<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-csr-attestation-26" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Remote Attestation with CSRs">Use of Remote Attestation with Certification Signing Requests</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-26"/>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Cryptic Forest">Cryptic Forest Software</organization>
      <address>
        <postal>
          <city>Sioux Lookout, Ontario</city>
          <country>Canada</country>
        </postal>
        <email>mike@ounsworth.ca</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization/>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>mwiseman@computer.org</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization/>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>ned.smith.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="20"/>
    <keyword>PKI</keyword>
    <keyword>PKCS#10</keyword>
    <keyword>CRMF</keyword>
    <keyword>Attestation</keyword>
    <keyword>Certificate Signing Requests</keyword>
    <abstract>
      <?line 85?>

<t>Certification Authorities (CAs) issuing certificates to Public Key Infrastructure (PKI) end entities may require a certificate signing request (CSR) to include additional verifiable information to confirm policy compliance. For example, a CA may require an end entity to demonstrate that the private key corresponding to a CSR's public key is secured by a hardware security module (HSM), is not exportable, etc. The process of generating, transmitting, and verifying  additional information required by the CA is called remote attestation. While work is currently underway to standardize various aspects of  remote attestation, a variety of proprietary mechanisms have been in use for years, particularly regarding protection of private keys.</t>
      <t>This specification defines ASN.1 structures which may carry attestation data for PKCS#10 and Certificate
Request Message Format (CRMF) messages. Both standardized and proprietary attestation formats are supported by this specification.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://lamps-wg.github.io/csr-attestation/draft-ietf-lamps-csr-attestation.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-csr-attestation/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/csr-attestation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 92?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Certification Authorities (CAs) issuing certificates to PKI end entities may require a certificate signing request (CSR) include verifiable attestations that contain claims regarding the platform used by the end entity to generate the key pair for which a certificate is sought and also contains claims of attributes of the key pair with respect to its protection, use and extractability. At the time of writing, the most pressing example of the need for remote attestation in certificate enrollment is the Code-Signing Baseline Requirements (CSBR) document maintained by the CA/Browser Forum <xref target="CSBR"/>. The <xref target="CSBR"/> requires compliant CAs to "ensure that a Subscriber's Private Key is generated, stored, and used in a secure environment that has controls to prevent theft or misuse". This requirement is a natural fit to enforce via remote attestation.</t>
      <t>This specification defines an attribute and an extension that allow for conveyance of verifiable attestations in several Certificate Signing Request (CSR) formats, including PKCS#10 <xref target="RFC2986"/> or Certificate Request Message Format (CRMF) <xref target="RFC4211"/> messages. Given several standard and proprietary remote attestation technologies are in use, this specification is intended to be as technology-agnostic as is feasible with respect to implemented and future remote attestation technologies. This aligns with the fact that a CA may wish to provide support for a variety of types of devices but cannot dictate what format a device uses to represent attestations.  However, if a certificate requester does not include the number and types of attestations required by the CA, it is unlikely the requester will receive the requested certificate.</t>
      <t>While CSRs are defined using Abstract Syntax Notation One (ASN.1), attestations may be defined using any data description language, i.e., ASN.1 or Concise Data Description Language (CDDL), or represented using any type of encoding, including Distinguished Encoding Rules (DER), Concise Binary Object Representation (CBOR), JavaScript Object Notation (JSON). This specification RECOMMENDS that attestations that are not encoded using the Basic Encoding Rules (BER) or Distinguished Encoding Rules (DER) be wrapped in an ASN.1 OCTET STRING.</t>
    </section>
    <section anchor="relationship-to-the-ietf-rats-working-group">
      <name>Relationship to the IETF RATS Working Group</name>
      <t>As noted, attestation-related technologies have existed for many years, albeit with no standard format and no standard means of conveying attestation statements to a CA. This draft addresses the latter, and is equally applicable to standard and proprietary attestation formats. The IETF Remote Attestation Procedures (RATS) working group is addressing the former. In <xref target="RFC9334"/>, RATS defined vocabulary, architecture, and usage patterns related to the practice of generating and verifying attestations.</t>
      <t>In its simplest topological model, attestations are generated by the certificate requester and verified by the CA/RA. Section 5 of <xref target="RFC9334"/> defines topological patterns that are more complex,
including the background check model and the passport model.  This
document may be applied to instantiating any of these topological
models for CSR processing, provided the required security
requirements specific to the context of certificate issuance are
satisfied.</t>
      <t><xref section="4.2" sectionFormat="of" target="RFC9334"/> defines several roles that originate, forward or process attestation statements (also see <xref section="1.2" sectionFormat="of" target="RFC9683"/>): the Attester; Endorser; Relying Party; and Verifier. Attestation statements, such as Evidence, may be directed to an entity taking at least one of these roles, including to an CA/RA acting as a Verifier.
An CA/RA may also forward attestation statements to a Verifier for appraisal. Each attestation statements may contain one or more claims, including claims that may be required by an RA or CA. Attestation statements transmitted by these parties are defined in <xref section="8" sectionFormat="of" target="RFC9334"/> as the "conceptual messages" Evidence, Endorsement, and Attestation Results. The structure defined in this specification may be used by any of the roles that originate attestation statements, and is equally applicable to these three conceptual messages.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document re-uses the terms defined in <xref target="RFC9334"/> related to remote
attestation. Readers of this document are assumed to be familiar with
the following terms defined in <xref target="RFC9334"/>: Evidence, Endorsement, Claim, Attestation Result (AR), Attester, Relying Party, and Verifier.
Per <xref target="RFC9334"/>, the CA/RA is the Relying Party with respect to remote attestation. This use of the term "relying party" differs from the traditional PKIX use of the term.
This specification uses CA/RA to refer to an <xref target="RFC9334"/> Relying Party, which may or may not include an integrated Verifier.</t>
      <t>The term "Certification Request" message is defined in <xref target="RFC2986"/>.
Specifications, such as <xref target="RFC7030"/>, later introduced the term
"Certificate Signing Request (CSR)" to refer to the Certification
Request message. While the term "Certification Request"
would have been correct, the mistake was unnoticed. In the meanwhile
CSR is an abbreviation used beyond PKCS#10. Hence, it is equally
applicable to other protocols that use a different syntax and
even a different encoding, in particular this document also
considers messages in the Certificate Request Message Format (CRMF) <xref target="RFC4211"/>
to be "CSRs". In this document, the terms "CSR" and Certificate Request
message are used interchangeably.</t>
      <t>The term "hardware security module (HSM)" is used generically to refer to the
combination of hardware and software designed to protect keys from unauthorized
access. Other commonly used terms include Secure Element, Trusted Platform Module, and Trusted Execution
Environment.</t>
      <t>Since this document combines terminology from two domains, Remote Attestation (RATS) and X.509 PKI, it follows a naming convention to avoid ambiguity.
RATS terminology is written in uppercase (e.g., Verifier), while X.509/PKI terminology is written in lowercase (e.g., certification authority (CA)).
This distinction clarifies terms that exist in both domains; for instance, a Verifier refers to the RATS entity that processes Evidence, whereas a verifier refers to the PKI entity that validates certificates.
This convention is distinct from camel-case identifiers like "AttestationStatement", which denote ASN.1 types.</t>
    </section>
    <section anchor="sec-attestationAttr">
      <name>Conveying Attestations in CSRs</name>
      <t>The focus of this specification is the conveyance of attestations to a CA/RA as part of a CSR.
The following sub-sections define formats to support this conveyance, an optional mechanism to limit support to specific attestation types at the ASN.1 level, and bindings to the attribute and extension mechanisms used in certificate managment protocols.</t>
      <section anchor="attestationstatement-and-attestationbundle">
        <name>AttestationStatement and AttestationBundle</name>
        <t>The <tt>AttestationStatement</tt> structure (as shown in <xref target="code-AttestationStatement"/>) facilitates the representation of Evidence, Endorsements,
and Attestation Results generated by an Attester, Endorser, or Verifier for processing by a Verifier or Relying Party, such as verification by a CA/RA.</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>type</tt> field is an OBJECT IDENTIFIER that identifies the format of the <tt>stmt</tt> field.</t>
          </li>
          <li>
            <t>The <tt>stmt</tt> field contains the attestation for processing, constrained by the <tt>type</tt> field. Formats that are not defined using ASN.1 <bcp14>MUST</bcp14> define an ASN.1 wrapper for use with the <tt>AttestationStatement</tt> structure.
For example, a CBOR-encoded format may be defined as an OCTET STRING for <tt>AttestationStatement</tt> purposes, where the contents of the OCTET STRING are the CBOR-encoded data.</t>
          </li>
        </ul>
        <figure anchor="code-AttestationStatement">
          <name>Definition of AttestationStatement</name>
          <sourcecode type="asn1"><![CDATA[
ATTESTATION-STATEMENT ::= TYPE-IDENTIFIER

AttestationStatement ::= SEQUENCE {
   type   ATTESTATION-STATEMENT.&id({AttestationStatementSet}),
   stmt   ATTESTATION-STATEMENT.&Type({AttestationStatementSet}{@type})
}
]]></sourcecode>
        </figure>
        <t>In some cases, a CA may require CSRs to include a variety of claims, which may require the cooperation of more than one Attester.
Similarly, a CA/RA may outsource verification of claims from different Attesters to a single Verifier.
The <tt>AttestationBundle</tt> structure, <xref target="code-AttestationBundle"/>, facilitates the representation of one or more <tt>AttestationStatement</tt> structures along with an <bcp14>OPTIONAL</bcp14> collection of certificates that may be useful for certification path building and validation to verify each <tt>AttestationStatement</tt>. <tt>AttestationBundle</tt> is the structure included in a CSR attribute or extension.</t>
        <figure anchor="code-AttestationBundle">
          <name>Definition of AttestationBundle</name>
          <sourcecode type="asn1"><![CDATA[
AttestationBundle ::= SEQUENCE {
   attestations SEQUENCE SIZE (1..MAX) OF AttestationStatement,
   certs SEQUENCE SIZE (1..MAX) OF LimitedCertChoices OPTIONAL,
}
]]></sourcecode>
        </figure>
        <t>At least one element in the <tt>attestations</tt> field <bcp14>SHOULD</bcp14> contain an attestation that is cryptographically bound to the public key that is the subject of the CSR containing the <tt>AttestationBundle</tt>.</t>
        <t>The <tt>CertificateChoices</tt> structure defined in <xref target="RFC6268"/>, and reproduced below along with <tt>OtherCertificateFormat</tt>, allows for carrying certificates in the default X.509 <xref target="RFC5280"/> format, or in other non-X.509 certificate formats. <tt>CertificateChoices</tt> <bcp14>MUST</bcp14> only contain certificate or other. In this context, <tt>CertificateChoices</tt> <bcp14>MUST NOT</bcp14> contain <tt>extendedCertificate</tt>, <tt>v1AttrCert</tt>, or <tt>v2AttrCert</tt>. Note that for non-ASN.1 certificate formats, the <tt>CertificateChoices</tt> <bcp14>MUST</bcp14> contain <tt>other</tt> with an <tt>OTHER-CERT-FMT.Type</tt> of <tt>OCTET STRING</tt> and data consistent with <tt>OTHER-CERT-FMT.id</tt>. <tt>LimitedCertChoices</tt> is defined to limit the available options to <tt>certificate</tt> and <tt>other</tt>.</t>
        <sourcecode type="asn1"><![CDATA[
   CertificateChoices ::= CHOICE {
     certificate Certificate,
     extendedCertificate [0] IMPLICIT ExtendedCertificate,
          -- Obsolete
     ...,
     [[3: v1AttrCert [1] IMPLICIT AttributeCertificateV1]],
          -- Obsolete
     [[4: v2AttrCert [2] IMPLICIT AttributeCertificateV2]],
     [[5: other      [3] IMPLICIT OtherCertificateFormat]] }

   OTHER-CERT-FMT ::= TYPE-IDENTIFIER

   OtherCertificateFormat ::= SEQUENCE {
     otherCertFormat OTHER-CERT-FMT.
             &id({SupportedCertFormats}),
     otherCert       OTHER-CERT-FMT.
             &Type({SupportedCertFormats}{@otherCertFormat})}

   LimitedCertChoices ::=
      CertificateChoices
          (WITH COMPONENTS {certificate, other})
]]></sourcecode>
        <t>The <tt>certs</tt> field contains a set of certificates that
may be used to validate an <tt>AttestationStatement</tt>
contained in <tt>attestations</tt>. For each <tt>AttestationStatement</tt>, the set of certificates <bcp14>SHOULD</bcp14> contain
the certificate that contains the public key needed to directly validate the
<tt>AttestationStatement</tt>, unless the signing key is expected to be known to the Verifier or is embedded within the <tt>AttestationStatement</tt>. Additional certificates <bcp14>MAY</bcp14> be provided, for example, to chain the
attestation key back to a trust anchor. No specific order of the certificates in <tt>certs</tt> should be expected because certificates contained in <tt>certs</tt> may be needed to validate different <tt>AttestationStatement</tt> instances.</t>
        <t>This specification places no restriction on mixing certificate types within the <tt>certs</tt> field. For example a non-X.509 attestation signer certificate <bcp14>MAY</bcp14> chain to a trust anchor via a chain of X.509 certificates. It is up to the Attester and its Verifier to agree on supported certificate formats.</t>
      </section>
      <section anchor="attestationstatementset">
        <name>AttestationStatementSet</name>
        <figure anchor="code-AttestationStatementSet">
          <name>Definition of AttestationStatementSet</name>
          <sourcecode type="asn1"><![CDATA[
AttestationStatementSet ATTESTATION-STATEMENT ::= {
   ... -- None defined in this document --
}
]]></sourcecode>
        </figure>
        <t>The expression illustrated in <xref target="code-AttestationStatementSet"/> maps ASN.1 Types
for attestation statements to the OIDs
that identify them. These mappings are used to construct
or parse <tt>AttestationStatement</tt> objects that appear in an <tt>AttestationBundle</tt>. Attestation statements are typically
defined in other IETF standards, in standards produced by other standards bodies,
or as vendor proprietary formats along with corresponding OIDs that identify them.
<tt>AttestationStatementSet</tt> is left unconstrained in this document. However, implementers <bcp14>MAY</bcp14>
populate it with the formats that they wish to support.</t>
      </section>
      <section anchor="csr-attribute-and-extension">
        <name>CSR Attribute and Extension</name>
        <t>By definition, attributes within a PKCS#10 CSR are typed as ATTRIBUTE and within a CRMF CSR are typed as EXTENSION.</t>
        <figure anchor="code-extensions">
          <name>Definitions of CSR attribute and extension</name>
          <sourcecode type="asn1"><![CDATA[
id-aa-attestation OBJECT IDENTIFIER ::= { id-aa 59 }

-- For PKCS#10
attr-attestations ATTRIBUTE ::= {
  TYPE AttestationBundle
  COUNTS MAX 1
  IDENTIFIED BY id-aa-attestation
}

-- For CRMF
ext-attestations EXTENSION ::= {
  SYNTAX AttestationBundle
  IDENTIFIED BY id-aa-attestation
}
]]></sourcecode>
        </figure>
        <t>The Extension variant illustrated in <xref target="code-extensions"/> is intended only for use within CRMF CSRs and is <bcp14>NOT RECOMMENDED</bcp14> to be used within X.509 certificates due to the privacy implications of publishing information about the end entity's hardware environment.</t>
        <t>Multiple different types of <tt>AttestationStatement</tt>(s) may be included within a single top-level <tt>AttestationBundle</tt>.  Note that this document does not require the <tt>AttestationBundle.attestations</tt> field to contain only one <tt>AttestationStatement</tt> of a given type.  For example, if a given type is a "wrapper" type containing the conceptual message wrapper (CMW) structure <xref target="I-D.ietf-rats-msg-wrap"/>, multiple copies of a CMW-typed AttestationStatement may be included.</t>
        <t>Per <xref target="RFC5280"/> no more than one instance of a given type of Extension may be carried within an Extensions structure, so an Extensions structure <bcp14>MUST</bcp14> contain no more than one Extension of type <tt>id-aa-attestation</tt>.</t>
        <t>PKCS#10 uses the legacy structures <tt>Attributes</tt> and <tt>Attribute</tt> rather than the later defined <tt>SingleAttribute</tt> and <tt>AttributeSet</tt> structures - all of which are defined against the ATTRIBUTE ASN.1 CLASS.  The ATTRIBUTE CLASS has a <tt>COUNTS MAX n</tt> clause which can be used to limit the copies of ATTRIBUTE related structures.  For the purposes of this document the <tt>COUNTS MAX 1</tt> clause in the <tt>attr-attestation</tt> shall be taken to mean the following:</t>
        <ul spacing="normal">
          <li>
            <t>An Attributes structure carried within a PKCS#10 CSR <bcp14>MUST</bcp14> contain no more than one Attribute of type <tt>id-aa-attestation</tt>.</t>
          </li>
          <li>
            <t>An Attribute of type <tt>id-aa-attestation</tt> <bcp14>MUST</bcp14> contain exactly one copy of an <tt>AttestationBundle</tt>.</t>
          </li>
        </ul>
        <t>When multiple Verifiers support the same attestation‑format OID, ambiguity can arise in routing attestations to the appropriate Verifier.  Resolving that ambiguity is outside the scope of this document and must be defined by the attestation‑format specification, particularly for opaque (wrapper) formats.  Two pragmatic approaches are recommended: (1) assign distinct OIDs for different verifier or verification types even when the underlying format structure is identical, or (2) encapsulate the opaque attestation object in a wrapper that carries an explicit hint.  Implementations should adopt one of these approaches and attestation‑format specifications should mandate the precise mechanism for nonce selection and routing of attestations.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to allocate a value from the "SMI Security for PKIX Module Identifier"
registry for the included ASN.1 module, and to allocate a value from "SMI Security for
S/MIME Attributes" to identify an attribute defined within.</t>
      <section anchor="module-registration-smi-security-for-pkix-module-identifier">
        <name>Module Registration - SMI Security for PKIX Module Identifier</name>
        <t>IANA is asked to register the following within the registry id-mod
SMI Security for PKIX Module Identifier (1.3.6.1.5.5.7.0).</t>
        <ul spacing="normal">
          <li>
            <t>Decimal: IANA Assigned - <strong>Replace TBDMOD</strong></t>
          </li>
          <li>
            <t>Description: CSR-ATTESTATION-2025 - id-mod-pkix-attest-01</t>
          </li>
          <li>
            <t>References: This Document</t>
          </li>
        </ul>
      </section>
      <section anchor="object-identifier-registrations-smi-security-for-smime-attributes">
        <name>Object Identifier Registrations - SMI Security for S/MIME Attributes</name>
        <t>IANA is asked to register the following within the registry id-aa
SMI Security for S/MIME Attributes (1.2.840.113549.1.9.16.2).</t>
        <ul spacing="normal">
          <li>
            <t>Attestation Statement</t>
          </li>
          <li>
            <t>Decimal: IANA Assigned - Note: .59 has already been early-allocated as "id-aa-evidence" referencing this document, so the request is to change the name of this entry to "id-aa-attestation" and leave the allocation of .59 as-is.</t>
          </li>
          <li>
            <t>Description: id-aa-attestation</t>
          </li>
          <li>
            <t>References: This Document</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document defines a structure to convey
attestations as additional information in CSRs, as well as an attribute to convey that structure in the
Certification Request Message defined in {<xref target="RFC2986"/>} and an extension to convey that structure in the
Certificate Request Message Format defined in {<xref target="RFC4211"/>}.
The CA/RA that receives the CSR may choose to verify the attestation(s) to determine if an issuance policy is met, or which of a suite of policies is satisfied. The CA/RA is also free to discard the additional information without processing.</t>
      <t>A CA which accepts or requires attestation(s) <bcp14>SHOULD</bcp14> document its requirements with its Certification Practice Statement(s).</t>
      <t>The remainder of this section identifies security considerations that apply when the CA/RA chooses to verify the attestation as part of the evaluation of a CSR.</t>
      <section anchor="binding-attestations-to-the-csrs-public-key">
        <name>Binding Attestations to the CSR's Public Key</name>
        <t>Regardless of the topological model, the CA/RA is ultimately responsible for validating the binding between the public key and the attestation(s) in the CSR. For CAs issuing in conformance with the CA/Browser Forum's Code Signing Baseline Requirements, this means verifying the attestation of HSM generation and protection is cryptographically bound to the public key in the CSR.</t>
        <t>Multiple attestations from multiple sources, as envisioned in <xref target="RFC9334"/>, can introduce additional complications as shown in the following example.</t>
        <t>For example, a CA may have an issuance policy that requires key generation in an HSM on a company-owned platform in a known good state.
The CSR might contain three AttestationStatements originated by three different attesters:</t>
        <ol spacing="normal" type="1"><li>
            <t>that a key pair was generated in an HSM;</t>
          </li>
          <li>
            <t>that a particular platform is company-owned; and</t>
          </li>
          <li>
            <t>that a particular platform was in a known good state (e.g, up to date on patches, etc.).</t>
          </li>
        </ol>
        <t>While each of these attestations may be independently correct, the CA/RA is responsible for confirming the attestations apply in concert to the public key in the CSR. That is, the CA/RA must analyze the attestations to ensure that:</t>
        <ol spacing="normal" type="1"><li>
            <t>the attestation of HSM generation by AttestationStatement 1 applies to the public key in the CSR;</t>
          </li>
          <li>
            <t>the attestation of company ownership by AttestationStatement 2 applies to the platform that contains the HSM; and</t>
          </li>
          <li>
            <t>the attestation that a platform was in a known good state by AttestationStatement 3 applies to the platform that contains the HSM.</t>
          </li>
        </ol>
      </section>
      <section anchor="freshness">
        <name>Freshness</name>
        <t>To avoid replay attacks, the CA/RA may choose to ignore attestations that are stale, or whose freshness cannot be determined. Mechanisms to address freshness and their application to the RATS topological models are discussed in <xref target="RFC9334"/>. Other mechanisms for determining freshness may be used as the CA/RA deems appropriate. When CSRs are embedded within certificate management protocols such as EST or CMP, these protocols can supply the Attester with a nonce. Further details are specified in <xref target="I-D.ietf-lamps-attestation-freshness"/>.</t>
      </section>
      <section anchor="relationship-of-attestations-and-certificate-extensions">
        <name>Relationship of Attestations and Certificate Extensions</name>
        <t>Attestations are intended as additional information in the issuance process, and may include sensitive information about the platform, such as hardware details or patch levels, or device ownership. It is <bcp14>NOT RECOMMENDED</bcp14> for a CA to copy attestations into the published certificate. CAs that choose to republish attestations in certificates <bcp14>SHOULD</bcp14> review the contents and delete any sensitive information.</t>
      </section>
      <section anchor="additional-security-considerations">
        <name>Additional Security Considerations</name>
        <t>In addition to the security considerations listed here, implementers should be familiar with the security considerations of the specifications on which this specification depends: PKCS#10 <xref target="RFC2986"/>, CRMF <xref target="RFC4211"/>, as well as general security concepts relating to remote attestation; many of these concepts are discussed in <xref section="6" sectionFormat="of" target="RFC9334"/>, <xref section="7" sectionFormat="of" target="RFC9334"/>, <xref section="9" sectionFormat="of" target="RFC9334"/>, <xref section="11" sectionFormat="of" target="RFC9334"/>, and <xref section="12" sectionFormat="of" target="RFC9334"/>. Implementers should also be aware of any security considerations relating to the specific attestation formats being carried within the CSR.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Independent</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="11" month="December" year="2025"/>
            <abstract>
              <t>   The Conceptual Messages introduced by the RATS architecture (RFC
   9334) are protocol-agnostic data units that are conveyed between RATS
   roles during remote attestation procedures.  Conceptual Messages
   describe the meaning and function of such data units within RATS data
   flows without specifying a wire format, encoding, transport
   mechanism, or processing details.  The initial set of Conceptual
   Messages is defined in Section 8 of RFC 9334 and includes Evidence,
   Attestation Results, Endorsements, Reference Values, and Appraisal
   Policies.

   This document introduces the Conceptual Message Wrapper (CMW) that
   provides a common structure to encapsulate these messages.  It
   defines a dedicated CBOR tag, corresponding JSON Web Token (JWT) and
   CBOR Web Token (CWT) claims, and an X.509 extension.

   This allows CMWs to be used in CBOR-based protocols, web APIs using
   JWTs and CWTs, and PKIX artifacts like X.509 certificates.
   Additionally, the draft defines a media type and a CoAP content
   format to transport CMWs over protocols like HTTP, MIME, and CoAP.

   The goal is to improve the interoperability and flexibility of remote
   attestation protocols.  Introducing a shared message format such as
   CMW enables consistent support for different attestation message
   types, evolving message serialization formats without breaking
   compatibility, and avoiding the need to redefine how messages are
   handled within each protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-23"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-attestation-freshness">
          <front>
            <title>Nonce-based Freshness for Remote Attestation in Certificate Signing Requests (CSRs) for the Certification Management Protocol (CMP), for Enrollment over Secure Transport (EST), and for Certificate Management over CMS (CMC)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Hendrik Brockhaus" initials="H." surname="Brockhaus">
              <organization>Siemens</organization>
            </author>
            <author fullname="Joe Mandel" initials="J." surname="Mandel">
              <organization>AKAYLA, Inc.</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="20" month="April" year="2026"/>
            <abstract>
              <t>   When an end entity includes attestation statements in a Certificate
   Signing Request (CSR), this document is specifically concerned with
   establishing the freshness of Evidence statements among that
   attestation data.  Current attestation technology commonly achieves
   this using nonces.

   This document outlines the process through which nonces are supplied
   to the end entity by an RA/CA for inclusion in Evidence, leveraging
   the Certificate Management Protocol (CMP), Enrollment over Secure
   Transport (EST), and Certificate Management over CMS (CMC).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-attestation-freshness-06"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC9683">
          <front>
            <title>Remote Integrity Verification of Network Devices Containing Trusted Platform Modules</title>
            <author fullname="G. C. Fedorkow" initials="G. C." role="editor" surname="Fedorkow"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <date month="December" year="2024"/>
            <abstract>
              <t>This document describes a workflow for remote attestation of the integrity of firmware and software installed on network devices that contain Trusted Platform Modules (TPMs), as defined by the Trusted Computing Group (TCG), or equivalent hardware implementations that include the protected capabilities, as provided by TPMs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9683"/>
          <seriesInfo name="DOI" value="10.17487/RFC9683"/>
        </reference>
        <reference anchor="CSBR" target="https://cabforum.org/uploads/Baseline-Requirements-for-the-Issuance-and-Management-of-Code-Signing.v3.7.pdf">
          <front>
            <title>Baseline Requirements for Code-Signing Certificates, v.3.7</title>
            <author>
              <organization>CA/Browser Forum</organization>
            </author>
            <date year="2024" month="February"/>
          </front>
        </reference>
        <reference anchor="SampleData" target="https://github.com/lamps-wg/csr-attestation-examples">
          <front>
            <title>CSR Attestation Sample Data</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 361?>

<section anchor="examples">
      <name>Examples</name>
      <t>Examples and sample data will be collected in the "CSR Attestation Sample Data" GitHub repository <xref target="SampleData"/>.</t>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <sourcecode type="asn1"><![CDATA[
CSR-ATTESTATION-2025
  { iso(1) identified-organization(3) dod(6) internet(1) security(5)
  mechanisms(5) pkix(7) id-mod(0) id-mod-pkix-attest-01(TBDMOD) }

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS

CertificateChoices
  FROM CryptographicMessageSyntax-2010 -- from [RFC6268]
    { iso(1) member-body(2) us(840) rsadsi(113549)
    pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) }

EXTENSION, ATTRIBUTE
  FROM PKIX-CommonTypes-2009 -- from [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-pkixCommon-02(57) }

id-aa
  FROM SecureMimeMessageV3dot1-2009
    { iso(1) member-body(2) us(840) rsadsi(113549)
    pkcs(1) pkcs-9(9) smime(16) modules(0) msg-v3dot1-02(39) }
  ;

ATTESTATION-STATEMENT ::= TYPE-IDENTIFIER

AttestationStatementSet ATTESTATION-STATEMENT ::= {
   ... -- None defined in this document --
}

AttestationStatement ::= SEQUENCE {
   type   ATTESTATION-STATEMENT.&id({AttestationStatementSet}),
   stmt   ATTESTATION-STATEMENT.&Type(
              {AttestationStatementSet}{@type})
}

-- Arc for Attestation types
id-aa-attestation OBJECT IDENTIFIER ::= { id-aa 59 }

-- For PKCS#10 (Attestation)
attr-attestation ATTRIBUTE ::= {
  TYPE AttestationBundle
  COUNTS MAX 1
  IDENTIFIED BY id-aa-attestation
}

-- For CRMF (Attestation)
ext-attestation EXTENSION ::= {
  SYNTAX AttestationBundle
  IDENTIFIED BY id-aa-attestation
}

-- Allow either X.509 or OTHER-CERT certificates
LimitedCertChoices ::=
    CertificateChoices
       (WITH COMPONENTS {certificate, other})

AttestationBundle ::= SEQUENCE {
   attestations SEQUENCE SIZE (1..MAX) OF AttestationStatement,
   certs SEQUENCE SIZE (1..MAX) OF LimitedCertChoices OPTIONAL
}

END
]]></sourcecode>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This specification is the work of a design team created by the chairs of the
LAMPS working group.
We would like to specifically thank Mike StJohns for writing initial
version of this draft and for his substantial work on the final version.
The following persons, in no specific order,
contributed to the work directly, participated in design team meetings, or provided review of the document.</t>
      <t>Richard Kettlewell, Chris Trufan, Bruno Couillard,
Jean-Pierre Fiset, Sander Temme, Jethro Beekman, Zsolt Rózsahegyi, Ferenc
Pető, Mike Agrenius Kushner, Tomas Gustavsson, Dieter Bong, Christopher Meyer, Carl Wallace, Michael Richardson, Tomofumi Okubo, Olivier
Couillard, John Gray, Eric Amador, Giri Mandyam, Darren Johnson, Herman Slatman, Tiru Reddy, James Hagborg, A.J. Stein, John Kemp, Daniel Migault and Russ Housley.</t>
      <t>Additionally, we would like to thank Andreas Kretschmer, Hendrik Brockhaus,
David von Oheimb, Corey Bonnell, and Thomas Fossati for their feedback based on implementation
experience.</t>
      <t>Close to the end of the specification development process, the working group chairs, Russ Housley and Tim Hollebeek, reached out to Steve Hanna, Tim Polk, and Carl Wallace to help improve the document and resolve contentious issues. Their contributions substantially impacted the final outcome of the document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
