Skip to content

Commit

Permalink
Update draft-ietf-rats-msg-wrap.md
Browse files Browse the repository at this point in the history
  • Loading branch information
hannestschofenig authored Oct 20, 2024
1 parent fb4a4f7 commit 3e7bf51
Showing 1 changed file with 4 additions and 3 deletions.
7 changes: 4 additions & 3 deletions draft-ietf-rats-msg-wrap.md
Original file line number Diff line number Diff line change
Expand Up @@ -296,9 +296,10 @@ CMW itself provides no facilities for authenticity, integrity protection, or con
It is the responsibility of the designer for each use case to determine the necessary security properties and implement them accordingly.
A secure channel (e.g., via TLS) or object-level security (e.g., using JWT) may suffice in some scenarios, but not in all.

When a CMW is used to carry Evidence for composite or layered attestation of a single device, all components within the CMW must be cryptographically
bound to prevent an attacker from replacing compromised Evidence with that of a non-compromised device. The protection of authenticity and integrity
MUST be provided by the attestation technology. For additional security considerations related to collections, refer to {{seccons-coll}}.
When a CMW is used to carry the Evidence for composite or layered attestation for a single device, the security properties needed are that of attestation.
In particular, all the members in a CMW must be bound together so that an attacker can not replace one Evidence message showing compromise with that from a non-compromised device.
The authenticity and integrity protection MUST be attestation-oriented.
For further security considerations about collections, see {{seccons-coll}}.

### Relation to EAT `submods`

Expand Down

0 comments on commit 3e7bf51

Please sign in to comment.