-1788
>>
>> -----Original Message-----
>> From: Russ Housley <housley@vigilsec.com>
>> Sent: Monday, May 31, 2021 12:56 PM
>> To: Dick Brooks <dick@reliableenergyanalytics.com>
>> Cc: Michael Richardson <mcr+ietf@sandelman.ca>; Hannes Tschofenig
>> <Hannes.Tschofenig@arm.com>; suit@ietf.org
>> Subject: Re: [Suit] suit-firmware-encryption-00
>>
>> Dick:
>>
>> Yes, and there are other use cases that require encryption.
>>
>> Russ
>>
>>
>>> On May 31, 2021, at 12:53 PM, Dick Brooks
>> <dick@reliableenergyanalytics.com> wrote:
>>>
>>> " If a trustworthy party in the middle of the distribution path is
>>> able to detect a problem with cleartext (but signed) firmware, they
>>> can report a vulnerability and refuse to pass the update along."
>>>
>>> This is precisely the function SCRM vendors are performing today.
>>> Encrypting a binary object would be an impediment to software supply
>>> chain risk assessment functions in place today.
>>>
>>> Thanks,
>>>
>>> Dick Brooks
>>>
>>> Never trust software, always verify and report! T
>>> http://www.reliableenergyanalytics.com
>>> Email: dick@reliableenergyanalytics.com
>>> Tel: +1 978-696-1788
>>>
>>> -----Original Message-----
>>> From: Suit <suit-bounces@ietf.org> On Behalf Of Russ Housley
>>> Sent: Monday, May 31, 2021 12:49 PM
>>> To: Michael Richardson <mcr+ietf@sandelman.ca>
>>> Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; suit@ietf.org
>>> Subject: Re: [Suit] suit-firmware-encryption-00
>>>
>>> Michael:
>>>
>>>>>> I agree that there are also challenges with certification schemes
>>>>>> that prevent developers from seeing the source code (or from
>>>>>> publishing the source code). That's yet another issue.
>>>>
>>>>> SUIT is using signature for the authentication and integrity of the
>>>>> firmware.  If the signature remains in place, a party in the middle
>>>>> of the distribution cannot insert any malware.
>>>>
>>>> The encryption of the firmware keeps third parties from auditing the
>>>> software updates to determine if malware has been inserted at the
>>> "factory"
>>>> Both white and black hats are currently using binary diff systems to
>>>> look at patches.  Black hats use this to develop exploits in the gap
>>>> between 9am EST and 9am PST!
>>>> I am suggesting that this is a "Security Consideration"
>>>
>>> Yes, this is a reasonable thing to add to the Security Considerations.
>>>
>>> If a trustworthy party in the middle of the distribution path is able
>>> to detect a problem with cleartext (but signed) firmware, they can
>>> report a vulnerability and refuse to pass the update along.
>>>
>>> Russ
>>> _______________________________________________
>>> Suit mailing list
>>> Suit@ietf.org
>>> https://www.ietf.org/mailman/listinfo/suit
>>>
>>
>>
>> IMPORTANT NOTICE: The contents of this email and any attachments are
>> confidential and may also be privileged. If you are not the intended
>> recipient, please notify the sender immediately and do not disclose
>> the contents to any other person, use it for any purpose, or store or
>> copy the information in any medium. Thank you.
>>
>> IMPORTANT NOTICE: The contents of this email and any attachments are
>> confidential and may also be privileged. If you are not the intended
>> recipient, please notify the sender immediately and do not disclose
>> the contents to any other person, use it for any purpose, or store or
>> copy the information in any medium. Thank you.
>>
>> IMPORTANT NOTICE: The contents of this email and any attachments are
>> confidential and may also be privileged. If you are not the intended
>> recipient, please notify the sender immediately and do not disclose
>> the contents to any other person, use it for any purpose, or store or
>> copy the information in any medium. Thank you.
>>
>> IMPORTANT NOTICE: The contents of this email and any attachments are
>> confidential and may also be privileged. If you are not the intended
>> recipient, please notify the sender immediately and do not disclose
>> the contents to any other person, use it for any purpose, or store or
>> copy the information in any medium. Thank you.
>>
>> _______________________________________________
>> Suit mailing list
>> Suit@ietf.org
>> https://www.ietf.org/mailman/listinfo/suit
>
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose the
> contents to any other person, use it for any purpose, or store or copy the
> information in any medium. Thank you.

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.