<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-fossati-tls-attestation-06" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Attestation in TLS/DTLS">Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization></organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="Y." surname="Sheffer" fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Howard" fullname="Paul Howard">
      <organization>Arm Limited</organization>
      <address>
        <email>Paul.Howard@arm.com</email>
      </address>
    </author>
    <author initials="I." surname="Mihalcea" fullname="Ionut Mihalcea">
      <organization>Arm Limited</organization>
      <address>
        <email>Ionut.Mihalcea@arm.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>Arm Limited</organization>
      <address>
        <email>Yogesh.Deshpande@arm.com</email>
      </address>
    </author>
    <author initials="A." surname="Niemi" fullname="Arto Niemi">
      <organization>Huawei</organization>
      <address>
        <email>arto.niemi@huawei.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>

    <date year="2024" month="March" day="19"/>

    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>attestation</keyword> <keyword>RATS</keyword> <keyword>TLS</keyword>

    <abstract>


<?line 128?>

<t>The TLS handshake protocol allows authentication of one or both peers using static, long-term credentials.
In some cases, it is also desirable to ensure that the peer runtime environment is in a secure state.
Such an assurance can be achieved using attestation which is a process by which an entity produces evidence about itself that another party can use to appraise whether that entity is found in a secure state.
This document describes a series of protocol extensions to the TLS 1.3 handshake that enables the binding of the TLS authentication key to a remote attestation session.
This enables an entity capable of producing attestation evidence, such as a confidential workload running in a Trusted Execution Environment (TEE), or an IoT device that is trying to authenticate itself to a network access point, to present a more comprehensive set of security metrics to its peer.
These extensions have been designed to allow the peers to use any attestation technology, in any remote attestation topology, and mutually.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-fossati-tls-attestation/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/yaronf/draft-tls-attestation"/>.</t>
    </note>


  </front>

  <middle>


<?line 137?>

<section anchor="introduction"><name>Introduction</name>

<t>Attestation <xref target="RFC9334"/> is the process by which an entity produces evidence about itself that another party can use to evaluate the trustworthiness of that entity.
This document describes a series of protocol extensions to the TLS 1.3 handshake that enables the binding of the TLS authentication key to a remote attestation session.
As a result, a peer can use "attestation credentials", consisting of compound platform evidence and key attestation, to authenticate itself to its peer during the setup of the TLS channel.
This enables an attester, such as a confidential workload running in a Trusted Execution Environment (TEE) <xref target="I-D.ietf-teep-architecture"/>, or an IoT device that is trying to authenticate itself to a network access point, to present a more comprehensive set of security metrics to its peer.
This, in turn, allows for the implementation of authorization policies at the relying parties that are based on stronger security signals.</t>

<t>Given the variety of deployed and emerging attestation technologies (e.g., <xref target="TPM1.2"/>, <xref target="TPM2.0"/>, <xref target="I-D.ietf-rats-eat"/>) these extensions have been explicitly designed to be agnostic of the attestation formats.
This is achieved by reusing the generic encapsulation defined in <xref target="I-D.ietf-rats-msg-wrap"/> for transporting evidence and attestation result payloads in the TLS Certificate message.</t>

<t>The proposed design supports both background-check and passport topologies, as described in Sections <xref target="RFC9334" section="5.2" sectionFormat="bare"/> and <xref target="RFC9334" section="5.1" sectionFormat="bare"/> of <xref target="RFC9334"/>.
This is detailed in <xref target="evidence-extensions"/> and <xref target="attestation-results-extensions"/>.
This specification provides both one-way (server-only) and mutual (client and server) authentication using attestation credentials, and allows the attestation topologies at each peer to be independent of each other.</t>

<t>This document does not specify any attestation technology.
Companion documents are expected to define specific attestation mechanisms.</t>

</section>
<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The reader is assumed to be familiar with the vocabulary and concepts defined in
<xref section="4" sectionFormat="of" target="RFC9334"/>, and those in <xref section="2" sectionFormat="of" target="I-D.bft-rats-kat"/>.</t>

<t>The following terms are used in this document:</t>

<dl newline="true">
  <dt>TLS Identity Key (TIK):</dt>
  <dd>
    <t>A cryptographic key used by one of the peers to authenticate itself during the
TLS handshake.</t>
  </dd>
  <dt>TIK-C, TIK-S:</dt>
  <dd>
    <t>The TIK that identifies the client or the server, respectively.</t>
  </dd>
  <dt>TIK-C-ID, TIK-S-ID:</dt>
  <dd>
    <t>An identifier for TIK-C or respectively, TIK-S. This may be a fingerprint 
(cryptographic hash) of the public key, but other implementations are possible.</t>
  </dd>
</dl>

<t>"Remote attestation credentials", or "attestation credentials", is used
to refer to both attestation evidence and attestation results, when no
distinction needs to be made between them.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="overview"><name>Overview</name>

<t>The basic functional goal is to link the authenticated key exchange of TLS with an interleaved remote attestation session in such a way that the key used to sign the handshake can be proven to be residing within the boundaries of an attested TEE.
The requirement is that the attester can provide evidence containing the security status of both the signing key and the platform that is hosting it.
The associated security goal is to obtain such binding so that no replay, relay or splicing from an adversary is possible.</t>

<t>Throughout the document, we will assume the conceptual attester model described in <xref section="3" sectionFormat="of" target="I-D.bft-rats-kat"/>, where TEE attestation is provided by a Platform Attestation Token (PAT) signed by the attester's "attesting environment".
Among other security metrics, the PAT contains evidence about the integrity of a "Key Attestation Service" executing within the TEE which issues a Key Attestation Token (KAT) for the TLS handshake signing key (TIK) as described in <xref target="handshake-overview"/>.</t>

<t>The protocol's security relies on the verifiable binding between these two logically separate units of evidence.</t>

</section>
<section anchor="attestation-extensions"><name>Attestation Extensions</name>

<t>As typical with new features in TLS, the client indicates support for the new
extension in the ClientHello message. The newly introduced extensions allow
remote attestation credentials and nonces to be exchanged. The nonces are used
for guaranteeing freshness of the exchanged evidence when the background check
model is in use.</t>

<t>When either the evidence or the attestation results extension is successfully
negotiated, the content of the corresponding Certificate message contains a
payload that is encoded based on the wrapper defined in <xref target="I-D.ietf-rats-msg-wrap"/>.
Both JSON and CBOR serializations are allowed in CMW, with the emitter choosing which serialization to use.</t>

<t>In TLS a client has to demonstrate possession of the private key via the
CertificateVerify message, when client-based authentication is requested. The
attestation payload must contain assertions relating to the client's TLS
Identity Key (TIK-C), which associate the private key with the attestation
information. These assertions may come in the form of a Key Attestation Token
(KAT), or of specific claims in an attestation result document. An example of a
KAT format utilizing the EAT format can be found in <xref target="I-D.bft-rats-kat"/>.</t>

<t>The relying party can obtain and appraise the remote attestation results either
directly from the Certificate message (in the passport model), or by relaying
the evidence from the Certificate message to the verifier and receiving the
attestation results. Subsequently, the attested key is used to verify the
CertificateVerify message.</t>

<t>When using the passport model, the remote attestation results obtained by the
attester from its trusted verifiers can be cached and used for any number of
subsequent TLS handshakes, as long as the freshness policy requirements are
satisfied.</t>

<t>This protocol supports both monolithic and split implementations. In a monolithic
implementation, the TLS stack is completely embedded within the TEE. In a split
implementation, the TLS stack is located outside the TEE, but any private keys
(and in particular, the TIK) only exist within the TEE. In order to support
both options, only the TIK's identity and its public component are ever
passed between the Client or Server TLS stack and its Attestation Service.</t>

</section>
<section anchor="use-of-remote-attestation-credentials-in-the-tls-handshake"><name>Use of Remote Attestation Credentials in the TLS Handshake</name>

<t>For both the passport model (described in section 5.1 of <xref target="RFC9334"/>) and
background check model (described in Section 5.2 of <xref target="RFC9334"/>) the following
modes of operation are allowed when used with TLS, namely:</t>

<t><list style="symbols">
  <t>TLS client is the attester,</t>
  <t>TLS server is the attester, and</t>
  <t>TLS client and server mutually attest towards each other.</t>
</list></t>

<t>We will show the message exchanges of the first two cases in sub-sections below.
Mutual authentication via attestation combines these two (non-interfering)
flows, including cases where one of the peers uses the passport model for its
attestation, and the other uses the background check model.</t>

<section anchor="handshake-overview"><name>Handshake Overview</name>

<t>The handshake defined here is analogous to certificate-based authentication in a regular TLS handshake. Instead of the certificate's private key, we use
the TIK identity key. This key is attested, with attestation being carried
by the Certificate message. Following that, the peer being attested proves possession of the private key using the CertificateVerify message.</t>

<t>Depending on the use case, the protocol supports peer authentication
using attestation only, or using both attestation and a regular public
key certificate.</t>

<t>The current version of the document assumes the KAT/PAT construct of 
<xref target="I-D.bft-rats-kat"/>. Not all platforms support this model, and a document
that defines private key attestation for use in TLS Attestation as defined here, must specify:</t>

<t><list style="symbols">
  <t>The format and the lifetime of TIK (e.g. an ephemeral, per session TIK vs.
a long lived one).</t>
  <t>How the key is attested using a structure carried by the
Certificate message.</t>
  <t>How proof of possession is performed.</t>
</list></t>

</section>
<section anchor="tls-client-authenticating-using-evidence"><name>TLS Client Authenticating Using Evidence</name>

<t>In this use case, the TLS server (acting as a relying party) challenges the TLS
client (as the attester) to provide evidence. The TLS server needs to provide a
nonce in the EncryptedExtensions message to the TLS client so that the
attestation service can feed the nonce into the generation of the evidence. The
TLS server, when receiving the evidence, will have to contact the verifier
(which is not shown in the diagram).</t>

<t>An example of this flow can be found in device onboarding where the 
client initiates the communication with cloud infrastructure to 
get credentials, firmware and other configuration data provisioned
to the device. For the server to consider the device genuine it needs
to present evidence.</t>

<figure title="TLS Client Providing Evidence to TLS Server." anchor="_figure-background-check-model1"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + evidence_proposal
     | + key_share*
     | + signature_algorithms*
     v                         -------->
                                                  ServerHello  ^ Key
                                                 + key_share*  | Exch
                                                               v
                                        {EncryptedExtensions}  ^  Server
                                          + evidence_proposal  |  Params
                                                      (nonce)  |
                                         {CertificateRequest}  v  
                                                {Certificate}  ^
                                          {CertificateVerify}  | Auth
                                                   {Finished}  v
                               <--------  [Application Data*]
     ^ {Certificate}
Auth | {CertificateVerify}
     v {Finished}              -------->
       [Application Data]      <------->  [Application Data]
]]></artwork></figure>

</section>
<section anchor="tls-server-authenticating-using-evidence"><name>TLS Server Authenticating Using Evidence</name>

<t>In this use case the TLS client challenges the TLS server to present evidence. 
The TLS server acts as an attester while the TLS client is the relying party. 
The TLS client, when receiving the evidence, will have to contact the verifier 
(which is not shown in the diagram).</t>

<t>An example of this flow can be found in confidential computing where 
a compute workload is only submitted to the server infrastructure 
once the client/user is assured that the confidential computing platform is
genuine.</t>

<figure title="TLS Server Providing Evidence to TLS Client." anchor="_figure-background-check-model2"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + evidence_request
     |   (nonce)
     | + key_share*
     | + signature_algorithms*
     v                         -------->
                                                  ServerHello  ^ Key
                                                 + key_share*  | Exch
                                                               v
                                        {EncryptedExtensions}  ^  Server
                                          + evidence_request   |  Params
                                                               |
                                         {CertificateRequest}  v  
                                                {Certificate}  ^
                                          {CertificateVerify}  | Auth
                                                   {Finished}  v
                               <--------  [Application Data*]
     ^ {Certificate}
Auth | {CertificateVerify}
     v {Finished}              -------->
       [Application Data]      <------->  [Application Data]
]]></artwork></figure>

</section>
<section anchor="tls-client-authenticating-using-attestation-results"><name>TLS Client Authenticating Using Attestation Results</name>

<t>In this use case the TLS client, as the attester, provides attestation results
to the TLS server. The TLS client is the attester and the the TLS server acts as
a relying party. Prior to delivering its Certificate message, the client must
contact the verifier (not shown in the diagram) to receive the attestation
results that it will use as credentials.</t>

<figure title="TLS Client Providing Results to TLS Server." anchor="_figure-passport-model1"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + results_proposal
     | + key_share*
     | + signature_algorithms*
     v                         -------->
                                                  ServerHello  ^ Key
                                                 + key_share*  | Exch
                                                               v
                                        {EncryptedExtensions}  ^  Server
                                           + results_proposal  |  Params
                                         {CertificateRequest}  v  
                                                {Certificate}  ^
                                          {CertificateVerify}  | Auth
                                                   {Finished}  v
                               <--------  [Application Data*]
     ^ {Certificate}
Auth | {CertificateVerify}
     v {Finished}              -------->
       [Application Data]      <------->  [Application Data]
]]></artwork></figure>

</section>
<section anchor="tls-server-authenticating-using-results"><name>TLS Server Authenticating Using Results</name>

<t>In this use case the TLS client, as the relying party, requests attestation
results from the TLS server. Prior to delivering its Certificate message, the
server must contact the verifier (not shown in the diagram) to receive the
attestation results that it will use as credentials.</t>

<figure title="TLS Server Providing Attestation Results to TLS Client." anchor="_figure-passport-model2"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + results_request
     | + key_share*
     | + signature_algorithms*
     v                         -------->
                                                  ServerHello  ^ Key
                                                 + key_share*  | Exch
                                                               v
                                        {EncryptedExtensions}  ^  Server
                                           + results_request   |  Params
                                                               |
                                         {CertificateRequest}  v  
                                                {Certificate}  ^
                                          {CertificateVerify}  | Auth
                                                   {Finished}  v
                               <--------  [Application Data*]
     ^ {Certificate}
Auth | {CertificateVerify}
     v {Finished}              -------->
       [Application Data]      <------->  [Application Data]
]]></artwork></figure>

</section>
</section>
<section anchor="evidence-extensions"><name>Evidence Extensions (Background Check Model)</name>

<t>The EvidenceType structure also contains an indicator for the type of credential
expected in the Certificate message. The credential can either contain
attestation evidence alone, or an X.509 certificate alongside attestation
evidence.</t>

<figure title="TLS Extension Structure for Evidence." anchor="_figure-extension-evidence"><artwork><![CDATA[
    enum { CONTENT_FORMAT(0), MEDIA_TYPE(1) } typeEncoding;
    enum { ATTESTATION(0), CERT_ATTESTATION(1) } credentialKind;

    struct {
        credentialKind credential_kind;
        typeEncoding type_encoding;
        select (EvidenceType.type_encoding) {
            case CONTENT_FORMAT:
                uint16 content_format;
            case MEDIA_TYPE:
                opaque media_type<0..2^16-1>;
        };
    } EvidenceType;

    struct {
        select(Handshake.msg_type) {
            case client_hello:
                EvidenceType supported_evidence_types<1..2^8-1>;
                opaque nonce<8..2^8-1>;
            case server_hello:
                EvidenceType selected_evidence_type;
        }
    } evidenceRequestTypeExtension;

    struct {
        select(Handshake.msg_type) {
            case client_hello:
                EvidenceType supported_evidence_types<1..2^8-1>;
            case server_hello:
                EvidenceType selected_evidence_type;
                opaque nonce<8..2^8-1>;
        }
    } evidenceProposalTypeExtension;
]]></artwork></figure>

<section anchor="attest-only"><name>Attestation-only</name>

<t>When the chosen evidence type indicates the sole use of attestation for
authentication, the Certificate payload is used as a container for
attestation evidence, as shown in <xref target="_figure-attest-only"/>, and follows the
model of <xref target="RFC8446"/>.</t>

<figure title="Certificate Message when using only attestation." anchor="_figure-attest-only"><artwork><![CDATA[
    struct {
        select (certificate_type) {
            case RawPublicKey:
                /* From RFC 7250 ASN.1_subjectPublicKeyInfo */
                opaque ASN1_subjectPublicKeyInfo<1..2^24-1>;

              case X509:
                opaque cert_data<1..2^24-1>;

              case attestation:
                  /* payload used to convey evidence */
                  opaque evidence<1..2^24-1>;
          };
          Extension extensions<0..2^16-1>;
      } CertificateEntry;

      struct {
          opaque certificate_request_context<0..2^8-1>;
          CertificateEntry certificate_list<0..2^24-1>;
      } Certificate;
]]></artwork></figure>

<t>The encoding of the evidence structure is defined in <xref target="I-D.ietf-rats-msg-wrap"/>.</t>

</section>
<section anchor="pkix-attest"><name>Attestation Alongside X.509 Certificates</name>

<t>When the chosen evidence type indicates usage of both attestation and PKIX,
the X.509 certificate will serve as the main payload in the Certificate
message, while the attestation evidence will be carried in the
CertificateEntry extension, as shown in <xref target="_figure-cert-attest"/>.</t>

<figure title="Certificate Message when using PKIX and attestation." anchor="_figure-cert-attest"><artwork><![CDATA[
    struct {
        select (certificate_type) {
            case RawPublicKey:
                /* From RFC 7250 ASN.1_subjectPublicKeyInfo */
                opaque ASN1_subjectPublicKeyInfo<1..2^24-1>;
              
            case X509:
                /* X.509 certificate conveyed as usual */
                opaque cert_data<1..2^24-1>;
        };

        /* attestation evidence conveyed as an extension, see below */
        Extension extensions<0..2^16-1>;
      } CertificateEntry;

    struct {
        opaque certificate_request_context<0..2^8-1>;
        CertificateEntry certificate_list<0..2^24-1>;
    } Certificate;

    struct {
        ExtensionType extension_type;
        /* payload used to convey evidence */
        opaque extension_data<0..2^16-1>;
    } Extension;

    enum {
        /* other extension types defined in the IANA TLS 
           ExtensionType Value registry */

        /* variant used to identify attestation evidence */
        attestation_evidence(60),
        (65535)
    } ExtensionType;
]]></artwork></figure>

<t>The encoding of the evidence structure is defined in <xref target="I-D.ietf-rats-msg-wrap"/>.</t>

<t>As described in <xref target="usage-variants"/>, this authentication mechanism is meant
primarily for carrying platform attestation evidence to provide more
context to the relying party. This evidence must be cryptographically bound
to the TLS handshake to prevent relay attacks. An Attestation Channel Binder as
described in <xref target="binding-mech"/> is therefore used when the attestation scheme
does not allow the binding data to be part of the token. The structure of
the binder is given in <xref target="_figure-tls-binder"/>.</t>

<figure title="Format of TLS channel binder." anchor="_figure-tls-binder"><artwork><![CDATA[
attestation_channel_binder = {
  &(nonce: 1) => bstr .size (8..64)
  &(ik_pub_fingerprint: 2) => bstr .size (16..64)
  &(channel_binder: 3) => bstr .size (16..64)
}
]]></artwork></figure>

<t><list style="symbols">
  <t>Nonce is the value provided as a challenge by the relying party.</t>
  <t>The identity key fingerprint (ik_pub_fingerprint) is a hash of the
Subject Public Key Info from the leaf X.509 certificate transmitted in
the handshake.</t>
  <t>The channel binder (channel_binder) is a value obtained from the early
exporter mechanism offered by the TLS implementation (<xref section="7.5" sectionFormat="of" target="RFC8446"/>). This Early Exporter Value (EEV) must be obtained immediately
following the ServerHello message, using 'attestation-binder' as the label,
an empty context, and with the key length set to 32 bytes.
<xref target="_figure-early-exporter"/> shows this computation using the notation from
<xref target="RFC8446"/>.</t>
</list></t>

<figure title="Usage of TLS v1.3 early exporter for channel binding." anchor="_figure-early-exporter"><artwork><![CDATA[
TLS-Early-Exporter(label, context_value, key_length) =
       HKDF-Expand-Label(
              Derive-Secret(early_exporter_master_secret, label, ""),
              "exporter", Hash(context_value), key_length)

channel_binder = TLS-Early-Exporter(label = "attestation-binder",
                                    context_value = "", key_length = 32)
]]></artwork></figure>

<t>A hash of the binder must be included in the attestation evidence. Previous
to hashing, the binder must be encoded as described in <xref target="binding-mech"/>.</t>

<t>The hash algorithm negotiatied within the handshake must be used wherever
hashing is required for the binder.</t>

</section>
</section>
<section anchor="attestation-results-extensions"><name>Attestation Results Extensions (Passport Model)</name>

<figure title="TLS Extension Structure for Attestation Results." anchor="_figure-extension-results"><artwork><![CDATA[
    struct {
        opaque verifier_identity<0..2^16-1>;
    } VerifierIdentityType;
      
    struct {
        select(Handshake.msg_type) {
            case client_hello:
                VerifierIdentityType trusted_verifiers<1..2^8-1>;
                 
            case server_hello:
                VerifierIdentityType selected_verifier;
        }
    } resultsRequestTypeExtension;

    struct {
        select(Handshake.msg_type) {
            case client_hello:
                VerifierIdentityType trusted_verifiers<1..2^8-1>;

            case server_hello:
                VerifierIdentityType selected_verifier;
        }
    } resultsProposalTypeExtension;
]]></artwork></figure>

</section>
<section anchor="behavior"><name>TLS Client and Server Handshake Behavior</name>

<t>The high-level message exchange in <xref target="_figure-overview"/> shows the
evidence_proposal, evidence_request, results_proposal, and results_request
extensions added to the ClientHello and the EncryptedExtensions messages.</t>

<figure title="Attestation Message Overview." anchor="_figure-overview"><artwork><![CDATA[
       Client                                           Server

Key  ^ ClientHello
Exch | + key_share*
     | + signature_algorithms*
     | + psk_key_exchange_modes*
     | + pre_shared_key*
     | + evidence_proposal*
     | + evidence_request*
     | + results_proposal*
     v + results_request*
     -------->
                                                  ServerHello  ^ Key
                                                 + key_share*  | Exch
                                            + pre_shared_key*  v
                                        {EncryptedExtensions}  ^  Server
                                         + evidence_proposal*  |
                                          + evidence_request*  |
                                          + results_proposal*  |
                                           + results_request*  |
                                        {CertificateRequest*}  v  Params
                                               {Certificate*}  ^
                                         {CertificateVerify*}  | Auth
                                                   {Finished}  v
                               <--------  [Application Data*]
     ^ {Certificate*}
Auth | {CertificateVerify*}
     v {Finished}              -------->
       [Application Data]      <------->  [Application Data]
]]></artwork></figure>

<section anchor="background-check-model"><name>Background Check Model</name>

<section anchor="client-hello"><name>Client Hello</name>

<t>To indicate the support for passing evidence in TLS following the 
background check model, clients include the evidence_proposal 
and/or the evidence_request extensions in the ClientHello.</t>

<t>The evidence_proposal extension in the ClientHello message indicates
the evidence types the client is able to provide to the server,
when requested using a CertificateRequest message.</t>

<t>The evidence_request extension in the ClientHello message indicates
the evidence types the client challenges the server to 
provide in a subsequent Certificate payload.</t>

<t>The evidence_proposal and evidence_request extensions sent in
the ClientHello each carry a list of supported evidence types,
sorted by preference.  When the client supports only one evidence
type, it is a list containing a single element.</t>

<t>The client <bcp14>MUST</bcp14> omit evidence types from the evidence_proposal 
extension in the ClientHello if it cannot respond to a request
from the server to present a proposed evidence type, or if 
the client is not configured to use the proposed evidence type 
with the given server.  If the client has no evidence types 
to send in the ClientHello it <bcp14>MUST</bcp14> omit the evidence_proposal
extension in the ClientHello.</t>

<t>The client <bcp14>MUST</bcp14> omit evidence types from the evidence_request
extension in the ClientHello if it is not able to pass the 
indicated verification type to a verifier.  If the client does 
not act as a relying party with regards to evidence processing
(as defined in the RATS architecture) then the client <bcp14>MUST</bcp14> 
omit the evidence_request extension from the ClientHello.</t>

</section>
<section anchor="server-hello"><name>Server Hello</name>

<t>If the server receives a ClientHello that contains the
evidence_proposal extension and/or the evidence_request
extension, then three outcomes are possible:</t>

<t><list style="symbols">
  <t>The server does not support the extensions defined in this
document.  In this case, the server returns the EncryptedExtensions
without the extensions defined in this document.</t>
  <t>The server supports the extensions defined in this document, but
it does not have any evidence type in common with the client.
Then, the server terminates the session with a fatal alert of
type "unsupported_evidence".</t>
  <t>The server supports the extensions defined in this document and
has at least one evidence type in common with the client.  In
this case, the processing rules described below are followed.</t>
</list></t>

<t>The evidence_proposal extension in the ClientHello indicates
the evidence types the client is able to provide to the server,
when challenged using a certificate_request message.  If the
server wants to request evidence from the client, it <bcp14>MUST</bcp14> include the
evidence_proposal extension in the EncryptedExtensions. This
evidence_proposal extension in the EncryptedExtensions then indicates
what evidence format the client is requested to provide in a
subsequent Certificate message.  The value conveyed in the
evidence_proposal extension by the server <bcp14>MUST</bcp14> be selected from one of the
values provided in the evidence_proposal extension sent in the
ClientHello.  The server <bcp14>MUST</bcp14> also send a certificate_request
message.</t>

<t>If the server does not send a certificate_request message or none 
of the evidence types supported by the client (as indicated in the
evidence_proposal extension in the ClientHello) match the
server-supported evidence types, then the evidence_proposal
extension in the ServerHello <bcp14>MUST</bcp14> be omitted.</t>

<t>The evidence_request extension in the ClientHello indicates what
types of evidence the client can challenge the server to return
in a subsequent Certificate message. With the evidence_request 
extension in the EncryptedExtensions, the server indicates the 
evidence type carried in the Certificate message sent by the server.
The evidence type in the evidence_request extension <bcp14>MUST</bcp14> contain 
a single value selected from the evidence_request extension in 
the ClientHello.</t>

</section>
</section>
<section anchor="passport-model"><name>Passport Model</name>

<section anchor="client-hello-1"><name>Client Hello</name>

<t>To indicate the support for passing attestation results in TLS following the
passport model, clients include the results_proposal and/or the results_request
extensions in the ClientHello message.</t>

<t>The results_proposal extension in the ClientHello message indicates the verifier
identities from which it can relay attestation results, when requested using a
CertificateRequest message.</t>

<t>The results_request extension in the ClientHello message indicates the verifier
identities from which the client expects the server to provide attestation
results in a subsequent Certificate payload.</t>

<t>The results_proposal and results_request extensions sent in the ClientHello each
carry a list of supported verifier identities, sorted by preference.  When the
client supports only one verifier, it is a list containing a single element.</t>

<t>The client <bcp14>MUST</bcp14> omit verifier identities from the results_proposal extension in
the ClientHello if it cannot respond to a request from the server to present
attestation results from a proposed verifier, or if the client is not configured
to relay the results from the proposed verifier with the given server. If the
client has no verifier identities to send in the ClientHello it <bcp14>MUST</bcp14> omit the
results_proposal extension in the ClientHello.</t>

<t>The client <bcp14>MUST</bcp14> omit verifier identities from the results_request extension in
the ClientHello if it is not configured to trust attestation results issued by
said verifiers. If the client does not act as a relying party with regards to
the processing of attestation results (as defined in the RATS architecture) then
the client <bcp14>MUST</bcp14> omit the results_request extension from the ClientHello.</t>

</section>
<section anchor="server-hello-1"><name>Server Hello</name>

<t>If the server receives a ClientHello that contains the results_proposal
extension and/or the results_request extension, then three outcomes are
possible:</t>

<t><list style="symbols">
  <t>The server does not support the extensions defined in this document.  In this
case, the server returns the EncryptedExtensions without the extensions
defined in this document.</t>
  <t>The server supports the extensions defined in this document, but it does not
have any trusted verifiers in common with the client. Then, the server
terminates the session with a fatal alert of type "unsupported_verifiers".</t>
  <t>The server supports the extensions defined in this document and has at least
one trusted verifier in common with the client.  In this case, the processing
rules described below are followed.</t>
</list></t>

<t>The results_proposal extension in the ClientHello indicates the verifier
identities from which the client is able to provide attestation results to the
server, when challenged using a certificate_request message.  If the server
wants to request evidence from the client, it <bcp14>MUST</bcp14> include the results_proposal
extension in the EncryptedExtensions. This results_proposal extension in the
EncryptedExtensions then indicates what verifier the client is requested to
provide attestation results from in a subsequent Certificate message.  The value
conveyed in the results_proposal extension by the server <bcp14>MUST</bcp14> be selected from
one of the values provided in the results_proposal extension sent in the
ClientHello.  The server <bcp14>MUST</bcp14> also send a certificate_request message.</t>

<t>If the server does not send a certificate_request message or none of the
verifier identities proposed by the client (as indicated in the results_proposal
extension in the ClientHello) match the server-trusted verifiers, then the
results_proposal extension in the ServerHello <bcp14>MUST</bcp14> be omitted.</t>

<t>The results_request extension in the ClientHello indicates what verifiers the
client trusts as issuers of attestation results for the server. With the
results_request extension in the EncryptedExtensions, the server indicates the
identity of the verifier who issued the attestation results carried in the
Certificate message sent by the server. The verifier identity in the
results_request extension <bcp14>MUST</bcp14> contain a single value selected from the
results_request extension in the ClientHello.</t>

</section>
</section>
</section>
<section anchor="background-check-model-examples"><name>Background-Check Model Examples</name>

<section anchor="cloud-confidential-computing"><name>Cloud Confidential Computing</name>

<t>In this example, a confidential workload is executed on computational
resources hosted at a cloud service provider.  This is a typical
scenario for secure, privacy-preserving multiparty computation,
including anti-money laundering, drug development in healthcare, contact
tracing in pandemic times, Machine Learning (ML) model training, etc.</t>

<t>In such scenarios, the users (e.g., the party providing the data input for the
computation, the party consuming the computed results, or the party
providing a proprietary ML model used in the computation) have two goals:</t>

<t><list style="symbols">
  <t>Identifying the workload they are interacting with,</t>
  <t>Making sure that the platform on which the workload executes is a
Trusted Execution Environment (TEE) with the expected features.</t>
</list></t>

<t>A convenient arrangement is to verify that the two requirements are met
at the same time that the secure channel is established.</t>

<t>The protocol flow, alongside all the involved actors, is captured in
<xref target="_figure-cc-example"/> where the TLS client is the user (the relying
party) while the TLS server is co-located with the TEE-hosted
confidential workload (the attester).</t>

<t>The flow starts with the client initiating a verification session with a
trusted verifier.  The verifier returns the evidence types it
understands and a nonce that will be used to challenge the attester.</t>

<t>The client starts the TLS handshake with the server by supplying the
attestation-related parameters it has obtained from the verifier.  If
the server supports one of the offered evidence types, it will echo it
in the specular extension and proceed by invoking a local API
(represented by <spanx style="verb">attest_key(...)</spanx> in the figure below) to request
attestation using the nonce supplied by the verifier.  The returned
evidence binds the identity key (TIK-S) with the platform identity and
security state, packaged into a CAB.  The server then signs a transcript
hash (represented by <spanx style="verb">hs</spanx> in the figure below) of the handshake context
and the server's Certificate message with the (attested) identity key,
and sends the attestation evidence together with the signature over to
the client.</t>

<t>The client forwards the attestation evidence to the verifier using the
previously established session, obtains the attestation result (AR) and
checks whether it is acceptable according to its local policy.  If so,
it proceeds and verifies the handshake signature using the corresponding
public key (for example, using the PoP key in the KAT evidence
<xref target="I-D.bft-rats-kat"/>).</t>

<t>The attestation evidence verification combined with the verification of
the CertificateVerify signature provide confirmation that the presented
cryptographic identity is bound to the workload and platform identity,
and that the workload and platform are trustworthy.  Therefore, after
the handshake is finalized, the client can trust the workload on the
other side of the established secure channel to provide the required
confidential computing properties.</t>

<figure title="Example Exchange with Server as Attester." anchor="_figure-cc-example"><artset><artwork  type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1168" width="576" viewBox="0 0 576 1168" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
<path d="M 8,48 L 8,80" fill="none" stroke="black"/>
<path d="M 8,272 L 8,1088" fill="none" stroke="black"/>
<path d="M 32,80 L 32,272" fill="none" stroke="black"/>
<path d="M 32,304 L 32,1104" fill="none" stroke="black"/>
<path d="M 96,48 L 96,80" fill="none" stroke="black"/>
<path d="M 136,288 L 136,304" fill="none" stroke="black"/>
<path d="M 168,48 L 168,80" fill="none" stroke="black"/>
<path d="M 200,80 L 200,1152" fill="none" stroke="black"/>
<path d="M 240,48 L 240,80" fill="none" stroke="black"/>
<path d="M 280,368 L 280,376" fill="none" stroke="black"/>
<path d="M 368,32 L 368,80" fill="none" stroke="black"/>
<path d="M 400,80 L 400,1152" fill="none" stroke="black"/>
<path d="M 448,40 L 448,72" fill="none" stroke="black"/>
<path d="M 528,80 L 528,672" fill="none" stroke="black"/>
<path d="M 528,704 L 528,1104" fill="none" stroke="black"/>
<path d="M 568,32 L 568,80" fill="none" stroke="black"/>
<path d="M 568,320 L 568,1088" fill="none" stroke="black"/>
<path d="M 368,32 L 568,32" fill="none" stroke="black"/>
<path d="M 8,48 L 96,48" fill="none" stroke="black"/>
<path d="M 168,48 L 240,48" fill="none" stroke="black"/>
<path d="M 8,80 L 96,80" fill="none" stroke="black"/>
<path d="M 168,80 L 240,80" fill="none" stroke="black"/>
<path d="M 368,80 L 568,80" fill="none" stroke="black"/>
<path d="M 40,128 L 200,128" fill="none" stroke="black"/>
<path d="M 32,240 L 192,240" fill="none" stroke="black"/>
<path d="M 8,272 L 120,272" fill="none" stroke="black"/>
<path d="M 8,304 L 552,304" fill="none" stroke="black"/>
<path d="M 200,416 L 392,416" fill="none" stroke="black"/>
<path d="M 400,496 L 520,496" fill="none" stroke="black"/>
<path d="M 408,528 L 528,528" fill="none" stroke="black"/>
<path d="M 208,672 L 400,672" fill="none" stroke="black"/>
<path d="M 400,704 L 520,704" fill="none" stroke="black"/>
<path d="M 408,736 L 528,736" fill="none" stroke="black"/>
<path d="M 208,784 L 400,784" fill="none" stroke="black"/>
<path d="M 40,880 L 200,880" fill="none" stroke="black"/>
<path d="M 32,944 L 192,944" fill="none" stroke="black"/>
<path d="M 200,960 L 224,960" fill="none" stroke="black"/>
<path d="M 208,992 L 224,992" fill="none" stroke="black"/>
<path d="M 200,1008 L 224,1008" fill="none" stroke="black"/>
<path d="M 208,1040 L 224,1040" fill="none" stroke="black"/>
<path d="M 200,1072 L 392,1072" fill="none" stroke="black"/>
<path d="M 24,1104 L 552,1104" fill="none" stroke="black"/>
<path d="M 208,1136 L 392,1136" fill="none" stroke="black"/>
<path d="M 120,272 C 128.83064,272 136,279.16936 136,288" fill="none" stroke="black"/>
<path d="M 552,304 C 560.83064,304 568,311.16936 568,320" fill="none" stroke="black"/>
<path d="M 224,960 C 232.83064,960 240,967.16936 240,976" fill="none" stroke="black"/>
<path d="M 224,992 C 232.83064,992 240,984.83064 240,976" fill="none" stroke="black"/>
<path d="M 224,1008 C 232.83064,1008 240,1015.16936 240,1024" fill="none" stroke="black"/>
<path d="M 224,1040 C 232.83064,1040 240,1032.83064 240,1024" fill="none" stroke="black"/>
<path d="M 24,1104 C 15.16936,1104 8,1096.83064 8,1088" fill="none" stroke="black"/>
<path d="M 552,1104 C 560.83064,1104 568,1096.83064 568,1088" fill="none" stroke="black"/>
<polygon class="arrowhead" points="528,704 516,698.4 516,709.6" fill="black" transform="rotate(0,520,704)"/>
<polygon class="arrowhead" points="528,496 516,490.4 516,501.6" fill="black" transform="rotate(0,520,496)"/>
<polygon class="arrowhead" points="416,736 404,730.4 404,741.6" fill="black" transform="rotate(180,408,736)"/>
<polygon class="arrowhead" points="416,528 404,522.4 404,533.6" fill="black" transform="rotate(180,408,528)"/>
<polygon class="arrowhead" points="400,1136 388,1130.4 388,1141.6" fill="black" transform="rotate(0,392,1136)"/>
<polygon class="arrowhead" points="400,1072 388,1066.4 388,1077.6" fill="black" transform="rotate(0,392,1072)"/>
<polygon class="arrowhead" points="400,416 388,410.4 388,421.6" fill="black" transform="rotate(0,392,416)"/>
<polygon class="arrowhead" points="216,1136 204,1130.4 204,1141.6" fill="black" transform="rotate(180,208,1136)"/>
<polygon class="arrowhead" points="216,1040 204,1034.4 204,1045.6" fill="black" transform="rotate(180,208,1040)"/>
<polygon class="arrowhead" points="216,992 204,986.4 204,997.6" fill="black" transform="rotate(180,208,992)"/>
<polygon class="arrowhead" points="216,784 204,778.4 204,789.6" fill="black" transform="rotate(180,208,784)"/>
<polygon class="arrowhead" points="216,672 204,666.4 204,677.6" fill="black" transform="rotate(180,208,672)"/>
<polygon class="arrowhead" points="200,944 188,938.4 188,949.6" fill="black" transform="rotate(0,192,944)"/>
<polygon class="arrowhead" points="200,240 188,234.4 188,245.6" fill="black" transform="rotate(0,192,240)"/>
<polygon class="arrowhead" points="48,880 36,874.4 36,885.6" fill="black" transform="rotate(180,40,880)"/>
<polygon class="arrowhead" points="48,128 36,122.4 36,133.6" fill="black" transform="rotate(180,40,128)"/>
<g class="text">
<text x="404" y="52">Server</text>
<text x="512" y="52">Attestation</text>
<text x="52" y="68">Verifier</text>
<text x="204" y="68">Client</text>
<text x="496" y="68">Service</text>
<text x="68" y="116">POST</text>
<text x="136" y="116">/newSession</text>
<text x="56" y="148">201</text>
<text x="104" y="148">Created</text>
<text x="80" y="164">Location:</text>
<text x="156" y="164">/76839A9</text>
<text x="64" y="180">Body:</text>
<text x="96" y="180">{</text>
<text x="84" y="196">nonce,</text>
<text x="124" y="212">supp-media-types</text>
<text x="48" y="228">}</text>
<text x="32" y="292">TLS</text>
<text x="88" y="292">handshake</text>
<text x="256" y="324">ClientHello</text>
<text x="240" y="340">{...}</text>
<text x="288" y="356">evidence_request(</text>
<text x="256" y="372">nonce</text>
<text x="284" y="388">types(a,b,c)</text>
<text x="224" y="404">)</text>
<text x="456" y="436">attest_key(</text>
<text x="452" y="452">nonce,</text>
<text x="460" y="468">TIK-S-ID</text>
<text x="416" y="484">)</text>
<text x="444" y="516">CAB(KAT,</text>
<text x="500" y="516">PAT)</text>
<text x="256" y="548">ServerHello</text>
<text x="240" y="564">{...}</text>
<text x="288" y="580">EncryptedExtensions</text>
<text x="240" y="596">{...}</text>
<text x="288" y="612">evidence_request(</text>
<text x="264" y="628">type(a)</text>
<text x="224" y="644">)</text>
<text x="292" y="660">Certificate(KAT,PAT)</text>
<text x="472" y="692">sign(TIK-S-ID,hs)</text>
<text x="456" y="724">sig</text>
<text x="300" y="756">CertificateVerify(sig)</text>
<text x="244" y="772">Finished</text>
<text x="60" y="804">POST</text>
<text x="120" y="804">/76839A9E</text>
<text x="64" y="820">Body:</text>
<text x="96" y="820">{</text>
<text x="92" y="836">type(a),</text>
<text x="72" y="852">CAB</text>
<text x="48" y="868">}</text>
<text x="64" y="900">Body:</text>
<text x="96" y="900">{</text>
<text x="104" y="916">att-result:</text>
<text x="172" y="916">AR{}</text>
<text x="48" y="932">}</text>
<text x="276" y="980">verify</text>
<text x="324" y="980">AR{}</text>
<text x="276" y="1028">verify</text>
<text x="320" y="1028">sig</text>
<text x="292" y="1060">Finished</text>
<text x="280" y="1124">application</text>
<text x="348" y="1124">data</text>
</g>
</svg>
</artwork><artwork  type="ascii-art"><![CDATA[
                                             .------------------------.
.----------.        .--------.               | Server  |  Attestation |
| Verifier |        | Client |               |         |  Service     |
'--+-------'        '---+----'               '---+---------------+----'
   |                    |                        |               |
   |  POST /newSession  |                        |               |
   |<-------------------+                        |               |
   | 201 Created        |                        |               |
   | Location: /76839A9 |                        |               |
   | Body: {            |                        |               |
   |   nonce,           |                        |               |
   |   supp-media-types |                        |               |
   | }                  |                        |               |
   +------------------->|                        |               |
   |                    |                        |               |
.--+-----------.        |                        |               |
| TLS handshake |       |                        |               |
+--+------------+-------+------------------------+---------------+---.
|  |                    | ClientHello            |               |    |
|  |                    |  {...}                 |               |    |
|  |                    |  evidence_request(     |               |    |
|  |                    |    nonce,              |               |    |
|  |                    |    types(a,b,c)        |               |    |
|  |                    |  )                     |               |    |
|  |                    +----------------------->|               |    |
|  |                    |                        | attest_key(   |    |
|  |                    |                        |   nonce,      |    |
|  |                    |                        |   TIK-S-ID    |    |
|  |                    |                        | )             |    |
|  |                    |                        +-------------->|    |
|  |                    |                        | CAB(KAT, PAT) |    |
|  |                    |                        |<--------------+    |
|  |                    | ServerHello            |               |    |
|  |                    |  {...}                 |               |    |
|  |                    | EncryptedExtensions    |               |    |
|  |                    |  {...}                 |               |    |
|  |                    |  evidence_request(     |               |    |
|  |                    |    type(a)             |               |    |
|  |                    |  )                     |               |    |
|  |                    | Certificate(KAT,PAT)   |               |    |
|  |                    |<-----------------------+               |    |
|  |                    |                        |sign(TIK-S-ID,hs)   |
|  |                    |                        +-------------->|    |
|  |                    |                        |     sig       |    |
|  |                    |                        |<--------------+    |
|  |                    | CertificateVerify(sig) |               |    |
|  |                    | Finished               |               |    |
|  |                    |<-----------------------+               |    |
|  | POST /76839A9E     |                        |               |    |
|  | Body: {            |                        |               |    |
|  |   type(a),         |                        |               |    |
|  |   CAB              |                        |               |    |
|  | }                  |                        |               |    |
|  |<-------------------+                        |               |    |
|  | Body: {            |                        |               |    |
|  |   att-result: AR{} |                        |               |    |
|  | }                  |                        |               |    |
|  +------------------->|                        |               |    |
|  |                    +---.                    |               |    |
|  |                    |    | verify AR{}       |               |    |
|  |                    |<--'                    |               |    |
|  |                    +---.                    |               |    |
|  |                    |    | verify sig        |               |    |
|  |                    |<--'                    |               |    |
|  |                    |       Finished         |               |    |
|  |                    +----------------------->|               |    |
|  |                    |                        |               |    |
 '-+--------------------+------------------------+---------------+---'
                        |    application data    |
                        |<---------------------->|
                        |                        |
]]></artwork></artset></figure>

</section>
<section anchor="iot-device-onboarding"><name>IoT Device Onboarding</name>

<t>In this scenario, an IoT device is connected to a remote device management entity, which could be a cloud service provider or a network operator.
We assume that, initially, the remote device management entity does not trust the device.</t>

<t>The device management entity's responsibility is to guarantee that the device is running the intended software version, has not been tampered with, and is not being emulated or cloned.</t>

<t>The protocol flow is shown in <xref target="_figure-iot-example"/> where the client 
is the attester while the server is the relying party.</t>

<t>The flow starts with the client initiating a TLS exchange with the TLS
server operated by the cloud service provider. The client indicates
what evidence types it supports.</t>

<t>The server obtains a nonce from the verifier, in real-time or from a
reserved nonce range, and returns it to the client alongside the
selected evidence type. Since the evidence will be returned in the
Certificate message the server has to request mutual authentication
via the CertificateRequest message.</t>

<t>The client, when receiving the EncryptedExtension with the
evidence_proposal, will proceed by invoking a local API to request the
attestation.  The returned evidence binds the identity key (TIK-C) with
the workload and platform identity and security state, packaged into a
CAB.  The client then signs a transcript hash of the handshake context
and the client's Certificate message  with the (attested) identity key,
and sends the evidence together with the signature over to the server.</t>

<t>The server forwards the attestation evidence to the verifier, obtains 
the attestation result and checks that it is acceptable according to its 
local policy. The evidence verification combined with the verification of
the CertificateVerify signature provide confirmation that the presented
cryptographic identity is bound to the platform identity, and that the 
platform is trustworthy.</t>

<t>If successful, the server proceeds with the application layer protocol 
exchange. If, for some reason, the attestation result is not satisfactory
the TLS server will terminate the exchange.</t>

<figure title="Example Exchange with Client as Attester." anchor="_figure-iot-example"><artset><artwork  type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1152" width="576" viewBox="0 0 576 1152" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
<path d="M 8,32 L 8,80" fill="none" stroke="black"/>
<path d="M 8,112 L 8,1088" fill="none" stroke="black"/>
<path d="M 32,80 L 32,112" fill="none" stroke="black"/>
<path d="M 32,144 L 32,1088" fill="none" stroke="black"/>
<path d="M 136,40 L 136,72" fill="none" stroke="black"/>
<path d="M 136,128 L 136,144" fill="none" stroke="black"/>
<path d="M 168,80 L 168,664" fill="none" stroke="black"/>
<path d="M 168,680 L 168,1136" fill="none" stroke="black"/>
<path d="M 224,32 L 224,80" fill="none" stroke="black"/>
<path d="M 328,48 L 328,80" fill="none" stroke="black"/>
<path d="M 368,80 L 368,1136" fill="none" stroke="black"/>
<path d="M 400,48 L 400,80" fill="none" stroke="black"/>
<path d="M 440,368 L 440,376" fill="none" stroke="black"/>
<path d="M 480,48 L 480,80" fill="none" stroke="black"/>
<path d="M 528,80 L 528,1088" fill="none" stroke="black"/>
<path d="M 568,48 L 568,80" fill="none" stroke="black"/>
<path d="M 568,160 L 568,1072" fill="none" stroke="black"/>
<path d="M 8,32 L 224,32" fill="none" stroke="black"/>
<path d="M 328,48 L 400,48" fill="none" stroke="black"/>
<path d="M 480,48 L 568,48" fill="none" stroke="black"/>
<path d="M 8,80 L 224,80" fill="none" stroke="black"/>
<path d="M 328,80 L 400,80" fill="none" stroke="black"/>
<path d="M 480,80 L 568,80" fill="none" stroke="black"/>
<path d="M 8,112 L 120,112" fill="none" stroke="black"/>
<path d="M 8,144 L 552,144" fill="none" stroke="black"/>
<path d="M 168,256 L 360,256" fill="none" stroke="black"/>
<path d="M 368,304 L 520,304" fill="none" stroke="black"/>
<path d="M 376,416 L 528,416" fill="none" stroke="black"/>
<path d="M 176,544 L 368,544" fill="none" stroke="black"/>
<path d="M 40,592 L 168,592" fill="none" stroke="black"/>
<path d="M 32,640 L 160,640" fill="none" stroke="black"/>
<path d="M 168,656 L 360,656" fill="none" stroke="black"/>
<path d="M 40,688 L 168,688" fill="none" stroke="black"/>
<path d="M 32,720 L 160,720" fill="none" stroke="black"/>
<path d="M 168,736 L 360,736" fill="none" stroke="black"/>
<path d="M 368,848 L 520,848" fill="none" stroke="black"/>
<path d="M 376,912 L 528,912" fill="none" stroke="black"/>
<path d="M 368,928 L 392,928" fill="none" stroke="black"/>
<path d="M 376,960 L 392,960" fill="none" stroke="black"/>
<path d="M 368,976 L 392,976" fill="none" stroke="black"/>
<path d="M 376,1008 L 392,1008" fill="none" stroke="black"/>
<path d="M 8,1088 L 552,1088" fill="none" stroke="black"/>
<path d="M 176,1120 L 360,1120" fill="none" stroke="black"/>
<path d="M 120,112 C 128.83064,112 136,119.16936 136,128" fill="none" stroke="black"/>
<path d="M 552,144 C 560.83064,144 568,151.16936 568,160" fill="none" stroke="black"/>
<path d="M 392,928 C 400.83064,928 408,935.16936 408,944" fill="none" stroke="black"/>
<path d="M 392,960 C 400.83064,960 408,952.83064 408,944" fill="none" stroke="black"/>
<path d="M 392,976 C 400.83064,976 408,983.16936 408,992" fill="none" stroke="black"/>
<path d="M 392,1008 C 400.83064,1008 408,1000.83064 408,992" fill="none" stroke="black"/>
<path d="M 552,1088 C 560.83064,1088 568,1080.83064 568,1072" fill="none" stroke="black"/>
<polygon class="arrowhead" points="528,848 516,842.4 516,853.6" fill="black" transform="rotate(0,520,848)"/>
<polygon class="arrowhead" points="528,304 516,298.4 516,309.6" fill="black" transform="rotate(0,520,304)"/>
<polygon class="arrowhead" points="384,1008 372,1002.4 372,1013.6" fill="black" transform="rotate(180,376,1008)"/>
<polygon class="arrowhead" points="384,960 372,954.4 372,965.6" fill="black" transform="rotate(180,376,960)"/>
<polygon class="arrowhead" points="384,912 372,906.4 372,917.6" fill="black" transform="rotate(180,376,912)"/>
<polygon class="arrowhead" points="384,416 372,410.4 372,421.6" fill="black" transform="rotate(180,376,416)"/>
<polygon class="arrowhead" points="368,1120 356,1114.4 356,1125.6" fill="black" transform="rotate(0,360,1120)"/>
<polygon class="arrowhead" points="368,736 356,730.4 356,741.6" fill="black" transform="rotate(0,360,736)"/>
<polygon class="arrowhead" points="368,656 356,650.4 356,661.6" fill="black" transform="rotate(0,360,656)"/>
<polygon class="arrowhead" points="368,256 356,250.4 356,261.6" fill="black" transform="rotate(0,360,256)"/>
<polygon class="arrowhead" points="184,1120 172,1114.4 172,1125.6" fill="black" transform="rotate(180,176,1120)"/>
<polygon class="arrowhead" points="184,544 172,538.4 172,549.6" fill="black" transform="rotate(180,176,544)"/>
<path class="jump" d="M 168,680 C 174,680 174,664 168,664" fill="none" stroke="black"/><polygon class="arrowhead" points="168,720 156,714.4 156,725.6" fill="black" transform="rotate(0,160,720)"/>
<polygon class="arrowhead" points="168,640 156,634.4 156,645.6" fill="black" transform="rotate(0,160,640)"/>
<polygon class="arrowhead" points="48,688 36,682.4 36,693.6" fill="black" transform="rotate(180,40,688)"/>
<polygon class="arrowhead" points="48,592 36,586.4 36,597.6" fill="black" transform="rotate(180,40,592)"/>
<g class="text">
<text x="64" y="52">Attestation</text>
<text x="180" y="52">Client</text>
<text x="48" y="68">Service</text>
<text x="364" y="68">Server</text>
<text x="524" y="68">Verifier</text>
<text x="32" y="132">TLS</text>
<text x="88" y="132">handshake</text>
<text x="224" y="180">ClientHello</text>
<text x="208" y="196">{...}</text>
<text x="260" y="212">evidence_proposal(</text>
<text x="252" y="228">types(a,b,c)</text>
<text x="192" y="244">)</text>
<text x="224" y="292">ServerHello</text>
<text x="396" y="292">POST</text>
<text x="464" y="292">/newSession</text>
<text x="208" y="308">{...}</text>
<text x="392" y="324">201</text>
<text x="440" y="324">Created</text>
<text x="416" y="340">Location:</text>
<text x="484" y="340">/76839</text>
<text x="400" y="356">Body:</text>
<text x="432" y="356">{</text>
<text x="416" y="372">nonce</text>
<text x="256" y="388">EncryptedExtensions</text>
<text x="444" y="388">types(a,b,c)</text>
<text x="208" y="404">{...}</text>
<text x="384" y="404">}</text>
<text x="260" y="420">evidence_proposal(</text>
<text x="228" y="436">nonce,</text>
<text x="232" y="452">type(a)</text>
<text x="192" y="468">)</text>
<text x="252" y="484">CertificateRequest</text>
<text x="224" y="500">Certificate</text>
<text x="248" y="516">CertificateVerify</text>
<text x="96" y="532">attest_key(</text>
<text x="212" y="532">Finished</text>
<text x="92" y="548">nonce,</text>
<text x="100" y="564">TIK-C-ID</text>
<text x="56" y="580">)</text>
<text x="84" y="628">CAB(KAT,</text>
<text x="140" y="628">PAT)</text>
<text x="260" y="644">Certificate(KAT,PAT)</text>
<text x="100" y="676">sign(TIK-C-ID,hs</text>
<text x="96" y="708">sig</text>
<text x="268" y="708">CertificateVerify(sig)</text>
<text x="212" y="724">Finished</text>
<text x="396" y="772">POST</text>
<text x="456" y="772">/76839A9E</text>
<text x="400" y="788">Body:</text>
<text x="432" y="788">{</text>
<text x="428" y="804">type(a),</text>
<text x="408" y="820">CAB</text>
<text x="384" y="836">}</text>
<text x="400" y="868">Body:</text>
<text x="432" y="868">{</text>
<text x="432" y="884">att-result:</text>
<text x="500" y="884">AR{}</text>
<text x="384" y="900">}</text>
<text x="444" y="948">verify</text>
<text x="492" y="948">AR{}</text>
<text x="444" y="996">verify</text>
<text x="488" y="996">sig</text>
<text x="248" y="1108">application</text>
<text x="316" y="1108">data</text>
</g>
</svg>
</artwork><artwork  type="ascii-art"><![CDATA[
.--------------------------.
| Attestation   |  Client  |            .--------.         .----------.
| Service       |          |            | Server |         | Verifier |
'--+----------------+------'            '----+---'         '-----+----'
   |                |                        |                   |
.--+-----------.    |                        |                   |
| TLS handshake |   |                        |                   |
+--+------------+---+------------------------+-------------------+---.
|  |                |                        |                   |    |
|  |                | ClientHello            |                   |    |
|  |                |  {...}                 |                   |    |
|  |                |  evidence_proposal(    |                   |    |
|  |                |    types(a,b,c)        |                   |    |
|  |                |  )                     |                   |    |
|  |                +----------------------->|                   |    |
|  |                |                        |                   |    |
|  +                | ServerHello            | POST /newSession  |    |
|  |                |  {...}                 +------------------>|    |
|  |                |                        | 201 Created       |    |
|  |                |                        | Location: /76839  |    |
|  |                |                        | Body: {           |    |
|  |                |                        |   nonce,          |    |
|  |                | EncryptedExtensions    |   types(a,b,c)    |    |
|  |                |  {...}                 | }                 |    |
|  |                |  evidence_proposal(    |<------------------+    |
|  |                |    nonce,              |                   |    |
|  |                |    type(a)             |                   |    |
|  |                |  )                     |                   |    |
|  |                | CertificateRequest     |                   |    |
|  |                | Certificate            |                   |    |
|  |                | CertificateVerify      |                   |    |
|  |  attest_key(   | Finished               |                   |    |
|  |    nonce,      |<-----------------------+                   |    |
|  |    TIK-C-ID    |                        |                   |    |
|  |  )             |                        |                   |    |
|  |<---------------+                        |                   |    |
|  |                |                        |                   |    |
|  |  CAB(KAT, PAT) |                        |                   |    |
|  +--------------->| Certificate(KAT,PAT)   |                   |    |
|  |                +----------------------->|                   |    |
|  |sign(TIK-C-ID,hs)                        |                   |    |
|  |<---------------+                        |                   |    |
|  |      sig       | CertificateVerify(sig) |                   |    |
|  +--------------->| Finished               |                   |    |
|  |                +----------------------->|                   |    |
|  |                |                        |                   |    |
|  |                |                        | POST /76839A9E    |    |
|  |                |                        | Body: {           |    |
|  |                |                        |   type(a),        |    |
|  |                |                        |   CAB             |    |
|  |                |                        | }                 |    |
|  |                |                        +------------------>|    |
|  |                |                        | Body: {           |    |
|  |                |                        |  att-result: AR{} |    |
|  |                |                        | }                 |    |
|  |                |                        |<------------------+    |
|  |                |                        +---.               |    |
|  |                |                        |    | verify AR{}  |    |
|  |                |                        |<--'               |    |
|  |                |                        +---.               |    |
|  |                |                        |    | verify sig   |    |
|  |                |                        |<--'               |    |
|  |                |                        |                   |    |
|  |                |                        |                   |    |
|  |                |                        |                   |    |
|  |                |                        |                   |    |
'--+----------------+------------------------+-------------------+---'
                    |    application data    |
                    |<---------------------->|
                    |                        |
]]></artwork></artset></figure>

</section>
</section>
<section anchor="sec-cons"><name>Security Considerations</name>

<t>TBD.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="tls-extensions"><name>TLS Extensions</name>

<t>IANA is asked to allocate four new TLS extensions, evidence_request,
evidence_proposal, results_request, results_proposal, from the "TLS
ExtensionType Values" subregistry of the "Transport Layer Security (TLS)
Extensions" registry <xref target="TLS-Ext-Registry"/>.  These extensions are used in the
ClientHello and the EncryptedExtensions messages. The values carried in these
extensions are taken from TBD.</t>

</section>
<section anchor="tls-alerts"><name>TLS Alerts</name>

<t>IANA is requested to allocate a value in the "TLS Alerts"
subregistry of the "Transport Layer Security (TLS) Parameters" registry
<xref target="TLS-Param-Registry"/> and populate it with the following entries:</t>

<t><list style="symbols">
  <t>Value: TBD1</t>
  <t>Description: unsupported_evidence</t>
  <t>DTLS-OK: Y</t>
  <t>Reference: [This document]</t>
  <t>Comment:</t>
  <t>Value: TBD2</t>
  <t>Description: unsupported_verifiers</t>
  <t>DTLS-OK: Y</t>
  <t>Reference: [This document]</t>
  <t>Comment:</t>
</list></t>

</section>
<section anchor="tls-certificate-types"><name>TLS Certificate Types</name>

<t>IANA is requested to allocate a new value in the "TLS Certificate Types"
subregistry of the "Transport Layer Security (TLS) Extensions"
registry <xref target="TLS-Ext-Registry"/>, as follows:</t>

<t><list style="symbols">
  <t>Value: TBD2</t>
  <t>Description: Attestation</t>
  <t>Reference: [This document]</t>
</list></t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>


<reference anchor="I-D.ietf-rats-msg-wrap">
   <front>
      <title>RATS Conceptual Messages Wrapper (CMW)</title>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Ned Smith" initials="N." surname="Smith">
         <organization>Intel</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>Linaro</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <date day="27" month="February" year="2024"/>
      <abstract>
	 <t>   This document defines the RATS conceptual message wrapper (CMW)
   format, a type of encapsulation format that can be used for any RATS
   messages, such as Evidence, Attestation Results, Endorsements, and
   Reference Values.  Additionally, the document describes a collection
   type that enables the aggregation of one or more CMWs into a single
   message.

   This document also defines corresponding CBOR tag, JSON Web Tokens
   (JWT) and CBOR Web Tokens (CWT) claims, as well as an X.509
   extension.  These allow embedding the wrapped conceptual messages
   into CBOR-based protocols, web APIs, and PKIX protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-04"/>
   
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC8949">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
      <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="94"/>
  <seriesInfo name="RFC" value="8949"/>
  <seriesInfo name="DOI" value="10.17487/RFC8949"/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor="I-D.bft-rats-kat">
   <front>
      <title>An EAT-based Key Attestation Token</title>
      <author fullname="Mathias Brossard" initials="M." surname="Brossard">
         <organization>arm</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>Linaro</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <date day="4" month="March" year="2024"/>
      <abstract>
	 <t>   This document defines an evidence format for key attestation based on
   the Entity Attestation Token (EAT).

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the Remote ATtestation
   ProcedureS Working Group mailing list (rats@ietf.org), which is
   archived at https://mailarchive.ietf.org/arch/browse/rats/.

   Source for this draft and an issue tracker can be found at
   https://github.com/thomas-fossati/draft-kat.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-bft-rats-kat-03"/>
   
</reference>

<reference anchor="RFC9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>


<reference anchor="I-D.ietf-rats-eat">
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
         </author>
      <author fullname="Jeremy O&#x27;Donoghue" initials="J." surname="O&#x27;Donoghue">
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname="Carl Wallace" initials="C." surname="Wallace">
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day="15" month="January" year="2024"/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-25"/>
   
</reference>


<reference anchor="I-D.ietf-rats-ar4si">
   <front>
      <title>Attestation Results for Secure Interactions</title>
      <author fullname="Eric Voit" initials="E." surname="Voit">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
         <organization>MIT</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>Linaro</organization>
      </author>
      <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
         <organization>Intel</organization>
      </author>
      <date day="4" month="March" year="2024"/>
      <abstract>
	 <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-06"/>
   
</reference>


<reference anchor="I-D.ietf-teep-architecture">
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
      <author fullname="Mingliang Pei" initials="M." surname="Pei">
         <organization>Broadcom</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Dave Thaler" initials="D." surname="Thaler">
         <organization>Microsoft</organization>
      </author>
      <author fullname="Dave Wheeler" initials="D. M." surname="Wheeler">
         <organization>Amazon</organization>
      </author>
      <date day="24" month="October" year="2022"/>
      <abstract>
	 <t>A Trusted Execution Environment (TEE) is an environment that enforces the following: any code within the environment cannot be tampered with, and any data used by such code cannot be read or tampered with by any code outside the environment.  This architecture document discusses the motivation for designing and standardizing a protocol for managing the lifecycle of Trusted Applications running inside such a TEE.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-teep-architecture-19"/>
   
</reference>


<reference anchor="TPM1.2" target="https://trustedcomputinggroup.org/resource/tpm-main-specification/">
  <front>
    <title>TPM Main Specification Level 2 Version 1.2, Revision 116</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2011" month="March"/>
  </front>
</reference>
<reference anchor="TPM2.0" target="https://trustedcomputinggroup.org/resource/tpm-library-specification/">
  <front>
    <title>Trusted Platform Module Library Specification, Family "2.0", Level 00, Revision 01.59</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="November"/>
  </front>
</reference>


<reference anchor="TLS-Ext-Registry" target="https://www.iana.org/assignments/tls-extensiontype-values">
  <front>
    <title>Transport Layer Security (TLS) Extensions</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>

<reference anchor="TLS-Param-Registry" target="https://www.iana.org/assignments/tls-parameters">
  <front>
    <title>Transport Layer Security (TLS) Parameters</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>


<reference anchor="I-D.acme-device-attest">
   <front>
      <title>Automated Certificate Management Environment (ACME) Device Attestation Extension</title>
      <author fullname="Brandon Weeks" initials="B." surname="Weeks">
         <organization>Google</organization>
      </author>
      <date day="22" month="February" year="2024"/>
      <abstract>
	 <t>   This document specifies new identifiers and a challenge for the
   Automated Certificate Management Environment (ACME) protocol which
   allows validating the identity of a device using attestation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-acme-device-attest-02"/>
   
</reference>


<reference anchor="RA-TLS" target="https://arxiv.org/abs/1801.05863">
  <front>
    <title>Integrating Remote Attestation with Transport Layer Security</title>
    <author initials="T." surname="Knauth" fullname="Thomas Knauth">
      <organization></organization>
    </author>
    <author initials="M." surname="Steiner" fullname="Michael Steiner">
      <organization></organization>
    </author>
    <author initials="S." surname="Chakrabarti" fullname="Somnath Chakrabarti">
      <organization></organization>
    </author>
    <author initials="L." surname="Lei" fullname="Li Lei">
      <organization></organization>
    </author>
    <author initials="C." surname="Xing" fullname="Cedric Xing">
      <organization></organization>
    </author>
    <author initials="M." surname="Vij" fullname="Mona Vij">
      <organization></organization>
    </author>
    <date year="2018" month="January"/>
  </front>
</reference>
<reference anchor="DICE-Layering" target="https://trustedcomputinggroup.org/resource/dice-layering-architecture/">
  <front>
    <title>DICE Layering Architecture Version 1.00 Revision 0.19</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2020" month="July"/>
  </front>
</reference>


    </references>


<?line 1121?>

<section anchor="usage-variants"><name>Design Rationale: X.509 and Attestation Usage Variants</name>

<t>The inclusion of attestation results and evidence as part of the TLS
handshake offers the relying party information about the state of the
system and its cryptographic keys, but lacks the means to specify a stable
endpoint identifier. While it is possible to solve this problem by
including an identifier as part of the attestation result, some use cases
require the use of a public key infrastructure (PKI). It is therefore
important to consider the possible approaches for conveying X.509
certificates and attestation within a single handshake.</t>

<t>In general, the following combinations of X.509 and attestation usage are
possible:</t>

<t><list style="numbers">
  <t>X.509 certificates only: In this case no attestation is exchanged in the
 TLS handshake. Authentication relies on PKI alone, i.e. TLS with X.509
 certificates.</t>
  <t>X.509 certificates containing attestation extension: The X.509
 certificates in the Certificate message carry attestation as part of
 the X.509 certificate extensions. Several proposals exist that enable
 this functionality:
  <list style="symbols">
      <t>Custom X.509 extension:
      <list style="symbols">
          <t>Attester-issued certificates (e.g., RA-TLS <xref target="RA-TLS"/>): The
attester acts as a certification authority (CA) and includes the
attestation evidence within an X.509 extension.</t>
          <t>DICE defines extensions that include attestation information in
the "Embedded CA" certificates (See Section 8.1.1.1 of <xref target="DICE-Layering"/>).</t>
          <t>Third party CA-issued certificates (e.g., ACME Device Attestation
<xref target="I-D.acme-device-attest"/>): Remote attestation is performed between
the third party CA and the attester prior to certificate issuance,
after which the CA adds an extension indicating that the certificate
key has fulfilled some verification policy.</t>
        </list></t>
      <t>Explicit signalling via existing methods, e.g. using a policy OID in
the end-entity certificate.</t>
      <t>Implicit signalling, e.g. via the issuer name.</t>
    </list></t>
  <t>X.509 certificates alongside a PAT: This use case assumes that a keypair
 with a corresponding certificate already exists and that the owner
 wishes to continue using it. As a consequence, there is no
 cryptographic linkage between the certificate and the PAT. This
 approach is described in <xref target="pkix-attest"/>.</t>
  <t>X.509 certificates alongside the PAT and KAT: The addition of key
 attestation implies that the TLS identity key must have been generated
 and stored securely by the attested platform. Unlike in variant (3),
 the certificate, the KAT, and the PAT must be cryptographically linked.
 This variant is currently not addressed in this document.</t>
  <t>Combined PAT/KAT: With this variant the attestation token carries
 information pertaining to both platform and key. No X.509 certificate
 is transmitted during the handshake. This approach is currently not
 addressed in this document.</t>
  <t>PAT alongside KAT: This variant is similar to (5) with the exception
 that the key and the platform attestations are stored in separate
 tokens, cryptographically linked together. This approach is covered by
 this document in <xref target="attest-only"/>. A possible instantiation of the KAT
 is described in <xref target="I-D.bft-rats-kat"/>.</t>
</list></t>

</section>
<section anchor="binding-mech"><name>Cross-protocol Binding Mechanism</name>

<t>Note: This section describes a protocol-agnostic mechanism which is used in
the context of TLS within the body of the draft. The mechanism might, in
the future, be spun out into its own document.</t>

<t>One of the issues that must be addressed when using remote attestation as
an authentication mechanism is the binding to the outer protocol (i.e., the
protocol requiring authentication). For every instance of the combined
protocol, the remote attestation credentials must be verifiably linked to
the outer protocol. The main reason for this requirement is security: a
lack of binding can result in the attestation credentials being relayed.</t>

<t>If the attestation credentials can be enhanced freely and in a verifiable way,
the binding can be performed by inserting the relevant data as new claims. If
the ways of enhancing the attestation credentials are more restricted, ad-hoc
solutions can be devised which address the issue. For example, many roots of
trust only allow a small amount (32-64 bytes) of user-provided data which will
be included in the attestation token. If more data must be included, it must
therefore be compressed. In this case, the problem is compounded by the need to
also include a challenge value coming from the relying party. The verification
steps also become more complex, as the binding data must be returned from the
verifier and checked by the relying party.</t>

<t>However, regardless of how the binding and verification are performed,
similar but distinct approaches need to be taken for every protocol into
which remote attestation is embedded, as the type or semantics of the
binding data could differ. A more standardised way of tackling this issue
would therefore be beneficial. This appendix presents a solution to this
problem, in the context of attestation evidence.</t>

<section anchor="binding-mechanism"><name>Binding Mechanism</name>

<t>The core of the binding mechanism consists of a new token format - the
Attestation Channel Binder - that represents a set of binders as a CBOR
map. Binders are individual pieces of data with an unambiguous definition.
Each binder is a name/value pair, where the name must be an integer and the
value must be a byte string.</t>

<t>Each protocol using the Attestation Channel Binder to bind attestation
credentials must define its Attestation Channel Binder using CDDL. The only
mandated binder is the challenger nonce which must use the value 1 as a
name. Every other name/value pair must come with a text description of its
semantics. The byte strings forming the values of binders can be
size-restricted where this value is known.</t>

<t>Attestation Channel Binders are encoded in CBOR, following the CBOR core
deterministic encoding requirements (<xref section="4.2.1" sectionFormat="of" target="RFC8949"/>).</t>

<t>An example Attestation Channel Binder is shown below.</t>

<figure title="Format of a possible TLS Attestation Channel Binder." anchor="_figure-binder-format"><artwork><![CDATA[
attestation_channel_binder = {
  &(nonce: 1) => bstr .size (8..64)
  &(ik_pub_fingerprint: 2) => bstr .size 32
  &(session_key_binder: 3) => bstr .size 32
}
]]></artwork></figure>

</section>
<section anchor="usage"><name>Usage</name>

<t>When a Attestation Channel Binder is used to compress data to fit the space
afforded by an attestation scheme, the encoded binder must be hashed. Since
the relying party has access to all the data expected in the binder, the
binder itself need not be conveyed. How the hashing algorithm is chosen,
used, and conveyed must be defined per outer protocol. If the digest size
does not match the user data size mandated by the attestation scheme, the
digest is truncated or expanded appropriately.</t>

<t>The verifier must first hash the encoded token received from the relying
party and then compare the hashes. The challenge value included in the
binder can then be extracted and verified. If verification is successful,
binder correctness can also be assumed by the relying party, as
verification was done with the values it expected.</t>

</section>
</section>
<section anchor="history"><name>History</name>

<t>RFC EDITOR: PLEASE REMOVE THIS SECTION</t>

<section anchor="draft-fossati-tls-attestation-02"><name>draft-fossati-tls-attestation-02</name>

<t><list style="symbols">
  <t>Focus on the background check model</t>
  <t>Added examples</t>
  <t>Updated introduction</t>
  <t>Moved attestation format-specific content to related drafts.</t>
</list></t>

</section>
<section anchor="draft-fossati-tls-attestation-01"><name>draft-fossati-tls-attestation-01</name>

<t><list style="symbols">
  <t>Added details about TPM attestation</t>
</list></t>

</section>
<section anchor="draft-fossati-tls-attestation-00"><name>draft-fossati-tls-attestation-00</name>

<t><list style="symbols">
  <t>Initial version</t>
</list></t>

</section>
</section>
<section anchor="working-group-information"><name>Working Group Information</name>

<t>The discussion list for the IETF TLS working group is located at the e-mail
address <eref target="mailto:tls@ietf.org">tls@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at <eref target="https://www1.ietf.org/mailman/listinfo/tls">https://www1.ietf.org/mailman/listinfo/tls</eref></t>

<t>Archives of the list can be found at:
<eref target="https://www.ietf.org/mail-archive/web/tls/current/index.html">https://www.ietf.org/mail-archive/web/tls/current/index.html</eref></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

