<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>

<rfc ipr="trust200902" docName="draft-ietf-rats-pkix-evidence-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="PKI-based Attestation Evidence">PKI-based Attestation Evidence</title>

    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author initials="R." surname="Kettlewell" fullname="Richard Kettlewell">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>Richard.Kettlewell@entrust.com</email>
      </address>
    </author>
    <author initials="J. P." surname="Fiset" fullname="Jean-Pierre Fiset">
      <organization abbrev="Crypto4A">Crypto4A Technologies Inc.</organization>
      <address>
        <postal>
          <street>1550A Laperriere Ave</street>
          <city>Ottawa, Ontario</city>
          <code>K1Z 7T2</code>
          <country>Canada</country>
        </postal>
        <email>jp@crypto4a.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Siegx</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization>Beyond Identity</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@beyondidentity.com</email>
      </address>
    </author>

    <date year="2024" month="October" day="11"/>

    <area>Security</area>
    <workgroup>RATS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 96?>

<t>This document specifies ASN.1 structures produced by an Attester as part
of the remote attestation procedures and constitute Evidence.</t>

<t>This document follows the Remote ATtestation procedureS (RATS)
architecture where Evidence is sent by an Attester and processed by
a Verifier.</t>



    </abstract>



  </front>

  <middle>


<?line 105?>

<section anchor="introduction"><name>Introduction</name>

<t>Trusted execution environments, like secure elements and hardware security
modules (HSMs), are now widely used, which provide a safe environment to place
cryptographic key material and security sensitive code which uses it,
such as signing and decryption services, secure boot, secure storage,
and other essential security functions.  These security functions are
typically exposed through a narrow and well-defined interface, and can be
used by operating system libraries and applications.</t>

<t>Increasingly, parties that rely on these secure elements want evidence
that the security sensitive operations are in fact being performed within
a secure element. This evidence can pertain to the secure element platform
itself, or to the storage and protection properties of the cryptographic keys,
or both. This is generally referred to as remote attestation, and is covered by
the Remote ATtestation procedureS (RATS) architecture <xref target="RFC9344"/>. This document
species an evidence data format specified in ASN.1 and re-using many data
structures from the PKIX ASN.1 modules <xref target="RFC5912"/> so to be a convenient format
for secure elements and verifiers that are designed primarily for use within
X.509 Public Key Infrastructures.</t>

<t>When a Certificate Signing Request (CSR) library is requesting a certificate
from a Certification Authority (CA), a PKI end entity may wish to provide
Evidence of the security properties of the trusted execution environment
in which the private key is stored. This Evidence is to be verified by a
Relying Party, such as the Registration Authority or the Certification
Authority as part of validating an incoming CSR against a given certificate
policy. <xref target="I-D.ietf-lamps-csr-attestation"/> defines how to carry Evidence in
either PKCS#10 <xref target="RFC2986"/> or Certificate Request Message Format (CRMF)
<xref target="RFC4211"/>.</t>

<t><xref target="I-D.ietf-lamps-csr-attestation"/> is agnostic to the content and the encoding
of Evidence. To offer interoperability it is necessary to define a format
that is utilized in a specific deployment environment.
Hardware security modules and other trusted execution environments, which
have been using ASN.1-based encodings for a long time prefer the use of
the same format throughout their software ecosystem. For those use cases
this specification has been developed.</t>

<t>This specification re-uses the claims defined in <xref target="I-D.ietf-rats-eat"/>.
While the encoding of the claims is different to what is defined in
<xref target="I-D.ietf-rats-eat"/>, the semantics of the claims is retained. This
specification is not an EAP profile, as defined in Section 6 of
<xref target="I-D.ietf-rats-eat"/></t>

<t>This specification was designed to meet the requirements published by the
CA Browser Forum to convey properties about hardware security models, such
as non-exportability, which must be enabled for storing publicly-trusted
code-signing keys. Hence, this specification is supposed to be used with
the attestation extension for Certificate Signing Requests (CSRs), see
<xref target="I-D.ietf-lamps-csr-attestation"/>.</t>

<t>There are, however, other use cases where remote attestation may also be
used, such as</t>

<t><list style="symbols">
  <t>A Certification Authority receives a certificate signing request and wishes to verify that the subject public key was generated in an HSM (for example to satisfy CA/B Forum subscriber private key verification requirement). They may also wish to verify that the operations the HSM will allow for the corresponding private key are consistent with the purpose of the requested certificate.</t>
  <t>A user of a Cloud Service Provider's 'Bring Your Own Key' service wishes to transfer their locally-generated key securely to the CSP's service by encrypting it under the CSP's public key. As part of their due diligence on the CSP's key they wish to verify (1) that it was generated by an HSM and (2) may only be used to unwrap the key into an HSM (i.e. unwrap permission but not decrypt permission).</t>
  <t>An auditor of an identity provision service (or a competent end user) may wish to verify that keys representing end-user identities are held in an HSM and have permissions that are in line with the applicable regulations. For example, they may wish verify that the protection arrangements for assigned keys cannot be changed.</t>
  <t>A manufacturer needs to provision configuration info, software, and credentials to a device from remote. With the help of remote attestation the manufacturer is provided enough information to verify that information is only sent to devices it has built.</t>
</list></t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>This document re-uses the terms defined in <xref target="RFC9334"/> related to remote
attestation. Readers of this document are assumed to be familiar with
the following terms: Evidence, Claim, Attestation Result, Attester,
Verifier, and Relying Party.</t>

</section>
<section anchor="attestation-evidence"><name>Attestation Evidence</name>

<t>This specification defines the following Evidence format, which contains
a set of claims. To protect Evidence against modification, it is protected
with a digital signature.</t>

<figure><sourcecode type="asn.1"><![CDATA[
PkixEvidenceStatement ::= SEQUENCE {
  tbsEvidence TBSEvidenceStatement
  signatureValues SEQUENCE SIZE (1..MAX) OF BIT STRING,
  relatedCertificates [0] IMPLICIT SEQUENCE of Certificate OPTIONAL
  -- As defined in RFC 5280
}

TBSEvidenceStatement ::= SEQUENCE {
  version INTEGER,
  claims SEQUENCE SIZE (1..MAX) OF EVIDENCE-CLAIM,
  signatureInfos SEQUENCE SIZE (1..MAX) OF SignatureInfo
}

EVIDENCE-CLAIM ::= TYPE-IDENTIFIER

-- TYPE-IDENTIFIER definition from X.681
TYPE-IDENTIFIER ::= CLASS
{
    &id OBJECT IDENTIFIER UNIQUE,
    &Type
}
WITH SYNTAX {&Type IDENTIFIED BY &id}

SignatureInfo ::= SEQUENCE {
   signatureAlgorithm AlgorithmIdentifier,
   sid [0] SignerIdentifier OPTIONAL
}

SignerIdentifier ::= SEQUENCE {
   keyId [0] EXPLICIT OCTET STRING OPTIONAL,
   subjectKeyIdentifier [1] EXPLICIT SubjectPublicKeyInfo OPTIONAL,
     -- As defined in RFC 5280
   certificate [2] EXPLICIT Certificate OPTIONAL,
     -- As defined in RFC 5280
   certHash [3] EXPLICIT CertHash OPTIONAL
}

CertHash ::= SEQUENCE {
    hash AlgorithmIdentifier,
    value OCTET STRING
}
-- There is bound to already exist an ASN.1 structure for this somewhere.

AlgorithmIdentifier ::= SEQUENCE {
   algorithm OBJECT IDENTIFIER,
   parameters ANY DEFINED BY algorithm OPTIONAL
}
]]></sourcecode></figure>

<t><spanx style="verb">version</spanx> <bcp14>MUST</bcp14> be set to 1.</t>

</section>
<section anchor="signing-and-verification-procedure"><name>Signing and Verification Procedure</name>

<t>EDNOTE: Can we start our versions at some number to avoid versions that
Crypto4A has already used?</t>

<section anchor="signing-procedure"><name>Signing Procedure</name>

<t><list style="numbers" type="1">
  <t>The message to be signed is the <spanx style="verb">TBSEvidenceStatement</spanx>, including the <spanx style="verb">SignatureInfo</spanx> for each of the signatures to be performed.</t>
  <t>Each signature is computed in parallel and placed into index of the
<spanx style="verb">signatureValues</spanx> SEQUENCE that matches the position of the corresponding
<spanx style="verb">SignatureInfo</spanx> in the <spanx style="verb">signatureInfos</spanx> sequence.</t>
</list></t>

<t>The signer <bcp14>MUST</bcp14> produce one signature per <spanx style="verb">signatureInfo</spanx>, it <bcp14>MUST NOT</bcp14>
omit signatures and <bcp14>MUST NOT</bcp14> produce a subset of the signatures listed in <spanx style="verb">signatureInfos</spanx>.</t>

</section>
<section anchor="verification-procedure"><name>Verification Procedure</name>

<t><list style="numbers" type="1">
  <t>The message to be verified is the <spanx style="verb">TBSEvidenceStatement</spanx>.</t>
  <t>For each <spanx style="verb">signatureInfo</spanx>, the corresponding verification public key
and signature algorithm is found according to the information contained
in the <spanx style="verb">SignatureInfo</spanx> for that signature and any accompanying
certificates or key material.</t>
  <t>For each signature, the message is verified using the value from the
corresponding element of the <spanx style="verb">signatureValue</spanx> sequence.</t>
  <t>The <spanx style="verb">PkixEvidenceStatement</spanx> <bcp14>SHOULD</bcp14> be considered valid if and only if
all signatures are valid; i.e. multiple signatures are to be treated as
an AND mode. This item is a recommendation and not a hard requirement
since verification policy is of course at the discretion of the Verifier.</t>
</list></t>

<t>EDNOTE: the major change here from the original Crypto4A QASM Attestation
is that the original only includes the claims in the signature, whereas
this includes everything, including the version, list of signature
algorithms. This prevents
possible attacks where those values are manipulated by attackers.
We should debate whether the certificates should be protected by the signature.
Pro: generally better for security to sign everything.
Con: in some contexts, it may be difficult to have the certificates prior to signing, but that's ok because most evidence carrier formats also allow you to attach the signatures externally.</t>

</section>
</section>
<section anchor="claims"><name>Claims</name>

<t>Since no claims are marked as MANDATORY, the sequence 'claims' may be constituted of
differing claims from one instance to the next. This is expected as each evidence statement
may be providing information to support different use cases.</t>

<t>Once an evidence statement is signed, the Attester is guaranteeing that all of the claims
carried by the evidence statement are true.</t>

<t>It is important to note that multiple claims in the sequence may have the same 'id'. Implementers
should ensure that this case is handled by verifying logic.</t>

<t>For ease of reading, claims have been separated into two lists:
"platform claims" and "key claims".</t>

<section anchor="platform-claims"><name>Platform Claims</name>

<figure><artwork><![CDATA[
| Claim          | OID      | Value        | Section           | Status       |
| --------       | -------- | ------------ | ----------------- | ------------ |
| Oemid          | TBD      | UTF8String   | {{sect-deviceID}} | RECOMMENDED  |
| Hwmodel        | TBD      | UTF8String   | {{sect-deviceID}} | RECOMMENDED  |
| Hwversion      | TBD      | UTF8String   | {{sect-deviceID}} | RECOMMENDED  |
| Hwserial       | TBD      | UTF8String   | {{sect-deviceID}} | RECOMMENDED  |
| Ueid           | TBD      | UTF8String   | {{sect-ueid}    } | OPTIONAL     |
| Sueid          | TBD      | UTF8String   | {{sect-sueid}}    | OPTIONAL     |
| EnvID          | TBD      | UTF8String   | {{sect-envID}}    | OPTIONAL     |
| Swname         | TBD      | UTF8String   | {{sect-swID}}     | RECOMMENDED  |
| Swversion      | TBD      | UTF8String   | {{sect-swID}}     | RECOMMENDED  |
| Oemboot        | TBD      | BOOLEAN      | {{sect-oemboot}}  | RECOMMENDED  |
| Location       | TBD      | ???          | {{sect-location}} | OPTIONAL     |
| Dbgstat        | TBD      | CHOICE       | {{sect-dbgstat}}  | RECOMMENDED  |
| Uptime         | TBD      | INTEGER      | {{sect-uptime}}   | OPTIONAL     |
| Bootcount      | TBD      | INTEGER      | {{sect-bootcount}}| OPTIONAL     |
| Bootseed       | TBD      | BIT STRING   | {{sect-bootseed}} | OPTIONAL     |
| Dloas          | TBD      | SEQUENCE OF Dloa | {{sect-dloas}}    | OPTIONAL     |
| Endorsements   | TBD      | SEQUENCE of Endorsement | {{sect-endorsements}} | OPTIONAL |
| Manifests      | TBD      | ??           | {{sect-manifests}} | OPTIONAL    |
| Measurements   | TBD      | ??           | {{sect-measurements}} | OPTIONAL    |
| Measres        | TBD      | ??           | {{sect-measres}}   | OPTIONAL    |
| Submods        | TBD      | ??           | {{sect-submods}}   | OPTIONAL    |
| Iat            | TBD      | Time         | {{sect-iat}}       | RECOMMENDED |
| FipsMode       | TBD      | Boolean      | {{sect-fipsmode}}  | RECOMMENDED |
| VendorInfo     | TBD      | TYPE-IDENTIFIER | {{sect-vendorinfo}}| OPTIONAL    |
| NestedEvidences| TBD      | SEQUENCE OF PkixEvidenceStatement | {{sect-nestedevidences}} | OPTIONAL |
| Nonce          | TBD      | OCTET STRING | {{sect-nonce}}     | OPTIONAL    |
]]></artwork></figure>

</section>
<section anchor="key-claims"><name>Key Claims</name>

<figure><artwork><![CDATA[
| Claim          | OID      | Value        | Section           | Status       |
| --------       | -------- | ------------ | ----------------- | ------------ |
| KeyId          | TBD      | IA5String    | {{sect-keyid}}    | OPTIONAL     |
| PubKey         | TBD      | OCTET STRING | {{sect-pubkey}}   | RECOMMENDED  |
| Purpose        | TBD      | CHOICE       | {{sect-purpose}}  | RECOMMENDED  |
| NonExportable  | TBD      | BOOLEAN      | {{sect-nonexportable}} | RECOMMENDED |
| Imported       | TBD      | BOOLEAN      | {{sect-imported}} | RECOMMENDED  |
| KeyExpiry      | TBD      | Time         | {{sect-keyexpiry}}| OPTIONAL     |
]]></artwork></figure>

<t>Even though no specific claims are required, a Verifier or Relying Party <bcp14>MAY</bcp14> reject an
Evidence claim if it is missing information required by the appraisal
policy. For example, a Relying Party which requires a FIPS-certified device
<bcp14>SHOULD</bcp14> reject Evidence if it does not contain sufficient
information to determine the FIPS certification status of the device.</t>

</section>
<section anchor="sect-deviceID"><name>Device Identifier</name>

<t>Devices assigned a Universal Entity ID compliant with RATS EAT <bcp14>SHOULD</bcp14>
provide this in the <spanx style="verb">Ueid</spanx> or <spanx style="verb">Sueid</spanx> claim. Devices with a traditional
human-readable serial number <bcp14>SHOULD</bcp14> provide this in the <spanx style="verb">Hwserial</spanx> claim.
Both <bcp14>MAY</bcp14> be provided.</t>

<t>The set <spanx style="verb">{OemID, Hwmodel, Hwversion, Hwserial}</spanx>, when provided, <bcp14>SHOULD</bcp14>
represent a universally unique identification of the device. Where
applicable, <spanx style="verb">{OemID, Hwmodel, Hwversion}</spanx> <bcp14>SHOULD</bcp14> match the way the
device is identified in relevant endorsements, such as published FIPS
or Common Criteria certificates.</t>

<section anchor="sect-ueid"><name>ueid (Universal Entity ID) Claim</name>

<t>The "ueid" claim conveys a UEID, which identifies an individual manufactured
entity. This identifier is a globally unique and permanent identifier. See
Section 4.2.1 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim. Three
types of UEIDs are defined, which are distinguished via a type field.</t>

<t>The ueid claim is defined as follows:</t>

<figure><artwork><![CDATA[
   id-ce-evidence-ueid OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_ueid }

   claim_ueid ::= SEQUENCE {
       type    INTEGER ( RAND(1), EUI(2), IMEI(3),...),
       value   OCTET STRING
   }
]]></artwork></figure>

</section>
<section anchor="sect-sueid"><name>sueids (Semi-permanent UEIDs) Claim (SUEIDs)</name>

<t>The "sueids" claim conveys one or more semi-permanent UEIDs (SUEIDs).
An SUEID has the same format, characteristics and requirements as a
UEID, but <bcp14>MAY</bcp14> change to a different value on entity life-cycle
events while the ueid claim is permanent. An entity <bcp14>MAY</bcp14> have both
a UEID and SUEIDs, neither, one or the other.</t>

<t>There <bcp14>MAY</bcp14> be multiple SUEIDs and each has a text string label the
purpose of which is to distinguish it from others.</t>

<t>See Section 4.2.2 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>

<t>The sueids claim is defined as follows:</t>

<figure><artwork><![CDATA[
   id-ce-evidence-sueids OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_sueids }

   claim_sueids ::= SEQUENCE {
       label   OCTET STRING,
       type    INTEGER ( RAND(1), EUI(2), IMEI(3),...),
       value   OCTET STRING
   }
]]></artwork></figure>

</section>
<section anchor="oemid-hardware-oem-identification-claim"><name>oemid (Hardware OEM Identification) Claim</name>

<t>The "oemid" claim identifies the Original Equipment Manufacturer (OEM) of
the hardware.</t>

<t>See Section 4.2.3 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>

<t>The value of this claim depends on the type of OEMID and three types of IDs
are defined:</t>

<t><list style="symbols">
  <t>OEMIDs using a 128-bit random number.
Section 4.2.3.1 of <xref target="I-D.ietf-rats-eat"/> defines this type.</t>
  <t>an IEEE based OEMID using a global registry for MAC addresses and company IDs.
Section 4.2.3.1 of <xref target="I-D.ietf-rats-eat"/> defines this type.</t>
  <t>OEMIDs using Private Enterprise Numbers maintained by IANA.
Section 4.2.3.3 of <xref target="I-D.ietf-rats-eat"/> defines this type.</t>
</list></t>

<t>The oemid claim is defined as follows:</t>

<figure><artwork><![CDATA[
   id-ce-evidence-oemid OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_oemid }

   claim_oemid ::= SEQUENCE {
       type    INTEGER ( PEN(1), IEEE(2), RANDOM(3),...),
       value   OCTET STRING
   }
]]></artwork></figure>

<t>Editor's Note: The value for the PEN is numeric. For the other
two types it is a binary string.</t>

</section>
<section anchor="hwmodel-hardware-model-claim"><name>hwmodel (Hardware Model) Claim</name>

<t>The "hwmodel" claim differentiates hardware models, products and variants
manufactured by a particular OEM, the one identified by OEM ID.
It <bcp14>MUST</bcp14> be unique within a given OEM ID.  The concatenation of the OEM ID
and "hwmodel" give a global identifier of a particular product.
The "hwmodel" claim <bcp14>MUST</bcp14> only be present if an "oemid" claim is present.</t>

<t>See Section 4.2.4 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>

<t>The hwmodel claim is defined as follows:</t>

<figure><artwork><![CDATA[
   id-ce-evidence-hwmodel OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_hwmodel }

   claim_hwmodel ::= OCTET STRING
]]></artwork></figure>

</section>
<section anchor="hwversion-hardware-version-claim"><name>hwversion (Hardware Version) Claim</name>

<t>The "hwversion" claim is a text string the format of which is set by each
manufacturer. A "hwversion" claim <bcp14>MUST</bcp14> only be present if a "hwmodel" claim
is present.</t>

<t>See Section 4.2.5 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>

<t>The hwversion claim is defined as follows:</t>

<figure><artwork><![CDATA[
   id-ce-evidence-hwversion OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_hwwversion }

   hwversion ::= OCTET STRING
]]></artwork></figure>

</section>
</section>
<section anchor="sect-envID"><name>Environment Identifier</name>

<figure><sourcecode type="asn.1"><![CDATA[
EnvID EVIDENCE-CLAIM ::= UTF8String IDENTIFIED BY TBD
]]></sourcecode></figure>

<t>This claim <bcp14>MAY</bcp14> be used to identify a partition within a cryptographic
device, or a logical environment that spans multiple cryptographic
devices such as a Security World or a cloud tenant. The format of
these identifiers will be vendor or environment specific.</t>

</section>
<section anchor="sect-swID"><name>Software Identifier</name>

<figure><sourcecode type="asn.1"><![CDATA[
Swname EVIDENCE-CLAIM ::= UTF8String IDENTIFIED BY TBD
  -- semantics defined in rats-eat-4.2.6
Swversion EVIDENCE-CLAIM ::= UTF8String IDENTIFIED BY TBD
  -- semantics defined in rats-eat-4.2.7
]]></sourcecode></figure>

<t><spanx style="verb">SwName</spanx> and <spanx style="verb">Swversion</spanx> together identify the device firmware and
<bcp14>SHOULD</bcp14> match the way the firmware is identified in relevant
endorsements, such as published FIPS or Common Criteria certificates.</t>

</section>
<section anchor="sect-oemboot"><name>OEM Boot</name>

<figure><sourcecode type="asn.1"><![CDATA[
Oemboot EVIDENCE-CLAIM ::= BOOLEAN IDENTIFIED BY TBD
  -- semantics defined in rats-eat-4.2.8
]]></sourcecode></figure>

</section>
<section anchor="sect-dbgstat"><name>Dbgstat (Debug Status)</name>

<t>The "dbgstat" claim applies to entity-wide or submodule-wide debug
facilities and diagnostic hardware built into chips. It applies to
any software debug facilities related to privileged software that
allows system-wide memory inspection, tracing or modification of
non-system software like user mode applications.</t>

<t>See Section 4.2.9 of <xref target="I-D.ietf-rats-eat"/> for a description of this
claim and the semantic of the values in the enumerated list.</t>

<t>The dbgstat claim is defined as follows:</t>

<figure><sourcecode type="asn.1"><![CDATA[
Dbgstat EVIDENCE-CLAIM ::= CHOICE {
    enabled                         [0] IMPLICIT NULL,
    disabled                        [1] IMPLICIT NULL,
    disabled-Since-Boot             [2] IMPLICIT NULL,
    disabled-Permanently            [3] IMPLICIT NULL,
    disabled-Fully-and-Permanently  [4] IMPLICIT NULL
}
  -- semantics defined in rats-eat-4.2.9
]]></sourcecode></figure>

</section>
<section anchor="sect-location"><name>Location</name>

<figure><sourcecode type="asn.1"><![CDATA[
Location EVIDENCE-CLAIM ::= ???? IDENTIFIED BY TBD
  -- semantics defined in rats-eat-4.2.10
]]></sourcecode></figure>

<t>Most HSMs will likely not know their own physical location, but cryptographic modules on mobile devices may.</t>

</section>
<section anchor="sect-uptime"><name>Uptime</name>

<t>The "uptime" claim contains the number of seconds that have elapsed
since the entity or submodule was last booted.</t>

<figure><sourcecode type="asn.1"><![CDATA[
Uptime EVIDENCE-CLAIM ::= INTEGER IDENTIFIED BY TBD
  -- semantics defined in rats-eat-4.2.11
]]></sourcecode></figure>

</section>
<section anchor="bootcount-sect-bootcount"><name>Bootcount {sect-bootcount}</name>

<t>The "bootcount" claim contains a count of the number times the entity
or submodule has been booted.  Support for this claim requires a
persistent storage on the device.</t>

<figure><sourcecode type="asn.1"><![CDATA[
Bootcount EVIDENCE-CLAIM ::= INTEGER IDENTIFIER BY TBD
  -- semantics defined in rats-eat-4.2.12
]]></sourcecode></figure>

</section>
<section anchor="sect-bootseed"><name>Bootseed</name>

<t>The "bootseed" claim contains a value created at system boot time
that allows differentiation of attestation reports from different
boot sessions of a particular entity (e.g., a certain UEID).</t>

<t>This value is usually public.  It is not a secret and <bcp14>MUST NOT</bcp14> be
used for any purpose that a secret seed is needed, such as seeding
a random number generator.</t>

<figure><sourcecode type="asn.1"><![CDATA[
Bootseed EVIDENCE-CLAIM ::= BIT STRING IDENTIFIED BY TBD
  -- semantics defined in rats-eat-4.2.13
]]></sourcecode></figure>

</section>
<section anchor="sect-dloas"><name>dloas (Digital Letters of Approval)</name>

<t>The "dloas" claim conveys one or more Digital Letters of Approval
(DLOAs).  A DLOA is a document that describes a certification
that an entity has received.  Examples of certifications represented
by a DLOA include those issued by Global Platform and those based on
Common Criteria.  The DLOA is unspecific to any particular
certification type or those issued by any particular organization.</t>

<figure><sourcecode type="asn.1"><![CDATA[
Dloas EVIDENCE-CLAIM ::= SEQUENCE SIZE (1..MAX) OF Dloa

Dloa ::= SEQUENCE IDENTIFIED BY TBD {
    dloaRegistrar IA5STRING,
    dloaPlatformLabel UTF8STRING,
    dloaApplicationLabal [0] IMPLICIT UTF8String OPTIONAL
}
  -- semantics defined in rats-eat-4.2.14
]]></sourcecode></figure>

</section>
<section anchor="sect-endorsements"><name>Endorsements</name>

<t>This claim allows referencing third party endorsements; for example
from the device vendor or a certification such as FIPS or Common
Criteria. The content <bcp14>MAY</bcp14> be referenced by URI, or placed directly
inline, but either way, the endorsement content or its URI <bcp14>MUST</bcp14> be
known by the attester at the time that the evidence is generated.</t>

<figure><sourcecode type="asn.1"><![CDATA[
Endorsements EVIDENCE-CLAIM ::= SEQUENCE SIZE (1..MAX) OF Endorsement

Endorsement ::= CHOICE IDENTIFIED BY TBD {
    uri     [0] IMPLICIT IA5String,
    content [1] IMPLICIT OCTET STRING
}
]]></sourcecode></figure>

<t>EDNOTE: this needs a bit of thought about what types of endorsements
we will likely see, and whether OCTET STRING is the right format.</t>

</section>
<section anchor="sect-manifests"><name>Manifests</name>

<t>TODO -- rats-eat-4.2.15</t>

</section>
<section anchor="sect-measurements"><name>Measurements</name>

<t>TODO -- rats-eat-4.2.16</t>

</section>
<section anchor="sect-measres"><name>Measres (Software Measurement Results)</name>

<t>TODO -- rats-eat-4.2.17</t>

</section>
<section anchor="sect-submods"><name>Submods (Submodules)</name>

<t>TODO -- rats-eat-4.2.18</t>

</section>
<section anchor="sect-iat"><name>iat (Issuance Time)</name>

<t>The time at which the evidence was created. Here we differ from
the <spanx style="verb">iat</spanx> claim in rats-eat-4.3.1 in that we use the PKIX time
format <spanx style="verb">Time</spanx> instead of the 64-bit CBOR time structure.</t>

<figure><sourcecode type="asn.1"><![CDATA[
Iat EVIDENCE-CLAIM ::= Time
]]></sourcecode></figure>

<t>It is recognized that many HSMs, especially if air-gapped, will
not have an accurate system clock. If the system is not anticipated
to have a reliable clock, then this claim <bcp14>SHOULD</bcp14> be omitted and
the <spanx style="verb">Nonce</spanx> claim used instead.</t>

</section>
<section anchor="sect-intuse"><name>intuse (Intended Use)</name>

<figure><sourcecode type="asn.1"><![CDATA[
Intuse EVIDENCE-CLAIM ::= CHOICE IDENTIFIED BY TBD {
    generic              [1] IMPLICIT NULL,
    registration         [2] IMPLICIT NULL,
    provisioning         [3] IMPLICIT NULL,
    certificateIssuance  [4] IMPLICIT NULL,
    proofOfPossession    [5] IMPLICIT NULL
}
  -- semantics defined in rats-eat-4.3.3
]]></sourcecode></figure>

<t>Note: tags intentionally started at 1 to align with EAT. If the
IANA registry of intended use claims is extended, then the this
CHOICE <bcp14>MAY</bcp14> be extended using the same tag values as indicated
in the EAT registry.</t>

</section>
<section anchor="sect-fipsmode"><name>FipsMode</name>

<t>The cryptographic module was booted in FIPS mode, including the
required self-tests and any other requiremnts of its FIPS certificate.</t>

<t>Note to verifiers and relying parties: "FIPS Mode" does not imply
"FIPS Certified". For example, a device may have a FIPS Mode even
if the device was never submitted for FIPS certification. This
claim <bcp14>SHOULD</bcp14> only be taken in conjunction with a valid FIPS
certification for this hardware and software version, and
appraising any other claims as required by the FIPS certification.</t>

<figure><sourcecode type="asn.1"><![CDATA[
FipsMode EVIDENCE-CLAIM ::= BOOLEAN IDENTIFIED BY TBD
]]></sourcecode></figure>

</section>
<section anchor="sect-vendorinfo"><name>VendorInfo</name>

<t>This claim provides a place for vendor to place propriatary data;
i.e. any proprietary data that does not fit in any other claim.</t>

<figure><sourcecode type="asn.1"><![CDATA[
VendorInfo ::= TYPE-IDENTIFIER IDENTIFIED BY TBD
]]></sourcecode></figure>

<t>Vendors must specify an OID and data type for their VendorInfo,
and communicate this to verifiers who wish to parse this data.</t>

</section>
<section anchor="sect-nestedevidences"><name>NestedEvidences</name>

<figure><sourcecode type="asn.1"><![CDATA[
NestedEvidences EVIDENCE-CLAIM ::= SEQUENCE OF PkixEvidenceStatement IDENTIFIED BY TBD
]]></sourcecode></figure>

<t>Composite devices may produce multiple signed evidence statements
that need to be signed in a hiearchical manner. PkixEvidenceStatements
<bcp14>MAY</bcp14> be nested.</t>

</section>
<section anchor="sect-nonce"><name>Nonce</name>

<t>The "nonce" claim is used to provide freshness.</t>

<t>The Nonce claim is used to carry the challenge provided by the caller to
demonstrate freshness of the generated token. The following constraints
apply to the nonce-type:</t>

<t><list style="symbols">
  <t>The length must be reasonable as it may be processed by end entities with limited resources.
Therefore, it is <bcp14>RECOMMENDED</bcp14> that the length does not exceed 64 bytes.</t>
  <t>Only a single nonce value is conveyed.</t>
</list></t>

<t>The nonce claim is defined as follows:</t>

<figure><sourcecode type="asn.1"><![CDATA[
Nonce EVIDENCE-CLAIM ::= OCTET STRING IDENTIFIED BY TBD
]]></sourcecode></figure>

<t>See Section 4.1 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>

</section>
<section anchor="sect-keyid"><name>KeyId</name>

<t>An identifier for the subject key. The format <bcp14>MAY</bcp14> be vendor-specific,
but <bcp14>MUST</bcp14> be an ASCII value (IA5String).</t>

<figure><sourcecode type="asn.1"><![CDATA[
KeyId EVIDENCE-CLAIM ::= IA5String IDENTIFIED BY TBD
]]></sourcecode></figure>

</section>
<section anchor="sect-pubkey"><name>PubKey</name>

<t>The subject public key being attested by this evidence.</t>

<figure><sourcecode type="asn.1"><![CDATA[
PubKey EVIDENCE-CLAIM ::= OCTET STRING IDENTIFIED BY TBD
]]></sourcecode></figure>

</section>
<section anchor="sect-purpose"><name>Purpose</name>

<t>TODO: align with PKCS#11 Purposes</t>

<figure><sourcecode type="asn.1"><![CDATA[
Purpose EVIDENCE-CLAIM ::= CHOICE IDENTIFIED BY TBD {
   ... Sign, Decrypt, Unwrap, etc..

}
]]></sourcecode></figure>

</section>
<section anchor="sect-nonexportable"><name>NonExportable</name>

<t>TODO align with PKCS#11</t>

<figure><sourcecode type="asn.1"><![CDATA[
NonExportable EVIDENCE-CLAIM ::= BOOLEAN IDENTIFIED BY TBD
]]></sourcecode></figure>

</section>
<section anchor="sect-imported"><name>Imported</name>

<t>TODO align with PKCS#11</t>

<figure><sourcecode type="asn.1"><![CDATA[
Imported EVIDENCE-CLAIM ::= BOOLIAN IDENTIFIED BY TBD
]]></sourcecode></figure>

</section>
<section anchor="sect-keyexpiry"><name>KeyExpiry</name>

<t>If the key has a known expiry time or "not after" date.</t>

<figure><sourcecode type="asn.1"><![CDATA[
KeyExpiry EVIDENCE-CLAIM ::= Time
]]></sourcecode></figure>

</section>
<section anchor="unrecognized-claims"><name>Unrecognized claims</name>

<t>This document does not define an exhaustive list of claims. New claims
may be added in the future, including proprietary ones. As such, parsers
<bcp14>SHOULD</bcp14> expect to encounter unrecognized claims, and to handle them gracefully.</t>

<t>In general, the correct behaviour for a verifier will be to start with an
appraisal policy of claims to look for, and where appropriate the expected
values (for example, FipsMode: true), and any additional claims that may be in the
evidence <bcp14>SHOULD</bcp14> be ignored.</t>

</section>
</section>
<section anchor="extclaims-extension"><name>Evidence Claims Certificate Extension</name>

<t>This section specifies the syntax and semantics of the Evidence Claims certificate extension which
provides a list of claims associated with the certificate subject appraised by the CA.</t>

<t>The Evidence Claims certificate extension <bcp14>MAY</bcp14> be included in public key certificates <xref target="RFC5280"></xref>.
The Evidence Claims certificate extension <bcp14>MUST</bcp14> be identified by the following object identifier:</t>

<figure><artwork><![CDATA[
     id-pe-evidenceclaims OBJECT IDENTIFIER  ::=
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-pe(1) 34 }
]]></artwork></figure>

<t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>

<t>The Evidence Claims extension <bcp14>MUST</bcp14> have the following syntax:</t>

<figure><artwork><![CDATA[
EvidenceClaims ::= SET SIZE (1..MAX) OF EVIDENCE-CLAIM
]]></artwork></figure>

<t>The EvidenceClaims represents an unsigned version of the evidence claims appraised by the CA.
It <bcp14>MUST</bcp14> contain at least one claim.  For privacy reasons, the CA <bcp14>MAY</bcp14> include only a subset
of the EvidenceClaims that were presented to it, for example in an EvidenceBundle in a CSR.
The CA may include in their certificate profile a
list of verified evidence claims (identified by OID) that <bcp14>MAY</bcp14> be copied from the CSR to
the certificate, while any other claims <bcp14>MUST NOT</bcp14> be copied.
By removing the signature from the evidence, the CA is asserting that it has has verified
the Evidence to chain to a root that the CA trusts, but it is not required to disclose
in the final certificate what that root is.</t>

<t>See <xref target="sec-priv-cons"/> for a discussion of privacy concerns related to re-publishing
Evidence into a certificate.</t>

<section anchor="extclaims-asn"><name>ASN.1 Module</name>

<t>This section provides an ASN.1 Module <xref target="X.680"/> for the Evidence Claims
certificate extension, and it follows the conventions established in
<xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>

<figure><artwork><![CDATA[
   <CODE BEGINS>
     EvidenceClaimsCertExtn
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) id-mod(0)
         id-mod-evidenceclaims(TBD) }

     DEFINITIONS IMPLICIT TAGS ::=
     BEGIN

     IMPORTS
       EXTENSION
       FROM PKIX-CommonTypes-2009  -- RFC 5912
         { iso(1) identified-organization(3) dod(6) internet(1)
           security(5) mechanisms(5) pkix(7) id-mod(0)
           id-mod-pkixCommon-02(57) } ;

     -- Evidence Claims Certificate Extension

     ext-EvidenceClaims EXTENSION ::= {
       SYNTAX EvidenceClaims
       IDENTIFIED BY id-pe-evidenceclaims }

     -- EvidenceClaims Certificate Extension OID

     id-pe-evidenceclaims OBJECT IDENTIFIER ::=
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-pe(1) 34 }

     -- Evidence Claims Certificate Extension Syntax

     EvidenceClaims ::= SET SIZE (1..MAX) OF EVIDENCE-CLAIM

     END
   <CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="implementation-considerations"><name>Implementation Considerations</name>

<section anchor="api-for-requesting-evidence-from-an-attesting-device"><name>API for requesting evidence from an attesting device</name>

<t>While it is strictly outside the scope of this document to specify how a calling application
can request evidence from a cryptographic device, two modes are suggested.</t>

<section anchor="request-by-id-and-claim-profile"><name>Request by ID and claim profile</name>

<t>In this mode, the calling application request evidence about a given entity
-- for example, a given EnvID or a given KeyID -- and the cryptographic device
assembles a <spanx style="verb">PkixEvidenceStatement</spanx> containing as many claims as it is able to
populate. Implementers may have named evidence profiles if it is desirable for
the cryptographic device to respond with multiple different sets of claims.</t>

</section>
<section anchor="request-by-claim-set"><name>Request by claim set</name>

<t>In this mode, the calling application pre-constructs a sequence of <spanx style="verb">EVIDENCE-CLAIM</spanx>
which is passed in to the attesting device. As a response, the attesting device returns
a structure of type <spanx style="verb">PkixEvidenceStatement</spanx> which includes all the expected signatures.</t>

<t>This mode is useful for attesting devices with more resources and used in situations where
the supported evidence profiles may not be known during implementation.</t>

<t>It is left to the implementer to choose the way that the desired claims are submitted to the
attesting device, including which types of claims are recognized and how much information is
provided by the caller.</t>

<t>However, when using this mode:
- an attesting device <bcp14>MUST</bcp14> reject the production of a <spanx style="verb">PkixEvidenceStatement</spanx> if any requested
  claim is not recognized; and,
- an attesting device <bcp14>MUST</bcp14> reject the production of a <spanx style="verb">PkixEvidenceStatement</spanx> if any requested
  claim is not supported by the observed state (claim is deemed false).</t>

<t>The use of this mode implies that the attesting device contains the logic necessary to interpret
and verify the submitted claims.</t>

</section>
</section>
</section>
<section anchor="sec-priv-cons"><name>Privacy Considerations</name>

<section anchor="publishing-evidence-in-a-certificate"><name>Publishing Evidence in a certificate</name>

<t>The extension <bcp14>MUST NOT</bcp14> publish in the certificate any privacy-sensitive information
that could compromise the end device. What counts as privacy-sensitive will vary by
use case. For example, consider a few scenarios:</t>

<t>First, consider a Hardware Security Module (HSM) backing a public code-signing service.
The model and firmware patch level could be considered sensitive as it could give an
attacker an advantage in exploiting known vulnerabilities against un-patched systems.</t>

<t>Second, consider a certificate issued to a end-user mobile computing device,
any sort of unique identifier could be used as a super-cookie for tracking
purposes.</t>

<t>Third, consider small IoT devices such as un-patchable wireless sensors.
Here there may be no privacy concerns and in fact knowing exact hardware
and firmware version information could help edge gateways to deny network
access to devices with known vulnerabilities.</t>

<t>Beyond that, a CA <bcp14>MUST</bcp14> have a configurable mechanism to control which information
is to be copied from the provided Evidence into the certificate, for example this
could be configured within a certificate profile or Certificate Practice Statement
(CPS) and this must be considered on a case-by-base basis.  To protect end-user
privacy, CA operators should err on the
side of caution and exclude information that is not clearly essential for security
verification by relying parties.  Avoiding unnecessary claims also mitigates the risk
of targeted attacks, where an
attacker could exploit knowledge of hardware versions, models, etc.</t>

</section>
</section>
<section anchor="sec-cons"><name>Security Considerations</name>

<t>This specification re-uses the claims from the EAT specification and
relies on the security protection offered by digital signatures. This
digital signature is computed with the Attestation Key available
on the device, see Section 12.1 of <xref target="RFC9334"/> for considerations
regarding the generation, the use and the protection of these
Attestation Keys. Since the Attester located at the end entity creates
the Evidence with claims defined in this document. This document inherits
the remote attestation architecture described in <xref target="RFC9334"/>. With the
re-use of the claims from <xref target="I-D.ietf-rats-eat"/> the security and privacy
considerations apply also to this document even though the encoding
in this specification is different from the encoding of claims
discussed by <xref target="I-D.ietf-rats-eat"/>.</t>

<t>Evidence contains information that may be unique to a device
and may therefore allow to single out an individual device for
tracking purposes.  Deployments that have privacy requirements must
take appropriate measures to ensure that claim values can only
identify a group of devices and that the Attestation Keys are used
across a number of devices as well.</t>

<t>To verify the Evidence, the primary need is to check the signature and
the correct encoding of the claims. To produce the Attestation Result,
the Verifier will use Endorsements, Reference Values, and Appraisal
Policies. The policies may require that certain claims must be present
and that their values match registered reference values.  All claims
may be worthy of additional appraisal.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBD: OIDs for all the claims listed in this document.</t>

<section anchor="oids-for-evidence-claims-certificate-extension"><name>OIDs for Evidence Claims Certificate Extension</name>

<t>For the EvidenceClaims certificate extension in <xref target="extclaims-extension"/>,
IANA is requested to assign an object identifier (OID) for the certificate extension.
The OID for the certificate extension should be allocated in the "SMI
Security for PKIX Certificate Extension" registry (1.3.6.1.5.5.7.1).</t>

<t>For the ASN.1 Module in <xref target="extclaims-asn"/>, IANA is requested to assign an
object identifier (OID) for the module identifier.  The OID for the
module should be allocated in the "SMI Security for PKIX Module
Identifier" registry (1.3.6.1.5.5.7.0).</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>


<reference anchor="I-D.ietf-rats-eat">
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
         <organization>Mediatek USA</organization>
      </author>
      <author fullname="Jeremy O&#x27;Donoghue" initials="J." surname="O&#x27;Donoghue">
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname="Carl Wallace" initials="C." surname="Wallace">
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day="6" month="September" year="2024"/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
   
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2986">
  <front>
    <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
    <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <date month="November" year="2000"/>
    <abstract>
      <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2986"/>
  <seriesInfo name="DOI" value="10.17487/RFC2986"/>
</reference>

<reference anchor="RFC4211">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="September" year="2005"/>
    <abstract>
      <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4211"/>
  <seriesInfo name="DOI" value="10.17487/RFC4211"/>
</reference>

<reference anchor="RFC5912">
  <front>
    <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="June" year="2010"/>
    <abstract>
      <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5912"/>
  <seriesInfo name="DOI" value="10.17487/RFC5912"/>
</reference>

<reference anchor="RFC9344">
  <front>
    <title>CCNinfo: Discovering Content and Network Information in Content-Centric Networks</title>
    <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
    <author fullname="A. Ooka" initials="A." surname="Ooka"/>
    <author fullname="X. Shao" initials="X." surname="Shao"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes a mechanism named "CCNinfo" that discovers information about the network topology and in-network cache in Content-Centric Networks (CCNs). CCNinfo investigates 1) the CCN routing path information per name prefix, 2) the Round-Trip Time (RTT) between the content forwarder and the consumer, and 3) the states of in-network cache per name prefix. CCNinfo is useful to understand and debug the behavior of testbed networks and other experimental deployments of CCN systems.</t>
      <t>This document is a product of the IRTF Information-Centric Networking Research Group (ICNRG). This document represents the consensus view of ICNRG and has been reviewed extensively by several members of the ICN community and the RG. The authors and RG chairs approve of the contents. The document is sponsored under the IRTF, is not issued by the IETF, and is not an IETF standard. This is an experimental protocol and the specification may change in the future.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9344"/>
  <seriesInfo name="DOI" value="10.17487/RFC9344"/>
</reference>

<reference anchor="RFC6268">
  <front>
    <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="July" year="2011"/>
    <abstract>
      <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6268"/>
  <seriesInfo name="DOI" value="10.17487/RFC6268"/>
</reference>


<reference anchor="I-D.ietf-lamps-csr-attestation">
   <front>
      <title>Use of Remote Attestation with Certification Signing Requests</title>
      <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
         <organization>Entrust Limited</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>Siemens</organization>
      </author>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         <organization>Beyond Identity</organization>
      </author>
      <author fullname="Ned Smith" initials="N." surname="Smith">
         <organization>Intel Corporation</organization>
      </author>
      <date day="18" month="September" year="2024"/>
      <abstract>
	 <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of Evidence in Certificate Signing Requests (CSRs)
   such as PKCS#10 or Certificate Request Message Format (CRMF) payloads
   which provides an elegant and automatable mechanism for transporting
   Evidence to a Certification Authority.

   Including Evidence along with a CSR can help to improve the
   assessment of the security posture for the private key, and can help
   the Certification Authority to assess whether it satisfies the
   requested certificate profile.  These Evidence Claims can include
   information about the hardware component&#x27;s manufacturer, the version
   of installed or running firmware, the version of software installed
   or running in layers above the firmware, or the presence of hardware
   components providing specific protection capabilities or shielded
   locations (e.g., to protect keys).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-11"/>
   
</reference>


<reference anchor="X.680" target="https://www.itu.int/rec/T-REC-X.680">
  <front>
    <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

</references>


<?line 999?>

<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>This specification is the work of a design team created by the chairs
of the LAMPS working group. This specification has been developed
based on discussions in that design team.</t>

<t>The following persons, in no specific order, contributed to the work:
Richard Kettlewell, Chris Trufan, Bruno Couillard, Jean-Pierre Fiset,
Sander Temme, Jethro Beekman, Zsolt Rózsahegyi, Ferenc Pető, Mike Agrenius
Kushner, Tomas Gustavsson, Dieter Bong, Christopher Meyer, Michael StJohns,
Carl Wallace, Michael Ricardson, Tomofumi Okubo, Olivier Couillard, John
Gray, Eric Amador, Johnson Darren, Herman Slatman, Tiru Reddy, Thomas
Fossati, Corey Bonnell, Argenius Kushner, James Hagborg.</t>

</section>
<section anchor="asn1-mod"><name>ASN.1 Module</name>

<t>TBD: Full ASN.1 goes in here.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

