[Teep] Comments on draft-tschofenig-teep-protocol-01

Dave Thaler <dthaler@microsoft.com> Wed, 27 November 2019 22:14 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65FAE120AD7 for <teep@ietfa.amsl.com>; Wed, 27 Nov 2019 14:14:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YiZK5t-tiSJV for <teep@ietfa.amsl.com>; Wed, 27 Nov 2019 14:14:36 -0800 (PST)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-eopbgr790097.outbound.protection.outlook.com [40.107.79.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F27CE120ACB for <teep@ietf.org>; Wed, 27 Nov 2019 14:14:35 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FsAbuyMnDunNchrNqKfoLaIcmvIieeSh1BKC3bIsNGqPtsTcpbyzqXLTRxVp06yw8hBeOXFKkUNqF4roK5iRinKKhDrJLxCOsJ8iUqnNgfL7vnpHvk1LcDmwQmohUFYoZybsErEtWQ1Zn7cuXajRMXvosJVMRIkVM+qB2NgpGsY0M2cdulnEiiUszzNHaRpsREzRxP0ENf80juvpGiX0+lgO5o+svA6JJffESBQhfVeR9n9cVlzQQXQc0Z6135Nqc9U11B9Saezl9ZuCIKaHWj2Vqe1UPetPAXhRephNB2xkKP6I1Zksbm1kbuVMnPEd/JVIJuvZZ/bxsLxFK4ZHOw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ERTc+NUUmCi5MoykgoIMwUmWHf451RCKgaf7NFq/Wxc=; b=mJaXUIPizzkFjR2fgv/f0ISBkQiA+/iwS2D8mnyUfgBfisIY9g/NgrZvpPrT6MQkDxoSHsCDZAe9ynUbREh31DsXYgD8MpJfBcnvLbcPinf5mU736O9zSr+9+8tXQTjyhQvZrNZ/yZ8HJIQNHrc2yv/m+0g0CVxByFnAc3oSyxV1P5irwzR7CzzNPj7tpR0Pz4Ekci1tEGp+pYpFAGdV0JFrqBE109twDivxsGiRcJa6WReCBzzAAD6fgIuZCIlHPvtwM+1X6AoU/7KV0yyYJJtoD0HRNkB251kF2dmzJLUyBzDOt8GoTR+h+SS7DcQGXOE5tFnvwY2+Vymop0ksvQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ERTc+NUUmCi5MoykgoIMwUmWHf451RCKgaf7NFq/Wxc=; b=Eb9WiSPc5V9cSc9z3JKaebnV65jhUx5LcTbrj9yYc/NwMnJjchwRIzULU+Pdzjk04R+tYdssfgU8WZzy/WJNHUa+j1sUk8pegv4ULMkvEpeOgfrhgz5zX8BaACvruDGp2DfMHs+BCjenhSCtM9W44Mnq8fKVSnts20axk5ePD+E=
Received: from MWHPR21MB0784.namprd21.prod.outlook.com (10.173.51.150) by MWHPR21MB0157.namprd21.prod.outlook.com (10.173.52.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2516.0; Wed, 27 Nov 2019 22:14:34 +0000
Received: from MWHPR21MB0784.namprd21.prod.outlook.com ([fe80::8d41:8f86:8654:8439]) by MWHPR21MB0784.namprd21.prod.outlook.com ([fe80::8d41:8f86:8654:8439%12]) with mapi id 15.20.2516.003; Wed, 27 Nov 2019 22:14:34 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
CC: "teep@ietf.org" <teep@ietf.org>
Thread-Topic: Comments on draft-tschofenig-teep-protocol-01
Thread-Index: AdWlbi24s5Z0yIrtR/6GzMwPd7a1Yg==
Date: Wed, 27 Nov 2019 22:14:34 +0000
Message-ID: <MWHPR21MB0784C341D0C1E5AD935DA960A3440@MWHPR21MB0784.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=dthaler@ntdev.microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2019-11-27T22:14:33.9361668Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=67b01820-b919-47fe-b70c-0297631fe2a7; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dthaler@microsoft.com;
x-originating-ip: [73.59.106.235]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 2e48d7e5-a78f-4f87-8031-08d773872f0b
x-ms-traffictypediagnostic: MWHPR21MB0157:
x-microsoft-antispam-prvs: <MWHPR21MB01578E9079184643A96AF844A3440@MWHPR21MB0157.namprd21.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 023495660C
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(136003)(366004)(39860400002)(396003)(189003)(199004)(606006)(790700001)(6116002)(316002)(256004)(6506007)(5660300002)(3846002)(6436002)(55016002)(71200400001)(52536014)(22452003)(66476007)(478600001)(7696005)(6916009)(4326008)(86362001)(966005)(66446008)(66946007)(76116006)(2906002)(64756008)(66556008)(8990500004)(33656002)(14454004)(25786009)(54896002)(81166006)(9686003)(10290500003)(6306002)(236005)(81156014)(8936002)(102836004)(26005)(7736002)(99286004)(186003)(10090500001)(74316002)(71190400001)(8676002)(66066001); DIR:OUT; SFP:1102; SCL:1; SRVR:MWHPR21MB0157; H:MWHPR21MB0784.namprd21.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: YKFi3c8ufh1PjyO32rcbVR9lU0hS+HCIMBmE5guxL+IISsDOGrqNVSUo3/Vq6UrCJWWknm6gbk4MJyj2vgGpdaPuQIXv5qsNhfZVzoVznlOcVhThMSkSYwX1CMepcPt+J6Guu3lDkHzqhPMWcArCnrZm9ITmLARP08VDRK/WcDkSZnjus+YqEdTeTQLDRFl2pgyYqlYnlTDGS3PB1uJcIxinfjyy2qbCa5zSN5XollTxMtSiDtN8YnjfVHfeDvxEnq1oHsniaGQj69nSSqWx9/7Wwp6kBCoopREivsH+NlFYLYimWShiOwUfpuPLFyipJE0A+pr4cxJWj/ge7tmLG4uX8kg3lJwV3tJR1IgWqlqDquANREGBiEG1ZACR8SYbws9x7nO9s/7BcMKOBlGH9igrgy7j66LLtrF20SeNnMMPoH7wUE1vrn74vv1bPUwZBleRdi0zu4DomlFW2hPEX+6ElE3QlH4D/PU2MnH2nJE=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MWHPR21MB0784C341D0C1E5AD935DA960A3440MWHPR21MB0784namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2e48d7e5-a78f-4f87-8031-08d773872f0b
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Nov 2019 22:14:34.2516 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: YAhP9Im2nTqkQiKE37gvs4TBSAhn136JpPxeXwcu56S9p4OFJtJO5giF71y3ubzHrqjLCLz2YBoEanhURBP0Ql9KDsxZTJxAx8a8xqKnclM=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR21MB0157
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/0_XntHiKUFES-KgbHZ6HvUbR8o0>
Subject: [Teep] Comments on draft-tschofenig-teep-protocol-01
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Nov 2019 22:14:38 -0000

I of course support adopting this as a WG document.

As noted at IETF 106, I prefer "TEEP Protocol" instead of "TEEP-P"
just like we say "TLS Protocol", "RADIUS Protocol", and "SSH Protocol"
for example, rather than "TLS-P", "RADIUS-P", and "SSH-P".

As a technical comment, I do not like the limitation in draft -01 that it can
only use EAT, and think that needs to be fixed before I can implement this draft.
If we go back to the IETF 105 discussion on TEEP+RATS alignment (slides at
https://datatracker.ietf.org/meeting/105/materials/slides-105-teep-sessb-teep-rats-alignment-01),
slide 2 seemed to be the WG consensus at the time.  That means the QueryResponse
in draft-tschofenig-teep-protocol-01 passes Evidence, as opposed to Attestation Results,
and the TAM only interprets Attestation Results from a Verifier, not the Evidence itself.

Slide 10 of https://datatracker.ietf.org/meeting/106/materials/slides-106-rats-sessa-rats-architecture-00
from the RATS WG meeting at IETF illustrates that there are many evidence formats,
of which EAT is one, but for which there already exist other standards and other proprietary
mechanisms used in existing hardware.  For example, SGX uses an Intel proprietary format
for Evidence, and for TrustZone we use the TCG standard DICE certificate chains.  Neither of
those are EATs for Evidence, even though I want to use EATs for Attestation Results.
But it means that the QueryResponse has to support all of these formats, including arbitrary
Vendor-specific formats, if we want the TEEP Protocol to be usable with a wide range of TEEs.
As such, I think the EAT in the Query Response needs to be replaced with a byte blob and
some format identifier (IANA media type or whatever).   If that is done, then I believe
the draft is actually implementable for our use cases.

Dave