Hi Peter,
Thanks for sharing this information with us.

As you say TPMs may be used in a bad way.  It is really up to
the "market" to decide what to use TPMs for.  This includes us
as well :)

If platform attestations will reach TLS or not is of course an interesting
topic and at this stage we can just guess.  The reason why I'm a bit
skeptical is really due to the deployment state of TLS client-auth compared
to various "plugin" methods.  The latter has become a necessity due to the
browser vendors' neglectance of a signature solution, which has forced
the development of stand-alone crypto support (e.g. java) rather than
using the native browser and OS crypto.  These solutions are incompatible
with the native TLS client-auth.

>Platform attestation has already been applied for network access (preventing
>workers from bringing virus-infected laptops within the firewall parameter
>of a company) and for web services (recently, in 2005).

Yes, indeed.

>I haven't hard
>about its application in webmail applications.  I don't quite see why
>platform attestation would be needed there.  Anders, can you explain?

I believe that some organizations would like to restrict certain features
when accessed in an unknown computing environment.  Typical
restrictions would be uploading or downloading of attachments.

>Also, I agree with Julien that a big advantage of webmail apps is that any
>Internet-connected computer anywhere running any platform can be used to
>access them.

Absolutely!.  I use this extensively myself.   But corporate web-mail and
other on-lineweb  apps may need some restrictions but I'm not a policy
maker.  I just want to provide the tools :-)

regards
Anders



----- Original Message -----
From: "Peter Djalaliev" <[EMAIL PROTECTED]>
To: <dev-tech-crypto@lists.mozilla.org>
Sent: Thursday, July 20, 2006 15:19
Subject: Re: Platform Attestation. was:To SSL-client-auth or 
nottoSSL-client-auth, that is the question(?)


Hello all,

I believe that TPM-generated platform attestation is a powerful mechanism
that can be used to augment user authentication, but it has its issues, some
of which were mentioned above:

 - TPM attestation is based on attestation quotes which are digitally signed
attestation logs.  Attestation logs are simply lists of names and SHA hasesh
of components loaded on the a machine.  The binary nature of this
attestation makes it hard to make a decision whether a platform attestation
is acceptable: we need to consider different application versions, as well
as patches or updates.  Also, we need to measure all software components,
which could compromise an application in the Trusted Computing Base:
executables, shared objects and eve configuration files.  There have been
some proposed solutions, but none of them IMHO are good enough for
deployment.
 - Pravicy issues - according to some people, the issues here are huge.
According to me, the lack of implementation of this technology in real-time
OS and apps makes it unclear about how exactly it will be implemented,
raising many speculations and privacy concerns.  The TPM-enabled technolofy
is very powerful, but could also be abused in ways to harm users.

It can be argued about whether or not TPMs would allow us to build "trusted
systems", but there is one thing which IMHO is hard to argue about - the
platform attestation and the sealing features provided by TPM chips bring to
regular desktop machines two security primitives which we really couldn't
rely upon before.  Also, TPM-enabled platform attestation and sealing have
been issued as a standard bu the TCPA.  They definitely seems a step further
towards having a trusted platform.  Again, these features are really
powerful, but could potentially be used against users.  However, I find that
the potential benefits from them are potentially huge.

To me the transport layer seems А logical place for platform attestation ()
because it can enhance the certificate-based user authentication mechanism
in TLS.  Platform attestation could be implemented into a new version of the
TLS protocol, utilizing the TLS extensions standard.  Within the TLS
handshake, two-way attestation will incur a latency overhead of a single
RTT, but will cause some additional processing on the server side (to be
measured).  The additional data exchanged for one-way attestation is an
attestation identity certificate (a slightly modified X509 certificate), an
attestation quote (588 bytes) and the attestation log with the list of
loaded components and their hashes (~ 5-10 Kb maybe).  Such a TLS
implementation can use the new TLS extensions proposed by RFC3546 and thus
be backwards-compatible with old implementations.

In general, platform attestation can be integrated in any authentication
mechanism, at least all the ones I know about so far.  So, Anders might turn
out right when he says that TLS might go bust because it doesn't support
platform attestation.  However, I don't think integrating it into TLS would
be so hard to do, given that this gets included in the TLS standard.

Platform attestation has already been applied for network access (preventing
workers from bringing virus-infected laptops within the firewall parameter
of a company) and for web services (recently, in 2005).  I haven't hard
about its application in webmail applications.  I don't quite see why
platform attestation would be needed there.  Anders, can you explain?

Also, I agree with Julien that a big advantage of webmail apps is that any
Internet-connected computer anywhere running any platform can be used to
access them.

Regards,
Peter



--------------------------------------------------------------------------------


_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to