<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.13 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc ipr="trust200902" docName="draft-fedorkow-rats-network-device-attestation-03" category="info">

  <front>
    <title abbrev="Network Device RIV">Network Device Remote Integrity Verification</title>

    <author initials="G.C." surname="Fedorkow" fullname="Guy Fedorkow" role="editor">
      <organization>Juniper Networks, Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>gfedorkow@juniper.net</email>
      </address>
    </author>
    <author initials="J." surname="Fitzgerald-McKay" fullname="Jessica Fitzgerald-McKay">
      <organization>National Security Agency</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>jmfitz2@nsa.gov</email>
      </address>
    </author>

    <date year="2020" month="February" day="26"/>

    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a workflow for remote attestation of integrity of network devices.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>There are many aspects to consider in fielding a trusted computing device,
from operating systems to applications.  Mechanisms to prove that
a device installed at a customer’s site is authentic (i.e., not counterfeit) and has
been configured with authorized software, all as part of a trusted supply chain, is one
of those aspects that’s easily overlooked.</t>

<t>Attestation is defined here as the process of creating, conveying and appraising
assertions about Platform trustworthiness characteristics, including supply chain trust,
identity, platform provenance, software configuration, hardware configuration, platform
composition, compliance to test suites, functional and assurance evaluations,
etc.</t>

<t>The supply chain itself has many elements, from validating suppliers of electronic
components, to ensuring that shipping procedures protect against tampering
through many stages of distribution and warehousing.  One element that helps
maintain the integrity of the supply chain after manufacturing is Attestation,
by assuring an administrator that the software that was launched when the device
was started is the same as the software that the device vendor initially shipped.</t>

<t>Within the Trusted Computing Group context, attestation is the process by
which an independent Verifier can obtain cryptographic proof as to the identity
of the device in question, evidence of the integrity of software loaded on
that device when it started up, and then verify that what’s there is what’s
supposed to be there.  For networking equipment, a verifier capability can
be embedded in a Network Management Station (NMS), a posture collection server,
or other network analytics tool (such as a software asset management solution,
or a threat detection and mitigation tool, etc.). While informally referred
to as attestation, this document focuses on a subset defined here as Remote
Integrity Verification (RIV).  RIV takes a network equipment centric perspective
that includes a set of protocols and procedures for determining whether a
particular device was launched with untampered software, starting from Roots
of Trust.  While there are many ways to accomplish attestation, RIV sets
out a specific set of protocols and tools that work in environments commonly
found in Networking Equipment.  RIV does not cover other platform characteristics
that could be attested, although it does provide evidence of a secure infrastructure
to increase the level of trust in other platform characteristics attested
by other means.</t>

<t>This profile outlines the RIV problem, and then identifies elements that
are necessary to get the complete attestation procedure working in a scalable
solution using commercial products.</t>

<t>This document focuses primarily on software integrity verification using
the Trusted Platform Module (TPM) to ensure a trustworthy result.</t>

<t>The integrity of attestation information must be protected by means of cryptographic
techniques, to assure its validity.
It’s important to note that TCG technologies are available to use either symmetric
key encryption with shared keys, or public key cryptography using private/public key pairs.
The two techniques can each produce secure results, but do require different provisioning mechanisms.
The RIV document currently focuses on asymmetric keying approaches only; future work might
include techniques for attestation using symmetric keys.</t>

<section anchor="requirements-language" title="Requirements Language">
<t>This document is non-normative; the document does not define protocols,
but rather identifies existing protocols that can be used together to achieve the
goals above, and in some cases, highlights gaps in existing protocols.</t>

</section>
<section anchor="goals" title="Goals">

<t>Attestation requires two interlocking services on the device:</t>

<t><list style="symbols">
  <t>Platform Identity, the mechanism providing trusted identity, can reassure network
managers that the specific devices they ordered from authorized manufacturers for
attachment to their network are those that were installed, and that they continue to
be present in their network. As part of the mechanism for Platform Identity,
cryptographic proof of the identity of the manufacturer is also provided.</t>
  <t>Software Measurement is the mechanism that reports the state of mutable software components
on the device, and can assure network managers that they have known, untampered
software configured to run in their network.</t>
</list></t>

<t>As a part of a trusted supply chain, the RIV attestation workflow outlined in this document is intended to meet the following high-level goals:</t>

<t><list style="symbols">
  <t>Provable Device Identity - The ability to identify a device using a cryptographic
identifier is a critical prerequisite to software inventory attestation.</t>
  <t>Software Inventory - A key goal is to identify the software release installed
on the device, and to provide evidence of its integrity.</t>
  <t>Verifiability - Verification of software and configuration of the device shows
that the software that’s supposed to be installed on  there actually has
been launched.  Verification  against reference
manifests signed by the supplier of the software provides assurance that the
software is free of unauthorized modification.</t>
</list></t>

</section>
<section anchor="description-of-remote-integrity-verification-riv" title="Description of Remote Integrity Verification (RIV)">

<t>RIV is a procedure that assures a network operator that the equipment on
their network can be reliably identified, and that untampered software of
a known version is installed on each endpoint. In this context, endpoint
might include the conventional connected devices like servers and laptops, but also
connected devices that make up the network equipment itself, such as routers,
switches and firewalls.</t>

<t>RIV can be viewed as a link in a trusted supply chain that ensures that devices launch
software without unauthorized modification, and includes three major processes:</t>

<t><list style="numbers">
  <t>Creation of Evidence is the process whereby an endpoint generates cryptographic
  proof (evidence) of claims about platform properties. In particular, the
  platform identity and its software configuration are of critical importance</t>
</list></t>

<t><list style="symbols">
  <t>Platform Identity refers to the mechanism assuring the
attestation relying party (typically a network administrator)
of the identity of devices that make up their network,
and that their manufacturers are known.</t>
  <t>Software used to boot a platform can be described as a chain
of measurements, started by a Root of Trust for Measurement,
that normally ends when the system software is loaded.
A measurement signifies the identity, integrity and version of each
software component registered with the TPM, so that the
subsequent appraisal stage can determine if the software
installed is authentic, up-to-date, and free of tampering.</t>
</list></t>

<t>Clearly the
  second part of the problem, attesting the state of mutable components
  of a given device, is of little value without
  reliable identification of the device in question.  By the
  same token, unambiguous identity of a device is necessary,
  but is insufficient to assure the operator of the provenance
  of the device through the supply chain, or that the device is
  configured to behave properly.</t>

<t><list style="numbers">
  <t>Conveyance of Evidence is the process of reliably transporting evidence from
  the point in a connected device where a measurement is stored to an
  appraiser/verifier, e.g. a management station. The transport
  is typically carried out via a management network. The channel must provide
  integrity and authenticity, and, in some use cases, may also require confidentiality.</t>
  <t>Appraisal of Evidence is the process of verifying the evidence received by
  a verifier/appraiser from a device, and using verified evidence to inform
  decision making. In this context, verification means comparing the device
  measurements reported as evidence with the configuration expected by the
  system administrator. This step can work only when there is a way to express
  what should be there, often referred to as golden measurements, or Reference
  Integrity Measurements, representing the intended configured state of the
  connected device.</t>
</list></t>

<t>An implementation of RIV requires three technologies</t>

<t><list style="numbers">
  <t>Identity: Platform identity can be based on IEEE 802.1AR Device Identity <xref target="IEEE-802-1AR"/>,
coupled with careful supply-chain management by the manufacturer.  The
DevID certificate contains a statement by the manufacturer that establishes
the provenance of the device as it left the factory.  Some applications with
a more-complex post-manufacture supply chain (e.g. Value Added Resellers),
or with different privacy concerns, may want to use an alternate mechanism for platform
authentication based on TCG Platform Certificates <xref target="Platform-Certificates"/>.
RIV currently relies on asymmetric keying for identity; alternate approaches
might use symmetric keys.</t>
  <t>Platform Attestation provides evidence of configuration of software elements
throughout the product lifecycle.  This form of attestation can be implemented
with TPM PCR, Quote and log mechanisms, which provide an authenticated mechanism
to report what software actually starts up on the device each time it reboots.</t>
  <t>Reference Integrity Measurements must be conveyed from the software authority
(often the manufacturer for embedded systems) to the system in which verification
will take place</t>
</list></t>

<t>Service Providers benefit from a trustworthy attestation mechanism that provides
assurance that their network comprises authentic equipment, and has loaded software
free of known vulnerabilities and unauthorized tampering.</t>

</section>
<section anchor="solution-requirements" title="Solution Requirements">

<t>The RIV attestation solution must meet a number of requirements to make it simple
to deploy at scale.</t>

<t><list style="numbers">
  <t>Easy to Use - This solution should work “out of the box” as far as possible,
that is, with the fewest possible steps needed at the end-user’s site.  Eliminate
complicated databases or provisioning steps that would have to be executed
by the owner of a new device. Network equipment is often required to “self-configure”,
to reliably reach out without manual intervention to prove its identity and
operating posture, then download its own configuration. See <xref target="RFC8572"/> for an
example of Secure Zero Touch Provisioning.</t>
  <t>Multi-Vendor - This solution should identify standards-based interfaces that
allow attestation to work with attestation-capable devices and verifiers
supplied by different vendors in one network.</t>
  <t>Scalable - The solution must not depend on choke points that limit the number
of endpoints that could be evaluated in one network domain.</t>
  <t>Extensible - A network equipment attestation solution needs to expand over
time as new features are added. The solution must allow new features to be
added easily, providing for a smooth transition and allowing newer and older
architectural components to continue to work together. Further, a network
equipment attestation solution and the specifications referenced here must
define safe extensibility mechanisms that enable innovation without breaking
interoperability.</t>
  <t>Efficient - A network equipment attestation solution should, to the greatest
extent feasible, continuously monitor the health and posture status of network
devices. Posture measurements should be updated in real-time as changes to
device posture occur and should be published to remote integrity validators.
Validation reports should also be shared with their relying parties (for
example, network administrators, or network analytics that rely on these
reports for posture assessment) as soon as they are available.</t>
</list></t>

</section>
<section anchor="scope" title="Scope">

<t>Remote Attestation is a very general problem that could apply to most network-connected computing devices.  However, this document includes several assumptions that limit the scope to Network Equipment (e.g. routers, switches and firewalls):</t>

<t><list style="symbols">
  <t>This solution is for use in non-privacy-preserving applications (for example,
networking, Industrial IoT), avoiding the need for a Privacy Certificate
Authority for attestation keys <xref target="AIK-Enrollment"/> or TCG Platform
Certificates <xref target="Platform-Certificates"/></t>
  <t>This document applies primarily to “embedded” applications, where the device
manufacturer ships the software image for the device.</t>
  <t>This document assumes network protocols that are common in networking equipment,
but not generally used in other applications.  Other applications (such as Industrial
IoT) would replace YANG/Netconf with a protocol suite more commonly used in
that environment.  Similarly, the same information flow would be used in Network
Endpoint Assessment <xref target="RFC5209"/>, mapped to NEA protocols.</t>
  <t>The approach outlined in this document assumes the use of TPM 1.2 or TPM 2.0.  Other
roots of trust could be used with the same information flow, although different
data structures would likely be called for.</t>
</list></t>

<section anchor="out-of-scope" title="Out of Scope">

<t><list style="symbols">
  <t>Run-Time Attestation: Run-time attestation of Linux or other multi-threaded
operating system processes considerably expands the scope of the problem.
Many researchers are working on that problem, but this document defers the
run-time attestation problem.</t>
  <t>Multi-Vendor Embedded Systems: Additional coordination would be needed for
devices that themselves comprise hardware and software from multiple vendors,
integrated by the end user.  Although currently out of scope for RIV, Trusted
Computing Group specifications do
encompass attestation of multi-vendor endpoint computing devices.</t>
  <t>Processor Sleep Modes: Network equipment typically does not “sleep”, so
sleep and hibernate modes are not considered.  Although out of scope
for RIV, Trusted Computing Group specifications do encompass sleep and hibernate
states.</t>
  <t>Virtualization and Containerization:  These technologies are increasingly
used in Network equipment, but are not considered in this revision of the
document.</t>
</list></t>

</section>
<section anchor="why-remote-integrity-verification" title="Why Remote Integrity Verification?">

<t>Remote Integrity Verification can go a long way to solving the “Lying Endpoint”
problem, in which malicious software on an endpoint may both subvert the
intended function, and also prevent the endpoint from reporting its compromised
status.  Man-in-the Middle attacks are also made more difficult through a
strong focus on device identity</t>

<t>Attestation data can be used for asset management, vulnerability and compliance
assessment, plus configuration management.</t>

</section>
<section anchor="network-device-attestation-challenges" title="Network Device Attestation Challenges">

<t>There have been demonstrations of attestation using TPMs for years, accompanied
by compelling security reasons for adopting attestation. Despite this, the
technology has not been widely adopted, in part, due to the difficulties
in deploying TPM-based attestation. Some of those difficulties are:</t>

<t><list style="symbols">
  <t>Standardizing device identity. Creating and using unique device identifiers
is difficult, especially in a privacy-sensitive environment.  But attestation
is of limited value if the operator is unable to determine which devices
pass attestation validation tests, and which fail. This problem is substantially
simplified for infrastructure devices like network equipment, where identity
can be explicitly coded using IEEE 802.1AR, but doing so relies on adoption
of 802.1AR <xref target="IEEE-802-1AR"/> by manufacturers and hardware system integrators.</t>
  <t>Standardizing attestation representations and conveyance. Interoperable remote
attestation has a fundamental dependence on vendors agreeing to a limited
set of network protocols commonly used in existing network equipment for
communicating attestation data. Network device
vendors will be slow to adopt the changes necessary to implement remote
attestation without a fully-realized plan for deployment.</t>
  <t>Interoperability. Networking equipment operates in a fundamentally multi-vendor
environment, putting additional emphasis on the need for standardized procedures
and protocols.</t>
  <t>Attestation evidence is complex. Operating systems used in larger embedded
devices are often multi-threaded, so the order of completion for individual
processes is non-deterministic.  While the hash of a specific component is
stable, once extended into a PCR, the resulting values are dependent on the
(non-deterministic) ordering of events, so there will never be a single known-good
value for some PCRs.  Careful analysis of event logs can provide proof that
the expected modules loaded, but it’s much more complicated than simply comparing
reported and expected digests, as collected in TPM Platform Configuration
Registers (PCRs).</t>
  <t>Software configurations can have seemingly infinite variability.  This problem
is nearly intractable on PC and Server equipment, where end users have unending
needs for customization and new applications.  However, embedded systems,
like networking equipment, are often simpler, in that there are fewer variations
and releases, with vendors typically offering fewer options for mixing and
matching.</t>
  <t>Standards-based mechanisms to encode and distribute Reference Integrity
Measurements, (i.e., expected values) are still in development.</t>
  <t>Software updates can be complex.  Even the most organized network operator
may have many different releases in their network at any given time, with
the result that there’s never a single digest or fingerprint that indicates
the software is “correct”; digests formed by hashing software modules on
a device can only show the correct combination of versions for a specific
device at a specific time.</t>
</list></t>

<t>None of these issues are insurmountable, but together, they’ve made deployment
of attestation a major challenge.  The intent of this document is to outline
an attestation profile that’s simple enough to deploy, while yielding enough
security to be useful.</t>

</section>
<section anchor="why-is-os-attestation-different" title="Why is OS Attestation Different?">

<t>Even in embedded systems, adding Attestation at the OS level (e.g. Linux
IMA, Integrity Measurement Architecture <xref target="IMA"/>) increases the number of objects to
be attested by one or two orders of
magnitude, involves software that’s updated and changed frequently, and introduces
processes that begin in unpredictable order.</t>

<t>TCG and others (including the Linux community) are working on methods and
procedures for attesting the operating system and application software, but
standardization is still in process.</t>

</section>
</section>
</section>
<section anchor="solution-outline" title="Solution Outline">

<section anchor="riv-software-configuration-attestation-using-tpm" title="RIV Software Configuration Attestation using TPM">

<t>RIV Attestation is a process for determining the identity of software running
on a specifically-identified device.  Remote Attestation is broken into two
phases, shown in Figure 1:</t>

<t><list style="symbols">
  <t>During system startup, measurements (i.e., digests computed as fingerprints
of files) are extended, or cryptographically folded, into the TPM.  Entries
are also added to an informational log.  The measurement process generally
follows the Chain of Trust model used in Measured Boot, where each stage
of the system measures the next one, and extends its measurement into the TPM,
before launching it.</t>
  <t>Once the device is running and has operational network connectivity, a separate,
trusted server (called a Verifier in this document) can interrogate the network
device to retrieve the logs and a copy of the digests collected by hashing
each software object, signed by an attestation private key known only to
the TPM.</t>
</list></t>

<t>The result is that the Verifier can verify the device’s identity by checking
the certificate containing the TPM’s attestation public key, and can
validate the software that was launched by comparing digests in the log with
known-good values, and verifying their correctness by comparing with the
signed digests from the TPM.</t>

<t>It should be noted that attestation and identity are inextricably linked;
signed evidence that a particular version of software was loaded is of little
value without cryptographic proof of the identity of the device producing
the evidence.</t>

<figure title="RIV Attestation Model" anchor="RIV-Attestation-Model"><artwork align="left"><![CDATA[
    +-------------------------------------------------------+
    | +--------+    +--------+   +--------+    +---------+  |
    | | BIOS   |--->| Loader |-->| Kernel |--->|Userland |  |
    | +--------+    +--------+   +--------+    +---------+  |
    |     |            |           |                        |
    |     |            |           |                        |
    |     +------------+-----------+-+                      |
    |                        Step 1  |                      |
    |                                V                      |
    |                            +--------+                 |
    |                            |  TPM   |                 |
    |                            +--------+                 |
    |   Router                       |                      |
    +--------------------------------|----------------------+
                                     |
                                     |  Step 2
                                     |    +-----------+
                                     +--->| Verifier  |
                                          +-----------+

    Reset---------------flow-of-time-during-boot--...------->
]]></artwork></figure>

<t>In Step 1, measurements are “extended” into the TPM as processes start. In
Step 2, signed PCR digests are retrieved from the TPM for off-box analysis
after the system is operational.</t>

<section anchor="what-does-riv-attest" title="What Does RIV Attest?">

<t>TPM attestation is strongly focused around Platform Configuration Registers (PCRs), but those registers are only vehicles for certifying attestation evidence.  The evidence itself is conveyed in log files (xref) which give the name and hash of each object to be attested.  These hashes are also extended into PCRs, where they can be retrieved in the form of a quote signed by a key known only to the TPM (xref).  The use of multiple PCRs serves only to provide some independence between different classes of object, so that one class of objects can be updated without changing the extended hash for other classes.  Although PCRs can be used for any purpose, this section outlines the objects that are conventionally attested with a TPM.</t>

<t>In general, PCRs are organized to independently attest three classes of object:</t>

<t><list style="symbols">
  <t>Code, i.e., instructions to be executed by a CPU.  To maintain a chain of trust, it’s important to measure every bit of code that’s run outside the root of trust.</t>
  <t>Configuration - Many devices offer numerous options controlled by non-volatile configuration variables which can impact the device’s security posture.  These settings may have vendor defaults, but often can be changed by administrators, who may want to verify via attestation that the settings they intend are still in place.</t>
  <t>Keys - Administrators may wish to verify via attestation that keys outside the Root of Trust have not be subject to unauthorized tampering.  (By definition, keys inside the root of trust can’t be verified independently)</t>
</list></t>

<t>The TCG PC Client Platform Firmware Profile Specification <xref target="PC-Client-BIOS-TPM-2.0"/> gives considerable detail on what is to be measured during the boot phase of a platform boot using a UEFI BOIS (www.uefi.org), but the goal is simply to measure every bit of code executed in the process of starting the device, along with any configuration information related to security posture.  Table XX summarizes the functions that are measured, and how they are allocated to PCRs.  It’s important to note that each PCR may contain results from dozens (or even thousands) of individual measurements.</t>

<figure title="Attested Objects" anchor="Attested-Objects"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|                                            |   Allocated PCR #   |
| Function                                   | Code | Configuration|
--------------------------------------------------------------------
| BIOS Static Root of Trust, plus embedded   |  0   |    1         |
| Option ROMs and drivers                    |      |              |
--------------------------------------------------------------------
| Pluggable Option ROMs to initialize and    |  2   |    3         |
| configure add-in devices                   |      |              |
--------------------------------------------------------------------
| Boot Manager code and configuration (UEFI  |  4   |    5         |
| uses a separate module to implement        |      |              |
| policies for selecting among a variety of  |      |              |
| potential boot devices).  This PCR records |      |              |
| boot attempts, and identifies what         |      |              |
| resources were used to boot the OS.        |      |              |
--------------------------------------------------------------------
| Vendor Specific Measurements               |  6   |    6         |
--------------------------------------------------------------------
| Secure Boot Policy.  This PCR records keys |      |    7         |
| and configuration used to validate the OS  |      |              |
| loader                                     |      |              |
--------------------------------------------------------------------
| OS Loader (e.g GRUB2 for Linux)            |  8   |    9         |
--------------------------------------------------------------------
| Reserved for OS (e.g. Linux IMA)           |  10  |    10        |
+------------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="riv-keying" title="RIV Keying">

<t>TPM 1.2 and TPM 2.0 have a variety of rules separating the functions of identity
and attestation, allowing for use-cases where software configuration must
be attested, but privacy must be maintained.</t>

<t>To accommodate these rules, enforced inside the TPM, in an environment where
device privacy is not
normally a requirement, the TCG Guidance for Securing Network Equipment
<xref target="NetEq"/> suggests using separate keys for Identity (i.e., DevID) and
Attestation (i.e., signing a quote of the contents of the PCRs), but
provisioning an Initial Attestation
Key (IAK) and x.509 certificate that parallels the IDevID, with the same
device ID information as the IDevID certificate (i.e., the same Subject Name
and Subject Alt Name, even though the key pairs are different).  This allows
a quote from the device, signed by the IAK, to be linked directly to the
device that provided it, by examining the corresponding IAK certificate.</t>

<t>Inclusion of an IAK by a vendor does not preclude a mechanism whereby an
Administrator can define Local Attestation Keys (LAKs) if desired.</t>

</section>
<section anchor="riv-information-flow" title="RIV Information Flow">

<t>RIV workflow for networking equipment is organized around a simple use-case,
where a network operator wishes to verify the integrity of software installed
in specific, fielded devices.  This use-case implies several components:</t>

<t><list style="numbers">
  <t>A Device (e.g. a router or other embedded device, also known as an Attester)
  somewhere and the network operator wants to examine its boot state.</t>
  <t>A Verifier (which might be a network management station) somewhere separate
  from the Device that will retrieve the information and analyze it to pass
  judgment on the security posture of the device.</t>
  <t>A Relying Party, which has access to the Verifier to request attestation
  and to act on results.  Interaction between the Relying Party and the
  Verifier is considered out of scope for RIV.</t>
  <t>Signed Reference Integrity Manifests (RIMs)
  (containing “golden measurements”, or Reference Integrity Measurements) can
  either be created by the device manufacturer
  and shipped along with the device as part of its software image, or alternatively,
  could be obtained a number of other ways (direct to the verifier from the
  manufacturer, from a third party, from the owner’s observation of what’s
  thought to be a “known good system”, etc.).  Retrieving RIMs from the device
  itself allows attestation to be done in systems which may not have access
  to the public internet, or by other devices that are not management stations
  per-se (e.g., a peer device).  If reference measurements are obtained from
  multiple sources, the Verifier may need to evaluate the relative level of
  trust to be placed in each source in case of a discrepancy.</t>
</list></t>

<t>These components are illustrated in Figure 2.</t>

<t>A more-detailed taxonomy of terms is given in <xref target="I-D.ietf-rats-architecture"/></t>

<figure title="RIV Reference Configuration for Network Equipment" anchor="RIV-Reference-Configuration"><artwork align="left"><![CDATA[
+---------------+        +-------------+        +---------+--------+
|               |        | Attester    | Step 1 | Verifier|        |
| Asserter      |        | (Device     |<-------| (Network| Relying|
| (Device       |        | under       |------->| Mngmt   | Party  |
| Manufacturer  |        | attestation)| Step 2 | Station)|        |
| or other      |        |             |        |         |        |
| authority)    |        |             |        |         |        |
+---------------+        +-------------+        +---------+--------+
       |                                             /\
       |                  Step 0                      |
       -----------------------------------------------

]]></artwork></figure>

<t>In Step 0, The Asserter (the device manufacturer) provides a Software Image
accompanied by one or more Reference Integrity Manifests (RIMs) to the Attester (the
device under attestation) signed by the asserter. In Step 1, the Verifier
(Network Management Station), on behalf of a Relying Party, requests Identity,
Measurement Values (and possibly RIMs) from the Attester. In Step 2, the
Attester responds to the request by providing a DevID, quotes (measured values),
and optionally RIMs, signed by the Attester.</t>

<t>See <xref target="I-D.birkholz-rats-reference-interaction-model"/> for more narrowly defined
terms related to Attestation</t>

</section>
<section anchor="riv-simplifying-assumptions" title="RIV Simplifying Assumptions">

<t>This document makes the following simplifying assumptions to reduce complexity:</t>

<t><list style="symbols">
  <t>The product to be attested is shipped with an IEEE 802.1AR DevID and an Initial
Attestation Key (IAK) with certificate.  The IAK cert contains the same identity
information as the DevID (specifically, the same Subject Name and Subject
Alt Name, signed by the manufacturer), but it’s a type of key that can be
used to sign a TPM Quote.  This convention is described in TCG Guidance for
Securing Network Equipment <xref target="NetEq"/>. For network equipment, which is generally non-privacy-sensitive, shipping
a device with both an IDevID and an IAK already provisioned substantially
simplifies initial startup. Privacy-sensitive applications may use the TCG
Platform Certificate and additional procedures to install identity credentials
on the platform after manufacture.  (See Section 2.3.1 below for the Platform
Certificate alternative)</t>
  <t>The product is equipped with a Root of Trust for Measurement, Root of Trust
for Storage and Root of Trust for Reporting (as defined in <xref target="GloPlaRoT"/>) that are
capable of conforming to the TCG Trusted Attestation Protocol (TAP) Information Model <xref target="TAP"/>.</t>
  <t>The vendor will ship Reference Integrity Measurements (i.e., known-good measurements)
in the form of signed CoSWID tags <xref target="I-D.ietf-sacm-coswid"/>, <xref target="SWID"/>,
as described in TCG Reference Integrity Measurement Manifest Information Model <xref target="RIM"/>.</t>
</list></t>

<section anchor="devid-alternatives" title="DevID Alternatives">

<t>Some situations may have privacy-sensitive requirements that preclude shipping
every device with an Initial Device ID installed.  In these cases, the IDevID
can be installed remotely using the TCG Platform Certificate <xref target="Platform-Certificates"/>.</t>

<t>Some administrators may want to install their own identity
credentials to certify device identity and attestation results.  IEEE 802.1AR
<xref target="IEEE-802-1AR"/> allows for both Initial Device Identity credentials, installed by the manufacturer, (analogous to a physical serial number plate),
or Local Device Identity credentials installed by the administrator of the
device (analogous to the physical Asset Tag used by many enterprises to identify their property).  TCG TPM 2.0 Keys documents <xref target="Platform-DevID-TPM-2.0"/> and
<xref target="PC-Client-BIOS-TPM-2.0"/> specifies parallel Initial and Local Attestation Keys (IAK and LAK), and
contains figures showing the relationship between IDevID, LDevID, IAK and
LAK keys.</t>

<t>Device administrators are free to use any number of criteria to judge authenticity
of a device before installing local identity keys, as part of an on-boarding
process.  The TCG TPM 2.0 Keys document <xref target="Platform-DevID-TPM-2.0"/> also outlines
procedures for creating Local Attestation Keys and Local Device
IDs (LDevIDs) rooted in the manufacturer’s IDevID as a check to reduce the
chances that counterfeit devices are installed in the network.</t>

<t>Note that many networking devices are expected to self-configure (aka Zero
Touch Provisioning).  Current standardized zero-touch mechanisms such as
<xref target="RFC8572"/> assume that identity keys are already in place before network on-boarding
can start, and as such, are compatible with IDevID and IAK keys installed by the
manufacturer, but not with LDevID and LAK keys, which would have to be installed
by the administrator.</t>

</section>
<section anchor="additional-attestation-of-platform-characteristics" title="Additional Attestation of Platform Characteristics">

<t>The Platform Attribute Credential <xref target="Platform-Certificates"/> can also be used to convey
additional information about a platform from the
manufacturer or other entities in the supply chain.  While outside the scope
of RIV, the Platform Attribute Credential can deliver information such as
lists of serial numbers for components embedded in a device or security assertions
related to the platform, signed by the manufacturer, system integrator or
value-added-reseller.</t>

</section>
<section anchor="root-of-trust-for-measurement" title="Root of Trust for Measurement">

<t>The measurements needed for attestation require that the device being attested
is equipped with a Root of Trust for Measurement, i.e., some trustworthy
mechanism that can compute the first measurement in the chain of trust required
to attest that each stage of system startup is verified, and a Root of Trust
for Reporting to report the results <xref target="TCGRoT"/>, <xref target="GloPlaRoT"/>.</t>

<t>While there are many complex aspects of a Root of Trust, two aspects that
are important in the case of attestation are:</t>

<t><list style="symbols">
  <t>The first measurement computed by the Root of Trust for Measurement, and stored
in the TPM’s Root of Trust for Storage, is presumed to be correct.</t>
  <t>There must not be a way to reset the RTS without re-entering the RTM code.</t>
</list></t>

<t>The first measurement must be computed by code that is implicitly trusted; if that
first measurement can be subverted, none of the remaining measurements can
be trusted. (See <xref target="NIST-SP-800-155"/>)</t>

</section>
<section anchor="reference-integrity-manifests-rims" title="Reference Integrity Manifests (RIMs)">

<t>Much of attestation focuses on collecting and transmitting evidence in
the form of PCR measurements and attestation logs.  But the critical part
of the process is enabling the verifier to decide whether the measurements
are “the right ones” or not.</t>

<t>While it must be up to network administrators to decide what they want on
their networks, the software supplier should supply the Reference Integrity
Measurements, (aka Golden Measurements or “known good” digests) that
may be used by a verifier to determine if evidence shows known good, known
bad or unknown software configurations.</t>

<t>In general, there are two kinds of reference measurements:</t>

<t><list style="numbers">
  <t>Measurements of early system startup (e.g., BIOS, boot loader, OS kernel)
are essentially single threaded, and executed exactly once, in a known sequence,
before any results could be reported.  In this case, while the method for
computing the hash and extending relevant PCRs may be complicated, the net
result is that the software (more likely, firmware) vendor will have one
known good PCR value that “should” be present in the relevant PCRs after the box has
booted.  In this case, the signed reference measurement could simply list the
expected hashes for the given version.  However, a RIM that contains the
intermediate hashes can be useful in debugging cases where the expected final hash
is not the one reported.</t>
  <t>Measurements taken later in operation of the system, once an OS has started
(for example, Linux IMA<xref target="IMA"/>), may be more complex, with unpredictable “final”
PCR values.  In this case, the Verifier must have enough information to reconstruct
the expected PCR values from logs and signed reference measurements from
a trusted authority.</t>
</list></t>

<t>In both cases, the expected values can be expressed as signed SWID or CoSWID tags,
but the SWID structure in the second case is somewhat more complex, as reconstruction of the extended hash in a PCR may involve thousands of files and other objects.</t>

<t>The TCG has published an information model defining elements of reference integrity
manifests under the title TCG Reference Integrity Manifest Information Model <xref target="RIM"/>.  This information model outlines how SWID tags should be structured to allow attestation, and defines “bundles” of SWID tags that may be needed to describe a complete software release.  The RIM contains some metadata relating to the software release it belongs to, plus hashes for each individual file or other object that could be attested.</t>

<t>TCG has also published the PC Client Reference Integrity Measurement specification <xref target="PC-Client-RIM"/>, which focuses on a SWID-compatible format suitable for expressing expected measurement values in the specific case of a UEFI-compatible BIOS, where the SWID focus on files and file systems is not a direct fit.  While the PC Client RIM is not directly applicable to network equipment, many vendors do use a conventional UEFI BIOS to launch their network OS.</t>

</section>
<section anchor="attestation-logs" title="Attestation Logs">

<t>Quotes from a TPM can provide evidence of the state of a device up to the time
the evidence was recorded, but to make sense of the quote in most cases an
event log of what software modules contributed which values to the quote
during startup must also be provided.  The log must contain enough information
to demonstrate its integrity by allowing exact reconstruction of the digest
conveyed in the signed quote (e.g., PCR values).</t>

<t>TCG has defined several event log formats:</t>

<t><list style="symbols">
  <t>UEFI BIOS event log (TCG EFI Platform Specification for TPM Family 1.1 or
1.2, Section 7 <xref target="EFI-TPM"/>)</t>
  <t>Canonical Event Log <xref target="Canonical-Event-Log"/></t>
  <t>There is also a Legacy BIOS event log, although this document is less relevant as UEFI
has largely replaced the Legacy BIOS (TCG PC Client Specific Implementation Specification
for Conventional BIOS, Section 11.3<xref target="PC-Client-BIOS-TPM-1.2"/>)</t>
</list></t>

<t>It should be noted that a given device might use more than one event log
format (e.g., a UEFI log during initial boot, switching to Canonical Log
when the host OS launches).</t>

<t>The TCG SNMP Attestation MIB <xref target="SNMP-Attestation-MIB"/> will support any
record-oriented log format, including the three TCG-defined
formats, but it currently leaves figuring out which log(s) are in what format
up to the Verifier.</t>

</section>
</section>
</section>
<section anchor="standards-components" title="Standards Components">

<section anchor="reference-models" title="Reference Models">

<section anchor="ietf-reference-model-for-challenge-response-remote-attestation" title="IETF Reference Model for Challenge-Response Remote Attestation">

<t>Initial work at IETF defines remote attestation as follows:</t>

<t>The Reference Interaction Model for Challenge-Response-based Remote Attestation
is based on the standard roles defined in <xref target="I-D.ietf-rats-architecture"/>:</t>

<t><list style="symbols">
  <t>Attester: The role that designates the subject of the remote attestation.
A system entity that is the provider of evidence takes on the role of an
Attester.</t>
  <t>Verifier: The role that designates the system entity and that is the appraiser
of evidence provided by the Attester. A system entity that is the consumer
of evidence takes on the role of a Verifier.</t>
</list></t>

<t>The following diagram illustrates a common information flow between a Verifier
and an Attester, specified in <xref target="I-D.birkholz-rats-reference-interaction-model"/>:</t>

<figure title="IETF Attestation Information Flow" anchor="IETF-Attestation-Information-Flow"><artwork align="left"><![CDATA[
Attester                                                     Verifier
   |                                                               |
   | <------- requestAttestation(nonce, authSecID, claimSelection) |
   |                                                               |
collectAssertions(assertionsSelection)                             |
   | => assertions                                                 |
   |                                                               |
signAttestationEvidence(authSecID, assertions, nonce)              |
   | => signedAttestationEvidence                                  |
   |                                                               |
   | signedAttestationEvidence ----------------------------------> |
   |                                                               |
   | verifyAttestationEvidence(signedAttestatEvidence, refassertions)
   |                                          attestationResult <= |
   |                                                               |
]]></artwork></figure>

<t>The RIV approach outlined in this document aligns with the RATS reference
model.</t>

</section>
</section>
<section anchor="riv-workflow" title="RIV Workflow">

<t>The overall flow for an attestation session is shown in Figure 4.  In this
diagram:</t>

<t><list style="symbols">
  <t>Step 0, obtaining the signed reference measurements, may happen in two
ways:</t>
  <t>Step 0A below shows a verifier obtaining reference measurements directly
from a software configuration authority, whether it’s the vendor or another
authority chosen by the system administrator.  The reference measurements
are signed by the Asserter (i.e., the software configuration authority).</t>
  <t>- Or - Step 0B, the reference measurements, signed by the Asserter, may be
distributed as part of software installation, long before the attestation
session begins.  Software installation is usually vendor-dependent, so there
are no standards involved in this step.  However, the verifier can use the
same protocol to obtain the reference measurements from the device as it
would have used with an external reference authority</t>
  <t>In Step 1, the Verifier initiates an attestation session by opening a TLS
session, validated using the DevID to prove that the connection is attesting
the right box.</t>
  <t>In Step 2, measured values are retrieved from the Attester’s TPM using a
YANG <xref target="RFC8348"/> or SNMP <xref target="RFC3413"/> interface that implements the TCG TAP model (e.g. YANG Module
for Basic Challenge-Response-based Remote Attestation Procedures <xref target="I-D.ietf-rats-yang-tpm-charra"/>).</t>
  <t>In Step 3, the Attester also delivers a copy of the signed reference measurements,
using Software Inventory YANG module based on Software Identifiers <xref target="I-D.birkholz-yang-swid"/>.</t>
</list></t>

<t>These steps yield enough information for the Verifier to verify measurements against
reference values.  Of course, in all cases, the signatures protecting quotes and RIMs must be checked
before the contents are used.</t>

<figure title="RIV Protocol and Encoding Summary" anchor="RIV-Protocol-and-Encoding-Summary"><artwork align="left"><![CDATA[
+---------------+        +-------------+        +---------+
|               |        |             | Step 1 |         |
|               |        | Attester    |<------>| Verifier|
| Asserter      |        | (Device     |<------>| (Network|
|(Configuration |------->| under       | Step 2 | Mngmt   |
| Authority)    | Step 0A| attestation)|        | Station)|
|               |        |             |------->|         |
+---------------+        +-------------+ Step 3 +---------+
        |                                           /|\
        |                                            |
        ----------------------------------------------
                        Step 0B

]]></artwork></figure>

<t>Either CoSWID-encoded reference measurements are signed by a trusted authority
and retrieved directly prior to attestation (as shown in Step 0A), or CoSWID-encoded
reference measurements are signed by the device manufacturer, installed on
the device by a proprietary installer, and delivered during attestation (as
shown in Step 0B). In Step 1, the Verifier initiates a connection for attestation.
The Attester’s identity is validated using DevID with TLS. In Step 2, a
nonce, quotes (measured values) and measurement log are conveyed via TAP
with a protocol-specific binding (e.g. SNMP). Logs are sent in the Canonical
Log Format In Step 3, CoSWID-encoded reference measurements are retrieved
from the Attester using the YANG (<xref target="I-D.birkholz-yang-swid"/>.
.</t>

<t>The following components are used:</t>

<t><list style="numbers">
  <t>TPM Keys are configured according to <xref target="Platform-DevID-TPM-2.0"/>, <xref target="PC-Client-BIOS-TPM-1.2"/>, or <xref target="Platform-ID-TPM-1.2"/></t>
  <t>Measurements of firmware and bootable modules are taken according to TCG PC Client <xref target="PC-Client-BIOS-TPM-2.0"/> and Linux IMA <xref target="IMA"/></t>
  <t>Device Identity is managed by IEEE 802.1AR certificates <xref target="IEEE-802-1AR"/>, with keys protected by TPMs.</t>
  <t>Attestation logs are formatted according to the Canonical Event Log format <xref target="Canonical-Event-Log"/></t>
  <t>Quotes are retrieved according to TCG TAP Information Model <xref target="TAP"/>.  While the TAP IM gives a protocol-independent description of the data elements involved, it’s important to note that quotes from the TPM are signed inside the TPM, so must be retrieved in a way that does not invalidate the signature, as specified in <xref target="I-D.ietf-rats-yang-tpm-charra"/>, to preserve the trust model.  (See Security Considerations).</t>
  <t>Reference Integrity Measurements are encoded as CoSWID tags, as defined in
  the TCG RIM document <xref target="RIM"/>, compatible with NIST IR 8060 <xref target="NIST-IR-8060"/> and the IETF CoSWID draft <xref target="I-D.ietf-sacm-coswid"/>.  Reference measurements are signed by the device manufacturer.</t>
</list></t>

</section>
<section anchor="layering-model-for-network-equipment-attester-and-verifier" title="Layering Model for Network Equipment Attester and Verifier">

<t>Retrieval of identity and attestation state uses one protocol stack, while
retrieval of Reference Measurements uses a different set of protocols.  Figure
5 shows the components involved.</t>

<figure title="RIV Protocol Stacks" anchor="RIV-Protocol-Stacks"><artwork align="left"><![CDATA[
+-----------------------+              +-------------------------+
|                       |              |                         |
|       Attester        |<-------------|        Verifier         |
|       (Device)        |------------->|   (Management Station)  |
|                       |      |       |                         |
+-----------------------+      |       +-------------------------+
                               |
           -------------------- --------------------
           |                                        |
---------------------------------- ---------------------------------
|Reference Integrity Measurements| |         Attestation           |
---------------------------------- ---------------------------------

********************************************************************
*         IETF Attestation Reference Interaction Diagram           *
********************************************************************

    .......................         .......................
    . Reference Integrity .         .  TAP (PTS2.0) Info  .
    .      Manifest       .         . Model and Canonical .
    .                     .         .     Log Format      .
    .......................         .......................

    *************************  .............. **********************
    * YANG SWID Module      *  . TCG        . * YANG Attestation   *
    * I-D.birkholz-yang-swid*  . Attestation. * Module             *
    *                       *  . MIB        . * I-D.ietf-rats-     *
    *                       *  .            . * yang-tpm-charra    *
    *************************  .............. **********************

    *************************  ************ ************************
    * XML, JSON, CBOR (etc) *  *    UDP   * * XML, JSON, CBOR (etc)*
    *************************  ************ ************************

    *************************               ************************
    *   RESTCONF/NETCONF    *               *   RESTCONF/NETCONF   *
    ************************               *************************

    *************************               ************************
    *       TLS, SSH        *               *       TLS, SSH       *
    *************************               ************************

]]></artwork></figure>

<t>IETF documents are captured in boxes surrounded by asterisks. TCG documents
are shown in boxes surrounded by dots. The IETF Attestation Reference Interaction
Diagram, Reference Integrity Manifest, TAP Information Model
and Canonical Log Format, and both YANG modules are works in progress. Information
Model layers describe abstract data objects that can be requested, and the
corresponding response SNMP is still widely used, but the industry is transitioning
to YANG, so in some cases, both will be required. TLS Authentication with
TPM has been shown to work; SSH authentication using TPM-protected keys is
not as easily done [as of 2019]</t>

</section>
</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>Networking Equipment such as routers, switches and firewalls has a key role to play in guarding the privacy of individuals using the network:
* Packets passing through the device must not be sent to unauthorized destinations.  For example
  * Routers often act as Policy Enforcement Points, where individual subscribers may be checked for
  authorization to access a network.  Subscriber login information must not be released to unauthorized parties.
  * Networking Equipment is often called upon to block access to protected resources, or from unauthorized users.
* Routing information, such as the identity of a router’s peers, must not be leaked to unauthorized neighbors.
* If configured, encryption and decryption of traffic must be carried out reliably, while protecting keys and credentials.
Functions that protect privacy are implemented as part of each layer of hardware and software that
makes up the networking device.
In light of these requirements for protecting the privacy of users of the network, the Network Equipment
must identify itself, and its boot configuration and measured device state (for example, PCR values),
to the Equipment’s Administrator, so there’s no uncertainty as to what function each device and
configuration is configured to carry out . This allows the administrator to ensure that the network
provides individual and peer privacy guarantees.</t>

<t>RIV specifically addresses the collection information from enterprise network devices by an enterprise
network.  As such, privacy is a fundamental concern for those deploying this solution, given EU
GDPR, California CCPA, and many other privacy regulations.  The enterprise should implement
and enforce their duty of care.</t>

<t>See <xref target="NetEq"/> for more context on privacy in networking devices</t>

</section>
<section anchor="Security" title="Security Considerations">

<t>Attestation results from the RIV procedure are subject to a number of attacks:</t>

<t><list style="symbols">
  <t>Keys may be compromised</t>
  <t>A counterfeit device may attempt to impersonate (spoof) a known authentic device</t>
  <t>Man-in-the-middle attacks may be used by a counterfeit device to attempt to deliver
responses that originate in an actual authentic device</t>
  <t>Replay attacks may be attempted by a compromised device</t>
</list></t>

<t>Trustworthiness of RIV attestation depends strongly on the validity of keys used for identity
and attestation reports.  RIV takes full advantage of TPM capabilities to ensure that results can be trusted.</t>

<t>Two sets of keys are relevant to RIV attestation</t>

<t><list style="symbols">
  <t>A DevID key is used to certify the identity of the device in which the TPM is installed.</t>
  <t>An Attestation Key (AK) key signs attestation reports, (called ‘quotes’ in TCG documents),
used to provide evidence for integrity of the software on the device.</t>
</list></t>

<t>TPM practices require that these keys be different, as a way of ensuring that a general-purpose
signing key cannot be used to spoof an attestation quote.</t>

<t>In each case, the private half of the key is known only to the TPM, and cannot be
retrieved externally, even by a trusted party.  To ensure that’s the case,
specification-compliant private/public key-pairs are generated inside the TPM, where they’re never
exposed, and cannot be extracted (See <xref target="Platform-DevID-TPM-2.0"/>).</t>

<t>Keeping keys safe is just part of attestation security; knowing which keys are bound
to the device in question is just as important.</t>

<t>While there are many ways to manage keys in a TPM (See <xref target="Platform-DevID-TPM-2.0"/>), RIV includes
support for “zero touch” provisioning (also known as zero-touch onboarding) of fielded
devices (e.g. Secure ZTP, <xref target="RFC8572"/>}), where keys which have predictable trust properties are
provisioned by the device vendor.</t>

<t>Device identity in RIV is based on IEEE 802.1AR DevID. This specification provides several elements</t>

<t><list style="symbols">
  <t>A DevID requires a unique key pair for each device, accompanied by an x.509 certificate</t>
  <t>The private portion of the DevID key is to be stored in the device, in a manner that provides confidentiality (Section 6.2.5 <xref target="IEEE-802-1AR"/>)</t>
</list></t>

<t>The x.509 certificate contains several components</t>

<t><list style="symbols">
  <t>The public part of the unique DevID key assigned to that device</t>
  <t>An identifying string that’s unique to the manufacturer of the device.  This is normally the
serial number of the unit, which might also be printed on label on the device.</t>
  <t>The certificate must be signed by a key traceable to the manufacturer’s root key.</t>
</list></t>

<t>With these elements, the device’s manufacturer and serial number can be identified by analyzing the
DevID certificate plus the chain of intermediate certs leading back to the manufacturer’s root
certificate.  As is conventional in TLS connections, a nonce must be signed by the device
in response to a challenge,
proving possession of its DevID private key.</t>

<t>RIV uses the DevID to validate a TLS connection to the device as the attestation session begins.  Security of
this process derives from TLS security, with the DevID providing proof that the TLS session terminates on
the intended device. <xref target="RFC8446"/>.</t>

<t>Evidence of software integrity is delivered in the form of a quote signed by the TPM
itself.  Because the contents of the quote are signed inside the TPM, any external
modification (including reformatting to a different data format) will be detected
as tampering.</t>

<t>A critical feature of the YANG model described in <xref target="I-D.ietf-rats-yang-tpm-charra"/> is the ability to carry TPM data structures in their native format, without requiring any changes to the structures as they were signed and delivered by the TPM.  While alternate methods of conveying TPM quotes could add an additional layer of signing using external keys, the important part is to preserve the TPM signing, so that tampering anywhere in the path between the TPM itself and the Verifier can be detected.</t>

<t>Prevention of spoofing attacks against attestation systems is also important.  There are two cases to consider:
* The entire device could be spoofed, that is, when the Verifier goes to verify a specific device, it might be redirected to a different device.  Use of the 802.1AR identity in the TPM ensures that the Verifier’s TLS session is in fact terminating on the right device.
* A compromised device could respond with a spoofed attestation result, that is, a compromised OS could return a fabricated quote.</t>

<t>Protection against spoofed quotes from a device with valid identity is a bit more complex.
An identity key must be available to sign any kind of nonce or hash offered by the verifier,
and consequently, could be used to sign a fabricated quote.  To block spoofed attestation
result, the quote generated inside the TPM must by signed by
a key that’s different from the DevID, called an Attestation Key (AK).</t>

<t>Given separate Attestation and DevID keys, the
binding between the AK and the same device must also be proven to
prevent a man-in-the-middle attack (e.g. the ‘Asokan Attack’ <xref target="RFC6813"/>).</t>

<t>This is accomplished in RIV through use of an AK certificate with the same elements as the DevID
(i.e., same manufacturer’s serial number, signed by the same manufacturer’s key), but containing
the device’s unique AK public key instead of the DevID public key.
[this will require an OID that says the key is known by the CA to be an Attestation key]</t>

<t>These two keys and certificates are used together:</t>

<t><list style="symbols">
  <t>The DevID is used to validate a TLS connection terminating on the device with a known serial number.</t>
  <t>The AK is used to sign attestation quotes, providing proof that the attestation
evidence comes from the same device.</t>
</list></t>

<t>Replay attacks, where results of a previous attestation are submitted in response to subsequent requests,
are usually prevented by inclusion of a nonce in the request to the TPM
for a quote.  Each request from the Verifier includes a new random number (a nonce). The resulting
quote signed by the TPM contains the same nonce, allowing the verifier to determine
freshness, i.e., that the resulting quote was generated in response to the verifier’s specific request.
Time-Based Uni-directional Attestation <xref target="I-D.birkholz-rats-tuda"/> provides an alternate mechanism
to verify freshness without requiring a request/response cycle.</t>

<t>Requiring results of attestation of the operating software to be signed by a key known only to the TPM also
removes the need to trust the device’s operating software (beyond the first measurement; see below); any
changes to the quote, generated and signed by the TPM itself, made by malicious device software, or in
the path back to the verifier, will invalidate the signature on the quote.</t>

<t>Although RIV recommends that device manufacturers pre-provision devices with easily-verified DevID and AK certs,
use of those credentials is not mandatory.  IEEE 802.1AR incorporates the idea of an Initial Device ID
(IDevID), provisioned by the manufacturer, and a Local Device ID (LDevID) provisioned by the owner of
the device.  RIV extends that concept by defining an Initial Attestation Key (IAK) and Local Attestation
Key (LAK) with the same properties.</t>

<t>Device owners can use any method to provision the Local credentials.</t>

<t><list style="symbols">
  <t>TCG doc <xref target="Platform-DevID-TPM-2.0"/> shows how the initial Attestation
keys can be used to certify LDevID and LAK keys.  Use of the LDevID and LAK allows the device owner
to use a uniform identity structure across device types from multiple manufacturers (in the same way
that an “Asset Tag” is used by many enterprises use to identify devices they own).  TCG doc
<xref target="Provisioning-TPM-2.0"/> also contains guidance on provisioning identity keys in TPM 2.0.</t>
  <t>But device owners can use any other mechanism they want to assure themselves that Local identity
certificates are inserted into the intended device, including physical inspection and programming
in a secure location, if they prefer to avoid placing trust in the manufacturer-provided keys.</t>
</list></t>

<t>Clearly, Local keys can’t be used for secure Zero Touch provisioning; installation of the Local keys
can only be done by some process that runs before the device is configured for network operation.</t>

<t>On the other end of the device life cycle, provision should be made to wipe Local keys when a device
is decommissioned, to indicate that the device is no longer owned by the enterprise.  The manufacturer’s
Initial identity keys must be preserved, as they contain no information that’s not already printed on
the device’s serial number plate.</t>

<t>In addition to trustworthy provisioning of keys, RIV depends on other trust anchors.  (See <xref target="GloPlaRoT"/> for definitions of Roots of Trust.)</t>

<t><list style="symbols">
  <t>Secure identity depends on mechanisms to prevent per-device secret keys from being compromised.  The TPM
provides this capability as a Root of Trust for Storage</t>
  <t>Attestation depends on an unbroken chain of measurements, starting from the very first measurement.
That first measurement is made by code called the Root of Trust for Measurement, typically done by trusted
firmware stored in boot flash.  Mechanisms for maintaining the trustworthiness of the RTM are out of
scope for RIV, but could include immutable firmware, signed updates, or a vendor-specific hardware
verification technique.</t>
  <t>RIV assumes some level of physical defense for the device.  If a TPM that has already been programmed
with an authentic DevID is stolen and inserted into a counterfeit device, attestation of that counterfeit
device may become indistinguishable from an authentic device.</t>
</list></t>

<t>RIV also depends on reliable reference measurements, as expressed by the RIM <xref target="RIM"/>.  The definition of
trust procedures for RIMs is out of scope for RIV, and the device owner is free to use any policy to validate
a set of reference measurements.  RIMs may be conveyed out-of-band or in-band, as part of the attestation
process (see Section 3.2).  But for embedded devices, where software is usually shipped as a self-contained
package, RIMs signed by the manufacturer and delivered in-band may be more convenient for the device owner.</t>

</section>
<section anchor="conclusion" title="Conclusion">

<t>TCG technologies can play an important part in the implementation of Remote
Integrity Verification.  Standards for many of the components needed for
implementation of RIV already exist:</t>

<t><list style="symbols">
  <t>Platform identity can be based on IEEE 802.1AR Device identity, coupled with
careful supply-chain management by the manufacturer.</t>
  <t>Complex supply chains can be certified using TCG Platform Certificates <xref target="Platform-Certificates"/></t>
  <t>The TCG TAP mechanism can be used to retrieve attestation evidence.  Work
is needed on a YANG model for this protocol.</t>
  <t>Reference Measurements must be conveyed from the software authority (e.g.,
the manufacturer) to the system in which verification will take place.  IETF
CoSWID work forms the basis for this, but new work is needed to create an
information model and YANG implementation.</t>
</list></t>

</section>
<section anchor="appendix" title="Appendix">

<section anchor="implementation-notes" title="Implementation Notes">

<t>Table 1 summarizes many of the actions needed to complete an Attestation
system, with links to relevant documents.  While documents are controlled
by several standards organizations, the implied actions required for
implementation are all the responsibility of the manufacturer of the device,
unless otherwise noted.</t>

<figure title="Component Status" anchor="Component-Status"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|             Component                           |  Controlling   |
|                                                 | Specification  |
--------------------------------------------------------------------
| Make a Secure execution environment             |   TCG RoT      |
|   o Attestation depends on a secure root of     |   UEFI.org     |
|     trust for measurement outside the TPM, as   |                |
|     well as roots for storage amd reporting     |                |
|     inside the TPM.                             |                |
|   o  Refer to TCG Root of Trust for Measurement.|                |
|   o  NIST SP 800-193 also provides guidelines   |                |
|      on Roots of Trust                          |                |
--------------------------------------------------------------------
| Provision the TPM as described in               | TCG TPM DevID  |
|   TCG documents.                                | TCG Platform   |
|                                                 |   Certificate  |
--------------------------------------------------------------------
| Put a DevID or Platform Cert in the TPM         | TCG TPM DevID  |
|    o Install an Initial Attestation Key at the  | TCG Platform   |
|      same time so that Attestation can work out |   Certificate  |
|      of the box                                 |-----------------
|    o Equipment suppliers and owners may want to | IEEE 802.1AR   |
|      implement Local Device ID as well as       |                |
|      Initial Device ID                          |                |
--------------------------------------------------------------------
| Connect the TPM to the TLS stack                | Vendor TLS     |
|    o  Use the DevID in the TPM to authenticate  | stack (This    |
|       TAP connections, identifying the device   | action is      |
|                                                 | simply         |
|                                                 | configuring TLS|
|                                                 | to use the     |
|                                                 | DevID as its   |
|                                                 | trust anchor.) |
--------------------------------------------------------------------
| Make CoSWID tags for BIOS/LoaderLKernel objects | IETF CoSWID    |
|    o  Add reference measurements into SWID tags | ISO/IEC 19770-2|
|    o  Manufacturer should sign the SWID tags    | NIST IR 8060   |
|    o  The TCG RIM-IM identifies further         |                |
|       procedures to create signed RIM           |                |
|       documents that provide the necessary      |                |
|       reference information                     |                |
--------------------------------------------------------------------
|  Package the SWID tags with a vendor software   | Retrieve tags  |
|  release                                        | with           |
|    o  A tag-generator plugin such      | {{I-D.birkholz-yang-swid}}|
|     as https://github.com/Labs64/swid-maven-plugin               |
|     can be used                                 |----------------|
|                                                 | TCG PC Client  |
|                                                 | RIM            |
--------------------------------------------------------------------
|  Use PC Client measurement definitions          | TCG PC Client  |
|  to define the use of PCRs                      | BIOS           |
|  (although Windows  OS is rare on Networking    |                |
|  Equipment, UEFI BIOS is not)                   |                |
--------------------------------------------------------------------
|  Use TAP to retrieve measurements               |                |
|    o  Map TAP to SNMP                           | TCG SNMP MIB   |
|    o  Map to YANG                               | YANG Module for|
|  Use Canonical Log Format                       |   Basic        |
|                                                 |   Attestation  |
|                                                 | TCG Canonical  |
|                                                 |   Log Format   |
--------------------------------------------------------------------
| Posture Collection Server (as described in IETF |                |
|  SACMs ECP) should request the                  |                |
|  attestation and analyze the result             |                |
| The Management application might be broken down |                |
|  to several more components:                    |                |
|    o  A Posture Manager Server                  |                |
|       which collects reports and stores them in |                |
|       a database                                |                |
|    o  One or more Analyzers that can look at the|                |
|       results and figure out what it means.     |                |
--------------------------------------------------------------------
]]></artwork></figure>

</section>
<section anchor="comparison-with-tcg-pts-ietf-nea" title="Comparison with TCG PTS / IETF NEA">

<t>Some components of an Attestation system have been implemented for end-user
machines such as PCs and laptops. Figure 7 shows the corresponding protocol
stacks.</t>

<figure title="Attestation for End User Computers" anchor="Attestation-for-End-User-Computers"><artwork align="left"><![CDATA[
+-----------------------+              +-------------------------+
|                       |              |                         |
|       Attester        |<-------------|        Verifier         |
|       (Device)        |------------->|   (Management Station)  |
|                       |      |       |                         |
+-----------------------+      |       +-------------------------+
                               |
           -------------------- --------------------
           |                                        |
---------------------------------- ---------------------------------
|Reference Integrity Measurements| |         Attestation           |
---------------------------------- ---------------------------------

--------------------------------------------------------------------
|         IETF Attestation Reference Interaction Diagram           |
-------------------------------------------------------------------

    .......................         --------------------------------
    . No Existing         .         |  TAPS (PTS2.0) Info Model and|
    . Reference Integrity .         |  Canonical Log Format        |
    . Manifest            .         |                              |
    . Protocols Exist     .         --------------------------------
    .                     .
    .                     .        ---------------------- ----------
    .                     .        | YANG Attestation   | |IETF NEA|
    .                     .        | Module             | | Msg and|
    .                     .        | I-D.ietf-rats-     | | Attrib.|
    .                     .        | yang-tpm-charra    | | for PA-|
    .                     .        |                    | | TNC    |
    .                     .        ---------------------- ----------
    .                     .        ---------------------- ----------
    .                     .        | XML, JSON, CBOR    | | PT-TLS |
    .                     .        ---------------------- | (for   |
    .                     .        ---------------------- |endpoint|
    .                     .        | NETCONF, RESTCONF, | |mcahines|
    .                     .        | COAP               | |        |
    .......................        ---------------------- ----------
    ----------------------------------------------------------------
    |                       TLS, SSH                               |
    ----------------------------------------------------------------
]]></artwork></figure>

</section>
</section>
<section anchor="IANA" title="IANA Considerations">

<t>This memo includes no request to IANA.</t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC8348" target='https://www.rfc-editor.org/info/rfc8348'>
<front>
<title>A YANG Data Model for Hardware Management</title>
<author initials='A.' surname='Bierman' fullname='A. Bierman'><organization /></author>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund'><organization /></author>
<author initials='J.' surname='Dong' fullname='J. Dong'><organization /></author>
<author initials='D.' surname='Romascanu' fullname='D. Romascanu'><organization /></author>
<date year='2018' month='March' />
<abstract><t>This document defines a YANG data model for the management of hardware on a single server.</t></abstract>
</front>
<seriesInfo name='RFC' value='8348'/>
<seriesInfo name='DOI' value='10.17487/RFC8348'/>
</reference>



<reference  anchor="RFC3413" target='https://www.rfc-editor.org/info/rfc3413'>
<front>
<title>Simple Network Management Protocol (SNMP) Applications</title>
<author initials='D.' surname='Levi' fullname='D. Levi'><organization /></author>
<author initials='P.' surname='Meyer' fullname='P. Meyer'><organization /></author>
<author initials='B.' surname='Stewart' fullname='B. Stewart'><organization /></author>
<date year='2002' month='December' />
<abstract><t>This document describes five types of Simple Network Management Protocol (SNMP) applications which make use of an SNMP engine as described in STD 62, RFC 3411.  The types of application described are Command Generators, Command Responders, Notification Originators, Notification Receivers, and Proxy Forwarders. This document also defines Management Information Base (MIB) modules for specifying targets of management operations, for notification filtering, and for proxy forwarding.  This document obsoletes RFC 2573.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='62'/>
<seriesInfo name='RFC' value='3413'/>
<seriesInfo name='DOI' value='10.17487/RFC3413'/>
</reference>



<reference  anchor="RFC5209" target='https://www.rfc-editor.org/info/rfc5209'>
<front>
<title>Network Endpoint Assessment (NEA): Overview and Requirements</title>
<author initials='P.' surname='Sangster' fullname='P. Sangster'><organization /></author>
<author initials='H.' surname='Khosravi' fullname='H. Khosravi'><organization /></author>
<author initials='M.' surname='Mani' fullname='M. Mani'><organization /></author>
<author initials='K.' surname='Narayan' fullname='K. Narayan'><organization /></author>
<author initials='J.' surname='Tardo' fullname='J. Tardo'><organization /></author>
<date year='2008' month='June' />
<abstract><t>This document defines the problem statement, scope, and protocol requirements between the components of the NEA (Network Endpoint Assessment) reference model.  NEA provides owners of networks (e.g., an enterprise offering remote access) a mechanism to evaluate the posture of a system.  This may take place during the request for network access and/or subsequently at any time while connected to the network.  The learned posture information can then be applied to a variety of compliance-oriented decisions.  The posture information is frequently useful for detecting systems that are lacking or have out-of-date security protection mechanisms such as: anti-virus and host-based firewall software.  In order to provide context for the requirements, a reference model and terminology are introduced.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5209'/>
<seriesInfo name='DOI' value='10.17487/RFC5209'/>
</reference>



<reference  anchor="RFC8572" target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author initials='K.' surname='Watsen' fullname='K. Watsen'><organization /></author>
<author initials='I.' surname='Farrer' fullname='I. Farrer'><organization /></author>
<author initials='M.' surname='Abrahamsson' fullname='M. Abrahamsson'><organization /></author>
<date year='2019' month='April' />
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference  anchor="RFC6813" target='https://www.rfc-editor.org/info/rfc6813'>
<front>
<title>The Network Endpoint Assessment (NEA) Asokan Attack Analysis</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='S.' surname='Hanna' fullname='S. Hanna'><organization /></author>
<date year='2012' month='December' />
<abstract><t>The Network Endpoint Assessment (NEA) protocols are subject to a subtle forwarding attack that has become known as the NEA Asokan Attack. This document describes the attack and countermeasures that may be mounted.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6813'/>
<seriesInfo name='DOI' value='10.17487/RFC6813'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor="I-D.ietf-rats-yang-tpm-charra">
<front>
<title>A YANG Data Model for Challenge-Response-based Remote Attestation Procedures using TPMs</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Eckel' fullname='Michael Eckel'>
    <organization />
</author>

<author initials='S' surname='Bhandari' fullname='Shwetha Bhandari'>
    <organization />
</author>

<author initials='B' surname='Sulzen' fullname='Bill Sulzen'>
    <organization />
</author>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<author initials='L' surname='Xia' fullname='Liang Xia'>
    <organization />
</author>

<author initials='T' surname='Laffey' fullname='Tom Laffey'>
    <organization />
</author>

<author initials='G' surname='Fedorkow' fullname='Guy Fedorkow'>
    <organization />
</author>

<date month='January' day='7' year='2020' />

<abstract><t>This document defines a YANG RPC and a minimal datastore tree required to retrieve attestation evidence about integrity measurements from a composite device with one or more roots of trust for reporting.  Complementary measurement logs are also provided by the YANG RPC originating from one or more roots of trust of measurement.  The module defined requires at least one TPM 1.2 or TPM 2.0 and corresponding Trusted Software Stack included in the device components of the composite device the YANG server is running on.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-yang-tpm-charra-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-yang-tpm-charra-00.txt' />
</reference>



<reference anchor="I-D.ietf-rats-architecture">
<front>
<title>Remote Attestation Procedures Architecture</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='N' surname='Smith' fullname='Ned Smith'>
    <organization />
</author>

<date month='February' day='4' year='2020' />

<abstract><t>In network protocol exchanges, it is often the case that one entity (a Relying Party) requires evidence about a remote peer to assess the peer's trustworthiness, and a way to appraise such evidence.  The evidence is typically a set of claims about its software and hardware platform.  This document describes an architecture for such remote attestation procedures (RATS).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-architecture-01.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-reference-interaction-model">
<front>
<title>Reference Interaction Models for Remote Attestation Procedures</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Eckel' fullname='Michael Eckel'>
    <organization />
</author>

<date month='January' day='7' year='2020' />

<abstract><t>This document defines interaction models for basic remote attestation procedures.  Different methods of conveying attestation evidence securely are defined and illustrated.  Analogously, the required information elements used by conveyance protocols are defined and illustrated.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-reference-interaction-model-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-reference-interaction-model-02.txt' />
</reference>



<reference anchor="I-D.birkholz-yang-swid">
<front>
<title>Software Inventory YANG module based on Software Identifiers</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<date month='October' day='23' year='2018' />

<abstract><t>This document provides a YANG module definition that enables a computing context to provide detailed information about installed software components.  The structure of the module is based on the Concise Software Identifier draft and therefore also strongly related to the ISO 19770-2:2015 Software Identifiers standard.  Both standards provide no interface to transport the SWID tag information between system entities and this document leverages the wide adoption of YANG based management interfaces.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-yang-swid-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-yang-swid-02.txt' />
</reference>



<reference anchor="I-D.ietf-sacm-coswid">
<front>
<title>Concise Software Identification Tags</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='J' surname='Fitzgerald-McKay' fullname='Jessica Fitzgerald-McKay'>
    <organization />
</author>

<author initials='C' surname='Schmidt' fullname='Charles Schmidt'>
    <organization />
</author>

<author initials='D' surname='Waltermire' fullname='David Waltermire'>
    <organization />
</author>

<date month='November' day='17' year='2019' />

<abstract><t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles.  SWID tag representations can be too large for devices with network and storage constraints.  This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags.  CoSWID supports the same features as SWID tags, as well as additional semantics that allow CoSWIDs to describe additional types of information, all in a more memory efficient format.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-13' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-sacm-coswid-13.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-tuda">
<front>
<title>Time-Based Uni-Directional Attestation</title>

<author initials='A' surname='Fuchs' fullname='Andreas Fuchs'>
    <organization />
</author>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='I' surname='McDonald' fullname='Ira McDonald'>
    <organization />
</author>

<author initials='C' surname='Bormann' fullname='Carsten Bormann'>
    <organization />
</author>

<date month='September' day='11' year='2019' />

<abstract><t>This documents defines the method and bindings used to conduct Time- based Uni-Directional Attestation (TUDA) between two RATS (Remote ATtestation procedureS) Principals over the Internet.  TUDA does not require a challenge-response handshake and thereby does not rely on the conveyance of a nonce to prove freshness of remote attestation Evidence.  Conversely, TUDA enables the creation of Secure Audit Logs that can constitute Evidence about current and past operational states of an Attester.  As a prerequisite for TUDA, every RATS Principal requires access to a trusted and synchronized time-source. Per default, in TUDA this is a Time Stamp Authority (TSA) issuing signed Time Stamp Tokens (TST).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-tuda-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-tuda-01.txt' />
</reference>


<reference anchor="TAP" >
  <front>
    <title>DRAFT: TCG Trusted Attestation Protocol (TAP) Information Model for TPM Families 1.2 and 2.0 and DICE Family 1.0, Version 1.0, Revision 0.29</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="NIST-SP-800-155" target="https://csrc.nist.gov/csrc/media/publications/sp/800-155/draft/documents/draft-sp800-155_dec2011.pdf">
  <front>
    <title>BIOS Integrity Measurement Guidelines (Draft)</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2011" month="December"/>
  </front>
</reference>
<reference anchor="SNMP-Attestation-MIB" >
  <front>
    <title>DRAFT: SNMP MIB for TPM-Based Attestation, Specification Version 0.8, Revision 0.02</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>
<reference anchor="Canonical-Event-Log" >
  <front>
    <title>DRAFT Canonical Event Log Format Version: 1.0, Revision: .12</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-2.0" target="https://trustedcomputinggroup.org/pc-client-specific-platform-firmware-profile-specification">
  <front>
    <title>PC Client Specific Platform Firmware Profile Specification Family "2.0", Level 00 Revision 1.04</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-1.2" target="https://www.trustedcomputinggroup.org/wp-content/uploads/TCG_PCClientImplementation_1-21_1_00.pdf">
  <front>
    <title>TCG PC Client Specific Implementation Specification for Conventional BIOS, Specification Version 1.21 Errata, Revision 1.00</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2012" month="February"/>
  </front>
</reference>
<reference anchor="EFI-TPM" target="https://trustedcomputinggroup.org/wp-content/uploads/EFI-Protocol-Specification-rev13-160330final.pdf">
  <front>
    <title>TCG EFI Platform Specification for TPM Family 1.1 or 1.2, Specification Version 1.22, Revision 15</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2014" month="January"/>
  </front>
</reference>
<reference anchor="RIM" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_RIM_Model_v1-r13_2feb20.pdf">
  <front>
    <title>DRAFT: TCG Reference Integrity Manifest Information Model</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-RIM" target="https://trustedcomputinggroup.org/xx">
  <front>
    <title>DRAFT: TCG PC Client Reference Integrity Manifest Specification, v.09</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="December"/>
  </front>
</reference>
<reference anchor="Platform-DevID-TPM-2.0" >
  <front>
    <title>DRAFT: TPM Keys for Platform DevID for TPM2, Specification Version 0.7, Revision 0</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="Platform-Certificates" >
  <front>
    <title>DRAFT: TCG Platform Attribute Credential Profile, Specification Version 1.0, Revision 15, 07 December 2017</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2017" month="December"/>
  </front>
</reference>
<reference anchor="Platform-ID-TPM-1.2" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf">
  <front>
    <title>TPM Keys for Platform Identity for TPM 1.2, Specification Version 1.0, Revision 3</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
</reference>
<reference anchor="Provisioning-TPM-2.0" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-TPM-v2.0-Provisioning-Guidance-Published-v1r1.pdf">
  <front>
    <title>TCG TPM v2.0 Provisioning Guidance</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="March"/>
  </front>
</reference>
<reference anchor="IEEE-802-1AR" >
  <front>
    <title>802.1AR-2018 - IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity, IEEE Computer Society</title>
    <author initials="M." surname="Seaman">
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2018" month="August"/>
  </front>
</reference>
<reference anchor="IMA" target="https://sourceforge.net/p/linux-ima/wiki/Home/">
  <front>
    <title>Integrity Measurement Architecture</title>
    <author surname="dsafford">
      <organization></organization>
    </author>
    <author surname="kds_etu">
      <organization></organization>
    </author>
    <author surname="mzohar">
      <organization></organization>
    </author>
    <author surname="reinersailer">
      <organization></organization>
    </author>
    <author surname="serge_hallyn">
      <organization></organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="TCGRoT" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_Roots_of_Trust_Specification_v0p20_PUBLIC_REVIEW.pdf">
  <front>
    <title>TCG Roots of Trust Specification</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="GloPlaRoT" target="https://globalplatform.org/specs-library/globalplatform-root-of-trust-definitions-and-requirements/">
  <front>
    <title>Root of Trust Definitions and Requirements Version 1.1</title>
    <author >
      <organization>GlobalPlatform Technology</organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="NetEq" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_Guidance_for_Securing_NetEq_1_0r29.pdf">
  <front>
    <title>TCG Guidance for Securing Network Equipment</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="January"/>
  </front>
</reference>
<reference anchor="NIST-IR-8060" target="https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8060.pdf">
  <front>
    <title>Guidelines for the Creation of Interoperable Software Identification (SWID) Tags</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2016" month="April"/>
  </front>
</reference>
<reference anchor="SWID" target="https://www.iso.org/standard/65666.html">
  <front>
    <title>Information Technology Software Asset Management Part 2: Software Identification Tag, ISO/IEC 19770-2</title>
    <author >
      <organization>The International Organization for Standardization/International Electrotechnical Commission</organization>
    </author>
    <date year="2015" month="October"/>
  </front>
</reference>
<reference anchor="AIK-Enrollment" target="https://trustedcomputinggroup.org/wp-content/uploads/IWG_CMC_Profile_Cert_Enrollment_v1_r7.pdf">
  <front>
    <title>TCG Infrastructure Working GroupA CMC Profile for AIK Certificate Enrollment Version 1.0, Revision 7</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2011" month="March"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

