You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-ietf-rats-reference-interaction-models.md
+26-7Lines changed: 26 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -135,9 +135,10 @@ Analogously, a general overview about the information elements typically used by
135
135
# Introduction
136
136
137
137
Remote ATtestation procedureS (RATS, {{-RATS}}) are workflows composed of roles and interactions, in which Verifiers create Attestation Results about the trustworthiness of an Attester's system component characteristics.
138
-
The Verifier's assessment in the form of Attestation Results is produced based on Endorsements, Reference Values, Attestation Policies, and Evidence -- trustable and tamper-evident Claims Sets about an Attester's system component characteristics -- generated by an Attester.
138
+
Verifiers generate assessments in the form of Attestation Results that are based on Endorsements, Reference Values, Appraisal Policies, and Evidence -- trustable and tamper-evident Claims Sets about an Attester's system component characteristics.
139
139
The roles *Attester* and *Verifier*, as well as the Conceptual Messages *Evidence* and *Attestation Results* are concepts defined by the RATS Architecture {{-RATS}}.
140
-
This document illustrates three main interaction models that can be used in specific RATS-related solution documents:
140
+
This document illustrates three main interaction models between various RATS roles, namely Attesters, Verifiers, and Relying Parties that can be used in specific RATS-related specifications.
141
+
Using Evidence as a prominent example, these three interaction models are:
141
142
142
143
1. *Challenge/Response Remote Attestation*:
143
144
A Verifier actively challenges an Attester and receives time-fresh Evidence in response.
@@ -196,7 +197,7 @@ Generally, it is marked by the handoff from the final bootloader or initial OS k
196
197
This document:
197
198
198
199
* outlines common interaction models between RATS roles;
199
-
* illustrates interaction models focusing on conveying Evidence about boot-time integrity from Attesters to Verifiers;
200
+
* illustrates interaction models using the conveyance of Evidence about boot-time integrity as an example throughout this document;
200
201
* does not exclude the application of those interaction models to runtime integrity or the conveyance of other RATS Conceptual Messages;
201
202
* does not cover every detail about Evidence conveyance.
202
203
@@ -229,16 +230,19 @@ In order to ensure Evidence is appropriately conveyed through the interaction mo
229
230
230
231
Authentication Secret:
231
232
232
-
: An Authentication Secret MUST be exclusively available to an Attesting Environment of the Attester.
233
+
: An Authentication Secret MUST be established before any RATS interaction takes place, and it must be made available exclusively to an Attesting Environment of the Attester.
233
234
234
235
: The Attester MUST protect Claims with this Authentication Secret to prove the authenticity of the Claims included in Evidence.
235
236
The Authentication Secret MUST be established before RATS take place.
236
237
237
238
Attester Identity:
238
239
239
-
: A statement made by an Endorser about an Attester that affirms the Attester's distinguishability. (Note that distinguishability does not imply uniqueness.)
240
+
: A statement made by an Endorser about an Attester that affirms the Attester's distinguishability.
240
241
241
-
: The provenance of Evidence for a distinguishable Attesting Environment MUST be unambiguous.
242
+
: In essence, an Attester Identity can either be explicit (e.g., via a Claim in Evidence or Endorsement) or implicit (e.g., via a signature that matches a trust anchor).
243
+
Note that distinguishability does not imply uniqueness; for example, a group of Attesters can be identified by an Attester Identity.
244
+
245
+
: The provenance of Evidence SHOULD be distinguishable with respect to the Attesting Environment and MUST be unambiguous with respect to the Attester Identity.
242
246
243
247
: An Attester Identity MAY be an Authentication Secret which is available exclusively to one of the Attesting Environments of the Attester.
244
248
It could be a unique identity, it could be included in a zero-knowledge proof (ZKP), it could be part of a group signature, or it could be a randomized DAA credential {{DAA}}.
@@ -798,6 +802,9 @@ In the sequence diagram above, the Verifier initiates an attestation by generati
798
802
The PubSub server then forwards this handle to the Attester by notifying it.
799
803
This mechanism ensures that each handle is uniquely associated with a specific attestation request, thereby enhancing security by preventing replay attacks.
800
804
805
+
While this model allows for Verifier-specific Handles and custom freshness policies, such policies must be defined and enforced outside the scope of this specification.
806
+
For instance, a Verifier may choose to include a Handle reference in its appraisal policy or request specific handling by the PubSub server through implementation-specific mechanisms.
807
+
801
808
#### Handle Generation for Uni-Directional Remote Attestation over Publish-Subscribe
802
809
803
810
~~~~ aasvg
@@ -882,7 +889,7 @@ When the Handle Distributor generates and publishes a Handle to the "Handle" top
882
889
Exactly as in the Challenge/Response and Uni-Directional interaction models, there is an Evidence Generation-Appraisal loop, in which the Attester generates Evidence and the Verifier appraises it.
883
890
In the Publish-Subscribe model above, the Attester publishes Evidence to the topic "AttEv" (= Attestation Evidence) on the PubSub server, to which a Verifier subscribed before.
884
891
The PubSub server notifies Verifiers, accordingly, by forwarding the attestation Evidence.
885
-
Although the above diagram depicts only full attestation Evidence and Event Logs, later attestations may use "deltas' for Evidence and Event Logs.
892
+
bAlthough the above diagram depicts only full attestation Evidence and Event Logs, later attestations may use "deltas' for Evidence and Event Logs.
886
893
The definition of delta Evidence is provided in {{handle-lifecycle-and-propagation-delays}}.
887
894
Verifiers appraise the Evidence and publish the Attestation Result to topic "AttRes" (= Attestation Result) on the PubSub server.
888
895
@@ -919,6 +926,9 @@ Attestation Result Generation is the same for both publish-subscribe models,*Cha
919
926
Relying Parties subscribe to topic `AttRes` (= Attestation Result) on the PubSub server.
920
927
The PubSub server forwards Attestation Results to the Relying Parties as soon as they are published to topic `AttRes`.
921
928
929
+
In some deployments, Attesters may also subscribe to the `AttRes` topic to consume Attestation Results.
930
+
This reuses the same publish-subscribe mechanism described here and may support local policy decisions or caching.
931
+
922
932
# Implementation Status
923
933
924
934
Note to RFC Editor: Please remove this section as well as references to {{BCP205}} before AUTH48.
@@ -1036,10 +1046,16 @@ To mitigate these risks, it is essential to implement robust security measures:
1036
1046
Implementing strong isolation mechanisms for topics can help prevent the Broker from inadvertently or maliciously routing notifications to unauthorized parties.
1037
1047
This includes using secure naming conventions and access controls that restrict the Broker's ability to manipulate topic subscriptions.
1038
1048
1049
+
In addition to isolating topics, privacy can be preserved by minimizing the inclusion of personally identifying information or unique Attester identifiers in messages published to shared topics, unless strictly required by the subscriber’s role or appraisal policy.
1050
+
1039
1051
* *Trusted Association Verification:*
1040
1052
To further safeguard against confusion attacks where the Broker might misroute notifications, mechanisms should be in place to verify the trust association between senders and receivers continuously.
1041
1053
This can be facilitated by cryptographic assurances, such as digital signatures and trusted certificates that validate the sender's identity and the integrity of the message content.
1042
1054
1055
+
Implementations may use Verifier Endorsements or pre-established authorization policies to define valid sender-receiver associations.
1056
+
These policies can be cryptographically enforced using signed metadata, access control lists, or secured registration procedures on the PubSub server.
1057
+
The precise method is deployment-specific.
1058
+
1043
1059
* *Audit and Monitoring:*
1044
1060
Regular audits and real-time monitoring of Broker activities can detect and respond to anomalous behavior that might indicate security breaches or manipulation attempts.
1045
1061
Logging all actions performed by the Broker provides an audit trail that can be critical for forensic analysis.
@@ -1051,6 +1067,9 @@ To mitigate these risks, it is essential to implement robust security measures:
1051
1067
By addressing these vulnerabilities proactively, the integrity and confidentiality of the attestation process can be maintained, reducing the risks associated with Broker-mediated communication in remote attestation scenarios.
1052
1068
It is crucial for solution architects to incorporate these security measures during the design and deployment phases to ensure that the attestation process remains secure and trustworthy.
1053
1069
1070
+
This specification does not require the PubSub server to attest to the Handle or cryptographically prove its dissemination.
1071
+
If such assurances are needed (e.g., for auditability or binding Handle provenance), additional mechanisms---such as signed delivery receipts or logs---must be provided by the PubSub infrastructure.
The security and privacy requirements for remote attestation can vary significantly based on the deployment environment, the nature of the attestation mechanisms used, and the specific threats each scenario faces.
0 commit comments