Remote Attestation Procedures Architecture
draft-ietf-rats-architecture-08
RATS Working Group H. Birkholz
Internet-Draft Fraunhofer SIT
Intended status: Informational D. Thaler
Expires: 11 June 2021 Microsoft
M. Richardson
Sandelman Software Works
N. Smith
Intel
W. Pan
Huawei Technologies
8 December 2020
Remote Attestation Procedures Architecture
draft-ietf-rats-architecture-08
Abstract
In network protocol exchanges it is often the case that one entity
requires believable evidence about the operational state of a remote
peer. Such evidence is typically conveyed as claims about the peer's
software and hardware platform, and is subsequently appraised in
order to assess the peer's trustworthiness. The process of
generating and appraising this kind of evidence is known as remote
attestation. This document describes an architecture for remote
attestation procedures that generate, convey, and appraise evidence
about a peer's operational state.
Note to Readers
Discussion of this document takes place on the RATS Working Group
mailing list (rats@ietf.org), which is archived at
https://mailarchive.ietf.org/arch/browse/rats/
(https://mailarchive.ietf.org/arch/browse/rats/).
Source for this draft and an issue tracker can be found at
https://github.com/ietf-rats-wg/architecture (https://github.com/
ietf-rats-wg/architecture).
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Birkholz, et al. Expires 11 June 2021 [Page 1]
Internet-Draft RATS Arch & Terms December 2020
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 11 June 2021.
Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Simplified BSD License text
as described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Reference Use Cases . . . . . . . . . . . . . . . . . . . . . 4
2.1. Network Endpoint Assessment . . . . . . . . . . . . . . . 4
2.2. Confidential Machine Learning (ML) Model Protection . . . 5
2.3. Confidential Data Retrieval . . . . . . . . . . . . . . . 5
2.4. Critical Infrastructure Control . . . . . . . . . . . . . 6
2.5. Trusted Execution Environment (TEE) Provisioning . . . . 6
2.6. Hardware Watchdog . . . . . . . . . . . . . . . . . . . . 6
2.7. FIDO Biometric Authentication . . . . . . . . . . . . . . 7
3. Architectural Overview . . . . . . . . . . . . . . . . . . . 7
3.1. Appraisal Policies . . . . . . . . . . . . . . . . . . . 9
3.2. Reference Values . . . . . . . . . . . . . . . . . . . . 9
3.3. Two Types of Environments of an Attester . . . . . . . . 9
3.4. Layered Attestation Environments . . . . . . . . . . . . 10
3.5. Composite Device . . . . . . . . . . . . . . . . . . . . 12
4. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.1. Roles . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.2. Artifacts . . . . . . . . . . . . . . . . . . . . . . . . 15
5. Topological Models . . . . . . . . . . . . . . . . . . . . . 16
5.1. Passport Model . . . . . . . . . . . . . . . . . . . . . 17
5.2. Background-Check Model . . . . . . . . . . . . . . . . . 18
Show full document text