[Last-Call] draft-ietf-scitt-architecture-20 telechat Iotdir review

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Document: draft-ietf-scitt-architecture
Title: An Architecture for Trustworthy and Transparent Digital Supply Chains
Reviewer: Jason Livingood
Review result: Ready with Nits

This is an interesting proposal and very worth proceeding with in the IETF.

There is a question about its practicality, but that will only become clear in
future Internet-Drafts that build on this architecture. The architecture
attempts to create a broader SBoM of sorts that covers the entire supply chain
of software generation (much like what SDL tries to do, but for packaged
released software). SCITT is something of a mix between a Cyber TrustMark and
an SBoM. It does mention crypto agility considerations in its own architecture
which is nice.ÊThis document also makes a very good case for why software
producers (not users) should be held to higher security standards.

This document proposes a data structure (SCITT) for software supply chain (not
limited to OSS). This is for the entire pipeline, not just SBoMs, which apply
only to packages or third-party dependencies. It shows a gap in what SBoMs can
cover, by putting together an architecture to make sure specific security
measures implemented at every stage (from code to deployment) is verifiable in
a unified schema. Furthermore, every security measure at every stage of the
supply chain is signed with proof.Ê

I really like the idea of having a unified ÒlabelÓ of sorts that can account
for all facets of software supply chain. It also accounts for Òadd-on servicesÓ
depending on the software and the use case. However, it has the same problems
as having an IoT label, like information overload, inaccurate data, and lack of
interest in implementation without a push from a regulator.

Nit: I am not sure which fields are deemed required versus voluntary.

Minor Observation: The document assumes that the software producer has enough
resources to immediately fix a vulnerability so that it does not show up on the
transparency chain. Most small scale software providers will likely not change
anything in their process due to the transparency from SCITT due to other
release considerations.Ê

Minor Observation / Possible Nit: What are the security measures to mitigate
security vulnerabilities in the SCITT schema itself? Beyond saying that
sensitive information should be hashed locally before sending to the
transparency service, there are no additional security considerations (the
document mentions these are out of scope though and should follow standard
security practices recommended by IETF). The only privacy consideration is that
SCITT issuers must check that providers donÕt have PII (which historically
doesnÕt work in practice well). If I was an attacker, I can go ahead and modify
the output of this schema to include false provenance and security statements.



-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux