Re: [Teep] Security domain default 1-to-1 mapping to a TA proposal in TEEP

Mingliang Pei <Mingliang_Pei@symantec.com> Mon, 25 March 2019 07:13 UTC

Return-Path: <Mingliang_Pei@symantec.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5388F12025C for <teep@ietfa.amsl.com>; Mon, 25 Mar 2019 00:13:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.302
X-Spam-Level:
X-Spam-Status: No, score=-4.302 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=symantec.com header.b=XRuuIjrq; dkim=pass (1024-bit key) header.d=symantec.com header.b=H+CjDNq6
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8vWvlW5eH1Ms for <teep@ietfa.amsl.com>; Mon, 25 Mar 2019 00:13:20 -0700 (PDT)
Received: from tussmtoutape01.symantec.com (Tussmtoutape01.symantec.com [155.64.38.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB7D2120353 for <teep@ietf.org>; Mon, 25 Mar 2019 00:13:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=Symantec.com; s=1; c=relaxed/simple; q=dns/txt; i=@Symantec.com; t=1553497999; x=2417411599; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=TFmJthQdmS9Ec0iXYqg/GKmEsOJHqyiZvgMuExiC/Gs=; b=XRuuIjrqCLlXYp7bffzzsyXurveOFQ78E0Y1xv0uGj9eBZRhxzwEkDCFjnT8PViB ypQdc8z6bJpALXRfvBD8hUecS8bioouxVUlAdte3P2qg2lc1YO0VrW8tlN3+mQlh yFyx8Mp+iow+rRIrT3bmKPAVDc+YJ6+TIUcH0emNEoQ=;
Received: from tussmtmtaapi02.symc.symantec.com (tus3-f5-symc-ext-prd-snat9.net.symantec.com [10.44.130.9]) by tussmtoutape01.symantec.com (Symantec Messaging Gateway) with SMTP id 66.4A.05531.F8F789C5; Mon, 25 Mar 2019 07:13:19 +0000 (GMT)
X-AuditID: 0a2c7e31-536df9e00000159b-c7-5c987f8fefe9
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (tus3-f5-symc-ext-prd-snat6.net.symantec.com [10.44.130.6]) by tussmtmtaapi02.symc.symantec.com (Symantec Messaging Gateway) with SMTP id 45.E9.05507.F8F789C5; Mon, 25 Mar 2019 07:13:19 +0000 (GMT)
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 25 Mar 2019 00:13:18 -0700
Received: from NAM05-DM3-obe.outbound.protection.outlook.com (10.44.128.8) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Mon, 25 Mar 2019 00:13:17 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=symantec.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TFmJthQdmS9Ec0iXYqg/GKmEsOJHqyiZvgMuExiC/Gs=; b=H+CjDNq69cSWOHa8/TCu99lqQCpapopE2TrWgkJj0POz5b75J5X39MG23Oz2blbDSlywWbhHmzRLpGjVSqu+kEMAdfNhrrUVXoXW2xlpo/1vLZkXoHOVBri5vNEdVHpu8xWfVRdXyK/hNmoewiHFzO7oNUgsO7bcRqWvYBO7V5c=
Received: from BY2PR16MB0854.namprd16.prod.outlook.com (10.164.172.140) by BY2PR16MB0773.namprd16.prod.outlook.com (10.164.172.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1730.16; Mon, 25 Mar 2019 07:13:16 +0000
Received: from BY2PR16MB0854.namprd16.prod.outlook.com ([fe80::a1bc:8741:404a:7311]) by BY2PR16MB0854.namprd16.prod.outlook.com ([fe80::a1bc:8741:404a:7311%2]) with mapi id 15.20.1730.019; Mon, 25 Mar 2019 07:13:16 +0000
From: Mingliang Pei <Mingliang_Pei@symantec.com>
To: Benjamin Kaduk <kaduk@mit.edu>
CC: "teep@ietf.org" <teep@ietf.org>, Andrew Atyeo <andrew.atyeo@intercede.com>
Thread-Topic: [Teep] Security domain default 1-to-1 mapping to a TA proposal in TEEP
Thread-Index: AQHU1VKRZgbX2HkEAk2k301Fswqim6YBZXtwgAB5yXqAAzrnAIAAbW2AgBYM3wA=
Date: Mon, 25 Mar 2019 07:13:16 +0000
Message-ID: <23B444BE-5418-4FE2-B531-7FD21ACF6416@symantec.com>
References: <F78A61D4-9B6B-4E83-8CF7-0C49E08718A9@symantec.com> <DB7PR10MB23489BA35BD7CDF8406DC6A9954D0@DB7PR10MB2348.EURPRD10.PROD.OUTLOOK.COM> <BY2PR16MB0854FBE72F059CDA5C0D45DDEC4D0@BY2PR16MB0854.namprd16.prod.outlook.com> <20190310165755.GA8182@kduck.mit.edu> <342E858A-7A4F-41EF-9E2F-1AFFF58ED590@symantec.com>
In-Reply-To: <342E858A-7A4F-41EF-9E2F-1AFFF58ED590@symantec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.d.1.180523
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Mingliang_Pei@symantec.com;
x-originating-ip: [76.21.116.95]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e594bc03-a003-4db6-997f-08d6b0f15a05
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:BY2PR16MB0773;
x-ms-traffictypediagnostic: BY2PR16MB0773:
x-ms-exchange-purlcount: 7
x-microsoft-antispam-prvs: <BY2PR16MB07739D053B8A34D071493476EC5E0@BY2PR16MB0773.namprd16.prod.outlook.com>
x-forefront-prvs: 0987ACA2E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(136003)(366004)(39860400002)(396003)(346002)(199004)(189003)(11346002)(71200400001)(6512007)(106356001)(6246003)(33656002)(3846002)(99286004)(54906003)(58126008)(446003)(71190400001)(4326008)(2616005)(2171002)(93886005)(86362001)(66066001)(316002)(15650500001)(83716004)(8936002)(476003)(68736007)(81156014)(81166006)(6116002)(256004)(8676002)(14444005)(102836004)(5660300002)(561944003)(305945005)(7736002)(82746002)(26005)(6486002)(229853002)(6436002)(478600001)(53546011)(6506007)(76176011)(10290500003)(25786009)(14454004)(36756003)(72206003)(966005)(53936002)(2906002)(486006)(80792005)(6306002)(97736004)(105586002)(6916009)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:BY2PR16MB0773; H:BY2PR16MB0854.namprd16.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: symantec.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: BRsqZylnh5FFzHXOAd5qEl86BPunMqfR0gePD7Ux/hHZKP1sd66cqMQZ1i59IfYOQ/q/8auTipG+YvWecEVqwH2T1LdRheWPmUr92XNDQsKXmBPrKKPExd2NuiUWwEoWqRdZrvh1HCWto4oEcjDzmbSCwh2Jw7q4RbApl2r8j4k81y727ACilj/BaKcQ45CCFNkvn5ht4T+jNIhka4k+NvKI5ivUKWg2qNDulhKs+2Vyv4xLikCv5FXpihie8zilQPwE3YE9Kb1R0j/Vx8wjY71/Jm6TWfLUGio1Ia7eW3THMhFBL0yN3xQ8WkuCpuXQi+F19J/2AJ65Xr2iXoBAVoNYaBYSCWnA1TIgULveTJ1q11DATkK0Jt/dLfPyZmJbzPZfSOoP5TgWpYvFFLMRA73zqta9Pn59vWYeR7htdKE=
Content-Type: text/plain; charset="utf-8"
Content-ID: <1CCC4C91C279144A883F4A1153A1E37C@namprd16.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: e594bc03-a003-4db6-997f-08d6b0f15a05
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Mar 2019 07:13:16.2386 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3b217a9b-6c58-428b-b022-5ad741ce2016
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR16MB0773
X-OriginatorOrg: symantec.com
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrMKsWRmVeSWpSXmKPExsXCpdPEqdtfPyPG4PQiDosd3/YzWSzfOJPJ Yumfb8wOzB5Llvxk8tiw4AGTR9OZo8wBzFFcNimpOZllqUX6dglcGVsntjAXPPOveHB1OVsD 4wPfLkZODgkBE4nNbWdYuxi5OIQEPjFKPJ/SywiT6J15kwki8Z1RYvO0nywQzhFGiac9DWBV QgIvGCWanteDJFgEJjBLrNxyFqplCpPE1Unv2CGqHjFKzHkA1MHBwSZgIHHhTh5IWERASWLx 2RY2EJtZwE9i4bQGMFtYIFTi4sF7LBA1YRKTNnazQdh+EmseQ9SwCKhKHF4MUcMrYC+x69Rl qIMOM0k8+GoFYnMKOEhMm7WTFcRmFBCT+H5qDRPELnGJW0/mM0G8KSCxZM95ZghbVOLl439g 9aICehI9O6+yQfTGSvxseQANFgWJZzs2Q9myEpfmd0PZvhKv+l4xgvwuIXCTUWLpjA2sIP9K CGhJnOuDhrWUxJ91k1kg7GyJH2cbmScwGs9CctIsoA5mAU2J9bv0IcIeEi8vfmSCsBUlpnQ/ ZJ8F9rGgxMmZT1gWMLKuYlQoKS0uzi3JLy1JLEg1MNQrrsxNBhGJwISTrJecn7uJEZx06gx3 MD7a4HOIUYCDUYmHd0nwjBgh1sQyoMpDjBIczEoivE9EgUK8KYmVValF+fFFpTmpxYcYpTlY lMR5ZVlLooUE0hNLUrNTUwtSi2CyTBycUg2MsraP/lrGKsYu05q68VLlYUU/X34fJpXCqWrP ni1b872dr/9CAHvYyunzF/rEB92aWqegE7Dd1HJJZsLyd9n9mvc4zkUtWHbhU/bpZ8XXav8v uXX73+Zyfr5bZ4xemDR/ExJeahKWO+vHp4QjbEft12xPWNX8NGPH/fyCiIbDe1yamGs62ubu VGIpzkg01GIuKk4EAD1cS9c2AwAA
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupgleLIzCtJLcpLzFFi42Lh0mli0+2vnxFjsLKX2WLHt/1MFss3zmSy WPrnG7MDs8eSJT+ZPDYseMDk0XTmKHMAcxSXTUpqTmZZapG+XQJXxtaJLcwFz/wrHlxdztbA +MC3i5GTQ0LARKJ35k2mLkYuDiGB74wSm6f9ZIFwjjBKPO1pYASpEhJ4wSjR9LweJMEiMIFZ YuWWs1AtU5gkrk56xw5R9YhRYs4DoA4ODjYBA4kLd/JAwiICShKLz7awgdjMAn4SC6c1gNnC AqESFw/eY4GoCZOYtLGbDcL2k1jzGKKGRUBV4vBiiBpeAXuJXacuQx10mEniwVcrEJtTwEFi 2qydrCA2o4CYxPdTa5ggdolL3HoynwniTQGJJXvOM0PYohIvH/8DqxcV0JPo2XmVDaI3VuJn ywNGiBoFiWc7NkPZshKX5ndD2b4Sr/peMYL8LiFwk1Fi6YwNrCD/SghoSZzrgwaplMSfdZNZ IOxsiR9nG6H2ykgsfneHFaL3IJvEt89vmCcw6s9CcussoFHMApoS63dBhT0kXl78yARhK0pM 6X7IPgscFIISJ2c+YVnAyLqKUaGktLg4tyS3JDGxINPASK+4MjcZRCQCE06yXnJ+7iZGcNJx ltzBeOiPzyFGAQ5GJR5ehz3TY4RYE8uAKg8xSnOwKInzBkR+iRYSSE8sSc1OTS1ILYovKs1J LT7EyMTBKdXAGH5vW/n51x8vJC8XVmMUlzBWimE1WvJIh8PkKKdxgJeY0Q9NAYNbV6+c26/S HG0WHGex7rmN/dWTh2NX9C7t7tCoObBSXJiHcftxR+6mFyrfJi5nu83qN2Fho8o2geWncr47 S3ZPn/X1Gb9s4+6Q+Z1LQz4kqZ9f1Oxw7P1N/6MqCWc+fNJ9p8RSnJFoqMVcVJwIAAqqWz0b AwAA
X-CFilter-Loop: TUS02
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/y0g8IrEaK6yBb601VX28DienEmk>
Subject: Re: [Teep] Security domain default 1-to-1 mapping to a TA proposal in TEEP
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Mar 2019 07:13:23 -0000

There are multiple follow up discussion in the issue tracker. Here is a quick summary:

Andy described the value the SD currently provides, and values of the SP AIK.

"1. (SP AIK is used in) additional Encryption of TA / perso data (by the TAM or the SP)

The CreateSD response returned spaik public key. This could be used by either the TAM or the Service Provider (that sits behind the TAM) to encrypt a TA or personalization data, encrypted for that specific device. This provided a means where a ServiceProvider could be enabled to keep data (the TA and the perso data - which would typically contain sensitive per device info) hidden from the TAM. 

Is there value in this spaik? It offers protection when a Service Provider wants to maintain some independence from TAM and wants to keep the TA binary private from the TAM, and to be able to create secret ‘per device’ personalization data on the fly (that will be private from the TAM). 

2. SP AIK is used by a Client App to verify response information returned in a call getTAInformation

Is there value in the anonymous attestation? Assuming the getTAInfo response is signed, there is value in avoiding releasing the TEE certificate to the app – since releasing the TEE certificate to rich OS apps implies that Rich OS can get a unique device identifier (which has privacy or tracking concerns).

If the CreateSD was removed, it wouldn’t necessarily stop us from being able to have an spaik for the purposes of signing getTAInfo response. (might need to think about this a bit more). Maybe we need to think more about how the Rich OS can be sure that TA id xx really does come from the service provider that it thinks it comes from."

David W had a follow question why separate SP AIK is needed. Single AIK per device can work for the data encryption purpose to a device. There is no strong objection on this.

There was the GetTAInfo response signing per SP for privacy usage.

David T raise a question whether TEE certificate as a device identity itself needs to be hidden as Rich OS may filter it as it does for other device ID such as MAC address etc.

I considered that Rich OS doesn't have the security strength in dealing with TEE device ID filtering as what TEE is designed for. This would also add a burden to Rich OS to guard TEE certificate pharming by a Client App over devices. This privacy concern needs to be further discussed.

Andy, Dave W, and Dave T, please feel free to add or revise.

Thanks,

Ming

On 3/10/19, 11:30 PM, "TEEP on behalf of Mingliang Pei" <teep-bounces@ietf.org on behalf of Mingliang_Pei@symantec.com> wrote:

    Thanks Ben, will do, Ming
    
    On 3/10/19, 9:58 AM, "Benjamin Kaduk" <kaduk@mit.edu> wrote:
    
        It would probably be good to get a summary of the discussion posted on the
        list once it's settled down, for archival purposes.
        
        -Ben
        
        On Fri, Mar 08, 2019 at 03:39:02PM +0000, Mingliang Pei wrote:
        > Thanks Andy, will follow up updates on the github, Ming
        > 
        > Sent from iPhone
        > 
        > ________________________________
        > From: Andrew Atyeo <andrew.atyeo@intercede.com>
        > Sent: Friday, March 8, 2019 1:42 AM
        > To: Mingliang Pei
        > Cc: teep@ietf.org
        > Subject: RE: Security domain default 1-to-1 mapping to a TA proposal in TEEP
        > 
        > Hi,
        > I have updated the github issue with my comments
        > https://clicktime.symantec.com/3UZcZZ4xTSsNvytS9paFjkp7Vc?u=https%3A%2F%2Fgithub.com%2Fietf-teep%2Farchitecture%2Fissues%2F7<https://clicktime.symantec.com/3DtasvM638D48u9sEW2edx47Vc?u=https%3A%2F%2Fgithub.com%2Fietf-teep%2Farchitecture%2Fissues%2F7>
        > 
        > basically I understand that there are some deployment types that might prefer a simpler approach, but I want to make sure that we know what would be ‘lost’ by not having a SD that is created separately. It might be that for some deployments the loss is no problem, or it might be that there could be alternative ways to give the same functionality but without need for a separate createSD that are worth exploring.
        > The github issue (link above) hopefully explains this better.
        > 
        > Regards,
        > 
        > Andrew Atyeo
        > Security Architect
        > Intercede
        > Digital trust    people ǀ devices ǀ apps
        > Office: +44 (0) 1455 558 111
        > https://clicktime.symantec.com/3VJerJ8soKqVyMNkw4JWG3s7Vc?u=www.intercede.com<https://clicktime.symantec.com/3Gqczp4aRiNtTy5rmhmPUeK7Vc?u=https%3A%2F%2Fwww.intercede.com%2F>
        > Legal Disclaimer <https://clicktime.symantec.com/3NQrLHmW1wfB1dzjQvLeV5f7Vc?u=https%3A%2F%2Fwww.intercede.com%2Fprivacy-cookies>
        > From: Mingliang Pei <Mingliang_Pei@symantec.com>
        > Sent: 08 March 2019 02:00
        > To: Andrew Atyeo <Andrew.Atyeo@intercede.com>
        > Cc: teep@ietf.org
        > Subject: Security domain default 1-to-1 mapping to a TA proposal in TEEP
        > 
        > Hi Andy,
        > 
        > We are working on to close this issue #7: clarifying meaning of Security Domain (SD)
        > 
        > https://clicktime.symantec.com/3UZcZZ4xTSsNvytS9paFjkp7Vc?u=https%3A%2F%2Fgithub.com%2Fietf-teep%2Farchitecture%2Fissues%2F7<https://clicktime.symantec.com/3DtasvM638D48u9sEW2edx47Vc?u=https%3A%2F%2Fgithub.com%2Fietf-teep%2Farchitecture%2Fissues%2F7>
        > 
        > We want to simplify it, and propose to create a SD per TA by default, without completely removing the SD for some existing use cases. It will be good to also have your input on the implications, considering you have more involved in this with a prior OTrP TAM POC implementation. Could you review the issue, and provide comments there?
        > 
        > Here is a quick recap on some discussion reasonings.
        > 
        > Historically we consider Security Domain as a first class entity in TEEP (OTrP). There have been some desires to simplify it, or not require it in the TEEP architecture as some use cases don’t use it as much as potential IoT use cases. On the other hand, we know that existing TEE implementations and other secure element related practices uses SD to isolate and associate protection boundary. There was some resource constraints on number of SDs that can be allocated in a TEE device.
        > 
        > To achieve broad support of both worlds, we consider to move to an “implicit” model as follows:
        > 
        > 
        >   *   One SD is created per TA when a TA is going to installed. This allows creation of TA without going through explicit SD creation and so on.
        >   *   The prior deletion of SD will delete all TAs within the same SD. Now each TA will be required to be explicitly deleted.
        > 
        > Thanks,
        > 
        > Ming
        > 
        
        > _______________________________________________
        > TEEP mailing list
        > TEEP@ietf.org
        > https://clicktime.symantec.com/3MCf2NsshWc1XzMuSUWKTSB7Vc?u=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteep
        
        
    
    _______________________________________________
    TEEP mailing list
    TEEP@ietf.org
    https://clicktime.symantec.com/3G4AynbCisPqc4EAAhpG8Cq7Vc?u=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteep