Hi Laurence

The mobile example looks good let’s update the draft with the mobile
example.

I don’t have any further comments for the review.

Thank you

Gyan
On Sat, Aug 20, 2022 at 11:23 PM Laurence Lundblade <l...@island-resort.com>
wrote:

> Below
>
> On Aug 20, 2022, at 1:38 PM, Michael Richardson <mcr+i...@sandelman.ca>
> wrote:
>
> Gyan Mishra via Datatracker <nore...@ietf.org> wrote:
>
> Section 3 describes the environment of an attester.  Section
> 3.2 clearly describes a layered environment, however section 3.3
> describes a composite environment using a carrier grade router as an
> example.  I think here the composite should be described just as is
> done in the layer environment section but not referencing an
> environment use case that may not be applicable to RAT.
>
>
> I guess I don't really follow what you are suggesting here.
>
> So within a
> carrier grade router chassis the backplane communication is all done
> vendor proprietary no external elements so I don’t see how trust comes
> into play as well as the backplane communication is hardware bus
> elements for backplane throughput for the LC and then as well router OS
> software component for the backplane communication. I think maybe
> choosing a better example that applies to RAT composite environment
> would be better.
>
>
> Yes, the way in which the Evidence is relayed is vendor proprietary, but
> the
> the Evidence and/or Attestation Results are then relayed to an external
> verifier.
>
>
> I don’t know anything about router architecture, but do about mobile phone
> architecture which I consider a candidate for composite attestation.
>
> A mobile phone based on a chip like a Qualcomm Snapdragon has many
> subsystems. Something like this:
> - A TEE and/or HW root of trust, perhaps controlled by the chip vendor,
> not the phone vendor
> - A Secure Element for payments or eSIM
> - A SIM card
> - The general purpose CPU running Android and is controlled by the phone
> vendor
> - A video playback subsystem that does content protection and is isolated
> from the main CPU
> - A cellular modem
> - A Bluetooth subsystem isolated from the modem
> - …
>
> There are several tiers of security and multiple vendors.
>
> LL
>
> --

<http://www.verizon.com/>

*Gyan Mishra*

*Network Solutions A**rchitect *

*Email gyan.s.mis...@verizon.com <gyan.s.mis...@verizon.com>*



*M 301 502-1347*
_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to