<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-fdb-rats-psa-endorsements-04" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="PSA Endorsements">Arm's Platform Security Architecture (PSA) Attestation Verifier Endorsements</title>

    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>Arm Ltd</organization>
      <address>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>

    <date />

    <area>Security</area>
    <workgroup>RATS</workgroup>
    

    <abstract>


<?line 54?>

<t>PSA Endorsements include reference values, cryptographic key material and
certification status information that a Verifier needs in order to appraise
attestation Evidence produced by a PSA device.  This memo defines such PSA
Endorsements as a profile of the CoRIM data model.</t>



    </abstract>



  </front>

  <middle>


<?line 61?>

<section anchor="introduction"><name>Introduction</name>

<t>PSA Endorsements include reference values, cryptographic key material and
certification status information that a Verifier needs in order to appraise
attestation Evidence produced by a PSA device <xref target="PSA-TOKEN"/>.  This memo defines
such PSA Endorsements as a profile of the CoRIM data model <xref target="CoRIM"/>.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?></t>

<t>The reader is assumed to be familiar with the terms defined in Section 2.1 of
<xref target="PSA-TOKEN"/> and in Section 4 of <xref target="RATS-ARCH"/>.</t>

</section>
<section anchor="sec-psa-endorsements"><name>PSA Endorsements</name>

<t>PSA Endorsements describe an attesting device in terms of the hardware and
firmware components that make up its PSA Root of Trust (RoT). This includes
the identification and expected state of the device as well as the
cryptographic key material needed to verify Evidence signed by the device's PSA
RoT. Additionally, PSA Endorsements can include information related to the
certification status of the attesting device.</t>

<t>There are five types of PSA Endorsements:</t>

<t><list style="symbols">
  <t>Reference Values (<xref target="sec-ref-values"/>), i.e., measurements of the PSA RoT
firmware;</t>
  <t>Attestation Verification Claims (<xref target="sec-keys"/>), i.e., cryptographic keys
that can be used to verify signed Evidence produced by the PSA RoT, along
with the identifiers that bind the keys to their device instances;</t>
  <t>Certification Claims (<xref target="sec-certificates"/>), i.e., metadata that describe
the certification status associated with a PSA device.</t>
  <t>Software Relations (<xref target="sec-swrel"/>), used to model upgrade and patch
relationships between software components;</t>
  <t>Endorsements Block List (<xref target="sec-endorsements-block-list"/>), used to invalidate
previously provisioned Endorsements.</t>
</list></t>

<section anchor="psa-endorsement-profile"><name>PSA Endorsement Profile</name>

<t>PSA Endorsements are carried in one or more CoMIDs inside a CoRIM.</t>

<t>The profile attribute in the CoRIM MUST be present and MUST have a single entry
set to the uri <spanx style="verb">http://arm.com/psa/iot/1</spanx> as shown in <xref target="ex-psa-iot-profile"/>.</t>

<figure title="PSA IoT version 1, CoRIM profile" anchor="ex-psa-iot-profile"><artwork><![CDATA[
/ corim-map / {
  / corim.profile / 3: [ 
    32("http://arm.com/psa/iot/1")
  ]
  / ... /
}
]]></artwork></figure>

</section>
<section anchor="sec-psa-rot-id"><name>PSA Endorsements to PSA RoT Linkage</name>

<t>Each PSA Endorsement - be it a Reference Value, Attestation Verification Claim
or Certification Claim - is associated with an immutable PSA RoT.  A PSA
Endorsement is associated to its PSA RoT by means of the unique PSA RoT
identifier known as Implementation ID (see Section 3.2.2 of <xref target="PSA-TOKEN"/>).</t>

<t>In order to support PSA Implementation IDs, the CoMID type
<spanx style="verb">$class-id-type-choice</spanx> is extended as follows:</t>

<figure><artwork><![CDATA[
; from draft-tschofenig-rats-psa-token
psa-implementation-id-type = bytes .size 32

tagged-implementation-id-type = #6.600(implementation-id-type)

$class-id-type-choice /= tagged-implementation-id-type
]]></artwork></figure>

<t>Besides, a PSA Endorsement can be associated with a specific instance of a
certain PSA RoT - as in the case of Attestation Verification Claims.  A PSA
Endorsement is associated with a PSA RoT instance by means of the Instance ID
(see Section 3.2.1 of <xref target="PSA-TOKEN"/>) and its "parent" Implementation ID.</t>

<t>These identifiers are typically found in the subject of a CoMID triple, encoded
in an <spanx style="verb">environment-map</spanx> as shown in <xref target="ex-psa-rot-id"/>.</t>

<figure title="Example PSA RoT Identification" anchor="ex-psa-rot-id"><artwork><![CDATA[
/ environment-map / {
  / comid.class / 0 : {
    / comid.class-id / 0 :
      / tagged-impl-id-type / 600(
        h'61636d652d696d706c656d656e746174
          696f6e2d69642d303030303030303031'
      ),
      / comid.vendor / 1 : "ACME Ltd.",
      / comid.model /  2 : "Roadrunner 1.0"
  },
  / comid.instance / 1 :
    / tagged-ueid-type / 550(
      h'01
        4ca3e4f50bf248c39787020d68ffd05c
        88767751bf2645ca923f57a98becd296'
    )
}
]]></artwork></figure>

<t>Optional <spanx style="verb">vendor</spanx> and <spanx style="verb">model</spanx> can be specified as well.  Together, they are
interpreted as a unique identifier of the product that embeds the PSA RoT.
Consistently providing a product identifier is RECOMMENDED.</t>

</section>
<section anchor="sec-ref-values"><name>Reference Values</name>

<t>Reference Values carry measurements and other metadata associated with the
updatable firmware in a PSA RoT.  When appraising Evidence, the Verifier
compares Reference Values against the values found in the Software Components
of the PSA token (see Section 3.4.1 of <xref target="PSA-TOKEN"/>).</t>

<t>Each measurement is encoded in a <spanx style="verb">measurement-map</spanx> of a CoMID
<spanx style="verb">reference-triple-record</spanx>.  Since a <spanx style="verb">measurement-map</spanx> can encode one or more
measurements, a single <spanx style="verb">reference-triple-record</spanx> can carry as many measurements
as needed, provided they belong to the same PSA RoT identified in the subject of
the "reference value" triple.  A single <spanx style="verb">reference-triple-record</spanx> SHALL
completely describe the updatable PSA RoT.</t>

<t>The identifier of a measured software component is encoded in a <spanx style="verb">psa-swcomp-id</spanx>
object as follows:</t>

<figure><artwork><![CDATA[
psa-swcomp-id = {
  psa.measurement-type => text
  psa.version => text
  psa.signer-id => psa.hash-type
}

psa.hash-type = bytes .size 32 / bytes .size 48 / bytes .size 64

psa.measurement-type = 1
psa.version = 4
psa.signer-id = 5
]]></artwork></figure>

<t>The semantics of the codepoints in the <spanx style="verb">psa-swcomp-id</spanx> map are equivalent to
those in the <spanx style="verb">psa-software-component</spanx> map defined in Section 3.4.1 of
<xref target="PSA-TOKEN"/>.  The <spanx style="verb">psa-swcomp-id</spanx> MUST uniquely identify a given software
component within the PSA RoT / product.</t>

<t>In order to support PSA Reference Value identifiers, the CoMID type
<spanx style="verb">$measured-element-type-choice</spanx> is extended as follows:</t>

<figure><artwork><![CDATA[
tagged-psa-swcomp-id = #6.601(psa-swcomp-id)

$measured-element-type-choice /= tagged-psa-swcomp-id
]]></artwork></figure>

<t>and automatically bound to the <spanx style="verb">comid.mkey</spanx> in the <spanx style="verb">measurement-map</spanx>.</t>

<t>The raw measurement is encoded in a <spanx style="verb">digests-type</spanx> object in the
<spanx style="verb">measurement-values-map</spanx>.  The <spanx style="verb">digests-type</spanx> array MUST contain at least one
entry.  The <spanx style="verb">digests-type</spanx> array MAY contain more than one entry if multiple
digests (obtained with different hash algorithms) of the same measured
component exist.</t>

<t>The example in <xref target="ex-reference-value"/> shows a CoMID a PSA Endorsement of type
Reference Value for a firmware measurement associated with Implementation ID
<spanx style="verb">acme-implementation-id-000000001</spanx>.</t>

<figure title="Example Reference Value" anchor="ex-reference-value"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.reference-triples / 0 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
          }
        },
        [
          / measurement-map / {
            / comid.mkey / 0 : 601({
              / psa.measurement-type / 1 : "PRoT",
              / psa.version /          4 : "1.3.5",
              / psa.signer-id /        5 : h'acbb11c7e4da2172
                                            05523ce4ce1a245a
                                            e1a239ae3c6bfd9e
                                            7871f7e5d8bae86b'
            }),
            / comid.mval / 1 : {
              / comid.digests / 2 : [
                / hash-alg-id / 1, / sha256 /
                / hash-value /  h'44aa336af4cb14a8
                                  79432e53dd6571c7
                                  fa9bccafb75f4882
                                  59262d6ea3a4d91b'
              ]
            }
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

<section anchor="sec-swrel"><name>Software Upgrades and Patches</name>

<t>In order to model software lifecycle events such as updates and patches, this
profile defines a new triple that conveys the following semantics:</t>

<t><list style="symbols">
  <t>SUBJECT: a software component</t>
  <t>PREDICATE: (non-critically / critically) (updates / patches)</t>
  <t>OBJECT: another software component</t>
</list></t>

<t>The triple is reified and used as the object of another triple,
<spanx style="verb">psa-swrel-triple-record</spanx>, whose subject is the embedding environment.</t>

<figure><artwork><![CDATA[
comid.psa-swrel-triples = 5

$$triples-map-extension //= (
  comid.psa-swrel-triples => [ + psa-swrel-triple-record ]
)

psa.updates = 1
psa.patches = 2

psa-swrel-rel = [
  type: psa.updates / psa.patches
  security-critical: bool ; true means it's a fix for a security bug
]

sw-rel = [
  new: psa-swcomp-id ; identifier of the "new" firmware
  rel: psa-swrel-rel ; patches, updates and the security flag
  old: psa-swcomp-id ; identifier of the "old" firmware
]

psa-swrel-triple-record = [
  environment-map
  sw-rel
]
]]></artwork></figure>

<t>An example of a security critical update involving versions "1.3.5" and "1.4.0"
of software component "PRoT" within the target environment associated with
Implementation ID <spanx style="verb">acme-implementation-id-000000001</spanx> is shown in
<xref target="ex-psa-swrel-update-crit"/>.</t>

<figure title="Example Critical Software Upgrade" anchor="ex-psa-swrel-update-crit"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.psa-swrel-triples / 5 : [
      [
        / environment-map / {
          / comid.class-id / 0 :
          / tagged-impl-id-type / 600(
            h'61636d652d696d706c656d656e746174
              696f6e2d69642d303030303030303031'
          ),
          / comid.vendor / 1 : "ACME Ltd.",
          / comid.model /  2 : "Roadrunner 1.0"
        },

        / sw-rel / [
          / new / {
            / psa.measurement-type / 1 : "PRoT",
            / psa.version /          4 : "1.4.0",
            / psa.signer-id /        5 : h'acbb11c7e4da2172
                                           05523ce4ce1a245a
                                           e1a239ae3c6bfd9e
                                           7871f7e5d8bae86b'
          },

          / rel / [
            / type / 1, / psa.updates /
            / security-critical / true
          ],

          / old / {
            / psa.measurement-type / 1 : "PRoT",
            / psa.version /          4 : "1.3.5",
            / psa.signer-id /        5 : h'acbb11c7e4da2172
                                           05523ce4ce1a245a
                                           e1a239ae3c6bfd9e
                                           7871f7e5d8bae86b'
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="sec-keys"><name>Attestation Verification Claims</name>

<t>An Attestation Verification Claim carries the verification key associated with
the Initial Attestation Key (IAK) of a PSA device.  When appraising Evidence,
the Verifier uses the Implementation ID and Instance ID claims (see
<xref target="sec-psa-rot-id"/>) to retrieve the verification key that it SHALL use to check
the signature on the Evidence.  This allows the Verifier to prove (or disprove)
the Attester's claimed identity.</t>

<t>Each verification key is provided alongside the corresponding device Instance
and Implementation IDs (and, possibly, a product identifier) in an
<spanx style="verb">attest-key-triple-record</spanx>.  Specifically:</t>

<t><list style="symbols">
  <t>The Instance and Implementation IDs are encoded in the environment-map as
shown in <xref target="ex-psa-rot-id"/>;</t>
  <t>The IAK public key is carried in the <spanx style="verb">comid.key</spanx> entry in the
<spanx style="verb">verification-key-map</spanx>.  The IAK public key is a PEM-encoded
SubjectPublicKeyInfo <xref target="RFC5280"/>.  There MUST be only one
<spanx style="verb">verification-key-map</spanx> in an <spanx style="verb">attest-key-triple-record</spanx>;</t>
  <t>The optional <spanx style="verb">comid.keychain</spanx> entry MUST NOT be set by a CoMID producer that
uses the profile described in this document, and MUST be ignored by a CoMID
consumer that is parsing according to this profile.</t>
</list></t>

<t>The example in <xref target="ex-attestation-verification-claim"/> shows the PSA Endorsement
of type Attestation Verification Claim carrying a secp256r1 EC public IAK
associated with Instance ID <spanx style="verb">4ca3...d296</spanx>.</t>

<figure title="Example Attestation Verification Claim" anchor="ex-attestation-verification-claim"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.attest-key-triples / 3 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
          },
          / comid.instance / 1 :
            / tagged-ueid-type / 550(
              h'01
                4ca3e4f50bf248c39787020d68ffd05c
                88767751bf2645ca923f57a98becd296'
            )
        },
        [
          / verification-key-map / {
            / comid.key / 0 :
              "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgA
              ETl4iCZ47zrRbRG0TVf0dw7VFlHtv18HInY
              hnmMNybo+A1wuECyVqrDSmLt4QQzZPBECV8
              ANHS5HgGCCSr7E/Lg=="
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="sec-certificates"><name>Certification Claims</name>

<t>PSA Certified <xref target="PSA-CERTIFIED"/> defines a certification scheme for the PSA
ecosystem.  A product - either a hardware component, a software component, or
an entire device - that is verified to meet the security criteria established
by the PSA Certified scheme is warranted a PSA Certified Security Assurance
Certificate (SAC).  A SAC contains information about the certification of a
certain product (e.g., the target system, the attained certification level, the
test lab that conducted the evaluation, etc.), and has a unique Certificate
Number.</t>

<t>The linkage between a PSA RoT -- comprising the immutable part as well as zero
or more of the mutable components -- and the associated SAC is provided by a
Certification Claim, which binds the PSA RoT Implementation ID and the software
component identifiers with the SAC unique Certificate Number.  When appraising
Evidence, the Verifier can use the Certification Claims associated with the
identified Attester as ancillary input to the Appraisal Policy, or to enrich
the produced Attestation Result.</t>

<t>A Certification Claim is encoded in an <spanx style="verb">psa-cert-triple-record</spanx>, which extends
the <spanx style="verb">$$triples-map-extension</spanx> socket, as follows:</t>

<figure><artwork><![CDATA[
comid.psa-cert-triples = 4

$$triples-map-extension //= (
  comid.psa-cert-triples => [ + psa-cert-triple-record ]
)

psa.immutable-rot = 1
psa.mutable-rot = 2

psa-rot-descriptor = {
  psa.immutable-rot => psa-implementation-id-type
  psa.mutable-rot => [ * psa-swcomp-id ]
}

psa-cert-triple-record = [
  psa-rot-descriptor
  psa-cert-num-type
]

psa-cert-num-type = text .regexp "[0-9]{13} - [0-9]{5}"
]]></artwork></figure>

<t><list style="symbols">
  <t>The Implementation ID of the immutable PSA RoT to which the SAC applies is
encoded as a <spanx style="verb">tagged-impl-id-type</spanx> in the <spanx style="verb">psa.immutable-rot</spanx> of the
<spanx style="verb">psa-rot-descriptor</spanx>;</t>
  <t>Any software component that is part of the certified PSA RoT is encoded as a
<spanx style="verb">psa-swcomp-id</spanx> (see <xref target="sec-ref-values"/>) in the <spanx style="verb">psa.mutable-rot</spanx> of the
<spanx style="verb">psa-rot-descriptor</spanx>;</t>
  <t>The unique SAC Certificate Number is encoded in the <spanx style="verb">psa-cert-num-type</spanx>.</t>
</list></t>

<t>A single CoMID can carry one or more Certification Claims.</t>

<t>The example in <xref target="ex-certification-claim"/> shows a Certification Claim that
associates Certificate Number <spanx style="verb">1234567890123 - 12345</spanx> to Implementation ID
<spanx style="verb">acme-implementation-id-000000001</spanx> and a single "PRoT" software component with
version "1.3.5".</t>

<figure title="Example Certification Claim with `supplement` Link-Relation" anchor="ex-certification-claim"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  }, 
  / comid.triples / 4 : {
    / comid.psa-cert-triples / 4 : [
      [
        / psa-rot-descriptor / {
          / psa.immutable-rot / 1 :
            h'61636d652d696d706c656d656e746174
              696f6e2d69642d303030303030303031',
          / psa.mutable-rot / 2 : [
            / psa-swcomp-id / {
              / psa.measurement-type / 1 : "PRoT",
              / psa.version /          4 : "1.3.5",
              / psa.signer-id /        5 : h'acbb11c7e4da2172
                                             05523ce4ce1a245a
                                             e1a239ae3c6bfd9e
                                             7871f7e5d8bae86b'
            }
          ]
        },
        / psa-cert-num-type / "1234567890123 - 12345"
      ]
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="sec-endorsements-block-list"><name>Endorsements Block List</name>

<t><cref>This is work in progress.  It may change or be removed in the future.</cref></t>

<t>The following three "blocklist" claims:</t>

<t><list style="symbols">
  <t><spanx style="verb">reference-blocklist-triple</spanx></t>
  <t><spanx style="verb">attest-key-blocklist-triple</spanx></t>
  <t><spanx style="verb">cert-blocklist-triple</spanx></t>
</list></t>

<t>are defined with the same syntax but opposite semantics with regards to their
"positive" counterparts to allow invalidating previously provisioned endorsements
from the acceptable set.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t><cref>TODO</cref></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="cbor-tag-registrations"><name>CBOR Tag Registrations</name>

<t>IANA is requested to allocate the following tag in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specified value:</t>

<texttable title="CoRIM CBOR Tags" anchor="tbl-psa-cbor-tag">
      <ttcol align='left'>Tag</ttcol>
      <ttcol align='left'>Data Item</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c>600</c>
      <c>tagged bytes</c>
      <c>PSA Implementation ID (<xref target="sec-psa-rot-id"/> of RFCTHIS)</c>
      <c>601</c>
      <c>tagged map</c>
      <c>PSA Software Component Identifier (<xref target="sec-ref-values"/> of RFCTHIS)</c>
</texttable>

</section>
<section anchor="corim-profile-registration"><name>CoRIM Profile Registration</name>

<t>IANA is requested to register the following profile value in the
<cref>TODO</cref> CoRIM registry.</t>

<texttable title="PSA profile for CoRIM" anchor="tbl-psa-corim-profile">
      <ttcol align='left'>Profile Value</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c><spanx style="verb">http://arm.com/psa/iot/1</spanx></c>
      <c>uri</c>
      <c>The CoRIM profile specified by this document</c>
</texttable>

</section>
<section anchor="comid-codepoints"><name>CoMID Codepoints</name>

<t>IANA is requested to register the following codepoints to the "CoMID Triples
Map" registry.</t>

<texttable title="PSA CoMID Triples" anchor="tbl-psa-comid-triples">
      <ttcol align='left'>Index</ttcol>
      <ttcol align='left'>Item Name</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>4</c>
      <c>comid.psa-cert-triples</c>
      <c>RFCTHIS</c>
      <c>5</c>
      <c>comid.psa-swrel-triples</c>
      <c>RFCTHIS</c>
</texttable>

</section>
</section>
<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>

<t><cref>TODO</cref></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>




<reference anchor="PSA-TOKEN">
   <front>
      <title>Arm&#x27;s Platform Security Architecture (PSA) Attestation Token</title>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Simon Frost" initials="S." surname="Frost">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Mathias Brossard" initials="M." surname="Brossard">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
         <organization>HP Labs</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>Linaro</organization>
      </author>
      <date day="21" month="February" year="2024"/>
      <abstract>
	 <t>   The Arm Platform Security Architecture (PSA) is a family of hardware
   and firmware security specifications, as well as open-source
   reference implementations, to help device makers and chip
   manufacturers build best-practice security into products.  Devices
   that are PSA compliant can produce attestation tokens as described in
   this memo, which are the basis for many different protocols,
   including secure provisioning and network access control.  This
   document specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by PSA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with ARM&#x27;s architecture.  It is not a
   standard nor a product of the IETF.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-22"/>
   
</reference>


<reference anchor="CoRIM">
   <front>
      <title>Concise Reference Integrity Manifest</title>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>arm</organization>
      </author>
      <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
         <organization>arm</organization>
      </author>
      <author fullname="Ned Smith" initials="N." surname="Smith">
         <organization>Intel</organization>
      </author>
      <author fullname="Wei Pan" initials="W." surname="Pan">
         <organization>Huawei Technologies</organization>
      </author>
      <date day="23" month="October" year="2023"/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies the information elements for representing Endorsements and
   Reference Values in CBOR format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-03"/>
   
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
  <front>
    <title>Concise Binary Object Representation (CBOR) Tags</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor="RATS-ARCH">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>


<reference anchor="PSA-CERTIFIED" target="https://www.psacertified.org">
  <front>
    <title>PSA Certified</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

