Skip to content

Commit

Permalink
Merge pull request #193 from gmandyam/branch1
Browse files Browse the repository at this point in the history
Branch1
  • Loading branch information
Giri Mandyam authored Jun 2, 2022
2 parents 6d296e9 + de32f79 commit 480b703
Showing 1 changed file with 7 additions and 1 deletion.
8 changes: 7 additions & 1 deletion draft-ietf-rats-eat.md
Original file line number Diff line number Diff line change
Expand Up @@ -911,11 +911,13 @@ requires a persistent storage on the device.

### The Boot Seed Claim (boot-seed)

The Boot Seed claim MUST contain a random value created at system boot time that will allow differentiation of reports from different boot sessions.

The Boot Seed claim contains a value created at system boot time that allows differentiation of attestation reports from different boot sessions of a particular entity (e.g., a certain UEID).

This value is usually public.
It is not a secret and MUST NOT be used for any purpose that a secret seed is needed, such as seeding a random number generator.

There are privacy considerations for Boot Seed. See {{bootseedprivacyconsiderations}}.

~~~~CDDL
{::include nc-cddl/boot-seed.cddl}
Expand Down Expand Up @@ -2163,6 +2165,10 @@ Implementers should consider laws and regulations governing the transmission of
Implementers should consider using location management facilities offered by the operating system on the entity generating the attestation.
For example, many mobile phones prompt the user for permission when before sending location data.

## Boot Seed Privacy Considerations {#bootseedprivacyconsiderations}

The Boot Seed claim is effectively a stable entity identifier within a given boot epoch. Therefore, it is not suitable for use in attestation schemes that are privacy-preserving.

## Replay Protection and Privacy {#replayprivacyconsiderations}

EAT offers 2 primary mechanisms for token replay protection (also sometimes
Expand Down

0 comments on commit 480b703

Please sign in to comment.