Open ounsworth opened 3 months ago
There is a use case where a manufacturer needs to perform an operation at a distance on one of its device. One of these operations could be a re-certification, where the manufacturer provides a certificate for a new key generated by the device.
The attestation from the device would provide enough information to the manufacturer to ensure that the manufacturer is emitting a certificate for a device previously manufactured by it.
This is very similar to a CA emitting a certificate for a public key. However, there must be claims to support the proper recognition.
Again, this could be accomplished using proprietary protocols. However, reusing common protocols and tools might lessen the burden of development and improve the security stance as it is widely scrutinized.
There is a use case where two devices are transferring keying material that requires identification. This identification could be based on application concerns (same domain, same realm, same customer, specific serial number).
In those circumstances, there is a need for a device to associate a transfer key with a device's attributes. The attestation protocol can be used to this end.
Again, this can be accomplished using a proprietary means. However, resources in HSMs are limited and there are gains to be accomplished by reusing the same protocol.
I added the use cases here: https://github.com/EntrustCorporation/draft-rats-pkix-evidence/pull/4
A few uses cases that come to mind:
All of these can be done with a proprietary attestation scheme, but a standardized scheme would be expected to reduce the burden on relying parties, by allowing to cope with multiple HSM designs with a single verifier implementation. (They would still need to configure at least one trust anchor per HSM vendor.)
I'm sure there are more!