Software Inventory consists of all software packages currently installed on
an endpoint and is usually described using ISO/IEC 19770-2:2015 SWID Tags
of the form:
name="bash" xml:lang="en-US" tagId="Ubuntu_20.04-x86_64-bash-5.0-6ubuntu1.1"
<Entity name="strongSwan Project" regid="strongswan.org" role="tagCreator"/>
<Meta product="Ubuntu 20.04 x86_64"/>
<Payload n8060:pathSeparator="/" n8060:envVarPrefix="$" n8060:envVarSuffix="">
<Directory root="/" name="bin">
<File name="bash" size="1183448"
<File name="rbash" size="1183448"
<Directory root="/" name="etc">
<File name="bash.bashrc" n8060:mutable="true" size="2319"
The SWID tag shown above describes version
5.0-6ubuntu1.1 of the
bash for the
x86_64 architecture. The tag optionally
SHA-2 file hashes that can be used as reference values for remote
attestation. The unique tag identifier is
For more details on SWID tags see NISTIR 8060.
The Software Inventory Message and Attributes (SWIMA) for PA-TNC (RFC 8412) standard is an extension of RFC 5792 and defines in the IETF namespace a new SWIMA Attributes PA-TNC message subtype and the following new PA-TNC attributes
- SWIMA Request - Software Inventory - Software Identifier Inventory - Software Events - Software Identifier Events - Subscription Status Request - Subscription Status Response - Source Metadata Request - Source Metadata Response
By sending a
SWIMA Request attribute, a
SWIMA IMV can request from a
SWIMA IMC either a complete
Inventory consisting of SWID tags or a more compact
Inventory made of the tag identifiers, only. Alternatively
Software Identifier Events can be requested. It is also possible to
Subscriptions which obliges a
SWIMA IMC to immediately send changes in
Software Inventory or new
Software Events to the
SWIMA IMV as soon as they occur.
There are two ways how the strongSwan Software Inventory Client functionality can be used to determine the current state of the software inventory on an endpoint:
In both cases the
SWIMA IMC is required
to manage the software inventory measurements on the TNC client.
There are two ways how the strongSwan Software Inventory Server functionality can can be used to manage the software inventory of associated endpoints:
In both cases the
SWIMA IMV is required
to manage the software inventory measurements on the TNC server.
In order to collect Software Identifiers of all software packages installed on the associated enpoints, we define a SWID Tag IDs policy enforcement for the Default group in the strongTNC policy manager tool.
When the TNC Client connects to the home network for the first time the
current state of the
Software Inventory in the form of
Software Events is
We see that currently 176 software packages are installed on the TNC Client endpoint. When we click on the Most recent session we see the session details
In the session 395
Software Identifier Events and 111 SWID Tags were
When we scroll down in the device report for the TNC Client, we see a list of
Software Events are time-stamped. Let’s select the ones from
Feb 17 02:18:54 2021
The event details show the update of the three
Ubuntu 20.04 packages
Feb 17 02:18:54 2021.
When we click on the
Ubuntu_20.04-x86_64-bash-5.0-6ubuntu1.1 tag ID of the
bash package, we see the details of its SWID tag
When we press the blue button the raw XML-encoded SWID tag is shown
Each SWID tag contains a complete list of the files contained in the software
packages including the path where the file is going to be installed in the file
system of the endpoint. When we click on the
/bin/bash file we see the file
We see that the
SHA-256 hash of the file has been extracted from the SWID tag
and can be used as a reference value for Remote Attestation.
When we click on the
bash package name we see what versions of this package
have been registered up to now
sec-updater tool is periodically
run to get security updates from the Debian, Ubuntu and Raspian websites.
After such a security update the device report of the
TNC Client shows the
25 vulnerable software packages have been detected
At the bottom of the device report the versions of the vulnerable software packages that are installed on the device are listed
sec-updater tool automatically
generates SWID tags for the updated software package that fix a vulnerability.
Thus due to the following
bash vulnerability the Ubuntu 20.04
package has been updated
Of course the
SHA-2 file hashes of the updated software package are also available