Code Monkey home page Code Monkey logo

draft-ietf-rats-daa's Introduction

Direct Anonymous Attestation for the Remote Attestation Procedures Architecture

This is the working area for the IETF RATS Working Group Internet-Draft, "Direct Anonymous Attestation for the Remote Attestation Procedures Architecture".

Contributing

See the guidelines for contributions.

Contributions can be made by creating pull requests. The GitHub interface supports creating pull requests using the Edit (โœ) button.

Command Line Usage

Formatted text and HTML versions of the draft can be built using make.

$ make

Command line usage requires that you have the necessary software installed. See the instructions.

draft-ietf-rats-daa's People

Contributors

cabo avatar henkbirkholz avatar

Watchers

 avatar  avatar  avatar  avatar

draft-ietf-rats-daa's Issues

freshness

How is freshness achieved in DAA without compromising the main security goal (i.e., anonymity)? I think the document should explain that clearly.

DAA Issuer role description is confusing

Current text:
"The Join Protocol is essentially an enrollment protocol that consumes
Evidence from the Attester (therefore the mapping to the Verifier
role). Corresponding Appraisal Policies for Evidence specific to the
Join Protocol are used to produce Attestation Results to decide
whether to issue a DAA credential to an Attester or not (therefore
the mapping to the Relying Party role)."

and
"The DAA Issuer acts as the Endorser for the Group Public Key that is
used by the Verifier for the appraisal of evidence of anonymized
Attesters that use the DAA credentials and associated key material to
produce Evidence."

This seems to suggest that Endorser, Verifier, and RP entities all have to be the same entity for join and sign protocols to work. However, this seems unnecessarily complex and may not align well with actual supply chain entities.

Consider the case where a supplier manufactures 1M instances of device X and provisions a group signing key K to all the device instances. If Evidence is signed using key K, then verifiers seeking to prove integrity of evidence signed by K(private) uses K(public) contained in a certificate issued by the supplier's chosen CA.

The verifier doesn't know which of the 1M devices signed evidence with K(private). Therefore, the verifier can't collude to reveal with Attester has which Evidence. If Evidence also contains only class identifiers, then all 1M devices will produce the same evidence.

The signatures will be different, but there is no way for the verifier to distinguish which signature belongs to which attester (within the group).

This approach means the DAA Issuer need only be implemented by the Endorser role. The join protocol is implemented only by the 1M Attesters. There's no reason for verifier / RP to participate in the join protocol.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.