Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

You've heard of HTTPS. Now get a load of HTTPA: Web services in verified remote trusted environments?
The Register ^ | 20 October 2021 | Thomas Claburn

Posted on 10/20/2021 10:29:46 AM PDT by ShadowAce

Two Intel staffers believe web services can be made more secure by not only carrying out computations in remote trusted execution environments, or TEEs, but by also verifying for clients that this was done so.

Software engineer Gordon King and Hans Wang, a research scientist at Intel Labs, proposed the protocol to make that possible. In a paper distributed this month through ArXiv, they describe a HTTP protocol called HTTPS Attestable (HTTPA) to enhance online security with remote attestation – a way for apps to obtain an assurance that data will be handled by trusted software in secure execution environments.

Essentially, it's hoped that applications can verify through certificates and cryptography that code running in a server-side TEE is precisely the code expected to be run, unmodified by a rogue administrator, hijacked OS or hypervisor, network intruder, or malware. Ideally, the TEE should prevent or detect miscreants from snooping on or altering the code and data.

The threat model is fragile with lots of requirements and caveats. If it all falls into place, "HTTPA provides an assurance to confirm the client’s workloads [will] run inside the expected enclave with expected verified software," as the duo put it in their paper [PDF].

"With HTTPA, we can provide security assurances to establish trustworthiness with web services and ensure integrity of request handling for web users," King and Wang continued. "We expect that remote attestation will become a new trend adopted to reduce web services security risks, and propose the HTTPA protocol to unify the web attestation and accessing services in a standard and efficient way."

Software services, the boffins contend, can be hijacked by network intruders, for example, and offer no real assurances about the integrity of computing workloads or communications channels. HTTPS alone, they say, isn't up to the challenge, but HTTPA perhaps can do better.

HTTPA relies on a TEE and Intel just happens to offer such a thing: Software Guard Extensions, or SGX.

SGX can be used by applications to form what's called enclaves in memory in which computations on sensitive information can occur in private from all other software thanks to automatic in-memory encryption of data and code as well as other protections. It should be possible to cryptographically check that all is as expected within an enclave; essentially, SGX provides the ingredients for the pair's proposed remote attestation system.

The neutral zone

In an email to The Register, King and Wang said while their proposal focused on how SGX could be used for more secure web interaction, the protocol accommodates TEEs from other vendors, such as Arm's TrustZone.

"The protocol is neutral and open to all the industrial participants," they wrote.

TEEs have been utilized to protect web services before, say King and Wang, but they've been deployed to address specific concerns. "We propose a general solution to standardize attestation over HTTPS and establish multiple trusted connections to protect and manage requested data for selected HTTP domains," they say.

HTTPA assumes the client is trusted and the server is not. So the client can use HTTPA to obtain a guarantee the server can be trusted to handle the requested computation within a TEE. HTTPA, however, doesn't extend beyond the TEE to vouch for the trustworthiness of the server overall.

Put another way, it takes the security benefits of TLS – certificate-based server authentication, integrity guarantees, forward secrecy and session replay prevention – and extends protection to data at rest and during computation.

HTTPA requires extending the HTTPS handshake process, the networking back-and-forth by which the client and server talk to one another. The protocol calls for three sets of HTTP methods: HTTP preflight request and response; HTTP attest request and response; and HTTP trusted session request and response.

"Preflight request checks if the attestation protocol is accepted by the server for using the 'ATTEST' method and headers," the authors explain in their paper. "It is an 'OPTIONS request,' using one HTTP request headers: Access-Control-Request-Method."

The HTTP attest and HTTP trusted session methods that follow are new; HTTP preflight is an existing mechanism used with Cross-origin resource sharing (CORS) for checking to see whether a server can handle a specific protocol.

A two-way street

For scenarios where two-way attestation is necessary, the authors describe a variant called Mutual HTTPA, or mHTTPA. It's a bit more complicated however as both the client and the server need to include two pre-session secrets for deriving session keys in their own TEEs.

King and Wang said, "We believe that [HTTPA] could be potentially beneficial to some industries, eg., fintech and healthcare."

Asked whether the protocol might interfere with services that have stringent bandwidth or latency requirements, they replied, "Further exploration would be needed to confirm any performance impact; however, we do not anticipate any significant performance change from other HTTPS protocols."

As to whether or when HTTPA might actually be adopted, that's not clear. Asked whether there's any plan to submit the spec as an RFC or to undertake some other form of standardization, they said, "We have some ongoing discussions that need to be reviewed by [Intel's] legal team before [disclosure]." ®


TOPICS: Computers/Internet
KEYWORDS: http; www

1 posted on 10/20/2021 10:29:46 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; AFreeBird; ...

2 posted on 10/20/2021 10:29:58 AM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

This appears, on its face, to be more of a PR gimmick than anything else.

You are still relying on trust in somebody else. It does not seem to add an empirically more secure process or hardware environment or am I missing something?


3 posted on 10/20/2021 10:32:42 AM PDT by SoConPubbie (Mitt and Obama: They're the same poison, just a different potency)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Sounds good. I bet they can get the Chinese government to pay for writing the code.


4 posted on 10/20/2021 10:35:42 AM PDT by monkeyshine (live and let live is dead)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SoConPubbie

It’s hard to tell from the article.


5 posted on 10/20/2021 10:36:41 AM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce

You’ve heard of HTTPS. Now get a load of HTTPA: Web services in verified remote trusted environments?

HTTPA requires vaccine compliance.


6 posted on 10/20/2021 10:48:06 AM PDT by Flick Lives (The future is a quiet world)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Standards are great. You can always make new ones for any particular purpose. The problem is getting other people to use them.


7 posted on 10/20/2021 10:50:26 AM PDT by glorgau
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I gave up when they came up with that ZIP code idea.


8 posted on 10/20/2021 10:57:05 AM PDT by Mark (Celebrities... is there anything they do not know? Homer Simpson)
[ Post Reply | Private Reply | To 1 | View Replies]

HTTP and HTTPS are outdated protocols. HGTP will become the next WEB 3.0 standard, via Constellation Hypergraph (DAG)


9 posted on 10/20/2021 10:59:03 AM PDT by blabs
[ Post Reply | Private Reply | To 8 | View Replies]

To: Flick Lives

Lol, and social distancing and masks


10 posted on 10/20/2021 10:59:34 AM PDT by Bob434
[ Post Reply | Private Reply | To 6 | View Replies]

To: ShadowAce

I don’t have a lot of trust in the Internet.


11 posted on 10/20/2021 11:51:06 AM PDT by Brian Griffin ( )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

12 posted on 10/20/2021 12:40:10 PM PDT by outofsalt (If history teaches us anything, it's that history rarely teaches anything.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: usconservative; Mr. K

Curious what you both think. I’m wondering if the Attesting is really that meaningful to web security, inasmuch as, sure, I know computations are correct/accurate/unaltered, HOWEVER, you still need encryption to transport such things as bank accounts, transactions, and the numbers behind them. I’m not seeing where that encryption happens?


13 posted on 10/20/2021 2:34:42 PM PDT by Lazamataz (I feel like it is 1937 Germany, and my last name is Feinberg.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: blabs
HTTP and HTTPS are outdated protocols. HGTP will become the next WEB 3.0 standard, via Constellation Hypergraph (DAG)

I agree, HTTP is definitely outdated and HTTPS will be (or already is) very insecure, especially with even 1-QBIT Quantum computing.

Expound on HGTP if you can and would.

14 posted on 10/20/2021 2:37:21 PM PDT by Lazamataz (I feel like it is 1937 Germany, and my last name is Feinberg.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Lazamataz

I’ll have to get back to you on this. I’m in Sedona Arizona with the girlfriend for the week.


15 posted on 10/20/2021 3:37:31 PM PDT by usconservative (When The Ballot Box No Longer Counts, The Ammunition Box Does. (What's In Your Ammo Box?))
[ Post Reply | Private Reply | To 13 | View Replies]

To: SoConPubbie

My BIL works for Intel so I’ll have to ask him but the implication to me is if you’re using software as a service whether as a person or a business, both entities have to have keys to work together. Without the keys, you can’t play in the sandbox. Think of the certificates or keys as a password containing 1,000 letters, characters etc.


16 posted on 10/20/2021 5:40:11 PM PDT by Mean Daddy (Every time Hillary lies, a demon gets its wings. - Windflier)
[ Post Reply | Private Reply | To 3 | View Replies]

To: usconservative
I’ll have to get back to you on this. I’m in Sedona Arizona with the girlfriend for the week.

Enjoy, bro! But yes. Definitely look all this over. Seems a piece might be missing, namely, actual encrypted transport.

17 posted on 10/21/2021 5:09:54 AM PDT by Lazamataz (I feel like it is 1937 Germany, and my last name is Feinberg.)
[ Post Reply | Private Reply | To 15 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson