<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-rats-pop-endorsement-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="EAR POP">Proof of Position for Auditor managed Endorsements</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-rats-pop-endorsement-00"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="April" day="26"/>
    <area>Internet</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 50?>

<t>Some aspects of a device can not be intuited by the device itself.
For instance, a router platform may have no way to know what color the case is, where in a cabinet it is located, or which electrical circuit it is connected to.
This kind of information must be provided through an Endorsement: a statement from a third party.</t>
      <t>These statements may require human audiitors to inspect the device physically.
But, which device is really in front of an auditor?  This document describes a mechanism by which an auditor can make physical contact with a device and collect information to identify the
device in a cryptographically strong manner.</t>
      <t>This protocol is not designed to run over Internet Protocol cabling, but rather over mechanisms such as USB cables, or serial consoles.</t>
    </abstract>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the RATS Architecture <xref target="RFC9334"/>, an important input to the Verifier function is the Endorsement.
Endorsements <xref target="I-D.ietf-rats-endorsements"/> provide information that the Attester can not inherently know.
This includes a statement that a particular (Attester) keypair belongs  to a device of a particular type.
Some of this information might be placed into device identity certificate (such as an IDevID <xref target="IDevID"/>), but many other kinds of claims would not belong.</t>
      <t>For instance, the physical location or connectivity of a device would be subject to change.
In some cases a GPS coordinate might make sense, but in other cases GPS might not be trustworthy, or might be inadequate.
The physical location of a router, as being in "Building 4, Aisle 37, Cabinet 9, Rack Unit 2-3"
would be a level of precision that GPS would be unable to provide.
Other claims might involve knowledge of the color of a device ("the red car"), or the connectivity of the device ("the device plugged into the blue cable").
A relative claim might also be relevant: The house on top of the person with Ruby Slippers.</t>
      <t>In these cases an endorsement will need to be created, often by a human inspector/auditor that will have to physically visit the device and ascertain the state of the device.
There are some challenges for such an auditor: they could be led astray by malicious intent to inspect the wrong device, or they could simply not locate the device they intended to audit.
This results in an endorsement linked to the wrong device.</t>
      <section anchor="overview-of-mechanism">
        <name>Overview of mechanism</name>
        <t>The auditor is equiped with a portable device (e.g., a tablet computer) containing an endorsement  signing key.
This is the audit device.
(This could be an actual key, or it could just be a secure/tamperproof container in which endorsements will be stored until a long-term/more-secure endorsement key can be employed)</t>
        <t>The auditor finds the device in question and then collects whatever information is relevant.
For instance, the location in whatever form makes sense for the endorsement.
That might include taking pictures of the device in-situ, scans of serial numbers on the outside of the case, and which cables are connected to which physical ports.</t>
        <t>The auditor then plugs a physical cable between their audit device and the device under audit.
This cable is envisioned to be either a USB console "rollover" cable <xref target="rollover"/>.
The audit device then initiates some commands over this cable that will result in a proof of the idnetity of connected device.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<dl>
        <dt>Audit Device:</dt>
        <dd>
          <t>The device that is used to collect information that will go into endorsements.</t>
        </dd>
        <dt>Device Under Audit:</dt>
        <dd>
          <t>Abbreviated to DUA. The device for which endorsements are being made.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>The human who inspects the Device Under Audit.</t>
        </dd>
      </dl>
    </section>
    <section anchor="protocol">
      <name>Protocol</name>
      <t>It is assumed that the console port has been designed for use by humans.
This protocol is designed to interact as if it's a human.
Note that more sophisticated mechanisms such as SLIP or PPP would be more vulnerable to spoofing.</t>
      <section anchor="loginhandshake">
        <name>Initial Handshake</name>
        <t>The audit device sends carriage returns (octet 13) until it sees a response with a colon (":") in it.
This is usually a "login:" or "username:" prompt of some kind.
The audit device then sends the word "endorsementaudit" with a carriage return.
This represents a user login, and for some systems this can be set as a real login with limited permissions.
It could run a special audit shell that only can perform system audits.
On other systems, this might just an unpriviledged account with the normal prompts and commands.</t>
        <t>The handshake is over when the word "endorsement" is seen.</t>
      </section>
      <section anchor="proof-of-position">
        <name>Proof of Position</name>
        <t>(Proof of Position is probably a silly name that ought to be replaced)</t>
        <t>All commands are prefixed with "rfcXXXX" (with a trailing space, where XXXX is the number of this document).
A second word indicates the command.
The allows the device under audit to collect all operations under a single command or command sub-system.</t>
        <t>The audit device then sends the word/command "position-proof", followed by a 33 byte nonce, base64URL encoded into a 45 byte string.
(33 bytes are recommended because being divisible by three, they encode evenly in base64, leaving  no trailing =)</t>
        <t>The device under audit then responds with a CBOR format EAT object, encoded in base64URL, and wrapped in the strings "--- BEGIN COSE OBJECT ---" and "--- END COSE OBJECT ---"
{XXX: or should we use CBOR Diagnostic Format?}</t>
        <t>The EAT payload should be constructed as follows.
Shown are a few attributes that would make sense to include.
The above provide nonce becomes the eat_nonce.</t>
        <artwork><![CDATA[
{
    / eat_nonce /       10: h'948f8860d13a463e8e',
    / ueid /           256: h'0198f50a4ff6c05861c8860d13a638ea',
    / oemid /          258: h'894823', / IEEE OUI format OEM ID /
    / hwmodel /        259: h'549dcecc8b987c737b44e40f7c635ce8'
                              / Hash of chip model name /,
    / hwversion /      260: ["1.3.4", 1], / Multipartnumeric version /
    / swname /         271: "Acme OS",
    / swversion /      272: ["3.5.5", 1],
    }
]]></artwork>
        <t>The EAT payload is signed using the device under audit's Attestation Key.
(A TPM's Endorsement Key can not sign things)
The hash of the Attestation Key is provided in the unprotected headers.</t>
        <artwork><![CDATA[
   61( 18( [
       h'A10126',                           / protected headers  /
       {
       / x5t / 34: [16, h'1234456781234567812344567812345678'],
       },                                   / unprotected headers /
       h'A20B46024A6B0978DE0A49000102030405060708',    / payload /
       h'9B9B2F5E470000F6A20C8A4157B5763FC45BE759
         9A5334028517768C21AFFB845A56AB557E0C8973
         A07417391243A79C478562D285612E292C622162
         AB233787'                                   / signature /
   ] ) )
]]></artwork>
        <t>x5t is from <xref target="RFC9360"/>.
The hash algoritm <bcp14>SHOULD</bcp14> be SHA256, or newer.
(Example to be updated.</t>
      </section>
      <section anchor="collection-of-endorsement-claims">
        <name>Collection of Endorsement Claims</name>
        <t>The audit device then validates the received EAT object from the device.
The audit device locates the public part of the device's Attestation Key.
This will in most cases be part of the "work order" that the auditor has been provided, but in some cases, the auditor will have to collect it from the device.</t>
        <t>For instance, a device might have been replaced since the audit was requested, or there might be additional devices that the auditor thinks might be relevant.
An example might be when a switching device has many cables connected into an adjacent optical media converter that puts multiple signals through a single multi-frequency optical cable.
Such a layer of indirection might affect the audit's ability to indicate which port is physically connected to which cable.</t>
        <t>Some key physical information that an auditor might need to collect is which fibre patches are connected to which ports of the switch.
This information would be ideally collected by scanning (and checking) labels on the fibre patches.</t>
      </section>
      <section anchor="additional-commands">
        <name>Additional Commands</name>
        <t>Some additional commands can be provided by the device under audit:</t>
        <dl>
          <dt>"attestation-key":</dt>
          <dd>
            <t>This command returns the public certificate for the device's Attestation Key in <xref target="RFC7468"/> Certificate format.</t>
          </dd>
          <dt>"port-flash":</dt>
          <dd>
            <t>This command takes an interface number/name (e.g., "GigabitEthernet 3/014"), and causes the LEDs adjacent to a particular port to flash in a distinct pattern.  This is to help identity which physical port is which.</t>
          </dd>
          <dt>"port-down":</dt>
          <dd>
            <t>This command takes an interface number/name (as above), and causes the switch to mark the physical port as down, but not turn off the laser.  Traffic <bcp14>SHOULD</bcp14> be re-routed as if the fibre has failed.  This is a disruptive test!  The auditor may then physically unplug the fibre as part of an audit of the fibre paths.  This command might not perform the action immediately, but could signal to the network operations center that such a test is desired, and allow them to approve it.</t>
          </dd>
          <dt>"port-up":</dt>
          <dd>
            <t>Indicates the end of an path-audit started by "port-down".</t>
          </dd>
          <dt>"endorsements":</dt>
          <dd>
            <t>This command is followed by a base64URL encoded CBOR Sequence of Endorsements, wrapped in the same BEGIN COSE header and footer as before.  To guard against failure during, the device under audit <bcp14>SHOULD</bcp14> time out this command after 120s if no END COSE OBJECT framing is seen.
This command allows the auditor to load any resulting endorsements directly into the device to be passed up along with Evidence to a Verifier.</t>
          </dd>
          <dt>"exit":</dt>
          <dd>
            <t>This command indicates that the audit is over, and the device under audit can return the console interface to the normal state.</t>
          </dd>
        </dl>
      </section>
      <section anchor="generation-of-endorsement">
        <name>Generation of Endorsement</name>
        <t>The auditor, having collected one or more proofs, then transmits them to the endorsement agency.
This may be via physical transfer, secured email, or some secured online API.</t>
        <t>The endorsement agency then needs to do the following:</t>
        <ol spacing="normal" type="1"><li>
            <t>locate the Endorsement Certificate, if it was not collected from the device.</t>
          </li>
          <li>
            <t>validate that the provided EAT is signed by the associated Endorsement Key.</t>
          </li>
          <li>
            <t>validate that the claims in the EAT are consistent with that which is expected from the device.</t>
          </li>
          <li>
            <t>validate the format of the additional information collected by the auditor.  Location, type and number of connections, (colour of device even).</t>
          </li>
        </ol>
        <t>From this, one or more Endorsements are then created and signed by the endorsing agency.</t>
        <t>In some cases the auditor might be entirely self-contained, producing the endorsements directly on their audit device.
In that case, they would use the "endorsements" to load the resulting Endorsements directly into the device.</t>
      </section>
    </section>
    <section anchor="alternatives-to-usbserial-cables">
      <name>Alternatives to USB/serial cables</name>
      <t>There are a number of cases where a USB or serial console cable might be unavailable, or it's might be undesireable.
Many smaller IoT devices, home routers and consumer items do not have any kind of console available.
The console access might require removal of the case, which might be impossible to do while the device is operational, or while the device is physically installed.
Console access might provide access to a priviledged prompt; that access might either be unsafe to give to the auditor, or might require a password to access that should not be shared.</t>
      <t>One alternative is to use Ethernet.
Most routing platforms have many ethernet ports, and usually have at least one empty ethernet port.
It is also common for there to be a dedicated copper ethernet port for management even on routing platforms that otherwise only have fiber-optic ports running at multiple hundred gigabits.
The use of ethernet has problems because ethernet can easily be switched; transmitting the signal to another device elsewhere.
This is often the whole point of the routing platform: to switch traffic elsewhere.
This would result in a false audit if the auditor is diverted.</t>
      <t>The LLDP protocol <xref target="LLDP"/> is a one-hop protocol which is usually not forwarded.
It can do things like tell a connected device which port of client device is connected to.
While trustworthy devices will not forward LLDP frames, an untrustworthy device that has been programmed to participate in a subterfuge might well forward frames.
It might be possible to construct a challenge/response system that has the auditor plug cables in some non-deterministic order in order to defeat the subterfuge.</t>
      <t>This process would probably need to augmented with some other forms of feedback; perhaps flashing of status LEDs on the device in a pattern.</t>
      <t>Note: the console/USB cable could also be redirected to another host!</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The ability to walk up to a device and interogate it as to it's identity is potentially privacy violating if the device is associated with a person.
This would include all kinds of small devices: phones, laptops, electric bicycles, automobiles,</t>
      <t>One countermeasure is that the device needs to be put into an audit mode before it can be interrogated.
This is reasonable for some devices and some audit processes, but for other processees, the need to do random audits may countermand this need.
For devices such as large routing platforms, they are often located in data centers with multiple layers of physical access control: locked buildings, locked machine rooms, and locked cabinets.
For such devices, there are perhaps few privacy concerns, and the auditor needs credentials in order to access the device at all.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are three concerns with this protocol.</t>
      <t>The first is the potential for unauthorized people to collect information about devices to which they have no authority to interogate.
In industrial settings, this is mitigated by physical access controls.
In those settings the ability to identify devices which may be physically misbehaving or are damaged and connect them to their digital identity significantly outweighs any concerns about device identity.</t>
      <t>In consumer and retail settings, the device <bcp14>SHOULD</bcp14> not respond to this protocol unless an operator/owner has put the device into device identication mode.</t>
      <t>The second concern with this protocol is that it might be spoofed or confuzzled.
The auditor could be mislead as whether the device in front of them is really the device that is responding to their queries.
The auditor <bcp14>SHOULD</bcp14> have the device identity with them already as part of the work order.
They should therefore not be mislead as to which device they intend to audit,  the issue is that it might not be the device that is physically in front of them.
The device might be a mock-up designed to look right, but really it is wired secretly to the real device which is elsewhere, and is differently configured.
This attack is called the "Sock-Puppet" attack.</t>
      <t>Such attacks require physical examination to detect.
Some attacks may be mitigated through careful use of the "port-flash" commands to cause signals visible to the auditor that would ideally be difficult to fake.
Efforts this way are the subject of further work.</t>
      <t>The third concern with this protocol is that it might open up the device to attacks via this console port.
The Initial Handshake <xref target="loginhandshake"/> mechanism is designed so that it can be easily implemented by typical router and operating system login mechanisms.
A very limited account would be created, or even a mode within the login mechanism itself, and so no additional inquiries would be possible.
Some operators prefer to never have a login process on the console/craft ports of their devices.
This is usually done so that maintenance people do not need to have passwords that can then be  re-used over a network, weaking the security of the device.
They depend upon physical security for the console ports to provide security.
Such operators might wish to rethink this policy for devices which will be subject to audit.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is asked to allocate a CBOR Tag for this object.
Details TBD.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Your name here.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-endorsements" target="https://datatracker.ietf.org/doc/html/draft-ietf-rats-endorsements-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-rats-endorsements.xml">
          <front>
            <title>RATS Endorsements</title>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Armidale Consulting</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>In the IETF Remote Attestation Procedures (RATS) architecture, a Verifier accepts Evidence and, using Appraisal Policy typically with additional input from Endorsements and Reference Values, generates Attestation Results in formats that are useful for Relying Parties. This document illustrates the purpose and role of Endorsements and discusses some considerations in the choice of message format for Endorsements in the scope of the RATS architecture. This document does not aim to define a conceptual message format for Endorsements and Reference Values. Instead, it extends RFC9334 to provide further details on Reference Values and Endorsements, as these topics were outside the scope of the RATS charter when RFC9334 was developed.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-endorsements-06"/>
        </reference>
        <reference anchor="RFC9360" target="https://www.rfc-editor.org/info/rfc9360" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9360.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7468" target="https://www.rfc-editor.org/info/rfc7468" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7468.xml">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IDevID" target="https://1.ieee802.org/security/802-1ar/l">
          <front>
            <title>IEEE 802.1AR Secure Device Identifier</title>
            <author>
              <organization>IEEE Standard</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="LLDP" target="https://www.ieee802.org/1/pages/802.1AB-rev.html">
          <front>
            <title>802.1AB-REV - Station and Media Access Control Connectivity Discovery</title>
            <author>
              <organization>IEEE Standard</organization>
            </author>
            <date year="2009" month="June" day="19"/>
          </front>
        </reference>
        <reference anchor="rollover" target="https://en.wikipedia.org/wiki/Rollover_cable">
          <front>
            <title>Console Rollover Cable</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2025" month="April" day="26"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 325?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
