[Teep] My implementation status (libteep & libcsuit)

Ken Takayama <ken.takayama.ietf@gmail.com> Fri, 08 September 2023 12:51 UTC

Return-Path: <ken.takayama.ietf@gmail.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1656C15106F; Fri, 8 Sep 2023 05:51:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e2VLsFrjABsP; Fri, 8 Sep 2023 05:51:20 -0700 (PDT)
Received: from mail-oa1-x30.google.com (mail-oa1-x30.google.com [IPv6:2001:4860:4864:20::30]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8C6A9C14CE4D; Fri, 8 Sep 2023 05:51:20 -0700 (PDT)
Received: by mail-oa1-x30.google.com with SMTP id 586e51a60fabf-1d544a4a315so1517698fac.3; Fri, 08 Sep 2023 05:51:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1694177479; x=1694782279; darn=ietf.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=2O0jBhbGn/3WCUPUAP8CVw6FCuUBQTjWlch965exqUE=; b=Xgc0yx29H7f33byBWRK9TMvyWg5EB1fsExhd85hbESZFlnKHUw4a8D7lNf/GqV/8zT 6YEHfbwuC/JIwcCBLdySnLj6FKW0YNXvS+XFatK1Z+1xrJ+8Nmuu0Fs8n5hL0ram++CF 00bgO6ba/6EsVV7RcrLtVKPPQae8C0LuMfLgMMGuA4bIgczRj2WHh+9FDESo9wBIlIgM EEc3Z/kjne1tWcQSgdNSCja5/tH5hm2nQvJLOlVoahpB5Iscd5Wf9k0y20qOxuukcPRx KHnTZis8o2sArwDi8PWxLiqOs0ZJOl8xo4KqnEas2ZnbuKtxVDnGAu5VYTd2FywwOUdB 29DQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1694177479; x=1694782279; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=2O0jBhbGn/3WCUPUAP8CVw6FCuUBQTjWlch965exqUE=; b=fAEldoJd4V4udfseNOp0VVou4sAQ7nj6fU+oHaxwshsdvxDYDf1m60ymZs2rPbmhGp n+Cvw6i16rOgbbLeyeGJ/zoILNgfG0pmUaQOL1KW2FmMe9XhH5xza1+ODSZ9wjMnaucC ZezVScKHw8mvjwBi6FLqjo0sIxanQqVciqu2dpk9hMzfHaesk7N2waB4k61IwdR561i8 hvA4elPoPO8ExK44VNFqQJd7LRTVwXzIQyL++WXlPDMm/JUYylgnQBdwclhcpVvHb21o lBQ7bsRErq98nQGRi17eC1ga4VUv6edHkYr+VnPxbQI5dtmSCHhjZfZd3lj1m2Ik7dYf g6bA==
X-Gm-Message-State: AOJu0Yx57tk9vUM4RCOHVfHgw0F/IdiELSxICeye6fOkEYF1ism+KYx5 H4Z93i6cfhq9w6neLpdYio6qB0maKCko6xMfmEt07PFAnNo=
X-Google-Smtp-Source: AGHT+IHxEAx/GhRsxIMrIR88/M/0E3l5pmY3a1wtqynvh7i0JyWoqKf6R0VNhJPBnubA0DGMcqMJ7VwXkBBmSxj4Rlc=
X-Received: by 2002:a05:6870:3127:b0:1b0:12d7:1ef6 with SMTP id v39-20020a056870312700b001b012d71ef6mr2385789oaa.25.1694177479088; Fri, 08 Sep 2023 05:51:19 -0700 (PDT)
MIME-Version: 1.0
From: Ken Takayama <ken.takayama.ietf@gmail.com>
Date: Fri, 08 Sep 2023 21:51:08 +0900
Message-ID: <CAOZByRBnCqkp_2F0pH6461Gq+02ZGAtdHQC9FzApE8jwTV68=Q@mail.gmail.com>
To: suit@ietf.org, "TEEP@ietf.org" <teep@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d3de6a0604d86e83"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/PRh56vUniUosZWDgbkRiEHRgGKU>
Subject: [Teep] My implementation status (libteep & libcsuit)
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Sep 2023 12:51:22 -0000

TEEP WG and SUIT WG,

I've updated my implementations, and couldn't find any critical issues.

I can provide some updated example messages to the documents.
To authors, do you need them before the upcoming interim?

Completed works and TODOes:

   - TEEP Protocol
      - [implementation] Add COSE_Key Thumbprint kid
         - deterministically calculate the thumbprint of a COSE_Key
         - code:
         https://github.com/kentakayama/libteep/blob/f12b8782f1e93f529118ed07d607410ddd3f0bd1/src/teep_cose.c#L752
         - sample:
         https://github.com/kentakayama/libteep/blob/master/testfiles/teep_success.md#cose_sign-protected-success-message-in-diag
      - checked calculated values with my python implementation:
         https://github.com/kentakayama/cose-key-thumbprint
      - [implementation] COSE_Sign on QueryRequest
         - multiple signatures using deterministic ECDSA and EdDSA
         - sample:
         https://github.com/kentakayama/libteep/blob/master/testfiles/query_request.md#cose_sign-protected-queryrequest-message-in-diag
         - TODO: insert them into appendix or create message repository?
         currently there is no signed messages in the document
         - [implementation] Reflect draft v16 message type update
         - QueryRequest: + attestation-payload-format, +
         attestation-payload, + suit-reports
         - Update: + err-code, + err-msg
         - Error: + challenge
      - [implementation] Update suit-cose-profile
         - e.g. suit-sha256-es256-ecdh-a128gcm =>
         suit-sha256-es256-ecdh-a128ctr
         - reported an issue:
         https://github.com/ietf-teep/teep-protocol/issues/356
         - TODO: create a PR (Updating CDDL and example message)
         - [document] Raised Issues around Evidence and Attestation Results
      - Evidence/Attestation Results from TAM:
         https://github.com/ietf-teep/teep-protocol/issues/354
         - Referring SUIT Report as Normative or Informative:
         https://github.com/ietf-teep/teep-protocol/issues/355
      - SUIT Encrypted Payloads
      - [implementation] Add COSE_Mac0 support for AES-KW symmetric example
         - Hannes is checking this example
         - TODO: create a PR
         - code: https://github.com/kentakayama/libcsuit/pull/32
      - [implementation] Set KDF context for ES-ECDH asymmetric example
      - code: https://github.com/kentakayama/libcsuit/pull/33
         - TODO: create a PR

Best,
Ken