SPDM Protocol Clarification Questions (v1.0, v1.1, v1.2) #3543
Replies: 2 comments 2 replies
-
|
See the SPDM whitepaper (https://www.dmtf.org/sites/default/files/standards/documents/DSP2058_1.3.0.pdf) for answers to questions like these.
Broadly yes.
That, and the identity of the instance of the device itself, assuming the manufacturer generates unique keys for each device.
Broadly yes. For certificate chains, the relying party should establish a trust relationship with the device manufacturer. Once established then the relying party acquires the manufacturer's root certificates and uses them to validate the device's certificate chain.
Broadly yes.
Broadly yes.
Broadly yes.
That depends on the endpoints' capabilities, mainly
That is incorrect. Messages may be tampered with, even within a secure session. However, that tampering would be detected by, at least, the receiving endpoint.
SPDM 1.1 is primarily 1.0 plus secure sessions.
This allows entities other than the device manufacturer to endorse the device. See also https://opencomputeproject.github.io/Security/device-identity-provisioning/HEAD/#introduction
Broadly yes. SPDM supports those directly or provides the building blocks for things like ownership transfer. |
Beta Was this translation helpful? Give feedback.
-
|
Is SPDM being used in broader scale? Like in server platforms/client platforms etc? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I have a few conceptual questions related to the SPDM protocol. These questions are not related to SPDM implementation or code, but to understanding the security goals and use cases across SPDM versions 1.0, 1.1, and 1.2.
SPDM 1.0 Questions
SPDM 1.0 provides device discovery, authentication, and attestation capabilities.
- the responder’s certificate chain, and
- the signatures returned in CHALLENGE_AUTH and measurement responses?
- compare received measurements against known-good (reference) measurements, and
- make a platform-specific policy decision (e.g., allow normal operation, restrict functionality, log an error, or trigger firmware recovery)?
SPDM 1.1 Questions
SPDM 1.1 introduces secure session establishment.
- confidential (encrypted),
- integrity-protected, and
- protected against replay and tampering?
- secure firmware updates,
- secure management commands, and
- protected measurement retrieval after trust has been established?
SPDM 1.2 Questions
SPDM 1.2 introduces certificate provisioning and update.
- SPDM 1.2 allows writing certificate chains into responder slots. What are the intended scenarios for this capability?
- While devices typically have certificates provisioned during secure manufacturing (e.g., SLOT0), is SPDM 1.2 designed to support:
- certificate rotation,
- ownership transfer,
- lifecycle management, or
- post-manufacturing certificate updates in the field?
Beta Was this translation helpful? Give feedback.
All reactions