[Teep] Reliably getting TEE properties

Dave Thaler <dthaler@microsoft.com> Thu, 24 March 2022 14:25 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D67A3A0D39 for <teep@ietfa.amsl.com>; Thu, 24 Mar 2022 07:25:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.112
X-Spam-Level:
X-Spam-Status: No, score=-2.112 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C6L1oX9NqaRC for <teep@ietfa.amsl.com>; Thu, 24 Mar 2022 07:25:38 -0700 (PDT)
Received: from na01-obe.outbound.protection.outlook.com (mail-eus2azlp170100001.outbound.protection.outlook.com [IPv6:2a01:111:f403:c110::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DABFD3A0D2D for <teep@ietf.org>; Thu, 24 Mar 2022 07:25:37 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Q7l/H7LLOLUY7WAFGvWxpQalquqdinyu/OqN2Tul1dXwr8ZU3gfQciwmye+q93UBRUvbfZcyePD50WoA1mtR0lG6kBppGF/Jp00OPspn4LUK6cowFzbAoRQooUISsgDcqomR16NyK48n6MQtB273B8mq65thBJdPyUoJ/hwj1IpjPUbX7rlu32RwqtKM0+6b0LfCfP8gZAoTTaQIJ6lP+SPcPm525cTLWMdjbD5vNSi4982OZXUD3jgszbOoldDia4c8zZIcqwbdNbbv72ckGkt51R9MAv3O8TU59fonYp30jRsP3uFzJ+Np5fFPhFxVUsPZGmq/5tzj8dJL9UMyxg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hULBp79SdRt3D9dVISmrqBH2orpiLmI7o/BR+03pHHo=; b=T3p1Yvk3Kdt6HwCK2AgD5LxKHwrbCulu1Pso2Ja7DLmNkYL2ZpYFjtav/dBreW8mx76bkQ71swZ2Eq+d3i8M+lNxdJktadwjQSWJVgcNeOjXz/x45BNhuLxFszhpSQzxug9X7FJC0BrpWm1LsZePDGplfNSam5kxXNgXGA8NRYQqpk72W9TZI+d1ZG7Yy9ZpvUMwSqeeRkYncjjEWGUoDyGb0fjVvR1tnqHVqutzyAKgdJm1MzIFPqvmjISZOZyTK9A12duixPkkSDXXxQxMqViA1BNqESrxqokKxwY0LHJ9TPDmLZGG/4kZwloZ+R1aJrHazRr6cY5IGQVBZRZ1WQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hULBp79SdRt3D9dVISmrqBH2orpiLmI7o/BR+03pHHo=; b=Tty8U6/Fv1Y4zJKUQWqyWyt0ZwJ6S3t/LMcggX9abX6jyoLESlzZOYSy9qMF29Q//MolQXapDCwBQ2ObWC7ZN5nSRGYIr+7iZj/qUSc2SDhRUx8wiIOw/1zwbPHy+hZgApINaVpIV/RCcm1MneboKGpuk0U4s/tZJL6oKcFa8TY=
Received: from CH2PR21MB1464.namprd21.prod.outlook.com (2603:10b6:610:89::16) by BN6PR21MB0164.namprd21.prod.outlook.com (2603:10b6:404:94::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.10; Thu, 24 Mar 2022 14:25:33 +0000
Received: from CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::4107:361b:c80c:5545]) by CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::4107:361b:c80c:5545%6]) with mapi id 15.20.5123.010; Thu, 24 Mar 2022 14:25:33 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: "teep@ietf.org" <teep@ietf.org>
Thread-Topic: Reliably getting TEE properties
Thread-Index: Adg/icpqObuyF4JjSKeB7uQZBs8Qug==
Date: Thu, 24 Mar 2022 14:25:33 +0000
Message-ID: <CH2PR21MB14645C4490FFC796D43A1034A3199@CH2PR21MB1464.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=fa416331-3fe1-478e-8947-4ac634fbfbcc; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-24T14:16:24Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ff51c19f-f222-48ad-e132-08da0da2282d
x-ms-traffictypediagnostic: BN6PR21MB0164:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <BN6PR21MB0164079EE0727CEDDF5811A0A3199@BN6PR21MB0164.namprd21.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR21MB1464.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(451199009)(38070700005)(122000001)(3480700007)(966005)(508600001)(186003)(26005)(8990500004)(71200400001)(55016003)(316002)(6916009)(82960400001)(2906002)(83380400001)(33656002)(82950400001)(86362001)(10290500003)(6506007)(7696005)(38100700002)(9686003)(76116006)(66446008)(66476007)(64756008)(66946007)(8676002)(52536014)(66556008)(8936002)(5660300002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR21MB1464.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ff51c19f-f222-48ad-e132-08da0da2282d
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Mar 2022 14:25:33.5854 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: qUINlyxmZx/Sgv8OJBeHHitjngtu0dtlsy+tYP8j9OtZ5C5fQ5SsOkLB/EfMVUa874jmqrMhqpgEJvNxc5vxxDkhyk9S3OLVzB++z625M+s=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR21MB0164
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/-TJ8IgGNICjChikvM9y50vkGv4c>
Subject: [Teep] Reliably getting TEE properties
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 14:25:44 -0000

I just filed issue https://github.com/ietf-teep/teep-protocol/issues/189
based on thinking about the discussion Brendan and I were having at the
tail end of the SUIT WG meeting today.

Currently evidence in the QueryResponse is an optional field, and the
QueryRequest can specify the attestation bit to request it.  Since the evidence
is not mandatory, the QueryResponse today has no reliable way to learn
the device identifying information and TEE identifying information (to use
the terms in the architecture draft), which seem critical to the task of being
able to determine which Trusted Components to install in the TEE.

Options:
1. Make evidence mandatory in the QueryResponse and remove the attestation bit from data-items-requested
2. Make attestation mandatory but allow it to be either passed inside the TEEP protocol or in a transport protocol (e.g., HTTPS terminating inside the TEE as in model C of figure 5 in the architecture draft). The attestation bit shouldn't be needed in data-items-requested here either since an implementation could know whether the transport included it inside the TEE or not.
3. Make use of SUIT Reports in the QueryResponse mandatory and put the system information there. This means that a TAM would be able to access them without relying on a Verifier to put relevant claims in Attestation Results so could ease interop with more Verifiers.   The only downside I see is that today it is not a
requirement that SUIT Reports be generated at "boot" time (meaning start time
for whatever components are relevant) on a TEEP device, and this option would
make that a requirement.
4. Some hybrid that allows more than one of the above in implementations but
only uses one in any particular message exchange.

I have to admit that I do see advantages in option 3 as noted above, and so I
filed https://github.com/ietf-teep/teep-protocol/pull/187 with what that might
look like if we go that route though I temporarily made suit reports optional
so it's technically option 4, but if we go with option 3, I will update to make
them mandatory.

Looking for feedback from the WG and especially from other implementers.

Dave