Skip to content

Commit 3e58959

Browse files
Editorial cleanup (#73)
Signed-off-by: Steven Bellock <sbellock@nvidia.com>
1 parent 64f4045 commit 3e58959

File tree

2 files changed

+32
-36
lines changed

2 files changed

+32
-36
lines changed

specifications/ietf-eat-profile/bibliography.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ references:
33
title: "DICE Concise Evidence Binding for SPDM"
44
publisher: "Trusted Computing Group"
55
issued:
6-
year: 2020
7-
month: 11
8-
url: "https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Concise-Evidence-Binding-for-SPDM-Version-1.0-Revision-54_pub.pdf"
6+
year: 2025
7+
month: 9
8+
url: "https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Concise-Evidence-Binding-for-SPDM-V1.1_pub.pdf"
99
- id: "ietf-rats-corim"
1010
title: "Concise Reference Integrity Manifest"
1111
publisher: "IETF"
@@ -17,8 +17,8 @@ references:
1717
title: "Security Protocol and Data Model (SPDM) Specification"
1818
publisher: "DMTF"
1919
issued:
20-
year: 2020
21-
month: 11
20+
year: 2024
21+
month: 9
2222
url: "https://www.dmtf.org/sites/default/files/standards/documents/DSP0274_1.3.2.pdf"
2323
- id: "ietf-rfc8152"
2424
title: "CBOR Object Signing and Encryption (COSE)"

specifications/ietf-eat-profile/spec.ocp

Lines changed: 27 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -71,24 +71,24 @@ This specification is sustainable.
7171

7272
# Overview
7373

74-
This profile builds on the **Concise Evidence Binding for SPDM**
74+
This profile builds on the **Concise Evidence (CoEv) Binding for SPDM**
7575
[@{tcg-dice-concise-evidence-binding-for-spdm}] by defining a dedicated
7676
profile. This profile utilizes a **CBOR Web Token (CWT)** that includes claims
7777
as defined by **Entity Attestation Token (EAT)** to ensure the integrity of
7878
CoEv through the implementation of a **COSE_Sign1** data structure.
7979

8080
The document details the binding between the **Security Protocol and Data Model
81-
(SPDM)** and the CWT Data Structure profile tailored for Data Center devices.
81+
(SPDM)** and the CWT Data Structure profile tailored for datacenter devices.
8282
Importantly, while the profile is designed to integrate seamlessly with SPDM as
8383
the message exchange protocol, its usage is not restricted solely to SPDM and
8484
can be applied with other protocols as well.
8585

8686
The primary objective of this specification is to establish a standardized
8787
method for representing evidence that is scalable across a diverse range of
88-
attesters, including **Systems on Chips (SoCs)**, hard drives, and AI
88+
attesters, including **Systems on Chips (SoCs)**, hard drives, and
8989
accelerators. By providing a unified approach, the specification aims to
90-
simplify and streamline the attestation process within complex and
91-
heterogeneous environments.
90+
simplify and streamline the attestation and verification process within complex
91+
and heterogeneous environments.
9292

9393
## Terms and Definitions
9494

@@ -103,23 +103,19 @@ heterogeneous environments.
103103
## Introduction
104104

105105
This specification details how an attester should represent its evidence within
106-
a CBOR Web Token (CWT) Profile. Specifically, the CWT serves as the CBOR
107-
(Concise Binary Object Representation) encoding of an IETF
108-
Entity Attestation Token (EAT), in accordance with the CDDL
109-
(Concise Declarative Data Language) semantics. The specification delineates the
110-
essential set of claims required within the CWT to form a coherent and
106+
a CBOR Web Token profile. Specifically, the CWT serves as the CBOR encoding of an
107+
IETF Entity Attestation Token, in accordance with the CDDL semantics. The specification
108+
delineates the essential set of claims required within the CWT to form a coherent and
111109
interoperable profile.
112110

113111
Moreover, the specification elaborates on the method for transmitting the CWT
114-
via SPDM (Security Protocol and Data Model), as outlined in the "Concise
115-
Evidence Binding for SPDM" [@{tcg-dice-concise-evidence-binding-for-spdm}]. It
116-
is crucial to note that while the profile is designed to work effectively with
117-
SPDM, it is not limited to this protocol and can be employed with alternative
118-
transmission methods as needed.
112+
via SPDM, as outlined in the "Concise Evidence Binding for SPDM" [@{tcg-dice-concise-evidence-binding-for-spdm}].
113+
While the profile is designed to work effectively with SPDM, it is not limited to this
114+
protocol and can be employed with alternative transmission methods as needed.
119115

120116
## Motivation
121117

122-
Data centers are becoming increasingly complex due to the growing number of
118+
Datacenters are becoming increasingly complex due to the growing number of
123119
integrated devices. For Cloud Service Providers (CSPs) and their tenants,
124120
evaluating the security posture of these intricate configurations is vital.
125121
This specification aims to simplify the attestation process by providing a
@@ -143,7 +139,7 @@ verifiers on the recommended claims and appraisal policy methodologies. It is
143139
important to note that this profile does not extend any CDDL, as it uses CDDL
144140
already defined by the IETF CoRIM Draft and DICE Concise Evidence.
145141

146-
The evidence is expressed as a CBOR Web Token (CWT). This profile describes the
142+
The evidence is expressed as a CBOR Web Token. This profile describes the
147143
list of claims that must be included in the CWT and how they should be used.
148144
Additionally, the profile outlines how the COSE_Sign1 fields must be populated
149145
and asserts that the certificate path of the Attestation Key must be included
@@ -159,21 +155,21 @@ mandatory and optional categories to balance attestation requirements with
159155
implementation flexibility.
160156

161157
**Claim Ordering**: To ensure consistent CBOR serialization and maximize
162-
interoperability across different implementations, **all claims MUST**
163-
be reported following the CBOR deterministic encoding requirements as specified
164-
in [@{ietf-rfc8949}].
165-
Specifically, the keys in the CWT map **MUST** be sorted in the bytewise
166-
lexicographic order of their deterministic encodings. This ordering convention
158+
interoperability across different implementations, **all claims MUST**
159+
be reported following the CBOR deterministic encoding requirements as specified
160+
in [@{ietf-rfc8949}].
161+
Specifically, the keys in the CWT map **MUST** be sorted in the bytewise
162+
lexicographic order of their deterministic encodings. This ordering convention
167163
applies to mandatory claims, optional claims, and private claims when present.
168164

169165
**Mandatory Claims (1-6)**: These claims are **REQUIRED** for all attestations
170166
and provide the minimum necessary information for verifier appraisal policies:
171167

172168
1. **issuer** (claim key: 1, encoded as 0x01)
173-
* This claim is used by the attester to bind the EAT to the certificate chain that issued it. It **SHALL** match the SUBJECT Common Name of the Attestation Key (AK) Certificate.
169+
* This claim is used by the attester to bind the EAT to the certificate chain that issued it. It **SHALL** match the SUBJECT Common Name of the Attestation Key Certificate.
174170

175171
2. **cti** (claim key: 7, encoded as 0x07)
176-
* This claim is used by the attester to determine the uniqueness of the token. Refer to [@{ietf-rfc8392}] for acceptable values for this claim
172+
* This claim is used by the attester to establish uniqueness of the token. Refer to [@{ietf-rfc8392}] for acceptable values for this claim
177173

178174
3. **Nonce** (claim key: 10, encoded as 0x0a)
179175
* This claim is used by the attester to ensure the freshness of the response. Refer to [@{ietf-rfc9711}] for acceptable values for this claim
@@ -219,15 +215,15 @@ serve informational purposes:
219215

220216
**Private Claims**: In addition to the standard claims defined above, this
221217
profile allows for up to 5 implementor-specific private claims. These claims
222-
are **OPTIONAL** and **MAY** be included to address vendor-specific requirements
223-
or unique platform characteristics. Private claims **MUST** use claim keys less
224-
than -65536 per RFC 8392. When present, private claims follow the deterministic
225-
encoding order and appear after all standard claims. Each private claim **SHOULD**
218+
are **OPTIONAL** and **MAY** be included to address vendor-specific requirements
219+
or unique platform characteristics. Private claims **MUST** use claim keys less
220+
than -65536 per RFC 8392. When present, private claims follow the deterministic
221+
encoding order and appear after all standard claims. Each private claim **SHOULD**
226222
be limited to 100 bytes in size to ensure efficient transmission and processing.
227223

228224
The following private claim keys are reserved for implementor use:
229225
- **Private claim 1** (claim key: -70002, encoded as 0x3a00011171, optional)
230-
- **Private claim 2** (claim key: -70003, encoded as 0x3a00011172, optional)
226+
- **Private claim 2** (claim key: -70003, encoded as 0x3a00011172, optional)
231227
- **Private claim 3** (claim key: -70004, encoded as 0x3a00011173, optional)
232228
- **Private claim 4** (claim key: -70005, encoded as 0x3a00011174, optional)
233229
- **Private claim 5** (claim key: -70006, encoded as 0x3a00011175, optional)
@@ -251,7 +247,7 @@ requirements or audit needs.
251247
## CWT Integrity Protection
252248

253249
The CWT is protected against integrity breaches and can be cryptographically
254-
authenticated. An **Attestation Key (AK)**, which is managed by the Attester’s
250+
authenticated. An **Attestation Key**, which is managed by the Attester’s
255251
**Root of Trust (RoT)**, is used to sign the **COSE_Sign1** [@{ietf-rfc8152}]
256252
data structure that ensures the integrity of the token.
257253

@@ -271,7 +267,7 @@ Vendor Root CA) or up to the Initial Device Identity (IDEVID).
271267

272268
This profile defines specific cryptographic algorithms that **MUST** be
273269
supported for CWT signing to ensure interoperability and appropriate security
274-
levels for data center environments.
270+
levels for datacenter environments.
275271

276272
### Supported Algorithms
277273

0 commit comments

Comments
 (0)