On Fri, May 28, 2021 at 08:04:18PM +0200, Eliot Lear wrote:
> Toerless,
> 
> Ultimately this is an authorization problem.  How you do that is entirely up
> to you.  I have given you a few examples.  I don't see how an additional
> endpoint to retrieve the same object would change that.

I don't think you have described any workflow that would allow to
achive what i claim is highly beneficial workflow: BRSKI decision to decide on 
whether/what
certificate to assign based on SBOM information without introducing a lot
of additional complexity (cloud service) and likely impossible dynamic
update of such cloud based SBOM information.

Cheers
    Toerless
> 
> Eliot
> 
> On 28.05.21 19:49, Toerless Eckert wrote:
> > On Fri, May 28, 2021 at 06:59:53PM +0200, Eliot Lear wrote:
> > > On 28.05.21 17:31, Toerless Eckert wrote:
> > > > On Fri, May 28, 2021 at 07:24:45AM +0200, Eliot Lear wrote:
> > > > 
> > > > Explain to me how this work flow would allow for the registrar to
> > > > decide whether to and/or what certificate to give to the pledge via EST 
> > > > based
> > > > on SBOM information.
> > > Well, in that case, if the registrar has the iDevID of the pledge, it can
> > > retrieve the MUD file, which points to an SBOM.
> > Except that we of course will also want to support many deployment cases
> > where there may be an airgap during enrolment. And if the primary interest
> > of a workflow is SBOM/attestation, then the manufacturer may not want to
> > engage in the cost of MUD cloud service.
> > 
> > Aka: i like o keep solutions modular so we're not forcing manufacturers to
> > have to invest into more system components than necessary/beneficial for
> > their customers use-cases.
> > 
> > 
> > >    My guess is that such an
> > > SBOM would have to live off device, because there is no trust yet between
> > > pledge and registrar.
> > Right.
> > 
> > >   And so if trust is required to retrieve the SBOM,
> > > then it has to be between the registrar and the manufacturer.
> > Which in addition to the above problems also includes the problem that
> > tracking of firmware load is even more work, especially when there can
> > be reseller firmware upgrades/customization or the like.
> > 
> > > This having been said, I think you may be applying the right policy at the
> > > wrong time.  It may make more sense to first establish trust, but limit
> > > access to the device until you have the SBOM.
> > That again also requires an additional layer of in-system complexity.
> > So far, we have designed systems nicely with domain security indicated
> > by their certificate. Now you need to add a whole new layer of per-device
> > in-system security differentiation. I have seen how difficult those
> > solutions become in enterprise 802.1 solutions. Additional VLANs, lots
> > of radius server complexity of parameters to be pushed, etc. pp.
> > 
> > > that way, because at any time the posture of a device can be found to be
> > > wanting.
> > Parsing failed. rephrase pls.
> > 
> > In any case, to me, the local retrievel of SBOM information during BRSKI
> > enrolment time seems to be very simple, very trustworthy by both sides,
> > very simple to implement, very much in line with the purpose of BRSKI
> > and with the least amount of system overhead. Aka: To me it would be
> > the lowest hanging fruit option to bring in attestation by BOM.
> > 
> > Cheers
> >      Toerless
> > 
> > > Eliot
> 




-- 
---
t...@cs.fau.de

_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to