hi Mark,

On Thu, 17 Jul 2025 at 23:04, Mark Novak <mr.mark.no...@gmail.com> wrote:
>
> Looking forward to meeting everyone in person.
> I am looking forward to discussing my key concern with this proposal: whether 
> it is really necessary to combine credential issuance with secure channel 
> negotiation. Not to say it’s impossible, of course it is, but is it 
> practical? Specifically, two most common types of workloads today are those 
> that horizontally scale, and serverless ones. In both cases you want to reuse 
> the same credential key and you want to limit the load on the verifier and 
> the credential issuer. The best approach is allay the most architecturally 
> sound one: separate the concerns; procure the credential once and not hit the 
> verifier each time a TLS channel is established.

The question can be reversed.  Is the aCSR approach always practical?

There are multiple dimensions at play.  A few that spring to mind: the
freshness requirements associated with the RP's appraisal policy, the
expected lifetime of the secure channel compared to freshness
expectations, and operational costs.

Starting from the latter and moving backwards.

Adding a CA/RA box to the system architecture incurs a high
operational cost, in addition to the unavoidable cost of running an
attestation verifier.
In some deployments, it may be possible to amortise such costs, but
this is not always feasible.

If your RPs have tight freshness requirements, an aCSR-based solution
would need to mint fresh, very short-term certificates at a sustained
pace.  Each certificate refresh would necessarily hit the back-end
verifier, which renders the "better scalability” argument a bit moot.

Besides, if the secure channel is long-lived, managing the periodic
refresh of the attestation credential may be challenging.
The two options I can see are:
1. Tear down the secure channel and re-establish it with the new credential.
2. Implement an application-specific refresh method.
Both options are feasible, but not ideal: the former option requires
extra coordination to handle the path switchover, and the latter
option makes the application responsible for providing its custom RA
protocol.

We (or at least I) are big fans of aCSR. However, after giving this
some thought, I’ve come to the conclusion that it cannot meet all
requirements in all cases.

To clarify the ethos of the expat effort: We are not claiming that
expat is a better solution in general.  We just want to add more
standardised (and formally verified) mechanisms to the attestation
toolbox so that people have more options.

cheers!

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to