You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
EAT: Move issuer / cti claims to Optional, and assign an OID to the p… (#80)
* EAT: Move issuer / cti claims to Optional, and assign an OID to the profile
Signed-off-by: Fabrizio Damato <[email protected]>
* EAT: Changed the Scope to Full Profile
Signed-off-by: Fabrizio Damato <[email protected]>
---------
Signed-off-by: Fabrizio Damato <[email protected]>
Copy file name to clipboardExpand all lines: specifications/ietf-eat-profile/spec.ocp
+25-17Lines changed: 25 additions & 17 deletions
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,7 @@ The Contributors of this Specification would like to acknowledge the following:
38
38
- Jason Young (Google)
39
39
- Jeff Andersen (Google)
40
40
- Ned Smith (Intel)
41
+
- Parvathi Bhogaraju (Microsoft)
41
42
- Roksana Golizadeh Mojarad (Microsoft)
42
43
- Raghu Krishnamurthy (NVIDIA)
43
44
- Steven Bellock (NVIDIA)
@@ -90,6 +91,13 @@ accelerators. By providing a unified approach, the specification aims to
90
91
simplify and streamline the attestation and verification process within complex
91
92
and heterogeneous environments.
92
93
94
+
## Profile Identifier
95
+
96
+
**OID: 1.3.6.1.4.1.42623.1.3**
97
+
98
+
This Object Identifier (OID) uniquely identifies this OCP Profile for IETF Entity Attestation Token. The OID **MUST** be included in the **eat_profile** claim (claim key 265, encoded as `0x190109`) within every CWT that conforms to this specification.
99
+
100
+
93
101
## Terms and Definitions
94
102
95
103
- **CWT**: CBOR Web Token
@@ -126,8 +134,8 @@ accommodate.
126
134
## Scope
127
135
128
136
This profile defines the evidence format for an Attester Endpoint Application.
129
-
With respect to RFC 9711, it is a partial profile, as it allows the integrator
130
-
to choose the algorithm to use for signing the statement. It is application
137
+
With respect to RFC 9711, it is a full profile, as it specifies the mandatory
138
+
cryptographic algorithm that must be used for signing the statement. It is application
131
139
layer agnostic, supporting implementations such as an SPDM Responder or any
132
140
other custom solution. The profile focuses solely on the evidence related to
133
141
the claims gathered by the Attester Application. Consequently, it does not
@@ -162,33 +170,33 @@ Specifically, the keys in the CWT map **MUST** be sorted in the bytewise
162
170
lexicographic order of their deterministic encodings. This ordering convention
163
171
applies to mandatory claims, optional claims, and private claims when present.
164
172
165
-
**Mandatory Claims (1-6)**: These claims are **REQUIRED** for all attestations
173
+
**Mandatory Claims (1-4)**: These claims are **REQUIRED** for all attestations
166
174
and provide the minimum necessary information for verifier appraisal policies. The verifier
167
175
can expect at a minimum these claims in a compliant attestation:
168
176
169
-
1. **issuer** (claim key: 1, encoded as 0x01)
170
-
* This claim is used by the attester to bind the EAT to the certificate chain that issued it. It **SHALL** match the SUBJECT Common Name of the Attestation Key Certificate.
171
-
172
-
2. **cti** (claim key: 7, encoded as 0x07)
173
-
* This claim is used by the attester to establish uniqueness of the token. Refer to [@{ietf-rfc8392}] for acceptable values for this claim
174
-
175
-
3. **Nonce** (claim key: 10, encoded as 0x0a)
177
+
1. **Nonce** (claim key: 10, encoded as 0x0a)
176
178
* This claim is used by the attester to ensure the freshness of the response. Refer to [@{ietf-rfc9711}] for acceptable values for this claim
177
179
178
-
4. **dbgstat** (claim key: 263, encoded as 0x190107)
180
+
2. **dbgstat** (claim key: 263, encoded as 0x190107)
179
181
* This claim is used by the attester to determine whether the attester is in Debug mode. Refer to [@{ietf-rfc9711}] for acceptable values for this claim
180
182
181
-
5. **EAT Profile** (claim key: 265, encoded as 0x190109)
182
-
* This claim is used by the attester to identify the profile. It **MUST** be present and **SHALL** contain the OID assigned to the OCP Profile. **TODO: OCP to assign OID Value**
183
+
3. **EAT Profile** (claim key: 265, encoded as 0x190109)
184
+
* This claim is used by the attester to identify the profile. It **MUST** be present and **SHALL** contain the OID `1.3.6.1.4.1.42623.1.3` assigned to the OCP Profile.
183
185
184
-
6. **Measurements** (claim key: 273, encoded as 0x190111)
186
+
4. **Measurements** (claim key: 273, encoded as 0x190111)
185
187
* This claim is used by the attester to present the target environment claims that verifier will consume for the appraisal policy. It **MUST** be present and **SHALL** encapsulate a "concise-evidence" as a serialized CBOR byte string using the appropriate IANA media type.
186
188
187
-
**Optional Claims (7-14)**: These claims are **OPTIONAL** and provide additional
189
+
**Optional Claims (5-15)**: These claims are **OPTIONAL** and provide additional
188
190
platform information that may be useful for audit purposes but are not strictly
189
191
necessary for appraisal policies. These claims are typically non-verifiable and
190
192
serve informational purposes:
191
193
194
+
5. **issuer** (claim key: 1, encoded as 0x01)
195
+
* This claim is used by the attester to bind the EAT to the certificate chain that issued it. It **SHALL** match the SUBJECT Common Name of the Attestation Key Certificate.
196
+
197
+
6. **cti** (claim key: 7, encoded as 0x07)
198
+
* This claim is used by the attester to establish uniqueness of the token. Refer to [@{ietf-rfc8392}] for acceptable values for this claim
199
+
192
200
7. **ueid** (claim key: 256, encoded as 0x190100)
193
201
* This claim is used by the attester to identify the attester. If present, refer to [@{ietf-rfc9711}] for acceptable values for this claim
194
202
@@ -241,7 +249,7 @@ size constraints apply:
241
249
* Each text string value in any claim **SHOULD NOT** exceed 100 bytes
242
250
243
251
**Appraisal Policy Considerations**: For verifier appraisal policies, the
244
-
mandatory claims (1-6) **SHALL** be sufficient to establish the security
252
+
mandatory claims (1-4) **SHALL** be sufficient to establish the security
245
253
posture of the attesting platform. Optional claims provide supplementary
246
254
information that enhances visibility into platform state and configuration but
247
255
are not critical for basic attestation verification. Verifiers **MAY** choose
@@ -287,7 +295,7 @@ algorithm for the COSE_Sign1 signature:
0 commit comments