-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make signer optional #3
Comments
I think I misunderstood ckt. It's not about signing the measurement. It's about authorizing install, right? Probably should call it something very different and describe that in a big way. Still might want it optional. A bit confused... |
Yes, exactly. Semantically, it is equivalent to Open-DICE's Authority Data, i.e., a thumbprint of the verified boot trusted authority.
Makes sense. Do you have any suggestions for the naming?
+1 |
You're trying to name some company or person (a legal entity), right? How about what EAT OEM ID did? EAT OEM ID is just trying to name a legal entity. You could add CKT, or CKT could one way to make a random ID. |
And call it "installing entity" or such rather than signer. I guess you've thought about it, but your adding another legal entity into the mix here in addition to SW manufacturer, HW manufacturer... Is that what you want to do? Seems like you'd want to know the SW manufacturer of the component just as much as who installed it. |
Partially addresses #1 Partially addresses #3 Fix #2 Signed-off-by: Thomas Fossati <[email protected]>
In PSA the Signer ID represents the identity of the signer of the firmware component's manifest. So, yes, it is "some company or person", which in PSA's secure boot model is reduced to the thumbprint of a public key. I am happy to extend the type to include other applicable types, i.e.:
and I like the idea of reusing something already specified, but my reading of EAT is that the semantics of |
So I'm thinking of this a bit generally outside of TCG and PSA stuff. That's right, isn't it? There's no requirement that it be used in those contexts, right? If so, the signer/installer gets interpreted in a variety of contexts. It's not very clear to me what signer/installer is. If the end user installs an app, are they the installer? If the component is the chip HW fuse block area, is the device OEM the installer? Who's the installer if you're measuring part of the file system. I assume the installer is distinct from the manufacturer of what is being measured because you're not calling it SW_manufacturer. Maybe you can say more about how the sender should create the signer/installer and what the receiver should do when it gets it. |
(In the future) we want to use this as a replacement for PSA software measurements, so we'd like to be able to losslessly map our current semantics onto it.
In general, yes.
Sure, that shouldn't be too hard. |
@laurencelundblade thanks for the discussion so far. After giving it some more thought, I have made some tentative changes to address your comments. In a nutshell: signers are now optional (i.e., your initial point), and any specific encoding requirements are on the EAT profile that uses measured components. |
I'd like to see some text explaining that the EAT signature will often be the way measurements are protected and authenticated. I think this is a major use case for measured components. It is an efficient way to secure measurements. CoSWIDs can be unsigned, so we're already doing that in EAT measurements, but it is not discussed. The discussion of signed/unsigned manifests in EAT is an example of what should have been there for measurements. |
Closing this as Laurence's original point (i.e., to make signers optional) has been addressed. The discussion on clarifying what the semantics for |
It is completely OK to rely on EAT's signing mechanism to authenticate the measurements.
The text was updated successfully, but these errors were encountered: