You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-ietf-rats-corim.md
+22-24Lines changed: 22 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1212,7 +1212,7 @@ The first `series` entry that successfully matches the `selection` criteria term
1212
1212
1213
1213
A Device Identity triple (`identity-triples` in {{sec-comid-triples}}) relates one or more cryptographic keys to a device identity.
1214
1214
The identity keys are bound to or associated with a Target Environment (as identified by `environment` and `mkey`—see below) within the device.
1215
-
The identity keys may be asserted via Evidence or Reference Values.
1215
+
The identity keys may be asserted via Evidence, Reference Values, or Endorsements.
1216
1216
1217
1217
The device identity keys may have been used to authenticate the Attester device or may be held in reserve for use at a later time.
1218
1218
@@ -1224,9 +1224,9 @@ Additional details about how a key was provisioned or is protected may be assert
1224
1224
1225
1225
Depending on key formatting, as defined by `$crypto-key-type-choice`, the Verifier may take different steps to locate and verify the key.
1226
1226
1227
-
If a key has usage restrictions that limit its use to device identity challenges, Verifiers SHOULD check for key use that violates key use restrictions.
1227
+
If a key has usage restrictions that limit its use to device identity challenges, Verifiers SHOULD enforce key use restrictions.
1228
1228
1229
-
Each successful verification of a key in `key-list` SHALL produce Endorsement Claims that are added to the ACS.
1229
+
Each successful verification of a key in `key-list` SHALL produce Endorsement Claims that are added to the Attester's Claim set.
1230
1230
Claims are asserted with the joint authority of the Endorser (CoRIM signer) and the Verifier.
1231
1231
Additionally, Verifiers MAY report key verification results as part of an error reporting function.
1232
1232
@@ -1237,19 +1237,19 @@ Additionally, Verifiers MAY report key verification results as part of an error
1237
1237
* `environment`: An `environment-map` condition used to identify the target Evidence or Reference Value.
1238
1238
See {{sec-environments}}.
1239
1239
1240
-
* `mkey`: An optional `$measured-element-type-choice` condition used to identify the element within the target Evidence or Reference Value.
1241
-
See {{sec-comid-mkey}}.
1242
-
1243
1240
* `key-list`: A list of `$crypto-key-type-choice` keys that identifies which keys are to be verified.
1244
1241
See {{sec-crypto-keys}}.
1245
1242
1246
-
* `authority-list`: An optional list of `$crypto-key-type-choice` keys that identifies the authorities that asserted the `key-list` in the target Evidence or Reference Values.
1243
+
* `mkey`: An optional `$measured-element-type-choice` condition used to identify the element within the target Evidence or Reference Value.
1244
+
See {{sec-comid-mkey}}.
1245
+
1246
+
* `authorized-by`: An optional list of `$crypto-key-type-choice` keys that identifies the authorities that asserted the `key-list` in the target Evidence or Reference Values.
An Attest Key triple (`attest-key-triples` in {{sec-comid-triples}}) relates one or more cryptographic keys to an Attesting Environment (as identified by `environment` and `mkey`).
1251
1251
The cryptographic attestation keys are wielded by an Attesting Environment.
1252
-
Attestation keys may be asserted via Evidence or Reference Values.
1252
+
Attestation keys may be asserted via Evidence, Reference Values, or Endorsements.
1253
1253
1254
1254
The attestation keys may have been used to sign Evidence or may be held in reserve for use at a later time.
1255
1255
@@ -1263,7 +1263,7 @@ Depending on key formatting, as defined by `$crypto-key-type-choice`, the Verifi
1263
1263
If a key has usage restrictions that limits its use to Evidence signing (e.g., see Section 5.1.5.3 in [DICE.cert]).
1264
1264
Verifiers SHOULD enforce key use restrictions.
1265
1265
1266
-
Each successful verification of a key in `key-list` SHALL produce Endorsement Claims that are added to the ACS.
1266
+
Each successful verification of a key in `key-list` SHALL produce Endorsement Claims that are added to the Attester's Claim set.
1267
1267
Claims are asserted with the joint authority of the Endorser (CoRIM signer) and the Verifier.
1268
1268
Additionally, Verifiers MAY report key verification results as part of an error reporting function.
1269
1269
@@ -2023,8 +2023,6 @@ The selected tags are mapped to an internal representation, making them suitable
For each `ev` entry, the `condition` ECT is compared with an ACS ECT, where the ACS ECT `cmtype` contains either `evidence`, `reference-values`, or `endorsements`.
2232
-
If the ECTs match ({{sec-match-condition-ect}}), for each key in `ev`.`condition`.`element-claims`.`measurement-values-map`.`crypto-keys`:
2230
+
If the ECTs match ({{sec-match-condition-ect}}), for each _key_ in `ev`.`condition`.`element-claims`.`measurement-values-map`.`crypto-keys`:
2233
2231
2234
2232
* Verify the certificate signatures for the certification path.
2235
2233
2236
2234
* Verify certificate revocation status for the certification path.
2237
2235
2238
2236
* Verify key usage restrictions appropriate for the type of key.
@@ -2251,7 +2247,9 @@ If key verification succeeds for any key:
2251
2247
2252
2248
* Add the Verifier authority `$crypto-key-type-choice` to the `ev`.`addition`.`authority` field.
2253
2249
2254
-
Add the `addition` ECT to the ACS.
2250
+
* Add the `addition` ECT to the ACS.
2251
+
2252
+
Otherwise, do not add the `addition` ECT to the ACS.
2255
2253
2256
2254
### Examples for optional phases 5, 6, and 7 {#sec-phases567}
2257
2255
@@ -2263,16 +2261,16 @@ Additionally, the creation of Attestation Results is out-of-scope for this docum
2263
2261
Phase 5: Verifier Augmentation
2264
2262
2265
2263
Claims related to Verifier-applied consistency checks are asserted under the authority of the Verifier.
2266
-
For example, the `attest-key-triple-record` may contain a cryptographic key to which the Verifier applies certificate path construction and validation.
2267
-
Validation may reveal an expired certificate.
2268
-
The Verifier implementation might generate a certificate path validation exception that is handled externally, or it could generate a Claim that the certificate path is invalid.
2264
+
For example, the Verifier may supply evidence freshness nonces to the Attester to be included in Evidence.
2265
+
If a Verifier nonce is used, the Verifier may augment the ACS with a nonce Claim using Verifier authority.
2266
+
If the Attester returns the nonce, it may also augment the ACS using Attester authority.
2269
2267
2270
2268
Phase 6: Policy Augmentation
2271
2269
2272
2270
Appraisal policy inputs could result in Claims that augment the ACS.
2273
2271
For example, an Appraisal Policy for Evidence may specify that if all of a collection of subcomponents satisfy a particular quality metric, the top-level component also satisfies the quality metric.
2274
2272
The Verifier might generate an Endorsement ECT for the top-level component that asserts a quality metric.
2275
-
Details about the policy applied may also augment the ACS.
2273
+
Details about the applied policy may augment the ACS.
2276
2274
An internal representation of policy details, based on the policy ECT, as described in {{sec-ir-policy}}, contains the environments affected by the policy with policy identifiers as Claims.
2277
2275
2278
2276
Phase 7: Attestation Results Production and Transformation
0 commit comments