Unfortunately each attestation format has a different method of
verifying the trust relationship of the attestation certificates.

- Android Key Attestation: Android publishes the root certificates
that all valid attestation certificates chain up to.
  - 
https://developer.android.com/training/articles/security-key-attestation#root_certificate
- Apple Managed Device Attestation: follows a similar pattern of
Android, the attestation certificates chain up to a well-known root.
- Chrome OS: there is only a web API for verifying challenges, there
is no way to do offline verification.
  - 
https://developers.google.com/chrome/verified-access/developer-guide#how_to_verify_user_and_device
- TPM: an enterprise would manually curate a collection of trusted
Endorsement Key certificate roots or use Microsoft's curated
collection.
  - https://go.microsoft.com/fwlink/?linkid=2097925

Since platform vendors define the verification procedures and can
change the procedure or the trusted roots at any time, I'm not sure
the best place to either specify or informatively reference the
verification procedures.

On Wed, Jul 20, 2022 at 4:07 PM Carl Wallace <[email protected]> wrote:
>
> Distributing trust anchors to verify device attestations is one of the aims 
> of 
> https://datatracker.ietf.org/doc/html/draft-wallace-rats-concise-ta-stores-00.
>  Note, there's also a LAMPS draft that borrows the WebAuthn format approach 
> from this ACME device attestation draft but for use in extensions suitable 
> for CMP, EST, SCEP, etc.
>
> On 7/20/22, 6:41 PM, "RATS on behalf of Michael Richardson" 
> <[email protected] on behalf of [email protected]> wrote:
>
>
>     I read acme-device-attest, and I guess the key part is a new 
> device-attest-01
>     method.
>
>     
> https://www.ietf.org/archive/id/draft-bweeks-acme-device-attest-00.html#name-device-attestation-challeng
>
>     tries to explain the format, and how the challenge is signed by the 
> device.
>     What I do not understand is any of the trust relationships between the 
> ACME
>     server and the manufacturer/provisionor of the Android Key 
> Attestation/Chrome
>     OS Verified Access/Trusted Platform Module.
>
>     Why does the Enterprise trust the attestation key?
>
>     --
>     Michael Richardson <[email protected]>, Sandelman Software Works
>      -= IPv6 IoT consulting =-
>
>
>
>     _______________________________________________
>     RATS mailing list
>     [email protected]
>     https://www.ietf.org/mailman/listinfo/rats
>
>
> _______________________________________________
> Acme mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/acme

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to