<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.6 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-rats-epoch-markers-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-rats-epoch-markers-01"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2022" month="May" day="04"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Abstract Text</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birkholz-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that are required to interact via secure interactions often require a shared understanding of the freshness of conveyed information, especially in the domain of remote attestation procedures.
Establishing a notion of freshness between various involved entities taking on roles that rely on information that is not outdated is not simple.
In general, establishing a shared understanding of freshness in a secure manner is not simple.
The RATS architecture <xref target="I-D.ietf-rats-architecture"/> dedicates an extensive appendix solely on the topic of freshness considerations and that fact alone should be considered a telltale sign on how necessary yet complex establishing a trusted and shared understanding of freshness between systems actually is.</t>
      <t>This document provides a prominent way to establish a notion of freshness between systems: Epoch Markers.
Epoch Markers are messages that are like time ticks produced and conveyed by a system in a freshness domain: the Epoch Bell.
Systems that receive Epoch Markers do not have to track freshness with their own local understanding of time (e.g., a local real time clock).
Instead, each reception of a specific Epoch Marker rings in a new age of freshness that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock where the ticks are conveyed by the Internet.</t>
      <t>The layout of the freshness domain in which Epoch Markers are conveyed like the ticks of a clock, introduces a domain-specific latency -- and therefore a certain uncertainty about tick accuracy.</t>
      <t>While all Epoch Markers share the common characteristic of being like clock ticks in a freshness domain, there are various payload types that can make up the content of an Epoch Marker.
These different types of Epoch Marker payloads address several specific use cases and are laid out in this document.
While Epoch Markers are encoded in CBOR and many of the payload types are encoded in CBOR as well, a prominent payload is the Time Stamp Token content as defined by <xref target="RFC3161"/>: a DER-encoded TSTInfo value.
Time Stamp Tokens (TST) produced by Time Stamp Authorities (TSA) are conveyed by the Time Stamp Protocol (TSP).
At the time of writing,
TSAs are the most common world-wide implemented secure timestamp token systems.
Reusing the essential TST payload structure as a payload type for CBOR encoded Epoch Markers makes sense with respect to migration paths and general interoperability.
But there is more than one way to represent a signed timestamp and other kinds of freshness ticks that can be used for Epoch Markers.</t>
      <t>In this document, basic interaction models on how to convey Epoch Marchers are illustrated as they impact the message design of a generic Epoch Marker.
Then, the structure of Epoch Markers is specified using CDDL and the corresponding payload types are introduced and elaborated on.
To increase the level of trustworthiness in the Epoch Bell and the
system that produces them,
Epoch Markers also provide the option to include (concise) remote attestation evidence or corresponding remote attestation results.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in <xref section="10.3" sectionFormat="of" target="I-D.ietf-rats-architecture"/>.</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models.
In general there are three of them:</t>
      <ul spacing="normal">
        <li>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to Section 7.1 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to Section 7.2 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to Section 7.3 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
      </ul>
    </section>
    <section anchor="epoch-marker-cddl">
      <name>Epoch Marker CDDL</name>
      <sourcecode type="CDDL">
epoch-marker = [
  header,
  $payload,
]

header = {
  ? challenge-response-nonce,
  ? remote-attestation-evidence, ; could be EAT or Concise Evidence
  ? remote-attestation-results, ; hopefully EAT with AR4SI Claims
}

challenge-response-nonce = (1: "PLEASE DEFINE")
remote-attestation-evidence = (2: "PLEASE DEFINE")
remote-attestation-results = (3: "PLEASE DEFINE")

;payload types independent on interaction model
$payload /= native-rfc3161-TST-info
$payload /= TST-info-based-on-CBOR-time-tag
$payload /= CBOR-time-tag
$payload /= multi-nonce
$payload /= multi-nonce-list
$payload /= strictly-monotonically-increasing-counter

native-rfc3161-TST-info = bytes ;  DER-encoded value of TSTInfo


; ~~~
; ~~~ translation with a few poetic licenses of ASN.1 TSTInfo into CDDL
; ~~~
TST-info-based-on-CBOR-time-tag = {
  &amp;(version : 0) =&gt; int .default 1 ; obsolete?
  &amp;(policy : 1) =&gt; oid
  &amp;(messageImprint : 2) =&gt; MessageImprint
  &amp;(serialNumber : 3) =&gt; int
  &amp;(eTime : 4) =&gt; profiled-etime
  ? &amp;(accuracy : 5) =&gt; rfc3161-accuracy
  &amp;(ordering : 6) =&gt; bool .default false
  ? &amp;(nonce : 7) =&gt; int
  ? &amp;(tsa : 8) =&gt; GeneralName
  * $$TSTInfoExtensions
}

; based on COSE_Hash_Find (draft-ietf-cose-hash-algs)
MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

rfc3161-accuracy = non-empty&lt;{
  ? &amp;(seconds : 0) =&gt; int
  ? &amp;(millis: 1) =&gt; 1..999
  ? &amp;(micros: 2) =&gt; 1..999
}&gt;

; timeMap profiles etime from https://datatracker.ietf.org/doc/html/draft-ietf-cbor-time-tag
profiled-etime = #6.1001(timeMap)
timeMap = {
  1 =&gt; #6.1(int / float) ; TIME_T
  * int =&gt; any
}

; Section 11.8 of I-D.ietf-cose-cbor-encoded-cert
GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]

; stuff
oid = #6.111(bstr)
non-empty&lt;M&gt; = (M) .and ({ + any =&gt; any })

CBOR-time-tag = [
time-tag,
? nonce
]

time-tag = "PLEASE DEFINE"
nonce = "PLEASE DEFINE"

multi-nonce = tstr / bstr / int

multi-nonce-list = [+ multi-nonce]

strictly-monotonically-increasing-counter = uint ; counter context? per issuer? per indicator?
</sourcecode>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3161" target="https://www.rfc-editor.org/info/rfc3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC3161"/>
            <seriesInfo name="RFC" value="3161"/>
            <author fullname="C. Adams" initials="C." surname="Adams">
              <organization/>
            </author>
            <author fullname="P. Cain" initials="P." surname="Cain">
              <organization/>
            </author>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas">
              <organization/>
            </author>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato">
              <organization/>
            </author>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned.  It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-architecture" target="https://www.ietf.org/archive/id/draft-ietf-rats-architecture-15.txt">
          <front>
            <title>Remote Attestation Procedures Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-15"/>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="8" month="February" year="2022"/>
            <abstract>
              <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models" target="https://www.ietf.org/archive/id/draft-ietf-rats-reference-interaction-models-05.txt">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-05"/>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="26" month="January" year="2022"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="rfc-3161-tstinfo">
      <name>RFC 3161 TSTInfo</name>
      <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depicts the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
      <sourcecode type="ASN.1">
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
</sourcecode>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
