You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: specifications/ietf-eat-profile/spec.ocp
+27-31Lines changed: 27 additions & 31 deletions
Original file line number
Diff line number
Diff line change
@@ -71,24 +71,24 @@ This specification is sustainable.
71
71
72
72
# Overview
73
73
74
-
This profile builds on the **Concise Evidence Binding for SPDM**
74
+
This profile builds on the **Concise Evidence (CoEv) Binding for SPDM**
75
75
[@{tcg-dice-concise-evidence-binding-for-spdm}] by defining a dedicated
76
76
profile. This profile utilizes a **CBOR Web Token (CWT)** that includes claims
77
77
as defined by **Entity Attestation Token (EAT)** to ensure the integrity of
78
78
CoEv through the implementation of a **COSE_Sign1** data structure.
79
79
80
80
The document details the binding between the **Security Protocol and Data Model
81
-
(SPDM)** and the CWT Data Structure profile tailored for Data Center devices.
81
+
(SPDM)** and the CWT Data Structure profile tailored for datacenter devices.
82
82
Importantly, while the profile is designed to integrate seamlessly with SPDM as
83
83
the message exchange protocol, its usage is not restricted solely to SPDM and
84
84
can be applied with other protocols as well.
85
85
86
86
The primary objective of this specification is to establish a standardized
87
87
method for representing evidence that is scalable across a diverse range of
88
-
attesters, including **Systems on Chips (SoCs)**, hard drives, and AI
88
+
attesters, including **Systems on Chips (SoCs)**, hard drives, and
89
89
accelerators. By providing a unified approach, the specification aims to
90
-
simplify and streamline the attestation process within complex and
91
-
heterogeneous environments.
90
+
simplify and streamline the attestation and verification process within complex
91
+
and heterogeneous environments.
92
92
93
93
## Terms and Definitions
94
94
@@ -103,23 +103,19 @@ heterogeneous environments.
103
103
## Introduction
104
104
105
105
This specification details how an attester should represent its evidence within
106
-
a CBOR Web Token (CWT) Profile. Specifically, the CWT serves as the CBOR
107
-
(Concise Binary Object Representation) encoding of an IETF
108
-
Entity Attestation Token (EAT), in accordance with the CDDL
109
-
(Concise Declarative Data Language) semantics. The specification delineates the
110
-
essential set of claims required within the CWT to form a coherent and
106
+
a CBOR Web Token profile. Specifically, the CWT serves as the CBOR encoding of an
107
+
IETF Entity Attestation Token, in accordance with the CDDL semantics. The specification
108
+
delineates the essential set of claims required within the CWT to form a coherent and
111
109
interoperable profile.
112
110
113
111
Moreover, the specification elaborates on the method for transmitting the CWT
114
-
via SPDM (Security Protocol and Data Model), as outlined in the "Concise
115
-
Evidence Binding for SPDM" [@{tcg-dice-concise-evidence-binding-for-spdm}]. It
116
-
is crucial to note that while the profile is designed to work effectively with
117
-
SPDM, it is not limited to this protocol and can be employed with alternative
118
-
transmission methods as needed.
112
+
via SPDM, as outlined in the "Concise Evidence Binding for SPDM" [@{tcg-dice-concise-evidence-binding-for-spdm}].
113
+
While the profile is designed to work effectively with SPDM, it is not limited to this
114
+
protocol and can be employed with alternative transmission methods as needed.
119
115
120
116
## Motivation
121
117
122
-
Data centers are becoming increasingly complex due to the growing number of
118
+
Datacenters are becoming increasingly complex due to the growing number of
123
119
integrated devices. For Cloud Service Providers (CSPs) and their tenants,
124
120
evaluating the security posture of these intricate configurations is vital.
125
121
This specification aims to simplify the attestation process by providing a
@@ -143,7 +139,7 @@ verifiers on the recommended claims and appraisal policy methodologies. It is
143
139
important to note that this profile does not extend any CDDL, as it uses CDDL
144
140
already defined by the IETF CoRIM Draft and DICE Concise Evidence.
145
141
146
-
The evidence is expressed as a CBOR Web Token (CWT). This profile describes the
142
+
The evidence is expressed as a CBOR Web Token. This profile describes the
147
143
list of claims that must be included in the CWT and how they should be used.
148
144
Additionally, the profile outlines how the COSE_Sign1 fields must be populated
149
145
and asserts that the certificate path of the Attestation Key must be included
@@ -159,21 +155,21 @@ mandatory and optional categories to balance attestation requirements with
159
155
implementation flexibility.
160
156
161
157
**Claim Ordering**: To ensure consistent CBOR serialization and maximize
162
-
interoperability across different implementations, **all claims MUST**
163
-
be reported following the CBOR deterministic encoding requirements as specified
164
-
in [@{ietf-rfc8949}].
165
-
Specifically, the keys in the CWT map **MUST** be sorted in the bytewise
166
-
lexicographic order of their deterministic encodings. This ordering convention
158
+
interoperability across different implementations, **all claims MUST**
159
+
be reported following the CBOR deterministic encoding requirements as specified
160
+
in [@{ietf-rfc8949}].
161
+
Specifically, the keys in the CWT map **MUST** be sorted in the bytewise
162
+
lexicographic order of their deterministic encodings. This ordering convention
167
163
applies to mandatory claims, optional claims, and private claims when present.
168
164
169
165
**Mandatory Claims (1-6)**: These claims are **REQUIRED** for all attestations
170
166
and provide the minimum necessary information for verifier appraisal policies:
171
167
172
168
1. **issuer** (claim key: 1, encoded as 0x01)
173
-
* This claim is used by the attester to bind the EAT to the certificate chain that issued it. It **SHALL** match the SUBJECT Common Name of the Attestation Key (AK) Certificate.
169
+
* This claim is used by the attester to bind the EAT to the certificate chain that issued it. It **SHALL** match the SUBJECT Common Name of the Attestation Key Certificate.
174
170
175
171
2. **cti** (claim key: 7, encoded as 0x07)
176
-
* This claim is used by the attester to determine the uniqueness of the token. Refer to [@{ietf-rfc8392}] for acceptable values for this claim
172
+
* This claim is used by the attester to establish uniqueness of the token. Refer to [@{ietf-rfc8392}] for acceptable values for this claim
177
173
178
174
3. **Nonce** (claim key: 10, encoded as 0x0a)
179
175
* This claim is used by the attester to ensure the freshness of the response. Refer to [@{ietf-rfc9711}] for acceptable values for this claim
0 commit comments