[Anima] discoverying MASA voucher signing keys/certificates and manufacturer signing certificates

2022-07-13 Thread Michael Richardson
Michael Richardson wrote: > Note: We have three anchors that we might like to deploy. > 1) the key that signs the RFC8366/constrained-voucher objects. Could > be a RPK. > 2) the key that signs the IDevID certificates in the devices. Most > likely a RFC5280 self-signed cert

Re: [Anima] I-D Action: draft-ietf-anima-brski-prm-04.txt

2022-07-13 Thread Brian E Carpenter
So since you haven't got a keycode... what would you do? Like an ATM skimmer attack - collect keycodes that people key in? Anyway, all I was really suggesting is that the Security Considerations need to explain why there is no vulnerability due to obtaining the list of pledges via mDNS. Regar

Re: [Anima] [COSE] .well-known/jwks.json and constrained-voucher and RFC7517

2022-07-13 Thread Michael Richardson
Thank you for the replies. (Omitting unicast CCs by request) It seems that 1) /.well-known/jwks.json might not be in as common use as I thought, but maybe OAUTH types might want to register it so as to reduce surprise in the future. 2) We, ANIMA, should probably have two or three RFC7517

Re: [Anima] I-D Action: draft-ietf-anima-brski-prm-04.txt

2022-07-13 Thread Michael Richardson
Brian E Carpenter wrote: >> > In any case, isn't the list of pledges itself a point of attack for >> > someone attempting to install a rogue device? So the security of the >> > list of pledges should perhaps be discussed in the Security > >> Considerations, even though it's outsid