rfc9684v4.txt   rfc9684.txt 
skipping to change at line 16 skipping to change at line 16
ThoughtSpot ThoughtSpot
E. Voit E. Voit
B. Sulzen B. Sulzen
Cisco Cisco
L. Xia L. Xia
Huawei Huawei
T. Laffey T. Laffey
HPE HPE
G. C. Fedorkow G. C. Fedorkow
Juniper Juniper
November 2024 December 2024
A YANG Data Model for Challenge-Response-Based Remote Attestation A YANG Data Model for Challenge-Response-Based Remote Attestation
(CHARRA) Procedures Using Trusted Platform Modules (TPMs) (CHARRA) Procedures Using Trusted Platform Modules (TPMs)
Abstract Abstract
This document defines the YANG Remote Procedure Calls (RPCs) and This document defines the YANG Remote Procedure Calls (RPCs) and
configuration nodes that are required to retrieve attestation configuration nodes that are required to retrieve attestation
evidence about integrity measurements from a device, following the evidence about integrity measurements from a device, following the
operational context defined in RFC 9683 "TPM-based Network Device operational context defined in RFC 9683 "TPM-based Network Device
skipping to change at line 2369 skipping to change at line 2369
ietf-tpm-remote-attestation.yang. However, the full definition of ietf-tpm-remote-attestation.yang. However, the full definition of
Table 3 of [TCG-Algos] will allow use by additional YANG Table 3 of [TCG-Algos] will allow use by additional YANG
specifications. specifications.
3. IANA Considerations 3. IANA Considerations
This document registers the following namespace URIs in the This document registers the following namespace URIs in the
[XML-Registry] per [RFC3688]: [XML-Registry] per [RFC3688]:
URI: urn:ietf:params:xml:ns:yang:ietf-tpm-remote-attestation URI: urn:ietf:params:xml:ns:yang:ietf-tpm-remote-attestation
Registrant Contact: The IESG.
Registrant Contact: The IESG. XML: N/A; the requested URI is an XML namespace.
XML: N/A; the requested URI is an XML namespace.
URI: urn:ietf:params:xml:ns:yang:ietf-tcg-algs URI: urn:ietf:params:xml:ns:yang:ietf-tcg-algs
Registrant Contact: The IESG.
Registrant Contact: The IESG. XML: N/A; the requested URI is an XML namespace.
XML: N/A; the requested URI is an XML namespace.
This document registers the following YANG modules in the registry This document registers the following YANG modules in the registry
[YANG-Parameters] per Section 14 of [RFC6020]: [YANG-Parameters] per Section 14 of [RFC6020]:
Name: ietf-tpm-remote-attestation Name: ietf-tpm-remote-attestation
Namespace: urn:ietf:params:xml:ns:yang:ietf-tpm-remote-attestation
Namespace: urn:ietf:params:xml:ns:yang:ietf-tpm-remote- Prefix: tpm
attestation Reference: draft-ietf-rats-yang-tpm-charra (RFC form)
Prefix: tpm
Reference: draft-ietf-rats-yang-tpm-charra (RFC form)
Name: ietf-tcg-algs Name: ietf-tcg-algs
Namespace: urn:ietf:params:xml:ns:yang:ietf-tcg-algs
Namespace: urn:ietf:params:xml:ns:yang:ietf-tcg-algs Prefix: taa
Reference: draft-ietf-rats-yang-tpm-charra (RFC form)
Prefix: taa
Reference: draft-ietf-rats-yang-tpm-charra (RFC form)
4. Security Considerations 4. Security Considerations
The YANG module ietf-tpm-remote-attestation.yang specified in this The YANG module ietf-tpm-remote-attestation.yang specified in this
document defines a schema for data that is designed to be accessed document defines a schema for data that is designed to be accessed
via network management protocols such as NETCONF [RFC6241] or via network management protocols such as NETCONF [RFC6241] or
RESTCONF [RFC8040]. The lowest NETCONF layer is the secure transport RESTCONF [RFC8040]. The lowest NETCONF layer is the secure transport
layer, and the mandatory-to-implement secure transport is Secure layer, and the mandatory-to-implement secure transport is Secure
Shell (SSH) [RFC6242]. The lowest RESTCONF layer is HTTPS, and the Shell (SSH) [RFC6242]. The lowest RESTCONF layer is HTTPS, and the
mandatory-to-implement secure transport is TLS [RFC8446]. mandatory-to-implement secure transport is TLS [RFC8446].
skipping to change at line 2497 skipping to change at line 2486
Some of the readable data nodes in this YANG module may be considered Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments. It is thus sensitive or vulnerable in some network environments. It is thus
important to control read access (e.g., via get, get-config, or important to control read access (e.g., via get, get-config, or
notification) to these data nodes. These are the subtrees and data notification) to these data nodes. These are the subtrees and data
nodes and their sensitivity/vulnerability: nodes and their sensitivity/vulnerability:
Event logs (bios-log, ima-log, netequip-boot-log) typically contain Event logs (bios-log, ima-log, netequip-boot-log) typically contain
hash values (digests) of running boot and OS software. Passive hash values (digests) of running boot and OS software. Passive
attackers can use these hash values to identify software versions and attackers can use these hash values to identify software versions and
thus launch targeted attacks on known vulnerabilities. Hence, bios- thus launch targeted attacks on known vulnerabilities. Hence, bios-
log, ima-log, and netequip-boot-log are considerd sensitive. log, ima-log, and netequip-boot-log are considered sensitive.
Some of the RPC operations in this YANG module may be considered Some of the RPC operations in this YANG module may be considered
sensitive or vulnerable in some network environments. It is thus sensitive or vulnerable in some network environments. It is thus
important to control access to these operations. These are the important to control access to these operations. These are the
operations and their sensitivity/vulnerability: operations and their sensitivity/vulnerability:
The 'log-retrieval' RPC operation is considered sensitive since it The 'log-retrieval' RPC operation is considered sensitive since it
enables retrieval of logs (bios-log, ima-log, netequip-boot-log) that enables retrieval of logs (bios-log, ima-log, netequip-boot-log) that
typically contain hash values (digests) of running boot and OS typically contain hash values (digests) of running boot and OS
software. This allows specifics of loaded software including BIOS software. This allows specifics of loaded software including BIOS
skipping to change at line 2708 skipping to change at line 2697
[RFC9334] Birkholz, H., Thaler, D., Richardson, M., Smith, N., and [RFC9334] Birkholz, H., Thaler, D., Richardson, M., Smith, N., and
W. Pan, "Remote ATtestation procedureS (RATS) W. Pan, "Remote ATtestation procedureS (RATS)
Architecture", RFC 9334, DOI 10.17487/RFC9334, January Architecture", RFC 9334, DOI 10.17487/RFC9334, January
2023, <https://www.rfc-editor.org/info/rfc9334>. 2023, <https://www.rfc-editor.org/info/rfc9334>.
[RFC9642] Watsen, K., "A YANG Data Model for a Keystore", RFC 9642, [RFC9642] Watsen, K., "A YANG Data Model for a Keystore", RFC 9642,
DOI 10.17487/RFC9642, October 2024, DOI 10.17487/RFC9642, October 2024,
<https://www.rfc-editor.org/info/rfc9642>. <https://www.rfc-editor.org/info/rfc9642>.
[RFC9683] Fedorkow, G. C., Voit, E., and J. Fitzgerald-McKay, [RFC9683] Fedorkow, G. C., Ed., Voit, E., and J. Fitzgerald-McKay,
"Remote Integrity Verification of Network Devices "Remote Integrity Verification of Network Devices
Containing Trusted Platform Modules", RFC 9683, Containing Trusted Platform Modules", RFC 9683,
DOI 10.17487/RFC9683, November 2024, DOI 10.17487/RFC9683, December 2024,
<https://www.rfc-editor.org/info/rfc9683>. <https://www.rfc-editor.org/info/rfc9683>.
[TCG-Algos] [TCG-Algos]
Trusted Computing Group, "TCG Algorithm Registry", Family Trusted Computing Group, "TCG Algorithm Registry", Family
"2.0" Level 00 Revision 01.34, 24 August 2023, "2.0" Level 00 Revision 01.34, 24 August 2023,
<https://trustedcomputinggroup.org/wp-content/uploads/TCG- <https://trustedcomputinggroup.org/wp-content/uploads/TCG-
Algorithm-Registry-Revision-1.34_pub-1.pdf>. Algorithm-Registry-Revision-1.34_pub-1.pdf>.
[TPM1.2] Trusted Computing Group, "TPM 1.2 Main Specification", TPM [TPM1.2] Trusted Computing Group, "TPM 1.2 Main Specification", TPM
Main Specification Level 2 Version 1.2, Revision 116, 1 Main Specification Level 2 Version 1.2, Revision 116, 1
 End of changes. 8 change blocks. 
25 lines changed or deleted 14 lines changed or added

This html diff was produced by rfcdiff 1.48.