[Last-Call] Re: [Rats] Last Call: <draft-ietf-rats-eat-27.txt> (The Entity Attestation Token (EAT)) to Proposed Standard

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

This is the second time through IETF Last Call for EAT.

The significant difference between draft-ietf-rats-eat-24 and draft-ietf-rats-eat-27 is the removal the normative reference to SUIT Manifest (and in turn SUIT MTI) so as to not have to wait for publication of the SUIT docs. See diff of manifests section below.

Our thinking is EAT is undiminished by this removal. The normative reference is only for the manifests claims, not for any central part of EAT.

The manifests claim is pluggable via a CDDL socket and CoAP content type. The SUIT Manifest reference is really just a pre-registration of a content type. It is still easy for someone to use SUIT Manifest with EAT. The pre-reg of CoSWID manifest and measurements content types will still be there.

If the reference were for a core part of EAT, like JWT or COSE, we wouldn’t have made this change.

The reason we put the reference in the document was to help justify and prove out the design of the manifests claim. That is accomplished. If we were thinking more carefully, we would have made the reference informative or removed it to avoid the publication schedule interlock like we did with UCCS.

The other changes are fixes for typos, changes for the completed IANA assignments, idnits and other that would not trigger this recycle through WGLC and IETF LC.

LL


4.2.15.  manifests (Software Manifests) Claim

   The "manifests" claim contains descriptions of software present on
   the entity.  These manifests are installed on the entity when the
   software is installed or are created as part of the installation
   process.  Installation is anything that adds software to the entity,
   possibly factory installation, the user installing elective
   applications and so on.  The defining characteristic of a manifest is
   that it is created by the software manufacturer.  The purpose of this
   claim is to relay unmodified manifests to the verifier and possibly
   to the relying party.

   Some manifests are signed by their software manufacturer
   independently, and some are not either because they do not support
   signing or the manufacturer chose not to sign them.  For example, a
   CoSWID might be signed independently before it is included in an EAT.
   When signed manifests are put into an EAT, the manufacturer's
   signature SHOULD be included even though an EAT's signature will also
   cover the manifest.  This allows the receiver to directly verify the
   manufacturer-originated manifest.

   This claim allows multiple manifest formats.  For example, the
   manifest may be a CBOR-encoded CoSWID, an XML-encoded SWID or other.
   Identification of the type of manifest is always by a Constrained
   Application Protocol (CoAP) Content-Format integer [RFC7252].  If
   there is no CoAP identifier registered for a manifest format, one
   MUST be registered.

   This claim MUST be an array of one or more manifests.  Each manifest
   in the claim MUST be an array of two.  The first item in the array of
   two MUST be an integer CoAP Content-Format identifier.  The second
   item is MUST be the actual manifest.

   In JSON-encoded tokens the manifest, whatever encoding it is, MUST be
   placed in a text string.  When a non-text encoded manifest like a
   CBOR-encoded CoSWID is put in a JSON-encoded token, the manifest MUST
   be base-64 encoded.

   This claim allows for multiple manifests in one token since multiple
   software packages are likely to be present.  The multiple manifests
   MAY be of different encodings.  In some cases EAT submodules may be
   used instead of the array structure in this claim for multiple
   manifests.

   A CoSWID manifest MUST be a payload CoSWID, not an evidence CoSWID.
   These are defined in [RFC9393].

   A Software Updates for Internet of Things (SUIT) Manifest
   [SUIT.Manifest] may be used.

   This claim is extensible for use of manifest formats beyond those
   mentioned in this document.  No particular manifest format is
   preferred.  For manifest interoperability, an EAT profile as defined
   in Section 6, should be used to specify which manifest format(s) are
   allowed.

   $$Claims-Set-Claims //= (
       manifests-label => manifests-type
   )

   manifests-type = [+ manifest-format]

   manifest-format = [
       content-type:   coap-content-format,
       content-format: JC< $manifest-body-json,
                           $manifest-body-cbor >
   ]

   $manifest-body-cbor /= bytes .cbor untagged-coswid
   $manifest-body-json /= base64-url-text

   $manifest-body-cbor /= bytes .cbor SUIT_Envelope
   $manifest-body-json /= base64-url-text


On May 28, 2024, at 11:22 AM, The IESG <iesg-secretary@xxxxxxxx> wrote:


The IESG has received a request from the Remote ATtestation ProcedureS WG
(rats) to consider the following document: - 'The Entity Attestation Token
(EAT)'
 <draft-ietf-rats-eat-27.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@xxxxxxxx mailing lists by 2024-06-11. Exceptionally, comments may
be sent to iesg@xxxxxxxx instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  An Entity Attestation Token (EAT) provides an attested claims set
  that describes state and characteristics of an entity, a device like
  a smartphone, IoT device, network equipment or such.  This claims set
  is used by a relying party, server or service to determine the type
  and degree of trust placed in the entity.

  An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
  attestation-oriented claims.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-rats-eat/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
   rfc9334: Remote ATtestation procedureS (RATS) Architecture (Informational - Internet Engineering Task Force (IETF))




_______________________________________________
RATS mailing list -- rats@xxxxxxxx
To unsubscribe send an email to rats-leave@xxxxxxxx

-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux