rfc9783v2.txt | rfc9783.txt | |||
---|---|---|---|---|
Independent Submission H. Tschofenig | Independent Submission H. Tschofenig | |||
Request for Comments: 9783 H-BRS | Request for Comments: 9783 H-BRS | |||
Category: Informational S. Frost | Category: Informational S. Frost | |||
ISSN: 2070-1721 M. Brossard | ISSN: 2070-1721 M. Brossard | |||
Arm Limited | Arm Limited | |||
A. Shaw | A. Shaw | |||
HP Labs | HP Labs | |||
T. Fossati | T. Fossati | |||
Linaro | Linaro | |||
May 2025 | June 2025 | |||
Arm's Platform Security Architecture (PSA) Attestation Token | Arm's Platform Security Architecture (PSA) Attestation Token | |||
Abstract | Abstract | |||
Arm's Platform Security Architecture (PSA) is a family of hardware | Arm's Platform Security Architecture (PSA) is a family of hardware | |||
and firmware security specifications, along with open-source | and firmware security specifications, along with open-source | |||
reference implementations, aimed at helping device makers and chip | reference implementations, aimed at helping device makers and chip | |||
manufacturers integrate best-practice security into their products. | manufacturers integrate best-practice security into their products. | |||
Devices that comply with PSA can generate attestation tokens as | Devices that comply with PSA can generate attestation tokens as | |||
skipping to change at line 1558 ¶ | skipping to change at line 1558 ¶ | |||
[TLS13-IoT] | [TLS13-IoT] | |||
Tschofenig, H., Fossati, T., and M. Richardson, "TLS/DTLS | Tschofenig, H., Fossati, T., and M. Richardson, "TLS/DTLS | |||
1.3 Profiles for the Internet of Things", Work in | 1.3 Profiles for the Internet of Things", Work in | |||
Progress, Internet-Draft, draft-ietf-uta-tls13-iot- | Progress, Internet-Draft, draft-ietf-uta-tls13-iot- | |||
profile-14, 5 May 2025, | profile-14, 5 May 2025, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-uta- | <https://datatracker.ietf.org/doc/html/draft-ietf-uta- | |||
tls13-iot-profile-14>. | tls13-iot-profile-14>. | |||
Appendix A. Examples | Appendix A. Examples | |||
The following examples show PSA attestation tokens for an | The following examples show PSA attestation tokens for a hypothetical | |||
hypothetical system comprising a single measured software component. | system comprising a single measured software component. The | |||
The attesting device is in a lifecycle state (Section 4.3.1) of | attesting device is in a lifecycle state (Section 4.3.1) of SECURED. | |||
SECURED. The attestation has been requested from a client residing | The attestation has been requested from a client residing in the SPE. | |||
in the SPE. | ||||
The example in Appendix A.1 illustrates the case where the IAK is an | The example in Appendix A.1 illustrates the case where the IAK is an | |||
asymmetric key. A COSE Sign1 envelope is used to wrap the PSA-token | asymmetric key. A COSE Sign1 envelope is used to wrap the PSA-token | |||
claims set. | claims set. | |||
Appendix A.2 illustrates the case where the IAK is a symmetric key | Appendix A.2 illustrates the case where the IAK is a symmetric key | |||
and a COSE Mac0 envelope is used instead. | and a COSE Mac0 envelope is used instead. | |||
The claims sets are identical, except for the Instance ID which is | The claims sets are identical, except for the Instance ID which is | |||
synthesized from the key material. | synthesized from the key material. | |||
End of changes. 2 change blocks. | ||||
6 lines changed or deleted | 5 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |