Skip to main content

Minutes interim-2023-suit-01: Mon 15:00
minutes-interim-2023-suit-01-202309111500-00

Meeting Minutes Software Updates for Internet of Things (suit) WG
Date and time 2023-09-11 15:00
Title Minutes interim-2023-suit-01: Mon 15:00
State Active
Other versions markdown
Last updated 2023-09-11

minutes-interim-2023-suit-01-202309111500-00

Agenda

Agenda for SUIT/TEEP Virtual Interim Meeting

Notes: Michael Richardson and Russ Housley

1) Logistics

  • Agenda Bashing
  • welcome done.
  • agenda bash:
    • do MTI and TEEP protocol in first hour (#7/#8)
    • move TEEP protocol after MTI

11:09 EDT:
7) Mandatory-to-Implement Algorithms for SUIT Manifests

Hannes says: related to AES128CTR usage: for TEEP AES-GCM is definitely
better than AES-CTR.
* Hannes asks for one version with GCM and one version with CTR
* Brendan would like to limit this to avoid combinatorial explosion,
so care is necessary, but whatever TEEP needs should be present.
* AT: this MTI is not just for encryption, but also for authenticated
encryption (AEAD). Akira may good to have both profiles in the MTI
depending on the usages.
* Brendan questions the benefit of GCM since the image is signed, so
the additional intengrity protection provided by GCM is not clear.
* This MTI pertains to manifest, RATS EAT, and the suit-reports. When
used for attestation, the signature is critical, so the integrity
protection offered by GCM is irrelevant.

MAYBE discussion to the list: do we need to introduce a AES-GCM profile
for TEEP.

11:23 EDT:

8) TEEP Protocol

Hackathon produced some new issues, which were discussed at 117.

Slide 8: no concerns raised.
AT: can always run CDDL syntax report, and suit-report still has an
error.
Option 3: make suit-reports optional and normative reference.
THIS WAS PREFERENCE.

DW: The error in the CDDL is on the suit-report and not TEEP side.
ACTION: AT to make sure that the CDDL is correct in the TEEP DOCUMENT.
ACTION: Brendan -- there should not be faulty CDDL in suit-report, and
will fix it.

Noting: #356, there are no objections to replacing each of them.
Brendan: for the use case of SUIT (TEEP+RATS), using AES-CTR makes
sense, but in general, this is not the right mode.

RH: APIs are not supposed to return any plaintext if the integrity check
fails, so the ability to break the image into chunks is an important
aspect, so that's why it does not fit into AES-GCM.

Hannes: was focused on specific things in last review, some PRs filed.

Are there things that need discussion in the group.

Discussion #396: https://github.com/ietf-teep/teep-protocol/pull/369
suggests text for ES-DH can just be reused.

Brendan: Has created a SUIT-REPORT that is confidentiality and integrity
protected, and this
profile might resolve the problem that Hannes reported.
ACTION: Brendan and Hannes to huddle to resolve question.

11:55 EDT:
2) SUIT Manifest Format

half of the comments resolved in -23.
For the other half of the comments, issues were created. 29 open.
There are no show-stoppers, just additional clarifications needed.
ACTION: (Dave,Ken) If old comments are no longer relevant, they could be
cleaned up.

11:58 EDT:
5) Firmware Encryption with SUIT Manifests

Ken: good to have anyone can verify the examples, currently the code is
complicated, he wants to create some simple code.

MR: Name the various encryption approaches to allow for easier
identification by implementors.
DW: when will we get an update with the examples completed?
HT: depends upon what further feedback, but also for Ken to complete
examples... might wrap up this week. (ACTION: next few weeks)
KT: if we use AES-CTR more, then it will take a few weeks, so end of
September.

12:12 EDT:

3) SUIT Manifest Extensions for Multiple Trust Domains

ACTION: (Brendon) raise question re: chains on the list.

6) Secure Reporting of Update Status

ACTION: call for additional reviews.

12:22 EDT:

4) Update Management Extensions for SUIT Manifests

No objections raised during call.
ACTION: Dave and Ken did reviews, and there were needs for
additional file permissions, and copy permissions. There were pull
requests which were merged, but could those reviewers confirm that they
are happy.
Dave is document shepherd, and will do write-up and admits he holds next
step. Would like to know if there is other than silence.
Additional comments from: (looks to github).

Brendan suggests that it can not be complete at this stage, that we will
have to revise it in the future to add things.

9) Any Other Business (if time permits)

MeetEcho:
https://meetecho-interims.ietf.org/conference/?short=148f9256-b18e-40db-b340-a99dbfe4465b