<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.6 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-rats-epoch-markers-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-rats-epoch-markers-00"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2022" month="April" day="27"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Abstract Text</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birkholz-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that are required to interact via secure interactions often require a shared understanding of the freshness of conveyed information, especially in the domain of remote attestation procedures.
Establishing a notion of freshness between various involved entities taking on roles that rely on information that is not outdated is not simple.
In general, establishing a shared understanding of freshness in a secure manner is not simple.
The RATS architecture <xref target="I-D.ietf-rats-architecture"/> dedicates an extensive appendix solely on the topic of freshness considerations and that fact alone should be considered a telltale sign on how necessary yet complex establishing a trusted and shared understanding of freshness between systems actually is.</t>
      <t>This document provides a prominent way to establish a notion of freshness between systems: Epoch Markers.
Epoch Markers are messages that are like time ticks produced and conveyed by a system in a freshness domain: the Epoch Bell.
Systems that receive Epoch Markers do not have to track freshness with their own local understanding of time (e.g., a local real time clock).
Instead, each reception of a specific Epoch Marker rings in a new age of freshness that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock where the ticks are conveyed by the Internet.</t>
      <t>The layout of the freshness domain in which Epoch Markers are conveyed like the ticks of a clock, introduces a domain-specific latency -- and therefore a certain uncertainty about tick accuracy.</t>
      <t>While all Epoch Markers share the common characteristic of being like clock ticks in a freshness domain, there are various payload types that can make up the content of an Epoch Marker.
These different types of Epoch Marker payloads address several specific use cases and are laid out in this document.
While Epoch Markers are encoded in CBOR and many of the payload types are encoded in CBOR as well, a prominent payload is the Time Stamp Token content as defined by <xref target="RFC3161"/>: a DER-encoded TSTInfo value.
Time Stamp Tokens (TST) produced by Time Stamp Authorities (TSA) are conveyed by the Time Stamp Protocol (TSP).
At the time of writing,
TSAs are the most common world-wide implemented secure timestamp token systems.
Reusing the essential TST payload structure as a payload type for CBOR encoded Epoch Markers makes sense with respect to migration paths and general interoperability.
But there is more than one way to represent a signed timestamp and other kinds of freshness ticks that can be used for Epoch Markers.</t>
      <t>In this document, basic interaction models on how to convey Epoch Marchers are illustrated as they impact the message design of a generic Epoch Marker.
Then, the structure of Epoch Markers is specified using CDDL and the corresponding payload types are introduced and elaborated on.
To increase the level of trustworthiness in the Epoch Bell and the
system that produces them,
Epoch Markers also provide the option to include (concise) remote attestation evidence or corresponding remote attestation results.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
Epoch Markers are a solution that includes the lessons learned from TSAs and provides several means to identify a new freshness epoch as illustrated by the RATS architecture.</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models.
In general there are three of them:</t>
      <ul spacing="normal">
        <li>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells)</li>
        <li>solicited distribution (e.g., via a subscription to Epoch Bells)</li>
        <li>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells)</li>
      </ul>
    </section>
    <section anchor="epoch-marker-cddl">
      <name>Epoch Marker CDDL</name>
      <sourcecode type="CDDL">
epoch-marker = [
  header,
  $payload,
]

header = {
  ? challenge-response-nonce,
  ? remote-attestation-evidence, ; could be EAT or Concise Evidence
  ? remote-attestation-results, ; hopefully EAT with AR4SI Claims
}

challenge-response-nonce = (1: "PLEASE DEFINE")
remote-attestation-evidence = (2: "PLEASE DEFINE")
remote-attestation-results = (3: "PLEASE DEFINE")

;payload types independent on interaction model
$payload /= native-rfc3161-TST-info
$payload /= TST-info-based-on-CBOR-time-tag
$payload /= CBOR-time-tag
$payload /= multi-nonce
$payload /= multi-nonce-list
$payload /= strictly-monotonically-increasing-counter

native-rfc3161-TST-info = bytes ;  DER-encoded value of TSTInfo

TST-info-based-on-CBOR-time-tag = "PLEASE DEFINE"

; ~~~
; ~~~ verbatim translation of ASN.1 TSTInfo into CDDL
; ~~~ (GeneralName is TODO atm, due to its terrible callousness)
; ~~~

TSTInfo = {
  &amp;(version : 0) =&gt; int .default 1
  &amp;(policy : 1) =&gt; oid
  &amp;(messageImprint : 2) =&gt; MessageImprint
  &amp;(serialNumber : 3) =&gt; int
  &amp;(genTime : 4) =&gt; GeneralizedTime
  ? &amp;(accuracy : 5) =&gt; Accuracy
  &amp;(ordering : 6) =&gt; bool .default false
  ? &amp;(nonce : 7) =&gt; int
  ? &amp;(tsa : 8) =&gt; GeneralName
  * $$TSTInfoExtensions
}

MessageImprint = [
  hashAlgorithm: AlgorithmIdentifier
  hashedMessage: bytes
]

AlgorithmIdentifier = [
  algorithm:  oid
  ? parameters: any
]

Accuracy = non-empty&lt;{
  ? &amp;(seconds : 0) =&gt; int
  ? &amp;(millis: 1) =&gt; 1..999
  ? &amp;(micros: 2) =&gt; 1..999
}&gt;

; https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5.2
GeneralizedTime = tstr .regexp '[0-9]{14}(\.[0-9]+)?Z'

GeneralName = "todo"

; stuff
oid = #6.111(bstr)
non-empty&lt;M&gt; = (M) .and ({ + any =&gt; any })

CBOR-time-tag = [
time-tag,
? nonce
]

time-tag = "PLEASE DEFINE"
nonce = "PLEASE DEFINE"

multi-nonce = tstr / bstr / int

multi-nonce-list = [+ multi-nonce]

strictly-monotonically-increasing-counter = uint ; counter context? per issuer? per indicator?
</sourcecode>
      <section anchor="rfc-3161-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <sourcecode type="DER">
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
</sourcecode>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3161" target="https://www.rfc-editor.org/info/rfc3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC3161"/>
            <seriesInfo name="RFC" value="3161"/>
            <author fullname="C. Adams" initials="C." surname="Adams">
              <organization/>
            </author>
            <author fullname="P. Cain" initials="P." surname="Cain">
              <organization/>
            </author>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas">
              <organization/>
            </author>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato">
              <organization/>
            </author>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned.  It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-architecture" target="https://www.ietf.org/archive/id/draft-ietf-rats-architecture-15.txt">
          <front>
            <title>Remote Attestation Procedures Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-15"/>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="8" month="February" year="2022"/>
            <abstract>
              <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
