rfc9334v7.txt | rfc9334.txt | |||
---|---|---|---|---|
skipping to change at line 1874 ¶ | skipping to change at line 1874 ¶ | |||
13. IANA Considerations | 13. IANA Considerations | |||
This document has no IANA actions. | This document has no IANA actions. | |||
14. References | 14. References | |||
14.1. Normative References | 14.1. Normative References | |||
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., | [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., | |||
Housley, R., Polk, W., and RFC Publisher, "Internet X.509 | Housley, R., and W. Polk, "Internet X.509 Public Key | |||
Public Key Infrastructure Certificate and Certificate | Infrastructure Certificate and Certificate Revocation List | |||
Revocation List (CRL) Profile", RFC 5280, | (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, | |||
DOI 10.17487/RFC5280, May 2008, | ||||
<https://www.rfc-editor.org/info/rfc5280>. | <https://www.rfc-editor.org/info/rfc5280>. | |||
[RFC7519] Jones, M., Bradley, J., Sakimura, N., and RFC Publisher, | [RFC7519] Jones, M., Bradley, J., and N. Sakimura, "JSON Web Token | |||
"JSON Web Token (JWT)", RFC 7519, DOI 10.17487/RFC7519, | (JWT)", RFC 7519, DOI 10.17487/RFC7519, May 2015, | |||
May 2015, <https://www.rfc-editor.org/info/rfc7519>. | <https://www.rfc-editor.org/info/rfc7519>. | |||
[RFC8392] Jones, M., Wahlstroem, E., Erdtman, S., Tschofenig, H., | [RFC8392] Jones, M., Wahlstroem, E., Erdtman, S., and H. Tschofenig, | |||
and RFC Publisher, "CBOR Web Token (CWT)", RFC 8392, | "CBOR Web Token (CWT)", RFC 8392, DOI 10.17487/RFC8392, | |||
DOI 10.17487/RFC8392, May 2018, | May 2018, <https://www.rfc-editor.org/info/rfc8392>. | |||
<https://www.rfc-editor.org/info/rfc8392>. | ||||
14.2. Informative References | 14.2. Informative References | |||
[CCC-DeepDive] | [CCC-DeepDive] | |||
Confidential Computing Consortium, "A Technical Analysis | Confidential Computing Consortium, "A Technical Analysis | |||
of Confidential Computing", Version 1.3, November 2022, | of Confidential Computing", Version 1.3, November 2022, | |||
<https://confidentialcomputing.io/white-papers-reports>. | <https://confidentialcomputing.io/white-papers-reports>. | |||
[CTAP] FIDO Alliance, "Client to Authenticator Protocol (CTAP)", | [CTAP] FIDO Alliance, "Client to Authenticator Protocol (CTAP)", | |||
February 2018, <https://fidoalliance.org/specs/fido-v2.0- | February 2018, <https://fidoalliance.org/specs/fido-v2.0- | |||
skipping to change at line 1921 ¶ | skipping to change at line 1919 ¶ | |||
model/>. | model/>. | |||
[RATS-DAA] Birkholz, H., Newton, C., Chen, L., and D. Thaler, "Direct | [RATS-DAA] Birkholz, H., Newton, C., Chen, L., and D. Thaler, "Direct | |||
Anonymous Attestation for the Remote Attestation | Anonymous Attestation for the Remote Attestation | |||
Procedures Architecture", Work in Progress, Internet- | Procedures Architecture", Work in Progress, Internet- | |||
Draft, draft-ietf-rats-daa-02, 7 September 2022, | Draft, draft-ietf-rats-daa-02, 7 September 2022, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-rats- | <https://datatracker.ietf.org/doc/html/draft-ietf-rats- | |||
daa-02>. | daa-02>. | |||
[RATS-PSA-TOKEN] | [RATS-PSA-TOKEN] | |||
Tschofenig, H., Frost, S., Brossard, M., Shaw, A. L., and | Tschofenig, H., Frost, S., Brossard, M., Shaw, A., and T. | |||
T. Fossati, "Arm's Platform Security Architecture (PSA) | Fossati, "Arm's Platform Security Architecture (PSA) | |||
Attestation Token", Work in Progress, Internet-Draft, | Attestation Token", Work in Progress, Internet-Draft, | |||
draft-tschofenig-rats-psa-token-10, 6 September 2022, | draft-tschofenig-rats-psa-token-10, 6 September 2022, | |||
<https://datatracker.ietf.org/doc/html/draft-tschofenig- | <https://datatracker.ietf.org/doc/html/draft-tschofenig- | |||
rats-psa-token-10>. | rats-psa-token-10>. | |||
[RATS-TUDA] | [RATS-TUDA] | |||
Fuchs, A., Birkholz, H., McDonald, I., and C. Bormann, | Fuchs, A., Birkholz, H., McDonald, I., and C. Bormann, | |||
"Time-Based Uni-Directional Attestation", Work in | "Time-Based Uni-Directional Attestation", Work in | |||
Progress, Internet-Draft, draft-birkholz-rats-tuda-07, 10 | Progress, Internet-Draft, draft-birkholz-rats-tuda-07, 10 | |||
July 2022, <https://datatracker.ietf.org/doc/html/draft- | July 2022, <https://datatracker.ietf.org/doc/html/draft- | |||
birkholz-rats-tuda-07>. | birkholz-rats-tuda-07>. | |||
[RATS-UCCS] | [RATS-UCCS] | |||
Birkholz, H., O'Donoghue, J., Cam-Winget, N., and C. | Birkholz, H., O'Donoghue, J., Cam-Winget, N., and C. | |||
Bormann, "A CBOR Tag for Unprotected CWT Claims Sets", | Bormann, "A CBOR Tag for Unprotected CWT Claims Sets", | |||
Work in Progress, Internet-Draft, draft-ietf-rats-uccs-03, | Work in Progress, Internet-Draft, draft-ietf-rats-uccs-04, | |||
11 July 2022, <https://datatracker.ietf.org/doc/html/ | 11 January 2023, <https://datatracker.ietf.org/doc/html/ | |||
draft-ietf-rats-uccs-03>. | draft-ietf-rats-uccs-04>. | |||
[RFC4086] Eastlake 3rd, D., Schiller, J., Crocker, S., and RFC | [RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker, | |||
Publisher, "Randomness Requirements for Security", | "Randomness Requirements for Security", BCP 106, RFC 4086, | |||
BCP 106, RFC 4086, DOI 10.17487/RFC4086, June 2005, | DOI 10.17487/RFC4086, June 2005, | |||
<https://www.rfc-editor.org/info/rfc4086>. | <https://www.rfc-editor.org/info/rfc4086>. | |||
[RFC4949] Shirey, R. and RFC Publisher, "Internet Security Glossary, | [RFC4949] Shirey, R., "Internet Security Glossary, Version 2", | |||
Version 2", FYI 36, RFC 4949, DOI 10.17487/RFC4949, August | FYI 36, RFC 4949, DOI 10.17487/RFC4949, August 2007, | |||
2007, <https://www.rfc-editor.org/info/rfc4949>. | <https://www.rfc-editor.org/info/rfc4949>. | |||
[RFC5209] Sangster, P., Khosravi, H., Mani, M., Narayan, K., Tardo, | [RFC5209] Sangster, P., Khosravi, H., Mani, M., Narayan, K., and J. | |||
J., and RFC Publisher, "Network Endpoint Assessment (NEA): | Tardo, "Network Endpoint Assessment (NEA): Overview and | |||
Overview and Requirements", RFC 5209, | Requirements", RFC 5209, DOI 10.17487/RFC5209, June 2008, | |||
DOI 10.17487/RFC5209, June 2008, | ||||
<https://www.rfc-editor.org/info/rfc5209>. | <https://www.rfc-editor.org/info/rfc5209>. | |||
[RFC6024] Reddy, R., Wallace, C., and RFC Publisher, "Trust Anchor | [RFC6024] Reddy, R. and C. Wallace, "Trust Anchor Management | |||
Management Requirements", RFC 6024, DOI 10.17487/RFC6024, | Requirements", RFC 6024, DOI 10.17487/RFC6024, October | |||
October 2010, <https://www.rfc-editor.org/info/rfc6024>. | 2010, <https://www.rfc-editor.org/info/rfc6024>. | |||
[RFC8322] Field, J., Banghart, S., Waltermire, D., and RFC | [RFC8322] Field, J., Banghart, S., and D. Waltermire, "Resource- | |||
Publisher, "Resource-Oriented Lightweight Information | Oriented Lightweight Information Exchange (ROLIE)", | |||
Exchange (ROLIE)", RFC 8322, DOI 10.17487/RFC8322, | RFC 8322, DOI 10.17487/RFC8322, February 2018, | |||
February 2018, <https://www.rfc-editor.org/info/rfc8322>. | <https://www.rfc-editor.org/info/rfc8322>. | |||
[strengthoffunction] | [strengthoffunction] | |||
NIST, "Strength of Function", | NIST, "Strength of Function", | |||
<https://csrc.nist.gov/glossary/term/ | <https://csrc.nist.gov/glossary/term/ | |||
strength_of_function>. | strength_of_function>. | |||
[TCG-DICE] Trusted Computing Group, "DICE Attestation Architecture", | [TCG-DICE] Trusted Computing Group, "DICE Attestation Architecture", | |||
Version 1.00, Revision 0.23, March 2021, | Version 1.00, Revision 0.23, March 2021, | |||
<https://trustedcomputinggroup.org/wp-content/uploads/ | <https://trustedcomputinggroup.org/wp-content/uploads/ | |||
DICE-Attestation-Architecture-r23-final.pdf>. | DICE-Attestation-Architecture-r23-final.pdf>. | |||
skipping to change at line 1988 ¶ | skipping to change at line 1985 ¶ | |||
Attestation", Version 1.0, Revision 0.95, January 2020, | Attestation", Version 1.0, Revision 0.95, January 2020, | |||
<https://trustedcomputinggroup.org/wp-content/uploads/ | <https://trustedcomputinggroup.org/wp-content/uploads/ | |||
TCG_DICE_SymIDAttest_v1_r0p95_pub-1.pdf>. | TCG_DICE_SymIDAttest_v1_r0p95_pub-1.pdf>. | |||
[TCGarch] Trusted Computing Group, "Trusted Platform Module Library, | [TCGarch] Trusted Computing Group, "Trusted Platform Module Library, | |||
Part 1: Architecture", November 2019, | Part 1: Architecture", November 2019, | |||
<https://trustedcomputinggroup.org/wp-content/uploads/ | <https://trustedcomputinggroup.org/wp-content/uploads/ | |||
TCG_TPM2_r1p59_Part1_Architecture_pub.pdf>. | TCG_TPM2_r1p59_Part1_Architecture_pub.pdf>. | |||
[TEEP-ARCH] | [TEEP-ARCH] | |||
Pei, M., Tschofenig, H., Thaler, D., and D. M. Wheeler, | Pei, M., Tschofenig, H., Thaler, D., and D. Wheeler, | |||
"Trusted Execution Environment Provisioning (TEEP) | "Trusted Execution Environment Provisioning (TEEP) | |||
Architecture", Work in Progress, Internet-Draft, draft- | Architecture", Work in Progress, Internet-Draft, draft- | |||
ietf-teep-architecture-19, 24 October 2022, | ietf-teep-architecture-19, 24 October 2022, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-teep- | <https://datatracker.ietf.org/doc/html/draft-ietf-teep- | |||
architecture-19>. | architecture-19>. | |||
[TLS-CWT] Tschofenig, H. and M. Brossard, "Using CBOR Web Tokens | [TLS-CWT] Tschofenig, H. and M. Brossard, "Using CBOR Web Tokens | |||
(CWTs) in Transport Layer Security (TLS) and Datagram | (CWTs) in Transport Layer Security (TLS) and Datagram | |||
Transport Layer Security (DTLS)", Work in Progress, | Transport Layer Security (DTLS)", Work in Progress, | |||
Internet-Draft, draft-tschofenig-tls-cwt-02, 13 July 2020, | Internet-Draft, draft-tschofenig-tls-cwt-02, 13 July 2020, | |||
skipping to change at line 2360 ¶ | skipping to change at line 2357 ¶ | |||
|<---Nonce-----------time(NR_r) | | |<---Nonce-----------time(NR_r) | | |||
| | | | | | | | |||
time(EG_a) | | | time(EG_a) | | | |||
| | | | | | | | |||
+----Evidence{Nonce}--->| | | +----Evidence{Nonce}--->| | | |||
| | | | | | | | |||
| time(ER_r) ---Evidence{Nonce}--->| | | time(ER_r) ---Evidence{Nonce}--->| | |||
| | | | | | | | |||
| | time(RG_v) | | | time(RG_v) | |||
| | | | | | | | |||
| ime(RA_r) <---Attestation Result--+ | | time(RA_r) <---Attestation Result--+ | |||
| | {time(RX_v)-time(RG_v)} | | | | {time(RX_v)-time(RG_v)} | | |||
~ ~ ~ | ~ ~ ~ | |||
| | | | | | | | |||
| time(OP_r) | | | time(OP_r) | | |||
Figure 14: Nonce-Based Background-Check Model | Figure 14: Nonce-Based Background-Check Model | |||
The Verifier can check whether the Evidence is fresh and a Claim | The Verifier can check whether the Evidence is fresh and a Claim | |||
value is recent, which is the same as Example 2. | value is recent, which is the same as Example 2. | |||
End of changes. 12 change blocks. | ||||
35 lines changed or deleted | 32 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |