IMA Server
The IMA Server is based on the basic TNC Server configuration and combines the SWIMA Server and Attestation Server functionality.
Plugin Configuration
For the IMA use case, the OS IMV. the SWIMA IMV and the Attestation IMV
have to be enabled in the /etc/tnc_config configuration file
#IMV-Configuration IMV "OS" /usr/lib/ipsec/imcvs/imv-os.so IMV "SWIMA" /usr/lib/ipsec/imcvs/imv-swima.so IMV "Attestation" /usr/lib/ipsec/imcvs/imv-attestation.so
These Integrity Measurement Verifieres have to be built beforehand with the
./configure options
--enable-imv-os --enable-imv-swima --enable-imv-attestation
When the charon daemon starts up, the IMVs are loaded.
OS IMV and Attestation IMV both subscribe to the standard PA-TNC message
subtype Operating System. The Attestation IMV additionally subscribes to
the PTS message subtype defined in the TCG namespace and the SWIMA IMV
to messages of the standard SWIMA subtype
00[DMN] Starting IKE charon daemon (strongSwan 5.9.7, Linux 5.13.0-44-generic, x86_64) 00[TNC] TNC recommendation policy is 'default' 00[TNC] loading IMVs from '/etc/tnc_config' 00[TNC] added IETF attributes 00[TNC] added ITA-HSR attributes 00[TNC] added PWG attributes 00[TNC] added TCG attributes 00[PTS] added TCG functional component namespace 00[PTS] added ITA-HSR functional component namespace 00[PTS] added ITA-HSR functional component 'Trusted GRUB Boot Loader' 00[PTS] added ITA-HSR functional component 'Trusted Boot' 00[PTS] added ITA-HSR functional component 'Linux IMA' 00[LIB] libimcv initialized 00[IMV] IMV 1 "OS" initialized 00[TNC] IMV 1 supports 1 message type: 'IETF/Operating System' 0x000000/0x00000001 00[TNC] IMV 1 "OS" loaded from '/usr/lib/ipsec/imcvs/imv-os.so' 00[IMV] IMV 2 "SWIMA" initialized 00[TNC] IMV 2 supports 1 message type: 'IETF/SWIMA' 0x000000/0x00000009 00[TNC] IMV 2 "SWIMA" loaded from '/usr/lib/ipsec/imcvs/imv-swima.so' 00[IMV] IMV 3 "Attestation" initialized 00[PTS] loading PTS ca certificates from '/etc/pts/cacerts' 00[PTS] mandatory PTS measurement algorithm HASH_SHA1[openssl] available 00[PTS] mandatory PTS measurement algorithm HASH_SHA2_256[openssl] available 00[PTS] optional PTS measurement algorithm HASH_SHA2_384[openssl] available 00[PTS] optional PTS measurement algorithm HASH_SHA2_512[openssl] available 00[PTS] optional PTS DH group MODP_2048[openssl] available 00[PTS] optional PTS DH group MODP_1536[openssl] available 00[PTS] optional PTS DH group MODP_1024[openssl] available 00[PTS] mandatory PTS DH group ECP_256[openssl] available 00[PTS] optional PTS DH group ECP_384[openssl] available 00[TNC] IMV 3 supports 2 message types: 'TCG/PTS' 0x005597/0x00000001 'IETF/Operating System' 0x000000/0x00000001 00[TNC] IMV 3 "ATTESTATION" loaded from '/usr/lib/ipsec/imcvs/imv-attestation.so'
VPN Configuration
The VPN configuration choses for this example is the same as for the general
TNC server but just
uses different client and server identities. For reasons of brevity we will omit
the PT-EAP and IKEv2 EAP transport layers.
PB-TNC Connection
The TNC server receives the first PB-TNC Client Data batch and assigns the PB-TNC
(TCG TNC IF-TNCCS 2.0) Connection ID 1 to the connection and also creates a
new states for the OS IMV, SWIMA IMV and the Attestation IMV.
The OS IMV gets the Access requestor’s identities mijas.strongsec.com and
10.10.1.52 from the TNC server via the TNC IF-IMV API.
09[TNC] assigned TNCCS Connection ID 1 09[IMV] IMV 1 "OS" created a state for IF-TNCCS 2.0 Connection ID 1: +long +excl -soh 09[IMV] over IF-T for Tunneled EAP 2.0 with maximum PA-TNC message size of 65490 bytes 09[IMV] user AR identity 'mijas.strongsec.com' of type username authenticated by certificate 09[IMV] machine AR identity '10.10.1.52' of type IPv4 address authenticated by unknown method 09[IMV] IMV 2 "SWIMA" created a state for IF-TNCCS 2.0 Connection ID 1: +long +excl -soh 09[IMV] over IF-T for Tunneled EAP 2.0 with maximum PA-TNC message size of 65490 bytes 09[IMV] IMV 3 "Attestation" created a state for IF-TNCCS 2.0 Connection ID 1: +long +excl -soh 09[IMV] over IF-T for Tunneled EAP 2.0 with maximum PA-TNC message size of 65490 bytes 09[IMV] IMV 1 "OS" changed state of Connection ID 1 to 'Handshake' 09[IMV] IMV 2 "SWIMA" changed state of Connection ID 1 to 'Handshake' 09[IMV] IMV 3 "Attestation" changed state of Connection ID 1 to 'Handshake'
OS Information
The TNC server receives a PB-TNC Client Data batch containing a standard
PB-Language-Preference message which sets the preferred language to
English [en] and two PA-TNC messages
09[TNC] received TNCCS batch (321 bytes) 09[TNC] TNC server is handling inbound connection 09[TNC] processing PB-TNC CDATA batch for Connection ID 1 09[TNC] PB-TNC state transition from 'Init' to 'Server Working' 09[TNC] processing IETF/PB-Language-Preference message (31 bytes) 09[TNC] processing IETF/PB-PA message (230 bytes) 09[TNC] processing IETF/PB-PA message (52 bytes) 09[TNC] setting language preference to 'en'
The first PA-TNC message of standard subtype Operating System containing seven
PA-TNC attributes that are processed by the OS IMV. The most important attribute
is the Device ID defined in the ITA-HSR namespace. Based on the keyid of
the endpoint’s Attestation Key it uniquely identfies the endpoint to be measured
09[TNC] handling PB-PA message type 'IETF/Operating System' 0x000000/0x00000001 09[IMV] IMV 1 "OS" received message for Connection ID 1 from IMC 1 09[TNC] processing PA-TNC message with ID 0x9db26aae 09[TNC] processing PA-TNC attribute type 'IETF/Product Information' 0x000000/0x00000002 09[TNC] processing PA-TNC attribute type 'IETF/String Version' 0x000000/0x00000004 09[TNC] processing PA-TNC attribute type 'IETF/Numeric Version' 0x000000/0x00000003 09[TNC] processing PA-TNC attribute type 'IETF/Operational Status' 0x000000/0x00000005 09[TNC] processing PA-TNC attribute type 'IETF/Forwarding Enabled' 0x000000/0x0000000b 09[TNC] processing PA-TNC attribute type 'IETF/Factory Default Password Enabled' 0x000000/0x0000000c 09[TNC] processing PA-TNC attribute type 'ITA-HSR/Device ID' 0x00902a/0x00000008 09[IMV] operating system name is 'Ubuntu' from vendor Canonical 09[IMV] operating system version is '20.04 x86_64' 09[IMV] operating system numeric version is 20.4 09[IMV] operational status: operational, result: successful 09[IMV] last boot: May 31 08:26:24 UTC 2022 09[IMV] IPv4 forwarding is enabled 09[IMV] factory default password is disabled 09[IMV] device ID is 732c769e8d1b2efef8b64d5ae83f84d129733fdd
The Attestation IMV has subscribed to messages of subtype Operating System
as well
09[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 1 09[TNC] processing PA-TNC message with ID 0x9db26aae 09[TNC] processing PA-TNC attribute type 'IETF/Product Information' 0x000000/0x00000002 09[TNC] processing PA-TNC attribute type 'IETF/String Version' 0x000000/0x00000004 09[TNC] processing PA-TNC attribute type 'IETF/Numeric Version' 0x000000/0x00000003 09[TNC] processing PA-TNC attribute type 'IETF/Operational Status' 0x000000/0x00000005 09[TNC] processing PA-TNC attribute type 'IETF/Forwarding Enabled' 0x000000/0x0000000b 09[TNC] processing PA-TNC attribute type 'IETF/Factory Default Password Enabled' 0x000000/0x0000000c 09[TNC] processing PA-TNC attribute type 'ITA-HSR/Device ID' 0x00902a/0x00000008 09[IMV] operating system name is 'Ubuntu' from vendor Canonical 09[IMV] operating system version is '20.04 x86_64' 09[IMV] device ID is 732c769e8d1b2efef8b64d5ae83f84d129733fdd
SWIMA Segmentation Contract
The second PA-TNC message is of standard subtype SWIMA and contains a
Segmentation Contract Request attribute defined in the TCG namespace which
proposes to split up huge PA-TNC messages into segments with a maximum size of
32'698 bytes each (see
PA-TNC message segmentation),
09[TNC] handling PB-PA message type 'IETF/SWIMA' 0x000000/0x00000009 09[IMV] IMV 2 "SWIMA" received message for Connection ID 1 from IMC 2 09[TNC] processing PA-TNC message with ID 0xc9a4e2e5 09[TNC] processing PA-TNC attribute type 'TCG/Segmentation Contract Request' 0x005597/0x00000021 09[IMV] IMV 2 received a segmentation contract request from IMC 2 for PA message type 'IETF/SWIMA' 0x000000/0x00000009 09[IMV] no message size limit, maximum segment size of 32698 bytes
The Segmentation Contract Response attribute defined in the TCG namespace is
inserted into a first PA-TNC message of standard subtype SWIMA
09[TNC] creating PA-TNC message with ID 0x3c431f74 09[TNC] creating PA-TNC attribute type 'TCG/Segmentation Contract Response' 0x005597/0x00000022 09[TNC] creating PB-PA message type 'IETF/SWIMA' 0x000000/0x00000009 09[IMV] IMV 1 requests a segmentation contract for PA message type 'IETF/Operating System' 0x000000/0x00000001 09[IMV] no message size limit, maximum segment size of 65466 bytes
IMV Policy Workitems
The imv_policy_manager program is executed which connects to the TNC database
and assigns the session number 363 to the current connection with ID 1.
Two measurement workitems are configured in the database:
-
SWIDT- SWID Tag IDs -
TPMRA- TPM Remote Attestation
09[IMV] assigned session ID 363 to Connection ID 1 09[IMV] policy: imv_policy_manager start successful 09[IMV] SWIDT workitem 659 09[IMV] TPMRA workitem 660
OS Assessment Result
No policy enforcements are defined for the OS IMV, so standard Assessment
Result and Remediation Instructions attributes are generated and inserted
into a second PA-TNC message of standard subtype Operating Systems
09[IMV] IMV 1 has no workitems - no evaluation requested 09[TNC] creating PA-TNC message with ID 0x37f97573 09[TNC] creating PA-TNC attribute type 'IETF/Assessment Result' 0x000000/0x00000009 09[TNC] creating PA-TNC attribute type 'IETF/Remediation Instructions' 0x000000/0x0000000a 09[TNC] creating PB-PA message type 'IETF/Operating System' 0x000000/0x00000001 09[TNC] IMV 1 provides recommendation 'allow' and evaluation 'don't know'
Software Identifier Event Request
The SWIMA IMV is responsible for handling the SWID Tag ID workitem,
including a SWIMA subscription request
09[IMV] IMV 2 handles SWIDT workitem 659 09[IMV] SWIMA subscription 659 requested
First a Segmentation Contract Request attribute defined in the TCG namespace
is generated
09[IMV] IMV 2 requests a segmentation contract for PA message type 'IETF/SWIMA' 0x000000/0x00000009 09[IMV] no message size limit, maximum segment size of 65466 bytes
and then a standard SWIMA Request requesting a continuous update on the
endpoint’s Software Identifier Events starting with Event ID 323
09[IMV] IMV 2 issues sw request 659 with earliest eid 323
Both attributes are inserted into a third PA-TNC message of standard subtype SWIMA
09[TNC] creating PA-TNC message with ID 0x2eabec55 09[TNC] creating PA-TNC attribute type 'TCG/Segmentation Contract Request' 0x005597/0x00000021 09[TNC] creating PA-TNC attribute type 'IETF/SWIMA Request' 0x000000/0x0000000d 09[TNC] creating PB-PA message type 'IETF/SWIMA' 0x000000/0x00000009
PTS Configuration
The Attestation IMV generates the following three PA-TNC attributes defined in
the TCG namespace
- Segmentation Contract Request - Request PTS Protocol Capabilities - PTS Measurement Algorithm Request
and inserts them into a fourth PA-TNC message of subtype PTS defined in the
TCG namespace
09[IMV] IMV 3 requests a segmentation contract for PA message type 'TCG/PTS' 0x005597/0x00000001 09[IMV] no message size limit, maximum segment size of 65466 bytes 09[TNC] creating PA-TNC message with ID 0xe6a89ae6 09[TNC] creating PA-TNC attribute type 'TCG/Segmentation Contract Request' 0x005597/0x00000021 09[TNC] creating PA-TNC attribute type 'TCG/Request PTS Protocol Capabilities' 0x005597/0x01000000 09[TNC] creating PA-TNC attribute type 'TCG/PTS Measurement Algorithm Request' 0x005597/0x06000000 09[TNC] creating PB-PA message type 'TCG/PTS' 0x005597/0x00000001
The four PA-TNC messages together with a PB-TNC PDP-Referral message defined
in the TCG namespace are sent in a PB-TNC Server Data batch to the TNC client
09[TNC] TNC server is handling outbound connection 09[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 09[TNC] creating PB-TNC SDATA batch 09[TNC] adding TCG/PB-PDP-Referral message 09[TNC] adding IETF/PB-PA message 09[TNC] adding IETF/PB-PA message 09[TNC] adding IETF/PB-PA message 09[TNC] adding IETF/PB-PA message 09[TNC] sending PB-TNC SDATA batch (402 bytes) for Connection ID 1
The TNC server receives a PB-TNC Client Data batch containing two PA-TNC messages
11[TNC] received TNCCS batch (2847 bytes) 11[TNC] TNC server is handling inbound connection 11[TNC] processing PB-TNC CDATA batch for Connection ID 1 11[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 11[TNC] processing IETF/PB-PA message (2755 bytes) 11[TNC] processing IETF/PB-PA message (84 bytes)
The SWIMA IMV handles the first PA-TNC message of standard subtype SWIMA
containing the following three attributes:
-
Segmentation Contract Responsedefined in theTCGnamespace:
The maximum segment size is reduced from to proposed65'366bytes to32'698bytes. -
PA-TNC Errordefined in the standardIETFnamespace:
TheSWIMA Requestcontained a subscription request forSW Identifier Eventswhich is not enabled on the TNC client (imc-swima.subscriptionoption). Therefore the TNC server clears the SWIMA subscription. -
SW Identifier Eventsdefined in the standardIETFnamespace:
26 new SW ID events were collected since the last run.
11[TNC] handling PB-PA message type 'IETF/SWIMA' 0x000000/0x00000009 11[IMV] IMV 2 "SWIMA" received message for Connection ID 1 from IMC 2 to IMV 2 11[TNC] processing PA-TNC message with ID 0x58b37554 11[TNC] processing PA-TNC attribute type 'TCG/Segmentation Contract Response' 0x005597/0x00000022 11[TNC] processing PA-TNC attribute type 'IETF/PA-TNC Error' 0x000000/0x00000008 11[TNC] processing PA-TNC attribute type 'IETF/SW Identifier Events' 0x000000/0x0000000f 11[IMV] IMV 2 received a segmentation contract response from IMC 2 for PA message type 'IETF/SWIMA' 0x000000/0x00000009 11[IMV] no message size limit, maximum segment size of 32698 bytes 11[IMV] received PA-TNC error 'SWIMA Subscription Denied' for request 659 11[IMV] description: subscriptions not enabled 11[IMV] SWIMA subscription 659 cleared 11[IMV] received software ID events with 26 items for request 659 at last eid 323 of epoch 0x38cd4cc6, 0 items to follow
The second PA-TNC message of subtype PTS defined in the TCG namespace contains
the following three attributes defined in the TCG namespace
- Segmentation Contract Response - PTS Protocol Capabilities - PTS Measurement Algorithm
as a response to the previous requests.
11[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001 11[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3 11[TNC] processing PA-TNC message with ID 0x03a3bf23 11[TNC] processing PA-TNC attribute type 'TCG/Segmentation Contract Response' 0x005597/0x00000022 11[TNC] processing PA-TNC attribute type 'TCG/PTS Protocol Capabilities' 0x005597/0x02000000 11[TNC] processing PA-TNC attribute type 'TCG/PTS Measurement Algorithm' 0x005597/0x07000000 11[IMV] IMV 3 received a segmentation contract response from IMC 3 for PA message type 'TCG/PTS' 0x005597/0x00000001 11[IMV] no message size limit, maximum segment size of 32698 bytes 11[PTS] supported PTS protocol capabilities: .VDT. 11[PTS] selected PTS measurement algorithm is HASH_SHA2_256
The SWIMA IMV arrives at its assessment which is allow and creates a standard
Assessment Result attribute inserted into a PA-TNC message of standard subtype
`SWIMA
11[IMV] IMV 2 handled SWIDT workitem 659: allow - received 26 SW ID events and 0 SWID tags 11[TNC] creating PA-TNC message with ID 0xcf298442 11[TNC] creating PA-TNC attribute type 'IETF/Assessment Result' 0x000000/0x00000009 11[TNC] creating PB-PA message type 'IETF/SWIMA' 0x000000/0x00000009 11[TNC] IMV 2 provides recommendation 'allow' and evaluation 'compliant'
The Attestation IMV creates a DH Nonce Parameters Request in the TCG
namespace and inserts it into a PA-TNC message of subtype PTS defined in the
TCG namespace
11[IMV] IMV 3 handles TPMRA workitem 660 11[TNC] creating PA-TNC message with ID 0x87cd81b4 11[TNC] creating PA-TNC attribute type 'TCG/DH Nonce Parameters Request' 0x005597/0x03000000 11[TNC] creating PB-PA message type 'TCG/PTS' 0x005597/0x00000001
The two PA-TNC messages are sent in a PB-TNC Server Data batch to the TNC client
11[TNC] TNC server is handling outbound connection 11[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 11[TNC] creating PB-TNC SDATA batch 11[TNC] adding IETF/PB-PA message 11[TNC] adding IETF/PB-PA message 11[TNC] sending PB-TNC SDATA batch (104 bytes) for Connection ID 1
The TNC server receives a PB-TNC Client Data batch containing a PA-TNC message
13[TNC] received TNCCS batch (144 bytes) 13[TNC] TNC server is handling inbound connection 13[TNC] processing PB-TNC CDATA batch for Connection ID 1 13[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 13[TNC] processing IETF/PB-PA message (136 bytes)
The PA-TNC message of subtype PTS defined in the TCG namespace contains
the DH Nonce Parameters Response defined in the TCG namespace which sets
the Diffie-Hellman group to ECP_256. the hash algorithm to SHA_256 and the
nonce length to 20 bytes
13[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001 13[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3 13[TNC] processing PA-TNC message with ID 0x0949ab4c 13[TNC] processing PA-TNC attribute type 'TCG/DH Nonce Parameters Response' 0x005597/0x04000000 13[PTS] selected DH hash algorithm is HASH_SHA2_256 13[PTS] selected PTS DH group is ECP_256 13[PTS] nonce length is 20
The Attestation IMV creates the following three attributes defined in the TCG
namespace
- DH Nonce Finish - Get TPM Version Information - Get Attestation Identity Key
and inserts them in a PA-TNC message of subtype PTS defined in the TCG
namespace
13[TNC] creating PA-TNC message with ID 0x385528f6 13[TNC] creating PA-TNC attribute type 'TCG/DH Nonce Finish' 0x005597/0x05000000 13[TNC] creating PA-TNC attribute type 'TCG/Get TPM Version Information' 0x005597/0x08000000 13[TNC] creating PA-TNC attribute type 'TCG/Get Attestation Identity Key' 0x005597/0x0d000000 13[TNC] creating PB-PA message type 'TCG/PTS' 0x005597/0x00000001
The PA-TNC message is sent in a PB-TNC Server Data batch to the TNC client
13[TNC] TNC server is handling outbound connection 13[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 13[TNC] creating PB-TNC SDATA batch 13[TNC] adding IETF/PB-PA message 13[TNC] sending PB-TNC SDATA batch (172 bytes) for Connection ID 1
The TNC server receives a PB-TNC Client Data batch containing a PA-TNC message
12[TNC] received TNCCS batch (172 bytes) 12[TNC] TNC server is handling inbound connection 12[TNC] processing PB-TNC CDATA batch for Connection ID 1 12[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 12[TNC] processing IETF/PB-PA message (164 bytes)
he PA-TNC message of subtype PTS defined in the TCG namespace contains
two attributes defined in the TCG namespace:
-
TPM Version Information:
Indicates the version of the implemented TPM standard (rev. 1.38), the chip or firmware vendor (STM) as well as the startup locality (3) that is important to correctly initializePCR0of the IMV’s own PCR bank emulation -
Attestation Identity Key:
This is the public part of the enpoint’s Attestation Key (AK) which is used by theAttestion IMVto verify the TPM Quote Signature. The keyid is usually equivalent to the endpoint’s hardware ID. Using strongTNC, the Trusted flag must be set in the Device Info view. As an alternative the attribute can transport the endpoint’s AK certificate.
12[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001 12[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3 12[TNC] processing PA-TNC message with ID 0xf413fa9e 12[TNC] processing PA-TNC attribute type 'TCG/TPM Version Information' 0x005597/0x09000000 12[TNC] processing PA-TNC attribute type 'TCG/Attestation Identity Key' 0x005597/0x0e000000 12[PTS] Version Information: TPM 2.0 rev. 1.38 2018 STM - startup locality: 3 12[IMV] verifying AIK with keyid 73:2c:76:9e:8d:1b:2e:fe:f8:b6:4d:5a:e8:3f:84:d1:29:73:3f:dd 12[IMV] AIK public key is trusted
Boot and IMA Event Measurements
The following three attributes are inserted into a PA-TNC message of subtype PTS
defined in the TCG namespace:
-
Get Symlinksdefined in theITA-HSRnamespace:
Request a list of symbolic links created by the operating system due to UsrMerge (eg./bin → /usr/bin). -
Request Functional Component Evidencedefined in theTCGnamespace:
Request BIOS pre-boot and IMA runtime evidence. -
Generate Attestation Evidencedefined in theTCGnamespace:
Request a TPM Quote Signature over the final state of the PCR registers involved in the evidence measurement.
12[IMV] evidence request by 12[TNC] creating PA-TNC message with ID 0xe05b2cac 12[TNC] creating PA-TNC attribute type 'ITA-HSR/Get Symlinks' 0x00902a/0x00000009 12[TNC] creating PA-TNC attribute type 'TCG/Request Functional Component Evidence' 0x005597/0x00100000 12[TNC] creating PA-TNC attribute type 'TCG/Generate Attestation Evidence' 0x005597/0x00200000 12[TNC] creating PB-PA message type 'TCG/PTS' 0x005597/0x00000001
The PA-TNC message is sent in a PB-TNC Server Data batch to the TNC client
12[TNC] TNC server is handling outbound connection 12[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 12[TNC] creating PB-TNC SDATA batch 12[TNC] adding IETF/PB-PA message 12[TNC] sending PB-TNC SDATA batch (105 bytes) for Connection ID 1
The TNC server receives a PB-TNC Client Data batch containing a PA-TNC message
14[TNC] received TNCCS batch (32745 bytes) 14[TNC] TNC server is handling inbound connection 14[TNC] processing PB-TNC CDATA batch for Connection ID 1 14[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 14[TNC] processing IETF/PB-PA message (32737 bytes)
The PA-TNC message of subtype PTS contains the following attributes:
-
Symlinksdefined in theITA-HSRnamespace:
If the endpoint’s Linux distribution supports UsrMerge then it sends a list of directory symbolic links. -
Simple Component Evidence(first batch):
Each attribute instance contains a single Boot Event measurement (SHA256 hash value plus event log entry).
14[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001
14[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3
14[TNC] processing PA-TNC message with ID 0x895b637c
14[TNC] processing PA-TNC attribute type 'ITA-HSR/Symlinks' 0x00902a/0x0000000a
14[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
14[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
...
14[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
14[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
The following symbolic links are applied during the lookup of IMA file measurements
14[PTS] adding directory symlinks: 14[PTS] /lib32 -> /usr/lib32 14[PTS] /lib -> /usr/lib 14[PTS] /libx32 -> /usr/libx32 14[PTS] /sbin -> /usr/sbin 14[PTS] /bin -> /usr/bin 14[PTS] /lib64 -> /usr/lib64
The 136 BIOS measurements are checked and the boot aggregate value as a starting point for the IMA measurements is computed and verified
14[PTS] TPM 2.0 - locality indicator set to 3 14[PTS] checking 136 BIOS evidence measurements 14[PTS] boot aggregate computed over PCR0..PCR9 is correct 14[PTS] checking boot aggregate evidence measurement
Two of the file measurements are not found in the strongTNC database
14[PTS] bc:d0:97:eb:35:88:dc:1d:c1:21:2c:8c:60:5d:55:34:db:90:f9:88:ca:a4:5f:18:ad:44:06:3a:1f:d5:cf:7e for '/usr/lib/systemd/system-generators/lvm2-activation-generator' not found 14[PTS] 14:46:6a:ac:b9:7b:20:ac:d1:2a:04:c3:c6:e7:82:1b:cb:a3:5c:82:38:68:39:64:5d:d6:4b:1c:6a:2e:c7:53 for '/etc/console-setup/cached_setup_keyboard.sh' not found
The next PB-TNC Client Data batch is requested by sending an empty PB-TNC Server Data batch
14[TNC] TNC server is handling outbound connection 14[TNC] no recommendation available yet, sending empty PB-TNC SDATA batch 14[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 14[TNC] creating PB-TNC SDATA batch 14[TNC] sending PB-TNC SDATA batch (8 bytes) for Connection ID 1
The second PB-TNC Client Data batch is received
08[TNC] received TNCCS batch (32671 bytes) 08[TNC] TNC server is handling inbound connection 08[TNC] processing PB-TNC CDATA batch for Connection ID 1 08[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 08[TNC] processing IETF/PB-PA message (32663 bytes)
The PA-TNC message of subtype PTS defined in the TCG namespace contains
Simple Component Evidence attributes
08[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001
08[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3
08[TNC] processing PA-TNC message with ID 0x04e49de2
08[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
08[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
...
08[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
08[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
Two of the file measurements are not found in the strongTNC database
08[PTS] c0:bb:99:9d:87:8c:ab:eb:ee:34:b1:57:9e:b1:96:22:a9:be:33:d3:c2:81:1f:f2:f2:38:fc:82:27:e1:43:45 for '/usr/lib/systemd/system-generators/lvm2-activation-generator' not found 08[PTS] 32:a1:e4:d4:41:06:3d:7e:4c:3b:0f:9a:f9:e6:14:9f:2b:7a:ff:c3:b7:5c:83:74:54:fe:93:39:d3:6c:60:1f for '/etc/console-setup/cached_setup_keyboard.sh' not found
The next PB-TNC Client Data batch is requested by sending an empty PB-TNC Server Data batch
08[TNC] TNC server is handling outbound connection 08[TNC] no recommendation available yet, sending empty PB-TNC SDATA batch 08[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 08[TNC] creating PB-TNC SDATA batch 08[TNC] sending PB-TNC SDATA batch (8 bytes) for Connection ID 1
The third PB-TNC Client Data batch is received
06[TNC] received TNCCS batch (32680 bytes) 06[TNC] TNC server is handling inbound connection 06[TNC] processing PB-TNC CDATA batch for Connection ID 1 06[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 06[TNC] processing IETF/PB-PA message (32672 bytes)
The PA-TNC message of subtype PTS defined in the TCG namespace contains
Simple Component Evidence attributes
06[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001
06[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3
06[TNC] processing PA-TNC message with ID 0x71bfc1a0
06[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
06[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
...
06[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
06[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
The next PB-TNC Client Data batch is requested by sending an empty PB-TNC Server Data batch
06[TNC] TNC server is handling outbound connection 06[TNC] no recommendation available yet, sending empty PB-TNC SDATA batch 06[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 06[TNC] creating PB-TNC SDATA batch 06[TNC] sending PB-TNC SDATA batch (8 bytes) for Connection ID 1
The fourth PB-TNC Client Data batch is received
12[TNC] received TNCCS batch (32644 bytes) 12[TNC] TNC server is handling inbound connection 12[TNC] processing PB-TNC CDATA batch for Connection ID 1 12[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 12[TNC] processing IETF/PB-PA message (32636 bytes)
The PA-TNC message of subtype PTS defined in the TCG namespace contains
Simple Component Evidence attributes
12[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001
12[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3
12[TNC] processing PA-TNC message with ID 0x93f33309
12[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
12[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
...
12[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
12[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
The next PB-TNC Client Data batch is requested by sending an empty PB-TNC Server Data batch
12[TNC] TNC server is handling outbound connection 12[TNC] no recommendation available yet, sending empty PB-TNC SDATA batch 12[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 12[TNC] creating PB-TNC SDATA batch 12[TNC] sending PB-TNC SDATA batch (8 bytes) for Connection ID 1
The fifth PB-TNC Client Data batch is received
14[TNC] received TNCCS batch (32614 bytes) 14[TNC] TNC server is handling inbound connection 14[TNC] processing PB-TNC CDATA batch for Connection ID 1 14[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 14[TNC] processing IETF/PB-PA message (32606 bytes)
The PA-TNC message of subtype PTS defined in the TCG namespace contains
Simple Component Evidence attributes
14[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001
14[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3
14[TNC] processing PA-TNC message with ID 0xe031c311
14[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
14[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
....
14[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
14[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
Several file measurements are not found in the strongTNC database
14[PTS] ee:cf:63:75:e5:f4:5a:5b:22:a6:8f:65:93:38:68:f1:51:53:ab:a8:cd:8c:d5:27:fc:ab:ca:44:f0:f5:e6:ea for '/usr/sbin/charon-systemd' not found
...
14[PTS] 4b:b6:e3:67:88:fa:fe:d6:2a:ef:2e:50:a8:e2:cc:0b:e3:be:f4:69:94:35:6f:d3:40:7a:a7:71:fc:9f:13:18 for '/usr/lib/libtss2-sys.so.1.0.0' not found
14[PTS] 58:ca:88:d2:8b:16:b1:8b:ee:c1:90:46:52:f7:0f:2e:4c:0e:97:72:92:38:3c:da:4c:71:f5:a5:ed:74:58:8a for '/usr/lib/libtss2-mu.so.0.0.0' not found
14[PTS] 3a:9a:93:1d:bc:5b:19:5b:23:e5:64:f9:7b:54:d0:34:ae:e7:62:9a:1f:1b:7a:dc:01:ce:d2:0a:67:60:89:ae for '/usr/lib/libtss2-tcti-device.so.0.0.0' not found
The next PB-TNC Client Data batch is requested by sending an empty PB-TNC Server Data batch
14[TNC] TNC server is handling outbound connection 14[TNC] no recommendation available yet, sending empty PB-TNC SDATA batch 14[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 14[TNC] creating PB-TNC SDATA batch 14[TNC] sending PB-TNC SDATA batch (8 bytes) for Connection ID 1
The sixth PB-TNC Client Data batch is received
08[TNC] received TNCCS batch (32671 bytes) 08[TNC] TNC server is handling inbound connection 08[TNC] processing PB-TNC CDATA batch for Connection ID 1 08[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 08[TNC] processing IETF/PB-PA message (32663 bytes) 08[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001
The PA-TNC message of subtype PTS defined in the TCG namespace contains
Simple Component Evidence attributes
08[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3
08[TNC] processing PA-TNC message with ID 0xa8f82bc7
08[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
08[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
...
08[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
08[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
The next PB-TNC Client Data batch is requested by sending an empty PB-TNC Server Data batch
08[TNC] TNC server is handling outbound connection 08[TNC] no recommendation available yet, sending empty PB-TNC SDATA batch 08[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 08[TNC] creating PB-TNC SDATA batch 08[TNC] sending PB-TNC SDATA batch (8 bytes) for Connection ID 1
The seventh PB-TNC Client Data batch is received
06[TNC] received TNCCS batch (32630 bytes) 06[TNC] TNC server is handling inbound connection 06[TNC] processing PB-TNC CDATA batch for Connection ID 1 06[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 06[TNC] processing IETF/PB-PA message (32622 bytes)
The PA-TNC message of subtype PTS defined in the TCG namespace contains
Simple Component Evidence attributes
06[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001
06[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3
06[TNC] processing PA-TNC message with ID 0xe9d4eb18
06[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
06[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
...
06[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
06[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
Several file measurements are not found in the strongTNC database
06[PTS] 56:bb:f2:6a:62:bc:ca:e7:ff:f5:2e:06:59:e2:18:5b:c8:af:c1:7d:bb:44:89:67:10:ae:db:44:1d:3c:c1:29 for '/usr/bin/tpm2' not found 06[PTS] 9a:a2:6f:88:6d:ad:01:a0:6c:6d:c5:ed:2d:4f:d3:7a:5a:57:89:19:17:28:14:27:9e:1c:7d:40:12:5d:50:e2 for '/usr/lib/libtss2-esys.so.0.0.0' not found 06[PTS] 1a:d6:6d:27:a1:92:dd:81:ae:a3:bc:37:b5:cc:7b:fa:60:9d:94:84:0e:c1:4f:c3:9c:2a:5c:9d:69:eb:e2:95 for '/usr/lib/libtss2-tctildr.so.0.0.0' not found 06[PTS] c2:4f:e6:31:c7:19:40:c5:a7:10:b3:85:c2:2e:16:a4:0e:b4:74:16:23:a0:a1:5e:e1:e0:99:85:66:52:10:95 for '/usr/lib/libtss2-rc.so.0.0.0' not found
The next PB-TNC Client Data batch is requested by sending an empty PB-TNC Server Data batch
06[TNC] TNC server is handling outbound connection 06[TNC] no recommendation available yet, sending empty PB-TNC SDATA batch 06[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 06[TNC] creating PB-TNC SDATA batch 06[TNC] sending PB-TNC SDATA batch (8 bytes) for Connection ID 1
The eighth PB-TNC Client Data batch is received
15[TNC] received TNCCS batch (23330 bytes) 15[TNC] TNC server is handling inbound connection 15[TNC] processing PB-TNC CDATA batch for Connection ID 1 15[TNC] PB-TNC state transition from 'Client Working' to 'Server Working' 15[TNC] processing IETF/PB-PA message (23322 bytes)
The PA-TNC message of subtype PTS defined in the TCG namespace contains
Simple Component Evidence attributes and the Simple Evidence Final attribute
15[TNC] handling PB-PA message type 'TCG/PTS' 0x005597/0x00000001
15[IMV] IMV 3 "Attestation" received message for Connection ID 1 from IMC 3 to IMV 3
15[TNC] processing PA-TNC message with ID 0xfc858c90
15[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
15[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
...
15[TNC] processing PA-TNC attribute type 'TCG/Simple Component Evidence' 0x005597/0x00300000
15[TNC] processing PA-TNC attribute type 'TCG/Simple Evidence Final' 0x005597/0x00400000
Several file measurements are not found in the strongTNC database
15[PTS] 8e:4a:5a:53:da:25:7c:18:53:c5:2a:52:5d:04:84:e4:41:7a:de:c5:cf:94:7b:a7:bc:62:16:eb:91:dc:fc:5f for '/etc/initramfs-tools/scripts/init-top/ima_policy' not found
15[PTS] af:e4:6b:04:21:cf:d7:b8:c0:08:c2:c5:10:96:44:28:e5:77:8c:9c:91:2c:6e:aa:75:4a:9e:73:b4:dd:12:ba for '/usr/share/initramfs-tools/scripts/local-block/lvm2' not found
...
15[PTS] bd:7a:11:17:66:ff:e9:d8:14:1d:c6:21:b7:f6:a2:b0:dc:30:77:be:49:3a:33:ca:74:48:bb:ee:ec:3c:84:9a for '/usr/share/initramfs-tools/scripts/local-top/lvm2' not found
15[PTS] fa:94:2b:f9:c1:d2:e0:17:03:56:e3:1a:59:94:fc:cd:ad:89:6d:0c:1f:74:df:95:56:c3:7c:2a:4f:ca:61:86 for '/usr/share/initramfs-tools/scripts/init-premount/lvm2' not found
The TPM Quote Signature computed over the PCR Composite digest and some additional
system information that is contained in the Simple Evidence Final attribute
is successfully verified
15[PTS] constructed PCR Composite: => 384 bytes @ 0x7f7dd80468f0
15[PTS] 0: 06 15 6C E6 46 85 9E E3 81 09 57 54 9A 18 4B 7A ..l.F.....WT..Kz
15[PTS] 16: 2E A6 C6 C0 4F 3D DB 8A 2C D3 A3 67 F4 93 16 71 ....O=..,..g...q
15[PTS] 32: 6C B0 42 07 6E C2 B8 67 A9 2B CB 8E 12 F9 14 D6 l.B.n..g.+......
15[PTS] 48: 4A 06 E2 9B A1 08 0C E4 E0 27 55 C0 21 23 6C 81 J........'U.!#l.
15[PTS] 64: 30 3B 09 87 95 4C D0 9C A1 78 B8 6B DD 60 55 40 0;...L...x.k.`U@
15[PTS] 80: F4 00 40 E8 E6 42 BD 11 73 AC 45 BC 9B 36 A3 49 ..@..B..s.E..6.I
15[PTS] 96: 3D 45 8C FE 55 CC 03 EA 1F 44 3F 15 62 BE EC 8D =E..U....D?.b...
15[PTS] 112: F5 1C 75 E1 4A 9F CF 9A 72 34 A1 3F 19 8E 79 69 ..u.J...r4.?..yi
15[PTS] 128: A3 1D BF 9D 3B CE 32 03 F2 54 59 8D 69 35 1D 8E ....;.2..TY.i5..
15[PTS] 144: 4B 7E 1B 54 CD 43 3D 1C 71 07 92 52 24 6A EC EF K~.T.C=.q..R$j..
15[PTS] 160: BB 49 6D 97 1F AB AC 31 BC 4D 1C A2 F2 EA F7 C0 .Im....1.M......
15[PTS] 176: 82 F3 E9 3C 25 6F 07 93 E0 CF 67 14 FD 36 40 4D ...<%o....g..6@M
15[PTS] 192: 3D 45 8C FE 55 CC 03 EA 1F 44 3F 15 62 BE EC 8D =E..U....D?.b...
15[PTS] 208: F5 1C 75 E1 4A 9F CF 9A 72 34 A1 3F 19 8E 79 69 ..u.J...r4.?..yi
15[PTS] 224: 44 6F 7A 67 D5 78 B2 F9 47 C4 E1 12 F7 69 96 E7 Dozg.x..G....i..
15[PTS] 240: E3 67 D2 74 AF AF BE 77 89 94 C4 1A 4B 67 BC FE .g.t...w....Kg..
15[PTS] 256: 36 77 2C B7 7B 34 C1 BC DC 41 6E 3C C0 50 E7 26 6w,.{4...An<.P.&
15[PTS] 272: 7B 64 C2 91 28 12 9B 6A 3A 13 8A 74 C6 58 73 AD {d..(..j:..t.Xs.
15[PTS] 288: E2 09 7C E2 17 04 A8 46 B3 55 3F 24 DF 4E 57 26 ..|....F.U?$.NW&
15[PTS] 304: F1 B9 86 DC 31 C3 11 B8 30 28 8D 86 00 21 EE 57 ....1...0(...!.W
15[PTS] 320: A2 7F 76 A0 91 10 EB D4 37 A0 35 FE 9F CE 70 BC ..v.....7.5...p.
15[PTS] 336: C6 5A 05 ED AA 81 CA BB 37 7F B5 49 01 A1 4E B6 .Z......7..I..N.
15[PTS] 352: E3 99 1B 7D DD 47 BE 7E 92 72 6A 83 2D 68 74 C5 ...}.G.~.rj.-ht.
15[PTS] 368: 34 9B 52 B7 89 FA 0D B8 B5 58 C6 9F EA 29 57 4E 4.R......X...)WN
15[PTS] constructed PCR Composite digest: => 32 bytes @ 0x7f7dd8044bc0
15[PTS] 0: 86 88 05 24 23 5E 82 D2 4E 3A 21 88 2A F6 F0 E0 ...$#^..N:!.*...
15[PTS] 16: C7 46 4D 35 FF A1 FE 93 88 FE 2E C0 02 95 70 86 .FM5..........p.
15[PTS] constructed TPM Quote Info: => 145 bytes @ 0x7f7dd80411e0
15[PTS] 0: FF 54 43 47 80 18 00 22 00 0B BD E2 F1 F3 E7 B6 .TCG..."........
15[PTS] 16: 0C A6 6D 93 1C EC AC 7D 25 B4 69 F0 E3 9E 96 9D ..m....}%.i.....
15[PTS] 32: 3D B8 A8 79 89 FB E2 C1 9B C5 00 20 C0 82 AC F2 =..y....... ....
15[PTS] 48: 74 2A AB 92 A1 A7 48 8A 8B 74 DC 29 0A 4E 82 30 t*....H..t.).N.0
15[PTS] 64: 9B D6 11 43 53 B1 95 21 5B B2 3F 59 00 00 00 00 ...CS..![.?Y....
15[PTS] 80: 5F AE 07 C5 00 00 01 13 00 00 00 00 01 00 01 01 _...............
15[PTS] 96: 02 00 00 00 00 00 00 00 01 00 0B 03 FF 47 00 00 .............G..
15[PTS] 112: 20 86 88 05 24 23 5E 82 D2 4E 3A 21 88 2A F6 F0 ...$#^..N:!.*..
15[PTS] 128: E0 C7 46 4D 35 FF A1 FE 93 88 FE 2E C0 02 95 70 ..FM5..........p
15[PTS] 144: 86 .
15[IMV] TPM Quote Info signature verification successful
1732 IMA file evidence measurements were processed, only 107 of them were not found in the strongTNC database
15[PTS] processed 1732 IMA file evidence measurements: 1625 ok, 107 unknown, 0 differ, 0 failed 15[PTS] 136 BIOS evidence measurements are ok 15[IMV] MV 3 handled TPMRA workitem 660: allow - processed 1732 IMA file evidence measurements: 1625 ok, 107 unknown, 0 differ, 0 failed; 136 BIOS evidence measurements are ok
TNC Assessment Result
Since all 136 BIOS evidence and 1625 IMA file evidence measurements and the TPM
Quote Signature were correct, the Attestation IMV generates a standard
Assessment Result attribute with the evaluation compliant and the
recommendation allow and inserts it in a PA-TNC message of subtype PTS
defined in the TGC namespace
15[TNC] creating PA-TNC message with ID 0x5553fd69 15[TNC] creating PA-TNC attribute type 'IETF/Assessment Result' 0x000000/0x00000009 15[TNC] creating PB-PA message type 'TCG/PTS' 0x005597/0x00000001 15[TNC] IMV 3 provides recommendation 'allow' and evaluation 'compliant'
The overall policy recommendation issued by the TNC server is allow and
communicated to the TNC client in the form of a PB-TNC Assessment-Result
and a PB-TNC Access-Recommendation payload, both of which are sent together
with the PA-TNC message from the Attestation IMV in a PB-TNC Result batch to
the TNC client
15[TNC] TNC server is handling outbound connection 15[IMV] policy: recommendation for access requestor 10.10.1.52 is allow 15[IMV] policy: imv_policy_manager stop successful 15[IMV] IMV 1 "OS" changed state of Connection ID 1 to 'Allowed' 15[IMV] IMV 2 "SWIMA" changed state of Connection ID 1 to 'Allowed' 15[IMV] IMV 3 "Attestation" changed state of Connection ID 1 to 'Allowed' 15[TNC] PB-TNC state transition from 'Server Working' to 'Decided' 15[TNC] creating PB-TNC RESULT batch 15[TNC] adding IETF/PB-PA message 15[TNC] adding IETF/PB-Assessment-Result message 15[TNC] adding IETF/PB-Access-Recommendation message 15[TNC] sending PB-TNC RESULT batch (88 bytes) for Connection ID 1
The TNC client replies with a PB-TNC Close batch which causes the OS IMV,
SWIMA IMV and Attestation IMV states as well as the PB-TNC connection
to be deleted. Due to the positive final recommendation, the IKEv2 connection is
allowed to complete
06[TNC] received TNCCS batch (8 bytes) 06[TNC] TNC server is handling inbound connection 06[TNC] processing PB-TNC CLOSE batch for Connection ID 1 06[TNC] PB-TNC state transition from 'Decided' to 'End' 06[TNC] final recommendation is 'allow' and evaluation is 'compliant' 06[TNC] policy enforced on peer 'mijas.strongsec.com' is 'allow' 06[TNC] policy enforcement point added group membership 'allow' 06[IKE] EAP_TTLS phase2 authentication of 'mijas.strongsec.com' with EAP_PT_EAP successful 06[IMV] IMV 1 "OS" deleted the state of Connection ID 1 06[IMV] IMV 2 "SWIMA" deleted the state of Connection ID 1 06[IMV] IMV 3 "Attestation" deleted the state of Connection ID 1 06[TNC] removed TNCCS Connection ID 1
IKEv2 Authentication Success
The EAP TTLS authentication based on a TLS client certificate plus the TNC
measurements was successful. Thus an EAP-SUCCESS message is sent to the EAP client
06[IKE] EAP method EAP_TTLS succeeded, MSK established 06[ENC] generating IKE_AUTH response 269 [ EAP/SUCC ] 06[NET] sending packet: from 10.10.0.150[4500] to 10.10.1.52[4500] (80 bytes)
The IKEv2 client sends an AUTH payload depending on the MSK (Master Secret Key)
derived from the EAP-TTLS session
05[NET] received packet: from 10.10.1.52[4500] to 10.10.0.150[4500] (112 bytes) 05[ENC] parsed IKE_AUTH request 270 [ AUTH ] 05[IKE] authentication of 'mijas.strongsec.com' with EAP successful 05[IKE] authentication of 'vpn.strongswan.org' (myself) with EAP 05[IKE] IKE_SA eap[1] established between 10.10.0.150[vpn.strongswan.org]...10.10.1.52[mijas.strongsec.com]
The IKEv2 server in turn authenticates itself again via an AUTH payload depending
on the EAP-TTLS MSK as well
05[IKE] maximum IKE_SA lifetime 11245s
05[IKE] peer requested virtual IP %any
05[CFG] assigning new lease to 'mijas.strongsec.com'
05[IKE] assigning virtual IP 10.10.1.65 to peer 'mijas.strongsec.com'
05[CFG] selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ
05[IKE] CHILD_SA eap{1} established with SPIs c3c268a8_i c28cd4ab_o and TS 10.10.0.150/32 === 10.10.1.65/32
05[ENC] generating IKE_AUTH response 270 [ AUTH CPRP(ADDR DNS) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_6_ADDR) ]
05[NET] sending packet: from 10.10.0.150[4500] to 10.10.1.52[4500] (272 bytes)
The IKEv2 connection has been successfully established.