Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

more words to the abstract and intro section #3

Merged
merged 1 commit into from
Oct 12, 2022
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
48 changes: 41 additions & 7 deletions draft-ftbs-rats-msg-wrap.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,21 +45,57 @@ normative:

informative:
I-D.ietf-rats-architecture: rats-arch
I-D.ietf-rats-eat: rats-eat
I-D.ietf-rats-ar4si: rats-ar4si
I-D.fossati-tls-attestation: tls-a
DICE-arch:
author:
org: "Trusted Computing Group"
title: "DICE Attestation Architecture"
target: https://trustedcomputinggroup.org/wp-content/uploads/DICE-Attestation-Architecture-r23-final.pdf
date: March, 2021

--- abstract

This document defines two encapsulation formats for RATS conceptual
messages.
messages (e.g., evidence, attestation results, endorsements and
reference values.)

--- middle

# Introduction

The RATS architecture defines a handful of conceptual messages
({{Section 8 of -rats-arch}}). Each conceptual message can have multiple
serialization formats ({{Section 9 of -rats-arch}}). The same serialized
message may have to be transported via different protocols - for
example, EAT {{-rats-eat}} evidence in a "background check" topological
arrangement, AR4SI {{-rats-ar4si}} attestation results in "passport"
mode.

In order to minimize the cost associated with registration and maximize
interoperability, it is desirable to reuse their typing information
across such boundaries.

This document defines two encapsulation formats for RATS conceptual
messages ({{Section 8 of -rats-arch}}).
messages that aim to achieve the goals stated above.

These encapsulation formats are designed to be:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wording should say "there are two formats" rather than "designed to have two formats"

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't understand the editorial suggestion. It doesn't seem to apply to L83.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds like the suggested change would be along the lines of

Suggested change
These encapsulation formats are designed to be:
There are two encapsulation formats available:

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes, but that doesn't work with what follows: the bulleted list describes the design criteria of the encaps, not the encaps themselves.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah, right, I see now!

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

closing this and merging.


TODO use cases (TLS, cert extensions, long-term storage, use in API
payloads, other)
* Self-describing - which removes the dependency on the framing provided
by the embedding protocol (or the storage system) to convey exact
typing information.

* Based on media types - which allows amortising their registration cost
across many different usage scenarios.

A protocol designer could use these formats, for example, to convey
evidence, endorsements or reference values in certificates and CRLs
extensions ({{DICE-arch}}), to embed attesation results or evidence as
first class authentication credentials in TLS handshake messages
{{-tls-a}}, to transport attestation-related payloads in RESTful APIs,
or for stable storage of attestation results in form of file system
objects.

# Conventions and Definitions

Expand Down Expand Up @@ -104,7 +140,7 @@ When using CBOR, the value field is serialized as a CBOR bytes string.

If a CoAP Content Format exists for the RATS conceptual message, the
TN() transform defined in {{Appendix B of RFC9277}} can be used to
derive a CBOR tag in range [1668546817, 1668612095].
derive a CBOR tag in range \[1668546817, 1668612095\].

# Examples

Expand Down Expand Up @@ -149,5 +185,3 @@ TODO IANA
{:numbered="false"}

TODO acknowledge.

- vim: tw=72 ts=4 sw=4 et