You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-ietf-rats-reference-interaction-models.md
+2-21Lines changed: 2 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -412,7 +412,7 @@ For example, when performing a boot integrity evaluation, a Verifier may only re
412
412
With the Handle, the Attestation Key IDs, and the Collected Claims, the Attester produces signed Evidence. That is, it digitally signs the Handle and the Collected Claims with a cryptographic secret identified by the Attestation Key ID. This is done once per Attesting Environment which is identified by the particular Attestation Key ID. The Attester communicates the signed Evidence as well as all accompanying Event Logs back to the Verifier.
413
413
414
414
The Claims, the Handle, and the Attester Identity information (i.e., the Authentication Secret) MUST be cryptographically bound to the signature of Evidence. These MAY be presented obfuscated, encrypted, or cryptographically blinded.
415
-
For further reference see section {{security-and-privacy-considerations}}.
415
+
For further reference see, Section {{security-and-privacy-considerations}}.
416
416
417
417
Upon receiving the Evidence and Event Logs, the Verifier validates the signature, Attester Identity, and Handle, and then appraises the Claims.
418
418
Claim appraisal is driven by Policy and takes Reference Values and Endorsements as input.
@@ -616,10 +616,6 @@ One example of a specific handle representation is {{-epoch-markers}}.
616
616
617
617
In the Uni-Directional model, handles are composed of cryptographically signed trusted timestamps as shown in {{-TUDA}}, potentially including other qualifying data.
618
618
The Handles are created by an external trusted third party (TTP) -- the Handle Distributor -- which includes a trustworthy source of time, and takes on the role of a Time Stamping Authority (TSA, as initially defined in {{-TSA}}).
619
-
In some deployments, a Verifier may obtain a Handle from the Handle Distributor and forward it to an Attester.
620
-
While feasible if the Handle can be authenticated (e.g., an Epoch Marker with a verifiable timestamp), this indirection introduces additional latency for the Attester and can make freshness semantics harder to appraise.
621
-
Therefore, direct distribution of Handles from the Handle Distributor to Attesters is the recommended approach.
622
-
623
619
Timestamps created from local clocks (absolute clocks using a global timescale, as well as relative clocks, such as tick-counters) of Attesters and Verifiers MUST be cryptographically bound to fresh Handles received from the Handle Distributor.
624
620
This binding provides a proof of synchronization that MUST be included in all produced Evidence.
625
621
This model provides proof that Evidence generation happened after the Handle generation phase.
@@ -640,7 +636,6 @@ To manage this complexity, it is essential to define a clear policy for handle v
640
636
641
637
* *Handle Expiry*:
642
638
Each handle should have a well-defined expiration time, after which it is considered invalid.
643
-
An Attester that is aware of the expiration time MUST NOT send Evidence with an expired handle.
644
639
This expiry must account for expected propagation delays and be clearly communicated to all entities in the attestation process.
645
640
646
641
* *Synchronization Checks*:
@@ -811,9 +806,6 @@ In the sequence diagram above, the Verifier initiates an attestation by generati
811
806
The PubSub server then forwards this handle to the Attester by notifying it.
812
807
This mechanism ensures that each handle is uniquely associated with a specific attestation request, thereby enhancing security by preventing replay attacks.
813
808
814
-
While this model allows for Verifier-specific Handles and custom freshness policies, such policies must be defined and enforced outside the scope of this specification.
815
-
For instance, a Verifier may choose to include a Handle reference in its appraisal policy or request specific handling by the PubSub server through implementation-specific mechanisms.
816
-
817
809
#### Handle Generation for Uni-Directional Remote Attestation over Publish-Subscribe
818
810
819
811
~~~~ aasvg
@@ -900,6 +892,7 @@ In the Publish-Subscribe model above, the Attester publishes Evidence to the top
900
892
The PubSub server notifies Verifiers, accordingly, by forwarding the attestation Evidence.
901
893
Although the above diagram depicts only full attestation Evidence and Event Logs, later attestations may use "deltas' for Evidence and Event Logs.
902
894
The definition of delta Evidence is provided in {{handle-lifecycle-and-propagation-delays}}.
895
+
903
896
Verifiers appraise the Evidence and publish the Attestation Result to topic "AttRes" (= Attestation Result) on the PubSub server.
904
897
905
898
#### Attestation Result Generation
@@ -935,9 +928,6 @@ Attestation Result Generation is the same for both publish-subscribe models,*Cha
935
928
Relying Parties subscribe to topic `AttRes` (= Attestation Result) on the PubSub server.
936
929
The PubSub server forwards Attestation Results to the Relying Parties as soon as they are published to topic `AttRes`.
937
930
938
-
In some deployments, Attesters may also subscribe to the `AttRes` topic to consume Attestation Results.
939
-
This reuses the same publish-subscribe mechanism described here and may support local policy decisions or caching.
940
-
941
931
# Implementation Status
942
932
943
933
Note to RFC Editor: Please remove this section as well as references to {{BCP205}} before AUTH48.
@@ -1055,16 +1045,10 @@ To mitigate these risks, it is essential to implement robust security measures:
1055
1045
Implementing strong isolation mechanisms for topics can help prevent the Broker from inadvertently or maliciously routing notifications to unauthorized parties.
1056
1046
This includes using secure naming conventions and access controls that restrict the Broker's ability to manipulate topic subscriptions.
1057
1047
1058
-
In addition to isolating topics, privacy can be preserved by minimizing the inclusion of personally identifying information or unique Attester identifiers in messages published to shared topics, unless strictly required by the subscriber’s role or appraisal policy.
1059
-
1060
1048
* *Trusted Association Verification:*
1061
1049
To further safeguard against confusion attacks where the Broker might misroute notifications, mechanisms should be in place to verify the trust association between senders and receivers continuously.
1062
1050
This can be facilitated by cryptographic assurances, such as digital signatures and trusted certificates that validate the sender's identity and the integrity of the message content.
1063
1051
1064
-
Implementations may use Verifier Endorsements or pre-established authorization policies to define valid sender-receiver associations.
1065
-
These policies can be cryptographically enforced using signed metadata, access control lists, or secured registration procedures on the PubSub server.
1066
-
The precise method is deployment-specific.
1067
-
1068
1052
* *Audit and Monitoring:*
1069
1053
Regular audits and real-time monitoring of Broker activities can detect and respond to anomalous behavior that might indicate security breaches or manipulation attempts.
1070
1054
Logging all actions performed by the Broker provides an audit trail that can be critical for forensic analysis.
@@ -1076,9 +1060,6 @@ To mitigate these risks, it is essential to implement robust security measures:
1076
1060
By addressing these vulnerabilities proactively, the integrity and confidentiality of the attestation process can be maintained, reducing the risks associated with Broker-mediated communication in remote attestation scenarios.
1077
1061
It is crucial for solution architects to incorporate these security measures during the design and deployment phases to ensure that the attestation process remains secure and trustworthy.
1078
1062
1079
-
This specification does not require the PubSub server to attest to the Handle or cryptographically prove its dissemination.
1080
-
If such assurances are needed (e.g., for auditability or binding Handle provenance), additional mechanisms---such as signed delivery receipts or logs---must be provided by the PubSub infrastructure.
The security and privacy requirements for remote attestation can vary significantly based on the deployment environment, the nature of the attestation mechanisms used, and the specific threats each scenario faces.
0 commit comments