Skip to content

Commit

Permalink
Merge pull request #284 from ietf-teep/eat-mandatory-claims
Browse files Browse the repository at this point in the history
Make EAT claims mandatory
  • Loading branch information
mcd500 committed Dec 8, 2022
2 parents 7b314fd + eca805a commit 53f3f08
Showing 1 changed file with 26 additions and 17 deletions.
43 changes: 26 additions & 17 deletions draft-ietf-teep-protocol.md
Original file line number Diff line number Diff line change
Expand Up @@ -587,9 +587,9 @@ for the Verifier to use when generating Attestation Results of some form:
| Freshness proof | nonce | {{Section 4.1 of I-D.ietf-rats-eat}} |
| Device unique identifier | ueid | {{Section 4.2.1 of I-D.ietf-rats-eat}} |
| Vendor of the device | oemid | {{Section 4.2.3 of I-D.ietf-rats-eat}} |
| Class of the device | hardware-model | {{Section 4.2.4 of I-D.ietf-rats-eat}} |
| TEE hardware type | hardware-version | {{Section 4.2.5 of I-D.ietf-rats-eat}} |
| TEE hardware version | hardware-version | {{Section 4.2.5 of I-D.ietf-rats-eat}} |
| Class of the device | hwmodel | {{Section 4.2.4 of I-D.ietf-rats-eat}} |
| TEE hardware type | hwversion | {{Section 4.2.5 of I-D.ietf-rats-eat}} |
| TEE hardware version | hwversion | {{Section 4.2.5 of I-D.ietf-rats-eat}} |
| TEE firmware type | manifests | {{Section 4.2.15 of I-D.ietf-rats-eat}} |
| TEE firmware version | manifests | {{Section 4.2.15 of I-D.ietf-rats-eat}} |

Expand Down Expand Up @@ -1175,9 +1175,10 @@ of this document.)
* Endorsement Identification: Optional, but semantics are the same
as in Verification Key Identification.
* Freshness: See {{freshness-mechanisms}}.
* Required Claims: None.
* Required Claims: ueid, oemid, hwmodel, hwversion, and manifests.
See {{attestation}} for discussion.
* Prohibited Claims: None.
* Additional Claims: Optional claims are those listed in {{attestation}}.
* Additional Claims: eat_nonce. See {{freshness-mechanisms}} for discussion.
* Refined Claim Definition: None.
* CBOR Tags: CBOR Tags are not used.
* Manifests and Software Evidence Claims: The sw-name claim for a Trusted
Expand Down Expand Up @@ -1714,18 +1715,26 @@ COSE is shown.
~~~~
/ eat-claim-set = /
{
/ issuer / 1: "joe",
/ timestamp (iat) / 6: 1(1526542894)
/ nonce / 10: h'948f8860d13a463e8e',
/ secure-boot / 15: true,
/ debug-status / 16: 3, / disabled-permanently /
/ security-level / 14: 3, / secure-restricted /
/ device-identifier / <TBD>: h'e99600dd921649798b013e9752dcf0c5',
/ vendor-identifier / <TBD>: h'2b03879b33434a7ca682b8af84c19fd4',
/ class-identifier / <TBD>: h'9714a5796bd245a3a4ab4f977cb8487f',
/ chip-version / 26: [ "MyTEE", 1 ],
/ component-identifier / <TBD>: h'60822887d35e43d5b603d18bcaa3f08d',
/ version / <TBD>: "v0.1"
/ eat_nonce / 10: h'948f8860d13a463e8e',
/ ueid / 256: h'0198f50a4ff6c05861c8860d13a638ea',
/ oemid / 258: h'894823', / IEEE OUI format OEM ID /
/ hwmodel / 259: h'549dcecc8b987c737b44e40f7c635ce8'
/ Hash of chip model name /,
/ hwversion / 260: ["1.3.4", 1], / Multipartnumeric /
/ manifests / 273: [
[ 60, / application/cbor, TO BE REPLACED /
/ with the format value for a /
/ SUIT_Reference once one is allocated /
{ / SUIT_Reference /
/ suit-report-manifest-uri / 1: "https://example.com/manifest.cbor",
/ suit-report-manifest-digest / 0:[
/ algorithm-id / -16 / "sha256" /,
/ digest-bytes / h'a7fd6593eac32eb4be578278e6540c5c'
h'09cfd7d4d234973054833b2b93030609'
]
}
]
]
}
~~~~

Expand Down

0 comments on commit 53f3f08

Please sign in to comment.