rfc9334v6.txt | rfc9334.txt | |||
---|---|---|---|---|
skipping to change at line 1600 ¶ | skipping to change at line 1600 ¶ | |||
This information might be particularly interesting to many attackers. | This information might be particularly interesting to many attackers. | |||
For example, knowing that a device is running a weak version of | For example, knowing that a device is running a weak version of | |||
firmware provides a way to aim attacks better. | firmware provides a way to aim attacks better. | |||
In some circumstances, if an attacker can become aware of | In some circumstances, if an attacker can become aware of | |||
Endorsements, Reference Values, or appraisal policies, it could | Endorsements, Reference Values, or appraisal policies, it could | |||
potentially provide an attacker with insight into defensive | potentially provide an attacker with insight into defensive | |||
mitigations. It is recommended that attention be paid to | mitigations. It is recommended that attention be paid to | |||
confidentiality of such information. | confidentiality of such information. | |||
Additionally, many Claims in Evidence, Attestation Results, and | Additionally, many Evidence, Attestation Results, and appraisal | |||
appraisal policies potentially contain PII depending on the end-to- | policies potentially contain Personally Identifying Information (PII) | |||
end use case of the remote attestation procedure. Remote attestation | depending on the end-to-end use case of the remote attestation | |||
that includes containers and applications, e.g., a blood pressure | procedure. Remote attestation that includes containers and | |||
monitor, may further reveal details about specific systems or users. | applications, e.g., a blood pressure monitor, may further reveal | |||
details about specific systems or users. | ||||
In some cases, an attacker may be able to make inferences about the | In some cases, an attacker may be able to make inferences about the | |||
contents of Evidence from the resulting effects or timing of the | contents of Evidence from the resulting effects or timing of the | |||
processing. For example, an attacker might be able to infer the | processing. For example, an attacker might be able to infer the | |||
value of specific Claims if it knew that only certain values were | value of specific Claims if it knew that only certain values were | |||
accepted by the Relying Party. | accepted by the Relying Party. | |||
Conceptual messages (see Section 8) carrying sensitive or | Conceptual messages (see Section 8) carrying sensitive or | |||
confidential information are expected to be integrity protected | confidential information are expected to be integrity protected | |||
(i.e., either via signing or a secure channel) and optionally might | (i.e., either via signing or a secure channel) and optionally might | |||
skipping to change at line 1893 ¶ | skipping to change at line 1894 ¶ | |||
[RFC8392] Jones, M., Wahlstroem, E., Erdtman, S., Tschofenig, H., | [RFC8392] Jones, M., Wahlstroem, E., Erdtman, S., Tschofenig, H., | |||
and RFC Publisher, "CBOR Web Token (CWT)", RFC 8392, | and RFC Publisher, "CBOR Web Token (CWT)", RFC 8392, | |||
DOI 10.17487/RFC8392, May 2018, | DOI 10.17487/RFC8392, May 2018, | |||
<https://www.rfc-editor.org/info/rfc8392>. | <https://www.rfc-editor.org/info/rfc8392>. | |||
14.2. Informative References | 14.2. Informative References | |||
[CCC-DeepDive] | [CCC-DeepDive] | |||
Confidential Computing Consortium, "A Technical Analysis | Confidential Computing Consortium, "A Technical Analysis | |||
of Confidential Computing", Version 1.3, November 2022, | of Confidential Computing", Version 1.3, November 2022, | |||
<https://confidentialcomputing.io/whitepaper-02-latest>. | <https://confidentialcomputing.io/white-papers-reports>. | |||
[CTAP] FIDO Alliance, "Client to Authenticator Protocol (CTAP)", | [CTAP] FIDO Alliance, "Client to Authenticator Protocol (CTAP)", | |||
February 2018, <https://fidoalliance.org/specs/fido-v2.0- | February 2018, <https://fidoalliance.org/specs/fido-v2.0- | |||
id-20180227/fido-client-to-authenticator-protocol-v2.0-id- | id-20180227/fido-client-to-authenticator-protocol-v2.0-id- | |||
20180227.html>. | 20180227.html>. | |||
[NIST-800-57-p1] | [NIST-800-57-p1] | |||
Barker, E., "Recommendation for Key Management: Part 1 - | Barker, E., "Recommendation for Key Management: Part 1 - | |||
General", DOI 10.6028/NIST.SP.800-57pt1r5, May 2020, | General", DOI 10.6028/NIST.SP.800-57pt1r5, May 2020, | |||
<https://nvlpubs.nist.gov/nistpubs/SpecialPublications/ | <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/ | |||
End of changes. 2 change blocks. | ||||
6 lines changed or deleted | 7 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |