Re: WG Action: Formed Remote ATtestation ProcedureS (rats)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



unsubscribe

> On Mar 7, 2019, at 2:59 PM, The IESG <iesg-secretary@xxxxxxxx> wrote:
> 
> A new IETF WG has been formed in the Security Area. For additional
> information, please contact the Area Directors or the WG Chairs.
> 
> Remote ATtestation ProcedureS (rats)
> -----------------------------------------------------------------------
> Current status: BOF WG
> 
> Chairs:
>  Kathleen Moriarty <Kathleen.Moriarty.ietf@xxxxxxxxx>
>  Nancy Cam-Winget <ncamwing@xxxxxxxxx>
>  Ned Smith <ned.smith@xxxxxxxxx>
>  Roman Danyliw <rdd@xxxxxxxx>
> 
> Assigned Area Director:
>  Benjamin Kaduk <kaduk@xxxxxxx>
> 
> Security Area Directors:
>  Eric Rescorla <ekr@xxxxxxxx>
>  Benjamin Kaduk <kaduk@xxxxxxx>
> 
> Mailing list:
>  Address: rats@xxxxxxxx
>  To subscribe: https://www.ietf.org/mailman/listinfo/rats
>  Archive: https://mailarchive.ietf.org/arch/browse/rats/
> 
> Group page: https://datatracker.ietf.org/group/rats/
> 
> Charter: https://datatracker.ietf.org/doc/charter-ietf-rats/
> 
> Introduction
> ==========
> 
> In network protocol exchanges, it is often the case that one entity (a relying
> party) requires evidence about the remote peer (and system components
> [RFC4949] thereof), in order to assess the trustworthiness of the peer. 
> Remote attestation procedures (RATS) enable relying parties to establish a
> level of confidence in the trustworthiness of remote system components
> through the creation of attestation evidence by remote system components and
> a processing chain towards the relying party.  A relying party can then
> decide whether to consider a remote system component trustworthy or not.
> 
> To improve the confidence in a system component's trustworthiness, a relying
> party may require evidence about:
> * system component identity,
> * composition of system components, including nested components,
> * roots of trust,
> * assertion/claim origination or provenance,
> * manufacturing origin,
> * system component integrity,
> * system component configuration,
> * operational state and measurements of steps which led to the operational
> state, or * other factors that could influence trust decisions.
> 
> While domain-specific attestation mechanisms such as Trusted Computing Group
> (TCG) Trusted Platform Module (TPM)/Trusted Software Stack (TSS), Fast
> Identity Online (FIDO) Alliance attestation, and Android Keystore attestation
> exist, there is no interoperable way to create and process attestation
> evidence to make determinations about system components among relying parties
> of different manufactures and origins.
> 
> Goals
> =====
> 
> This WG will standardize formats for describing assertions/claims about system
> components and associated evidence; and procedures and protocols to convey
> these assertions/claims to relying parties.  Given the security and privacy
> sensitive nature of these assertions/claims, the WG will specify approaches to
> protect this exchanged data.  While a relying party may use reference, known,
> or expected values or thresholds to assess the assertions/claims, the
> procedures for this activity are out of scope for this WG (without
> rechartering).
> 
> The working group will cooperate and coordinate with other IETF WGs such as
> TEEP, SUIT, and SACM, and work with organizations in the community, such as
> the TCG and the FIDO Alliance, as appropriate.  The WG will also evaluate
> prior work such as NEA and proprietary attestation technologies like the
> Android Keystore.
> 
> Program of Work
> ==============
> 
> The working group will develop standards supporting interoperable remote
> attestation procedures for system components. The main deliverables are as
> follows:
> 
> 1. Specify use cases for remote attestation (to document and achieve WG
> consensus but not expected to be published as an RFC).
> 
> 2. Specify terminology and architecture that enable attestation techniques.
> The architecture may include a system security model for the signing key
> material and involve at least the system component, system component provider,
> and the relying authority.
> 
> 3. Standardize an information model for assertions/claims which provide
> information about system components characteristics scoped by the specified
> use-cases.
> 
> 4. Standardize data models that implement and secure the defined information
> model (e.g., CBOR Web Token structures [RFC8392], JSON Web Token structures
> [RFC7519]).
> 
> 5. Standardize interoperable protocols to securely convey assertions/claims.
> 
> 
> 





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux