You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-ietf-rats-reference-interaction-models.md
+19-2Lines changed: 19 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -796,6 +796,9 @@ In the sequence diagram above, the Verifier initiates an attestation by generati
796
796
The PubSub server then forwards this handle to the Attester by notifying it.
797
797
This mechanism ensures that each handle is uniquely associated with a specific attestation request, thereby enhancing security by preventing replay attacks.
798
798
799
+
While this model allows for Verifier-specific Handles and custom freshness policies, such policies must be defined and enforced outside the scope of this specification.
800
+
For instance, a Verifier may choose to include a Handle reference in its appraisal policy or request specific handling by the PubSub server through implementation-specific mechanisms.
801
+
799
802
#### Handle Generation for Uni-Directional Remote Attestation over Publish-Subscribe
800
803
801
804
~~~~ aasvg
@@ -880,8 +883,10 @@ When the Handle Distributor generates and publishes a Handle to the "Handle" top
880
883
Exactly as in the Challenge/Response and Uni-Directional interaction models, there is an Evidence Generation-Appraisal loop, in which the Attester generates Evidence and the Verifier appraises it.
881
884
In the Publish-Subscribe model above, the Attester publishes Evidence to the topic "AttEv" (= Attestation Evidence) on the PubSub server, to which a Verifier subscribed before.
882
885
The PubSub server notifies Verifiers, accordingly, by forwarding the attestation Evidence.
883
-
Although the above diagram depicts only full attestation Evidence and Event Logs, later attestations may use "deltas' for Evidence and Event Logs.
884
-
Verifiers appraise the Evidence and publish the Attestation Result to topic "AttRes" (= Attestation Result) on the PubSub server.
886
+
Although the above diagram depicts only full attestation Evidence and Event Logs, later attestations may use "deltas" for Evidence and Event Logs.
887
+
888
+
Verifiers appraise the Evidence and publish the Attestation Result to the `AttRes` topic (= Attestation Result) on the PubSub server, which then serves as the dissemination point from which subscribers, such as Relying Parties or other authorized roles, retrieve the result.
889
+
885
890
886
891
#### Attestation Result Generation
887
892
@@ -916,6 +921,9 @@ Attestation Result Generation is the same for both publish-subscribe models,*Cha
916
921
Relying Parties subscribe to topic `AttRes` (= Attestation Result) on the PubSub server.
917
922
The PubSub server forwards Attestation Results to the Relying Parties as soon as they are published to topic `AttRes`.
918
923
924
+
In some deployments, Attesters may also subscribe to the `AttRes` topic to consume Attestation Results.
925
+
This reuses the same publish-subscribe mechanism described here and may support local policy decisions or caching.
926
+
919
927
# Implementation Status
920
928
921
929
Note to RFC Editor: Please remove this section as well as references to {{BCP205}} before AUTH48.
@@ -1033,10 +1041,16 @@ To mitigate these risks, it is essential to implement robust security measures:
1033
1041
Implementing strong isolation mechanisms for topics can help prevent the Broker from inadvertently or maliciously routing notifications to unauthorized parties.
1034
1042
This includes using secure naming conventions and access controls that restrict the Broker's ability to manipulate topic subscriptions.
1035
1043
1044
+
In addition to isolating topics, privacy can be preserved by minimizing the inclusion of personally identifying information or unique Attester identifiers in messages published to shared topics, unless strictly required by the subscriber’s role or appraisal policy.
1045
+
1036
1046
* *Trusted Association Verification:*
1037
1047
To further safeguard against confusion attacks where the Broker might misroute notifications, mechanisms should be in place to verify the trust association between senders and receivers continuously.
1038
1048
This can be facilitated by cryptographic assurances, such as digital signatures and trusted certificates that validate the sender's identity and the integrity of the message content.
1039
1049
1050
+
Implementations may use Verifier Endorsements or pre-established authorization policies to define valid sender-receiver associations.
1051
+
These policies can be cryptographically enforced using signed metadata, access control lists, or secured registration procedures on the PubSub server.
1052
+
The precise method is deployment-specific.
1053
+
1040
1054
* *Audit and Monitoring:*
1041
1055
Regular audits and real-time monitoring of Broker activities can detect and respond to anomalous behavior that might indicate security breaches or manipulation attempts.
1042
1056
Logging all actions performed by the Broker provides an audit trail that can be critical for forensic analysis.
@@ -1048,6 +1062,9 @@ To mitigate these risks, it is essential to implement robust security measures:
1048
1062
By addressing these vulnerabilities proactively, the integrity and confidentiality of the attestation process can be maintained, reducing the risks associated with Broker-mediated communication in remote attestation scenarios.
1049
1063
It is crucial for solution architects to incorporate these security measures during the design and deployment phases to ensure that the attestation process remains secure and trustworthy.
1050
1064
1065
+
This specification does not require the PubSub server to attest to the Handle or cryptographically prove its dissemination.
1066
+
If such assurances are needed (e.g., for auditability or binding Handle provenance), additional mechanisms---such as signed delivery receipts or logs---must be provided by the PubSub infrastructure.
The security and privacy requirements for remote attestation can vary significantly based on the deployment environment, the nature of the attestation mechanisms used, and the specific threats each scenario faces.
0 commit comments