rfc9783v2.txt | rfc9783.txt | |||
---|---|---|---|---|
Independent Submission H. Tschofenig | Independent Submission H. Tschofenig | |||
Request for Comments: 9783 H-BRS | Request for Comments: 9783 H-BRS | |||
Category: Informational S. Frost | Category: Informational S. Frost | |||
ISSN: 2070-1721 M. Brossard | ISSN: 2070-1721 M. Brossard | |||
Arm Limited | Arm Limited | |||
A. Shaw | A. Shaw | |||
HP Labs | HP Labs | |||
T. Fossati | T. Fossati | |||
Linaro | Linaro | |||
May 2025 | June 2025 | |||
Arm's Platform Security Architecture (PSA) Attestation Token | Arm's Platform Security Architecture (PSA) Attestation Token | |||
Abstract | Abstract | |||
Arm's Platform Security Architecture (PSA) is a family of hardware | Arm's Platform Security Architecture (PSA) is a family of hardware | |||
and firmware security specifications, along with open-source | and firmware security specifications, along with open-source | |||
reference implementations, aimed at helping device makers and chip | reference implementations, aimed at helping device makers and chip | |||
manufacturers integrate best-practice security into their products. | manufacturers integrate best-practice security into their products. | |||
Devices that comply with PSA can generate attestation tokens as | Devices that comply with PSA can generate attestation tokens as | |||
skipping to change at line 347 ¶ | skipping to change at line 347 ¶ | |||
postfix -key is used for PSA-originated claims. | postfix -key is used for PSA-originated claims. | |||
4.1. Caller Claims | 4.1. Caller Claims | |||
4.1.1. Nonce | 4.1.1. Nonce | |||
The EAT [EAT] "nonce" (claim key 10) is used to carry the challenge | The EAT [EAT] "nonce" (claim key 10) is used to carry the challenge | |||
provided by the caller to demonstrate freshness of the generated | provided by the caller to demonstrate freshness of the generated | |||
token. | token. | |||
Since the EAT nonce claim offers flexiblity for different attestation | Since the EAT nonce claim offers flexibility for different | |||
technologies, this specification applies the following constraints to | attestation technologies, this specification applies the following | |||
the nonce-type: | constraints to the nonce-type: | |||
* The length MUST be either 32, 48, or 64 bytes. | * The length MUST be either 32, 48, or 64 bytes. | |||
* Only a single nonce value is conveyed. The array notation MUST | * Only a single nonce value is conveyed. The array notation MUST | |||
NOT be used for encoding the nonce value. | NOT be used for encoding the nonce value. | |||
This claim MUST be present in a PSA attestation token. | This claim MUST be present in a PSA attestation token. | |||
psa-nonce = ( | psa-nonce = ( | |||
nonce-label => psa-hash-type | nonce-label => psa-hash-type | |||
skipping to change at line 1558 ¶ | skipping to change at line 1558 ¶ | |||
[TLS13-IoT] | [TLS13-IoT] | |||
Tschofenig, H., Fossati, T., and M. Richardson, "TLS/DTLS | Tschofenig, H., Fossati, T., and M. Richardson, "TLS/DTLS | |||
1.3 Profiles for the Internet of Things", Work in | 1.3 Profiles for the Internet of Things", Work in | |||
Progress, Internet-Draft, draft-ietf-uta-tls13-iot- | Progress, Internet-Draft, draft-ietf-uta-tls13-iot- | |||
profile-14, 5 May 2025, | profile-14, 5 May 2025, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-uta- | <https://datatracker.ietf.org/doc/html/draft-ietf-uta- | |||
tls13-iot-profile-14>. | tls13-iot-profile-14>. | |||
Appendix A. Examples | Appendix A. Examples | |||
The following examples show PSA attestation tokens for an | The following examples show PSA attestation tokens for a hypothetical | |||
hypothetical system comprising a single measured software component. | system comprising a single measured software component. The | |||
The attesting device is in a lifecycle state (Section 4.3.1) of | attesting device is in a lifecycle state (Section 4.3.1) of SECURED. | |||
SECURED. The attestation has been requested from a client residing | The attestation has been requested from a client residing in the SPE. | |||
in the SPE. | ||||
The example in Appendix A.1 illustrates the case where the IAK is an | The example in Appendix A.1 illustrates the case where the IAK is an | |||
asymmetric key. A COSE Sign1 envelope is used to wrap the PSA-token | asymmetric key. A COSE Sign1 envelope is used to wrap the PSA-token | |||
claims set. | claims set. | |||
Appendix A.2 illustrates the case where the IAK is a symmetric key | Appendix A.2 illustrates the case where the IAK is a symmetric key | |||
and a COSE Mac0 envelope is used instead. | and a COSE Mac0 envelope is used instead. | |||
The claims sets are identical, except for the Instance ID which is | The claims sets are identical, except for the Instance ID which is | |||
synthesized from the key material. | synthesized from the key material. | |||
End of changes. 3 change blocks. | ||||
9 lines changed or deleted | 8 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |