Skip to content

Commit

Permalink
Merge pull request #283 from ietf-wg-scitt/hannestschofenig-patch-17
Browse files Browse the repository at this point in the history
Security Considerations - Certification Path Validation

Co-authored-by: Henk Birkholz <[email protected]>
Co-authored-by: Hannes Tschofenig <[email protected]>
  • Loading branch information
henkbirkholz and hannestschofenig authored Jul 21, 2024
2 parents 30fddae + 9cd61c8 commit 173dee5
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion draft-ietf-scitt-architecture.md
Original file line number Diff line number Diff line change
Expand Up @@ -731,7 +731,7 @@ An example of Signed Statement's payloads that can improve authenticity assuranc
For example, if a Transparency Service is implemented using a set of redundant replicas, each running within its own hardware-protected trusted execution environments (TEEs), then each replica can provide fresh Evidence or fresh Attestation Results about its TEEs. The respective Evidence can show, for example, the binding of the hardware platform to the software that runs the Transparency Service, the long-term public key of the service, or the key used by the replica for signing Receipts. The respective Attestation Result, for example, can show that the remote attestation Evidence was appraised by a Relying Party and complies with well-known Reference Values and Endorsements.

Auditors should be aware that the certification path information included in an unprotected `x5chain` header of a to-be-registered Signed Statement can be tampered with by a malicious Transparency Service (e.g., one that does not incorporate remote attestation), which may replace the intermediate certificates and ultimately connect to an unexpected root.
This modification can allow malicious TS to forge Claims that look genuine except for the wrong trust anchor.
This modification helps protect against person-in-the-middle attacks, but not denial-of-service.
Auditors MUST perform certification path validation in accordance with PKIX rules specified in {{-PKIX}}.
In particular, Auditors MUST verify that certification paths chain to one or more trust anchors (often represented as root certificates).

Expand Down

0 comments on commit 173dee5

Please sign in to comment.