<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-frost-rats-eat-collection-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.10 -->
  <front>
    <title abbrev="EAT Collection">Entity Attestation Token (EAT) Collection Type</title>
    <seriesInfo name="Internet-Draft" value="draft-frost-rats-eat-collection-01"/>
    <author fullname="Simon Frost">
      <organization>Arm</organization>
      <address>
        <email>Simon.Frost@arm.com</email>
      </address>
    </author>
    <date year="2022" month="June" day="27"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT</keyword>
    <keyword>collection container</keyword>
    <abstract>
      <t>The default top-level definitions for an EAT <xref target="I-D.ietf-rats-eat"/> assume a hierarchy involving a leading signer within the Attester. Some token use cases do not match that model. This specification defines an extension to EAT allowing the top-level of the token to consist of a collection of otherwise defined tokens.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-frost-rats-eat-collection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
      </t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>An Attestation Token conforming to EAT <xref target="I-D.ietf-rats-eat"/> has a default top level definition for a token to be constructed principally as a claim set within a CBOR Web Token (CWT) <xref target="RFC8392"/> with the associated COSE envelope <xref target="RFC8152"/> providing at least integrity and authentication. An equivalent JSON encoding for a JWT <xref target="RFC7519"/> in a JWS envelope <xref target="RFC7515"/> is supported as an alternative at the top-level definition. The top level token can be augmented with related claims in a Detached Bundle (DEB).</t>
      <t>For the use case of transmitting a claim set through a secure channel, the top-level definition can be extended to use an Unprotected CWT Claim Set (UCCS) <xref target="I-D.ietf-rats-uccs"/>.</t>
      <t>This document outlines an additional top-level extension for which neither of the above top level definitions match exactly: the attestation token consists of a collection of objects, each with their own integrity and some internally defined relationship through which the integrity of the whole collection can be determined. i.e. there is no top-level signer for the set. The objects may all share the same logical hierarchy in a device or have a hierarchy which is internally defined within the object set.</t>
    </section>
    <section anchor="design-considerations-use-cases">
      <name>Design Considerations / Use Cases</name>
      <t>Take a device with an attestation system consisting of a platform claim set and a workload claim set, each controlled by different components and with an underlying hardware Root of Trust. The two claim sets are delivered together to make up the overall attestation token. Depending upon the implementation and deployment use case, the signing system can either be entirely centric to the platform RoT or can have separate signers for the two claim sets. In either case, a cryptographic binding is established between the two parts of the token.</t>
      <t>A specific manifestation of such a device is one incorporating the Arm Confidential Compute Architecture (CCA) attestation token <xref target="Arm-CCA"/>. In trying to prepare the attestation token using EAT, there were no issues constructing the claim sets or incorporating them into individual CWTs where appropriate. However, in trying to design an 'envelope structure' to convey the two parts as a single report it was found that maintaining EAT compatibility would require very different shaped compound tokens for different models, for example one based on a submod arrangement and another based on a DEB, though with different 'leading' objects. This would create extra code and explanation in areas where keeping things simple is desirable. There was an alternative approach considered, which stays close to existing thinking on EAT, which would be to create the wrapper from the UCCS EAT extension containing only submods for the respective components. This however stretches the current use case for UCCS beyond its existing description. The RATS WG approach of separating UCCS from the core EAT specification to be an extension also encourages proposing this further extension.</t>
      <t>To support the CCA use case, it is also relevant to consider current attestation technologies which are based on certificate chains (e.g. SPDM, DICE, several key attestation systems). Here also are multiple objects with their own integrity and an internally defined relationship. If attempting to move such a technology to the EAT world, the same challenges apply.</t>
    </section>
    <section anchor="token-collection">
      <name>Token Collection</name>
      <t>The proposed extension for the top-level definition is to add a 'Token Collection' type. The contents of the type are a map of CWTs (JWTs). The DEB top-level entry for EAT is included for completeness, and the UCCS extension can also be embraced, though the use cases for these have not been explored. The identification of collection members and the intra collection integrity mechanism is considered usage specific. A verifier will be expected to extract each of the members of the collection and check their validity both individually and as a set.</t>
      <t>A map was chosen rather than an unbounded array to give the opportunity to add identifying map tags to each entry. The interpretation of the tags will be usage specific, but may correspond to registered identities of specific token types. To assist a verifier correlate the expected contents a profile entry can be added as the 'profile-label' identity in the map.</t>
      <t>See <xref target="cddl"/> for a CDDL <xref target="RFC8610"/> description of the proposed extension.</t>
      <t>While most of the use cases for collections are for scenarios where there will be at least two entries in a collection, the CDDL allows for &gt;= 1 entries in a collection to allow for the scenario where only one entry is currently available even though the normal set is larger.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A verifier for an attestation token must apply a verification process for the full set of entries contained within the Token Collection.
This process will be custom to the relevant profile for the Token Collection and take into account any individual verification per entry and/or verification for the objects considered collectively, including the intra token integrity scheme.
As there is no overall signature for the Collection, protection against malicious modification must be contained within the entries.
It is expected that there exists a cryptographic binding between entries, this can for example be one to many or one to one in a (chain) series.
Depending upon the use case and associated threat model, the freshness of entries may need extra consideration.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>In the registry <xref target="IANA.cbor-tags"/>, IANA is requested to allocate the tag in <xref target="tbl-eat-collection"/> from the FCFS space, with the present document as the specification reference.</t>
      <table align="left" anchor="tbl-eat-collection">
        <name>EAT Collection</name>
        <thead>
          <tr>
            <th align="left">Tag</th>
            <th align="left">Data Item</th>
            <th align="left">Semantics</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD399</td>
            <td align="left">map</td>
            <td align="left">EAT Collection RFCthis</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <date day="20" month="May" year="2022"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a phone, IoT device, network equipment or such.  This claims set is
   used by a relying party, server or service to determine how much it
   wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.  To a large degree, all this document
   does is extend CWT and JWT.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-13"/>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-uccs">
          <front>
            <title>A CBOR Tag for Unprotected CWT Claims Sets</title>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jeremy O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Nancy Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="12" month="January" year="2022"/>
            <abstract>
              <t>   CBOR Web Token (CWT, RFC 8392) Claims Sets sometimes do not need the
   protection afforded by wrapping them into COSE, as is required for a
   true CWT.  This specification defines a CBOR tag for such unprotected
   CWT Claims Sets (UCCS) and discusses conditions for its proper use.


   // The present version (-01) has a few editorial improvements over
   // -00 and attempts to address points from Thomas Fossati's
   // 2021-03-16 review, for further discussion at IETF 111.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-02"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="Arm-CCA">
          <front>
            <title>Confidential Compute Architecture</title>
            <author>
              <organization>Arm Ltd</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="cddl">
      <name>CDDL</name>
      <sourcecode type="cddl"><![CDATA[
$$EAT-CBOR-Tagged-Token /= Tagged-Collection
$$EAT-CBOR-Untagged-Token /= TL-Collection

Tagged-Collection =  #6.TBD399(TL-Collection)

; Note that although the common use cases for collections are for at least two entries in a collection,
; the CDDL below allows for >= 1 entry to allow the scenario where only one entry is currently available even
; though the normal set is larger
TL-Collection = {
    ? eat-collection-identifier,
    + cwt-collection-entries // jwt-collection-entries // DEB-collection-entries
}

eat-collection-identifier = (
    profile-label => general-uri / general-oid
)

cwt-collection-entries = (
    collection-entry-label => CWT-Messages
)

jwt-collection-entries = (
    collection-entry-label => JWT-Messages
)

DEB-collection-entries = (
    collection-entry-label => DEB-Messages
)

collection-entry-label = JC<text, int>


]]></sourcecode>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thomas Fossati and Yogesh Deshpande provided insightful comments and review for this proposal.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
