<?xml version='1.0'?>
<!DOCTYPE rfc SYSTEM 'rfc2629.dtd'>
<rfc ipr="trust200902" docName="draft-hallambaker-mesh-platform-02" category="info">
<?rfc toc="yes"?>  
<?rfc symrefs="yes"?>  
<?rfc sortrefs="yes"?>  
<?rfc compact="yes"?>  
<?rfc subcompact="no"?>  
<front>
<title abbrev="Mathematical Mesh Platform Configuration">Mathematical Mesh: Platform Configuration</title>
<author fullname="Phillip Hallam-Baker" initials="P. M." surname="Hallam-Baker">
<organization>Comodo Group Inc.</organization>
<address>
<email>philliph@comodo.com</email>
</address>
</author>
<date day="10" month="April" year="2018"/>
<area/>
<workgroup/>
<abstract>
<t>
The Mathematical Mesh ?The Mesh? is an end-to-end secure infrastructure that facilitates the exchange of configuration and credential data between multiple user devices. This document describes how Mesh profiles are stored for application access on Windows, Linux and OSX platforms.</t>
<t>
This document is also available online at <eref target="http://prismproof.org/Documents/draft-hallambaker-mesh-platform.html">
http://prismproof.org/Documents/draft-hallambaker-mesh-platform.html</eref>
.</t>
</abstract>
</front>
<middle>
<section title="Introduction" anchor="s-1">
<t>
This document describes recommended platform specific configuration for Mathematical Mesh applications. The use of common conventions for storage of profiles and private keys allows mesh enabled applications to interoperate on the same machine.</t>
<t>
Protecting private key material from disclosure to other processes presents complex and difficult technical challenges. Ensuring that a key is properly erased from storage before memory is released relies on a complex series of assumptions about memory management at the compiler, operating system and the platform level. </t>
<t>
For maximum security, the use of private key storage facilities provided by the platform is preferred.</t>
</section>
<section title="Definitions" anchor="s-2">
<t>
This section presents the related specifications and standard, the terms that are used as terms of art within the documents and the terms used as requirements language.</t>
<section title="Requirements Language" anchor="s-2_1">
<t>
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 <xref target="RFC2119">
</xref>
.</t>
</section>
<section title="Defined Terms" anchor="s-2_2">
<t>
The terms of art used in this document are described in the Mesh Architecture Guide <xref target="draft-hallambaker-mesh-architecture">
</xref>
.</t>
</section>
<section title="Related Specifications" anchor="s-2_3">
<t>
The architecture of the Mathematical Mesh is described in the Mesh Architecture Guide <xref target="draft-hallambaker-mesh-architecture">
</xref>
. The Mesh documentation set and related specifications are described in this document.</t>
</section>
<section title="Implementation Status" anchor="s-2_4">
<t>
The implementation status of the reference code base is described in the companion document <xref target="draft-hallambaker-mesh-developer">
</xref>
.</t>
</section>
</section>
<section title="Windows Platform Configuration" anchor="s-3">
<t>
The Windows Configuration is stored in a combination of Windows Key Store entries, registry entries and data files.</t>
<t>
The profiles that are available to a user are specified as Windows registry keys.</t>
<t>
Cached and archival copies of profiles are stored on the local machine as data files with file names and locations specified in the Windows registry.</t>
<t>
Cryptographic keys are stored in a Windows key store.</t>
<t>
To locate a device, application or personal profile, an application:</t>
<t>
Searches for a Windows registry entry that matches the relevant criteria.</t>
<t>
Retrieves the profile data from either a local cached copy or the corresponding portal.</t>
<t>
Accesses the corresponding private keys through the Windows key store.</t>
<t>
The Windows Key store is the natural storage location for cryptographic keys on the Windows platform as keys are at minimum protected by the operating system access control mechanism. The Windows key store also permits the use of cryptographic hardware devices.</t>
<section title="Registry Key Entries" anchor="s-3_1">
<t>
All keys used by the Mathematical Mesh are stored in the following Windows registry location:</t>
<t>
HKEY_CURRENT_USER\SOFTWARE\CryptoMesh</t>
<t>
This location has the following sub keys:</t>
<t><list style="hanging">
<t hangText="PersonalProfiles">
(Default) -&gt; UDF fingerprint of the default personal profile</t>
<t hangText="PersonalProfiles\&amp;lt;UDF&amp;gt;">
(Default) -&gt; File location for the profile.</t>
<t>
Archive -&gt; File location for the profile archive.</t>
<t>
Portals -&gt; Multistring containing portal accounts to which the profile is registered. The default portal is first.</t>
<t hangText="ApplicationProfiles">
Web -&gt; UDF fingerprint of default Web Application profile</t>
<t>
SSH -&gt; UDF fingerprint of default SSH Application profile</t>
<t>
Network -&gt; UDF fingerprint of default network Application profile</t>
<t>
Mail -&gt; UDF fingerprint of default Mail Application profile</t>
<t>
&lt;UDF Fingerprint of profile&gt; -&gt; File location of profile  </t>
<t hangText="DeviceProfiles">
(Default) -&gt; UDF fingerprint of default device profile</t>
<t>
&lt;UDF Fingerprint of Device profile&gt; -&gt; File location of device profile</t>
</list></t>
</section>
<section title="Data File Locations" anchor="s-3_2">
<t>
ApplicationData \CryptoMesh\</t>
</section>
<section title="Key Store Entries" anchor="s-3_3">
</section>
<section title="Profiles" anchor="s-3_4">
<section title="Locating a personal profile" anchor="s-3_4_1">
<t>
To locate the default personal profile, an application:</t>
<t>
Retrieves the key PersonalProfiles\(Default) to get &lt;UDF&gt;</t>
<t>
Locates the profile with identifier &lt;UDF&gt;</t>
<t>
To locate the personal profile with identifier UDF, an application:</t>
<t>
Retrieves the key PersonalProfiles\&lt;UDF&gt;</t>
<t>
Retrieves the latest version of the profile from the location specified in PersonalProfiles\&lt;UDF&gt;\(Default)</t>
<t>
If necessary, the profile is refreshed from one of the accounts specified in PersonalProfiles\&lt;UDF&gt;\Portal</t>
<t>
In case of an inconsistency being detected, the application MAY use the archived copies of the profile to resynchronize.</t>
<t>
Note that having been connected to a profile at some time in the past does not guarantee that a device currently has access, even if the device in question was an administration device for the profile.</t>
</section>
<section title="Locating a device profile" anchor="s-3_4_2">
<t>
To locate a device profile an application </t>
</section>
<section title="Locating an application profile" anchor="s-3_4_3">
<t>
To locate a device profile an application </t>
<t>
</t>
</section>
</section>
</section>
<section title="OSX Platform Configuration" anchor="s-4">
<t>
The OSX configuration is stored in a combination of a master configuration file, profile data files and the OSX KeyChain</t>
<t>
The profiles that are available to a user are stored in a JSON configuration file </t>
<t>
Cached and archival copies of profiles are stored on the local machine as data files with file names and locations specified in the JSON configuration file</t>
<t>
Cryptographic keys are stored in the OSX Key Chain.</t>
<t>
File locations</t>
<t>
The JSON Configuration file is stored in ~/.cryptomesh/profiles.json</t>
<t>
Profile data files are stored in a directory ~/.cryptomesh/&lt;UDF&gt;</t>
<t>
The latest copy of the profile is stored in &lt;UDF&gt;.mmm</t>
<t>
An archive containing all the stored profiles is stored in &lt;UDF&gt;.all.mmm</t>
<t>
</t>
<section title="Key Storage" anchor="s-4_1">
<t>
Private keys are stored in the OSX Key Manager in some fashion to be decided later.</t>
</section>
</section>
<section title="Linux Platform Configuration" anchor="s-5">
<t>
The Linux configuration is stored in a combination of a master configuration file, profile data files and private key files.</t>
<t>
The file layout of the Linux configuration and data files is identical to that of OSX.</t>
<section title="Key Storage" anchor="s-5_1">
<t>
Private Keys are stored in the locations that the Linux applications that are to use them expect to find them.</t>
</section>
</section>
<section title="IANA Considerations" anchor="s-6">
<t>
None</t>
</section>
<section title="Acknowledgements" anchor="s-7">
<t>
TBS</t>
<t>
</t>
</section>
</middle>
<back>
<references title="Normative References">
<reference anchor="RFC2119">
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname="S. Bradner" initials="S." surname="Bradner">
<organization/>
<address>
</address>
</author>
<date month="March" year="1997"/>
</front>
<seriesInfo name="BCP" value="14"/>
<seriesInfo name="RFC" value="2119"/>
<seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
</references>
<references title="Informative References">
<reference anchor="draft-hallambaker-mesh-architecture">
<front>
<title>Mathematical Mesh: Architecture</title>
<author fullname="Phillip Hallam-Baker" initials="P" surname="Hallam-Baker">
<organization/>
<address>
</address>
</author>
<date day="18" month="September" year="2017"/>
</front>
<seriesInfo name="Internet-Draft" value="draft-hallambaker-mesh-architecture-04"/>
<format type="TXT" target="http://www.ietf.org/internet-drafts/draft-hallambaker-mesh-architecture-04.txt"/>
</reference>
<reference anchor="draft-hallambaker-mesh-developer">
<front>
<title>Mathematical Mesh: Reference Implementation</title>
<author fullname="Phillip Hallam-Baker" initials="P" surname="Hallam-Baker">
<organization/>
<address>
</address>
</author>
<date day="18" month="September" year="2017"/>
</front>
<seriesInfo name="Internet-Draft" value="draft-hallambaker-mesh-developer-05"/>
<format type="TXT" target="http://www.ietf.org/internet-drafts/draft-hallambaker-mesh-developer-05.txt"/>
</reference>
</references>
</back>
</rfc>
