Re: [Last-Call] [Rats] Genart last call review of draft-ietf-rats-architecture-21

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Aug 20, 2022, at 8:23 PM, Laurence Lundblade <lgl@xxxxxxxxxxxxxxxxx> wrote:

I don’t know anything about router architecture, but do about mobile phone architecture which I consider a candidate for composite attestation.

A mobile phone based on a chip like a Qualcomm Snapdragon has many subsystems. Something like this:
- A TEE and/or HW root of trust, perhaps controlled by the chip vendor, not the phone vendor
- A Secure Element for payments or eSIM
- A SIM card 
- The general purpose CPU running Android and is controlled by the phone vendor
- A video playback subsystem that does content protection and is isolated from the main CPU
- A cellular modem
- A Bluetooth subsystem isolated from the modem
- …

There are several tiers of security and multiple vendors.


To go on a bit further, there are many attestation architecture possible here for various use cases. Maybe even one phone has more than one implementation of attestation.

The TEE is likely the lead attester in many. For example, in a content protection application it may collect measurements from the video playback subsystem and from Android and report to the video distribution server.

Or go for further to have nesting and have a HW root of trust (like a TPM, but more capable) and have it attest to the TEE and then the TEE attests to other parts.

Samsung Knox TIMA is an implementation of this that includes taking *and* evaluating them on the device.

Simple Android applications may want to include attestation that is either shallow (just the app) or deep (down to HW root of trust) so their associated servers know it’s really the authentication application. Qualcomm’s product here does some of that.

When the secure element is included, it will probably produce its own signed stand-alone attestation. That attestation can be included as a nested token in a TEE-based attestation of the TEE and other parts of the device. This cryptographically binds that particular secure element attestation to the rest of the parts of the phone, perhaps for top-bottom (user interface to secured key material) attestation of a financial transaction.

LL


-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux