Internet-Draft | EAR | April 2024 |
Fossati, et al. | Expires 23 October 2024 | [Page] |
This document defines the EAT Attestation Result (EAR) message format.¶
EAR is used by a verifier to encode the result of the appraisal over an attester's evidence. It embeds an AR4SI's "trustworthiness vector" to present a normalized view of the evaluation results, thus easing the task of defining and computing authorization policies by relying parties. Alongside the trustworthiness vector, EAR provides contextual information bound to the appraisal process. This allows a relying party (or an auditor) to reconstruct the frame of reference in which the trustworthiness vector was originally computed. EAR supports simple devices with one attester as well as composite devices that are made of multiple attesters, allowing the state of each attester to be separately examined. EAR can also accommodate registered and unregistered extensions. It can be serialized and protected using either CWT or JWT.¶
This note is to be removed before publishing as an RFC.¶
The latest revision of this draft can be found at https://thomas-fossati.github.io/draft-ear/draft-fv-rats-ear.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-fv-rats-ear/.¶
Discussion of this document takes place on the Remote ATtestation ProcedureS Working Group mailing list (mailto:rats@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/rats/. Subscribe at https://www.ietf.org/mailman/listinfo/rats/.¶
Source for this draft and an issue tracker can be found at https://github.com/thomas-fossati/draft-ear.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 23 October 2024.¶
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
This document defines the EAT [I-D.ietf-rats-eat] Attestation Result (EAR) message format.¶
EAR is used by a verifier to encode the result of the appraisal over an attester's evidence. It embeds an AR4SI's "trustworthiness vector" [I-D.ietf-rats-ar4si] to present a normalized view of the evaluation results, thus easing the task of defining and computing authorization policies by relying parties. Alongside the trustworthiness vector, EAR provides contextual information bound to the appraisal process. This allows a relying party (or an auditor) to reconstruct the frame of reference in which the trustworthiness vector was originally computed. EAR supports simple devices with one attester as well as composite devices that are made of multiple attesters (see Section 3.3 of [RFC9334]) allowing the state of each attester to be separately examined. EAR can also accommodate registered and unregistered extensions. It can be serialized and protected using either CWT [RFC8392] or JWT [RFC7519].¶
This document uses terms and concepts defined by the RATS architecture. For a complete glossary see Section 4 of [RFC9334].¶
The terminology from CBOR [STD94], CDDL [RFC8610] and COSE [STD96] applies; in particular, CBOR diagnostic notation is defined in Section 8 of [STD94] and Appendix G of [RFC8610].¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
EAR is an EAT token which can be serialized as JWT [RFC7519] or CWT [RFC8392].¶
The EAR claims-set is as follows:¶
Where:¶
eat.profile
(mandatory)The EAT profile (Section 6 of [I-D.ietf-rats-eat]) associated with the EAR claims-set
and encodings defined by this document.
It MUST be the following tag URI ([RFC4151])
tag:github.com,2023:veraison/ear
.¶
iat
(mandatory)"Issued At" claim -- the time at which the EAR is issued. See Section 4.1.6 of [RFC7519] and Section 4.3.1 of [I-D.ietf-rats-eat] for the EAT-specific encoding restrictions (i.e., disallowing the floating point representation).¶
ear.verifier-id
(mandatory)Identifying information about the appraising verifier. See Section 3.1 for further details on its structure and serialization.¶
ear.raw-evidence
(optional)The unabridged evidence submitted for appraisal, including any signed container/envelope. This field may be consumed by other Verifiers in multi-stage verification scenarios or by auditors. There are privacy considerations associated with this claim. See Section 8.¶
eat.submods
(mandatory)A submodule map (Section 4.2.18 of [I-D.ietf-rats-eat]) holding one EAR-appraisal
for
each separately appraised attester.
The map MUST contain at least one entry.
For each appraised attester the verifier chooses a unique label.
For example, when evidence is in EAT format, the label could be constructed
from the associated EAT profile.
A verifier SHOULD publicly and permanently document its labelling scheme for
each supported evidence type, unless EAR payloads are produced and consumed
entirely within a private deployment.
See Section 3.2 for the details about the contents of an
EAR-appraisal
.¶
eat.nonce
(optional)A user supplied nonce that is echoed by the verifier to provide freshness. The nonce is a sequence of bytes between 8 and 64 bytes long. When serialized as JWT, the nonce MUST be base64 encoded, resulting in a string between 12 and 88 bytes long. See Section 4.1 of [I-D.ietf-rats-eat].¶
$$ear-extension
(optional)Any registered or unregistered extension. An EAR extension MUST be a map. See Section 4 for further details.¶
Section 2.2.2 of [I-D.ietf-rats-ar4si] defines an information model for identifying the
software that runs the verifier. The ar4si.verifier-id
claim provides its
serialization as follows:¶
Where:¶
ear.status
(mandatory)The overall appraisal status for this attester represented as one of the four trustworthiness tiers (Section 3.2.2). The value of this claim MUST be set to a tier of no higher trust than the tier corresponding to the worst trustworthiness claim across the entire trustworthiness vector.¶
ear.trustworthiness-vector
(optional)The AR4SI trustworthiness vector providing the breakdown of the appraisal for
this attester.
See Section 3.2.1 for the details.
This claim MUST be present unless the party requesting Evidence appraisal
explicitly asks for it to be dropped, e.g., via an API parameter or similar
arrangement. Such consumer would therefore rely entirely on the semantics of
the ear.status
claim. This behaviour is NOT RECOMMENDED because of the
resulting loss of quality of the appraisal result.¶
ear.appraisal-policy-id
(optional)An unique identifier of the appraisal policy used to evaluate the attestation result.¶
$$ear-appraisal-extension
(optional)Any registered or unregistered extension. An EAR appraisal extension MUST be a map. See Section 4 for further details.¶
The ar4si-trustworthiness-vector
claim is an embodiment of the AR4SI
trustworthiness vector (Section 2.3.5 of [I-D.ietf-rats-ar4si]) and it is defined as
follows:¶
It contains an entry for each one of the eight AR4SI appraisals that have been
conducted on the submitted evidence (Section 2.3.4 of [I-D.ietf-rats-ar4si]).
The value of each entry is chosen in the -128..127 range according to the rules
described in Sections 2.3.3 and 2.3.4 of [I-D.ietf-rats-ar4si].
All categories are optional.
A missing entry means that the verifier makes no claim about this specific
appraisal facet because the category is not applicable to the submitted
evidence.
As required by the non-empty
macro, at least one entry MUST be present in the
vector.¶
The trust tier type represents one of the equivalency classes in which the
$ar4si-trustworthiness-claim
space is partitioned.
See Section 2.3.2 of [I-D.ietf-rats-ar4si] for the details.
The allowed values for the type are as follows:¶
To serialize the EAR claims-set in JSON format, the following substitutions are applied to the encoding-agnostic CDDL definitions in Section 3, Section 3.2.1 and Section 3.2.2:¶
; $ar4si.trust-tier choice ar4si.trust-tier-none = "none" ar4si.trust-tier-affirming = "affirming" ar4si.trust-tier-warning = "warning" ar4si.trust-tier-contraindicated = "contraindicated" ; EAR JWT claims ear.status = "ear.status" ear.trustworthiness-vector = "ear.trustworthiness-vector" ear.raw-evidence = "ear.raw-evidence" ear.appraisal-policy-id = "ear.appraisal-policy-id" ear.verifier-id = "ear.verifier-id" ; EAT JWT claims eat.profile = "eat_profile" eat.nonce = "eat_nonce" eat.submods = "submods" ; JWT claims iat = "iat" ; ar4si.trustworthiness-vector instance-identity = "instance-identity" configuration = "configuration" executables = "executables" file-system = "file-system" hardware = "hardware" runtime-opaque = "runtime-opaque" storage-opaque = "storage-opaque" sourced-data = "sourced-data" ; JSON types mapping ear-bytes = text .regexp "[A-Za-z0-9_=-]+" ear-label = text ; ar4si.verifier-id labels developer = "developer" build = "build" ; EAT eat.nonce-type = base64-url-text .size (12..88)¶
The example in Figure 6 shows an EAR claims-set corresponding to a "contraindicated" appraisal, meaning the verifier has found some problems with the attester's state reported in the submitted evidence. Specifically, the identified issue is related to unauthorized code or configuration loaded in runtime memory (i.e., value 96 in the executables category). The appraisal is for a device with one attester labelled "PSA". Note that in case there is only one attester, the labelling can be freely chosen because there is no ambiguity.¶
The breakdown of the trustworthiness vector is as follows:¶
Instance Identity (affirming): recognized and not compromised¶
Configuration (warning): known vulnerabilities¶
Executables (contraindicated): contraindicated run-time¶
File System (none): no claim being made¶
Hardware (affirming): genuine¶
Runtime Opaque (none): no claim being made¶
Storage Opaque (none): no claim being made¶
Sourced Data (none): no claim being made¶
The example in Figure 7 contains the appraisal for a composite device with two attesters named "CCA Platform" and "CCA Realm" respectively. Both attesters have either "affirming" or (implicit) "none" values in their associated trustworthiness vectors. Note that the "none" values can refer to either an AR4SI category that is unapplicable for the specific attester (ideally, the applicability should be specified by the evidence format itself), or to the genuine lack of information at the attester site regarding the specific category. For example, the reference values for the "CCA Realm" executables (i.e., the confidential computing workload) may not be known to the CCA platform verifier. In such cases, it is up to the downstream entity (typically, the relying party) to complete the partial appraisal.¶
; $ar4si.trust-tier code-points ar4si.trust-tier-none = 0 ar4si.trust-tier-affirming = 2 ar4si.trust-tier-warning = 32 ar4si.trust-tier-contraindicated = 96 ; EAR CWT claims ear.status = 1000 ear.trustworthiness-vector = 1001 ear.raw-evidence = 1002 ear.appraisal-policy-id = 1003 ear.verifier-id = 1004 ; EAT CWT claims eat.profile = 265 eat.nonce = 10 eat.submods= 266 ; CWT claims iat = 6 ; ar4si.trustworthiness-vector keys instance-identity = 0 configuration = 1 executables = 2 file-system = 3 hardware = 4 runtime-opaque = 5 storage-opaque = 6 sourced-data = 7 ; CBOR type mappings ear-bytes = bytes ear-label = int / text ; ar4si.verifier-id keys developer = 0 build = 1 ; EAT eat.nonce-type = bytes .size (8..64)¶
EAR provides core semantics for describing the result of appraising attestation
evidence.
However, a given application may offer extra functionality to its relying
parties, or tailor the attestation result to the needs of the application (e.g.,
TEEP [I-D.ietf-teep-protocol]).
To accommodate such cases, both EAR
and EAR-appraisal
claims-sets can be
extended by plugging new claims into the $$ear-extension
(or
$$ear-appraisal-extension
, respectively) CDDL socket.¶
The rules that govern extensibility of EAR are those defined in [RFC8392] and [RFC7519] for CWTs and JWTs respectively.¶
An extension MUST NOT change the semantics of the EAR
and EAR-appraisal
claims-sets.¶
A receiver MUST ignore any unknown claim.¶
An application-specific extension will normally mint its claim from the "private space" - using integer values less than -65536 for CWT, and Public or Private Claim Names as defined in Sections 4.2 and 4.3 of [RFC7519] when serializing to JWT.¶
It is RECOMMENDED that JWT EARs use Collision-Resistant Public Claim Names (Section 2 of [RFC7519]) rather than Private Claim Names.¶
If an extension will be used across multiple applications, or is intended to be used across multiple environments, the associated extension claims SHOULD be registered in one, or both, the CWT and JWT claim registries.¶
In general, if the registration policy requires an accompanying specification document (as it is the case for "specification required" and "standards action"), such document SHOULD explicitly say that the extension is expected to be used in EAR claims-sets identified by this profile.¶
An up-to-date view of the registered claims can be obtained via the [IANA.cwt] and [IANA.jwt] registries.¶
If an extension supports functionality of a specific application (e.g. Project Veraison Services), its claims MAY be registered.¶
If an extension supports a protocol that may be applicable across multiple applications or environments (e.g., TEEP), its claims SHOULD be registered.¶
Since, in general, there is no guarantee that an application will be confined within an environment, it is RECOMMENDED that extension claims that have meaning outside the application's context are always registered.¶
It is also possible that claims that start out as application-specific acquire a more stable meaning over time. In such cases, it is RECOMMENDED that new equivalent claims are created in the "public space" and are registered as described in Section 4.2. The original "private space" claims SHOULD then be deprecated by the application.¶
The TEEP protocol [I-D.ietf-teep-protocol] specifies the required claims that an attestation result must carry for a TAM (Trusted Application Manager) to make decisions on how to remediate a TEE (Trusted Execution Environment) that is out of compliance, or update a TEE that is requesting an authorized change.¶
The list is provided in Section 4.3.1 of [I-D.ietf-teep-protocol].¶
EAR defines a TEEP application extension for the purpose of conveying such claims.¶
ear.teep-claims = "ear.teep-claims" eat.ueid = "ueid" eat.oemid = "oemid" eat.hardware-model = "hwmodel" eat.hardware-version = "hwversion" eat.manifests = "manifests" ; cddl(1)-unsupported: .size (12..44) eat.ueid-type = base64-url-text eat.oemid-type = oemid-pen / oemid-ieee / oemid-random ; cddl(1)-unsupported: .size (4..44) eat.hardware-model-type = base64-url-text eat.hardware-version-type = [ version: tstr, ? scheme: $version-scheme ] eat.manifests-type = [ + manifest-format ] manifest-format = [ content-type: coap-content-format, content-format: base64-url-text / text ] coap-content-format = uint .le 65535 oemid-pen = int ; cddl(1)-unsupported: .size 4 oemid-ieee = base64-url-text ; cddl(1)-unsupported: .size 24 oemid-random = base64-url-text¶
Example:¶
{ "eat_profile": "tag:github.com,2023:veraison/ear", "iat": 1666529184, "ear.verifier-id": { "developer": "https://veraison-project.org", "build": "vts 0.0.1" }, "ear.raw-evidence": "NzQ3MjY5NzM2NTYzNzQK", "submods": { "PSA": { "ear.status": "contraindicated", "ear.trustworthiness-vector": { "instance-identity": 2, "executables": 96, "hardware": 2 }, "ear.appraisal-policy-id": "https://veraison.example/policy/1/60a0068d", "ear.teep-claims": { "eat_nonce": "80FH7byS7VjfARIq0_KLqu6B9j-F79QtV6p", "ueid": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyAh", "oemid": "Av8B", "hwmodel": "fJYq", "hwversion": ["1.2.5", 16384] } } } }¶
ear.teep-claims = 65000 eat.ueid = 256 eat.oemid = 258 eat.hardware-model = 259 eat.hardware-version = 260 eat.manifests = 273 ; XXX provisional eat.ueid-type = bytes .size (7..33) eat.oemid-type = oemid-pen / oemid-ieee / oemid-random eat.hardware-model-type = bytes .size (1..32) eat.hardware-version-type = [ version: text ? scheme: $version-scheme ] eat.manifests-type = [ + manifest-format ] manifest-format = [ content-type: coap-content-format content-format: bytes .cbor untagged-coswid ] coap-content-format = uint .le 65535 untagged-coswid = bytes ; XXX should import coswid oemid-pen = int oemid-ieee = bytes .size 3 oemid-random = bytes .size 16¶
Example:¶
{ 265: "tag:github.com,2023:veraison/ear", 6: 1666529184, 1004: { 0: "https://veraison-project.org", 1: "vts 0.0.1" }, 1002: h'6C696665626F61746D616E', 266: { "PSA": { 1000: 0, 1001: { 0: 2, 1: 2, 2: 2, 4: 2 }, 1003: "https://veraison.example/policy/1/60a0068d", 65000: { 10: h'948f8860d13a463e', 256: h'0198f50a4ff6c05861c8860d13a638ea', 258: 64242, 259: h'ee80f5a66c1fb9742999a8fdab930893', 260: ["1.2.5", 16384] } } } }¶
The Project Veraison verifier defines three private, application-specific extensions:¶
ear.veraison.annotated-evidence
JSON representation of the evidence claims-set, including any annotations provided by the Project Veraison verifier. There are privacy considerations associated with this claim. See Section 8.¶
ear.veraison.policy-claims
any extra claims added by the policy engine in the Project Veraison verifier.¶
ear.veraison.key-attestation
contains the public key part of a successfully verified attested key. The key is a DER encoded ASN.1 SubjectPublicKeyInfo structure (Section 4.1.2.7 of [RFC5280]).¶
ear.veraison.annotated-evidence = "ear.veraison.annotated-evidence" ear.veraison.policy-claims = "ear.veraison.policy-claims" ear.veraison.key-attestation = "ear.veraison.key-attestation" ear.veraison.attested-key-public = "akpub"¶
Example:¶
{ "eat_profile": "tag:github.com,2023:veraison/ear", "iat": 1666529184, "ear.verifier-id": { "developer": "https://veraison-project.org", "build": "vts 0.0.1" }, "ear.raw-evidence": "NzQ3MjY5NzM2NTYzNzQK", "submods": { "PSA_IOT": { "ear.status": "contraindicated", "ear.trustworthiness-vector": { "instance-identity": 2, "executables": 96, "hardware": 2 }, "ear.appraisal-policy-id": "https://veraison.example/policy/1/60a0068d", "ear.veraison.annotated-evidence": { "eat-profile": "http://arm.com/psa/2.0.0", "psa-client-id": 1, "psa-security-lifecycle": 12288, "psa-implementation-id": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=", "psa-software-components": [ { "measurement-value": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=", "signer-id": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=" }, { "measurement-value": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=", "signer-id": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=" } ], "psa-nonce": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=", "psa-instance-id": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyAh", "psa-certification-reference": "1234567890123-12345" }, "ear.veraison.policy-claims": { "psa-certified": { "certificate-number": "1234567890123-12345", "date-of-issue": "23/06/2022", "test-lab": "Riscure", "certification-holder": "ACME Inc.", "certified-product": "RoadRunner", "hardware-version": "Gizmo v1.0.2", "software-version": "TrustedFirmware-M v1.0.6", "certification-type": "PSA Certified Level 1 v2.1", "developer-type": "PSA Certified – Device" } } } } }¶
Key attestation example:¶
{ "eat_profile": "tag:github.com,2023:veraison/ear", "iat": 1666529184, "ear.verifier-id": { "developer": "https://veraison-project.org", "build": "vts 0.0.1" }, "ear.raw-evidence": "NzQ3MjY5NzM2NTYzNzQK", "submods": { "PARSEC_TPM": { "ear.status": "affirming", "ear.trustworthiness-vector": { "instance-identity": 2, "executables": 2, "hardware": 2 }, "ear.appraisal-policy-id": "https://veraison.example/policy/1/60a0068d", "ear.veraison.key-attestation": { "akpub": "MFkwEwYHKoZIzj0CAQYIKoZIz___" } } } }¶
ear.veraison.annotated-evidence = -70000 ear.veraison.policy-claims = -70001 ear.veraison.key-attestation = -70002 ear.veraison.attested-key-public = 0¶
Example:¶
{ 265: "tag:github.com,2023:veraison/ear", 6: 1666529184, 1004: { 0: "https://veraison-project.org", 1: "vts 0.0.1" }, 1002: h'6C696665626F61746D616E', 266: { "PSA_IOT": { 1000: 0, 1001: { 0: 2, 1: 2, 2: 2, 4: 2 }, 1003: "https://veraison.example/policy/1/60a0068d", -70000: { "eat-profile": "http://arm.com/psa/2.0.0", "psa-client-id": 1, "psa-security-lifecycle": 12288, "psa-implementation-id": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=", "psa-software-components": [ { "measurement-value": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=", "signer-id": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=" }, { "measurement-value": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=", "signer-id": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=" } ], "psa-nonce": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA=", "psa-instance-id": "AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyAh", "psa-certification-reference": "1234567890123-12345" }, -70001: { "psa-certified": { "certificate-number": "1234567890123-12345", "date-of-issue": "23/06/2022", "test-lab": "Riscure", "certification-holder": "ACME Inc.", "certified-product": "RoadRunner", "hardware-version": "Gizmo v1.0.2", "software-version": "TrustedFirmware-M v1.0.6", "certification-type": "PSA Certified Level 1 v2.1", "developer-type": "PSA Certified – Device" } } } } }¶
Media types for EAR are automatically derived from the base EAT media type [I-D.ietf-rats-eat-media-type] using the profile string defined in Section 3.¶
For example, a JWT serialization would use:¶
application/eat-jwt; eat_profile="tag:github.com,2023:veraison/ear"¶
A CWT serialization would instead use:¶
application/eat-cwt; eat_profile="tag:github.com,2023:veraison/ear"¶
This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in [RFC7942]. The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs. Please note that the listing of any individual implementation here does not imply endorsement by the IETF. Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors. This is not intended as, and must not be construed to be, a catalog of available implementations or their features. Readers are advised to note that other implementations may exist.¶
According to [RFC7942], "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature. It is up to the individual working groups to use this information as they see fit".¶
The organization responsible for this implementation is Project Veraison, a Linux Foundation project hosted at the Confidential Computing Consortium.¶
The organization currently provides two separate implementations: one in Golang another in C17.¶
The developers can be contacted on the Zulip channel: https://veraison.zulipchat.com/#narrow/stream/357929-EAR/.¶
github.com/veraison/ear
The software, hosted at https://github.com/veraison/ear, provides a Golang
package that allows encoding, decoding, signing and verification of EAR
payloads together with a CLI (arc
) to create, verify and visualize EARs on
the command line.
The maturity level is currently alpha, and only the JWT serialization is
implemented.
The license is Apache 2.0.
The package is used by the Project Veraison verifier to produce attestation
results.¶
github.com/veraison/c-ear
The software, hosted at https://github.com/veraison/c-ear, provides a C17 library that allows verification and partial decoding of EAR payloads. The maturity level is currently pre-alpha, and only the JWT serialization is implemented. The license is Apache 2.0. The library targets relying party applications that need to verify attestation results.¶
github.com/veraison/rust-ear
The software, hosted at https://github.com/veraison/rust-ear, provides a Rust (2021 edition) library that allows verification and partial decoding of EAR payloads. The maturity level is currently pre-alpha, with limitted algorithm support. Both JWT and COSE serializations are implemented. The license is Apache 2.0. The library targets verifiers that need to produce attestation results as well as relying party applications that need to verify and consume attestation results.¶
TODO Security¶
EAR is designed to expose as little identifying information as possible about the attester. However, certain EAR claims have direct privacy implications. Implementations should therefore allow applying privacy-preserving techniques to those claims, for example allowing their redaction, anonymisation or outright removal. Specifically:¶
It SHOULD be possible to disable inclusion of the optional ear.raw-evidence
claim¶
It SHOULD be possible to disable inclusion of the optional
ear.veraison.annotated-evidence
claim¶
It SHOULD be possible to allow redaction, anonymisation or removal of
specific claims from the ear.veraison.annotated-evidence
object¶
EAR is an EAT, therefore the privacy considerations in Section 8 of [I-D.ietf-rats-eat] apply.¶
This specification adds the following values to the "JSON Web Token Claims" registry [IANA.jwt] and the "CBOR Web Token Claims" registry [IANA.cwt].¶
Each entry below is an addition to both registries.¶
The "Claim Description", "Change Controller" and "Specification Documents" are common and equivalent for the JWT and CWT registries. The "Claim Key" and "Claim Value Types(s)" are for the CWT registry only. The "Claim Name" is as defined for the CWT registry, not the JWT registry. The "JWT Claim Name" is equivalent to the "Claim Name" in the JWT registry.¶
TODO¶
non-empty
A CDDL generic that can be used to ensure the presence of at least one item in an object with only optional fields.¶
non-empty<M> = (M) .within ({ + any => any })¶
base64-url-text
Base64 encoding using the URL- and filename-safe character set defined in Section 5 of [RFC4648], with all trailing '=' characters omitted (as permitted by Section 3.2) and without the inclusion of any line breaks, whitespace, or other additional characters.¶
base64-url-text = tstr .regexp "[A-Za-z0-9_-]+"¶
Open Policy Agent OPA is a popular and flexible policy engine that is used in a variety of contexts, from cloud to IoT. OPA policies are written using a purpose-built, declarative programming language called Rego. Rego has been designed to handle JSON claim-sets and their JWT envelopes as first class objects, which makes it an excellent fit for dealing with JWT EARs.¶
The following example illustrates an OPA policy that a Relying Party would use to make decisions based on a JWT EAR received from a trusted verifier.¶
package ear ear_appraisal = { "verified": signature_verified, "appraisal-status": status, "trustworthiness-vector": trust_vector, } { # verify EAR signature is correct and from one of the known and # trusted verifiers signature_verified := io.jwt.verify_es256( input.ear_token, json.marshal(input.trusted_verifiers) ) # extract the EAR claims-set [_, payload, _] := io.jwt.decode(input.ear_token) # access the attester-specific appraisal record app_rec := payload.submods.PARSEC_TPM status := app_rec["ear.status"] == "affirming" # extract the trustworhiness vector for further inspection trust_vector := app_rec["ear.trustworthiness-vector"] } # add further conditions on the trust_vector here # ...¶
The result of the policy appraisal is the following JSON object:¶
{ "ear_appraisal": { "appraisal-status": true, "trustworthiness-vector": { "executables": 2, "hardware": 2, "instance-identity": 2 }, "verified": true } }¶
For completeness, the trusted verifier public key and the EAR JWT used in the example are provided below.¶
=============== NOTE: '\' line wrapping per RFC 8792 ================ { "ear_token": "eyJhbGciOiJFUzI1NiIsInR5cCI6IkpXVCJ9.eyJlYXIucmF3L\ WV2aWRlbmNlIjoiTnpRM01qWTVOek0yTlRZek56UUsiLCJlYXIudmVyaWZpZXItaWQiO\ nsiYnVpbGQiOiJ2dHMgMC4wLjEiLCJkZXZlbG9wZXIiOiJodHRwczovL3ZlcmFpc29uL\ XByb2plY3Qub3JnIn0sImVhdF9wcm9maWxlIjoidGFnOmdpdGh1Yi5jb20sMjAyMzp2Z\ XJhaXNvbi9lYXIiLCJpYXQiOjEuNjY2NTI5MTg0ZSswOSwianRpIjoiNTViOGIzZmFkO\ GRkMWQ4ZWFjNGU0OGYxMTdmZTUwOGIxMWY4NDRkOWYwMTg5YmZlZDliODc1MTVhNjc1N\ DI2NCIsIm5iZiI6MTY3NzI0Nzg3OSwic3VibW9kcyI6eyJQQVJTRUNfVFBNIjp7ImVhc\ i5hcHByYWlzYWwtcG9saWN5LWlkIjoiaHR0cHM6Ly92ZXJhaXNvbi5leGFtcGxlL3Bvb\ GljeS8xLzYwYTAwNjhkIiwiZWFyLnN0YXR1cyI6ImFmZmlybWluZyIsImVhci50cnVzd\ HdvcnRoaW5lc3MtdmVjdG9yIjp7ImV4ZWN1dGFibGVzIjoyLCJoYXJkd2FyZSI6Miwia\ W5zdGFuY2UtaWRlbnRpdHkiOjJ9LCJlYXIudmVyYWlzb24ua2V5LWF0dGVzdGF0aW9uI\ jp7ImFrcHViIjoiTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFY2pTc\ DhfTVdNM2d5OFR1Z1dPMVRwUVNqX3ZJa3NMcEMtZzhsNVMzbHBHYjdQV1dHb0NBakVQO\ F9BNTlWWndMWGd3b1p6TjBXeHVCUGpwYVdpV3NmQ1EifX19fQ.3Ym-f1LEgamxePUM7h\ 6Y2RJDGh9eeL0xKor0n1wE9jdAnLNwm3rTKFV2S2LbqVFoDtK9QGalT2t5RnUdfwZNmg\ ", "trusted_verifiers": { "keys": [ { "alg": "ES256", "crv": "P-256", "kty": "EC", "x": "usWxHK2PmfnHKwXPS54m0kTcGJ90UiglWiGahtagnv8", "y": "IBOL-C3BttVivg-lSreASjpkttcsz-1rb7btKLv8EX4" } ] } }¶
Note to RFC Editor: please remove before publication.¶
The list of currently open issues for this documents can be found at https://github.com/thomas-fossati/draft-ear/issues.¶
Note to RFC Editor: please remove before publication.¶
Initial release.¶
align JWT and CWT representations of eat_nonce¶
Many thanks to Dave Thaler, Greg Kostal, Simon Frost, Yogesh Deshpande for helpful comments and discussions that have shaped this document.¶