rfc9683v3.txt | rfc9683.txt | |||
---|---|---|---|---|
skipping to change at line 151 ¶ | skipping to change at line 151 ¶ | |||
Additionally, this document defines the following term: | Additionally, this document defines the following term: | |||
Attestation: The process of generating, conveying, and appraising | Attestation: The process of generating, conveying, and appraising | |||
claims, backed by evidence, about device trustworthiness | claims, backed by evidence, about device trustworthiness | |||
characteristics, including supply chain trust, identity, device | characteristics, including supply chain trust, identity, device | |||
provenance, software configuration, device composition, compliance | provenance, software configuration, device composition, compliance | |||
to test suites, functional and assurance evaluations, etc. | to test suites, functional and assurance evaluations, etc. | |||
The goal of attestation is simply to assure an administrator or | The goal of attestation is simply to assure an administrator or | |||
auditor that the device's configuration and software are authentic | auditor that the device's configuration and software are authentic | |||
and has been unaltered since the device started. The determination | and were unmodified since the device started. The determination of | |||
of software authenticity is not prescribed in this document, but it's | software authenticity is not prescribed in this document, but it's | |||
typically taken to mean a software image generated by an authority | typically taken to mean a software image generated by an authority | |||
trusted by the administrator, such as the device manufacturer. | trusted by the administrator, such as the device manufacturer. | |||
Within the context of the Trusted Computing Group (TCG), the scope of | Within the context of the Trusted Computing Group (TCG), the scope of | |||
attestation is typically narrowed to describe the process by which an | attestation is typically narrowed to describe the process by which an | |||
independent Verifier can obtain cryptographic proof as to the | independent Verifier can obtain cryptographic proof as to the | |||
identity of the device in question, evidence of the integrity of the | identity of the device in question, evidence of the integrity of the | |||
device's software that was loaded upon startup, and verification that | device's software that was loaded upon startup, and verification that | |||
the current configuration matches the intended configuration. For | the current configuration matches the intended configuration. For | |||
network equipment, a Verifier capability can be embedded in a Network | network equipment, a Verifier capability can be embedded in a Network | |||
End of changes. 1 change blocks. | ||||
2 lines changed or deleted | 2 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |