<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-acme-rats-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="acme-rats">Automated Certificate Management Environment (ACME) rats Identifier and Challenge Type</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-acme-rats-00"/>
    <author fullname="Chunchi Peter Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <author fullname="Mike Ounsworth">
      <organization/>
      <address>
        <email>mike@ounsworth.ca</email>
      </address>
    </author>
    <author fullname="Michael Richardson">
      <organization>Sandelman Software Works Inc</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="December" day="12"/>
    <area>Security</area>
    <workgroup>Automated Certificate Management Environment</workgroup>
    <keyword>ACME</keyword>
    <keyword>RATS</keyword>
    <keyword>Zero Trust</keyword>
    <abstract>
      <?line 59?>

<t>This document describes an approach where an ACME Server can challenge an ACME Client to provide a Remote Attestation Evidence or Remote Attestation Result in any format supported by the Conceptual Message Wrapper.</t>
      <t>The ACME Server can optionally challenge the Client for specific claims that it wishes attestation for.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://liuchunchi.github.io/draft-liu-acme-rats/draft-liu-acme-rats.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-acme-rats/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Automated Certificate Management Environment Working Group mailing list (<eref target="mailto:acme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/acme/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/acme/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/liuchunchi/draft-liu-acme-rats"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>ACME <xref target="RFC8555"/> is a standard protocol for issuing and renewing certificates automatically.
When an ACME client needs a certificate, it connects to the ACME server, providing a proof of control of a desired identity. Upon success, it then receives a certificate with that identity in it.</t>
      <t>These identities become part of the certificate, usually a Fully Qualified Domain Name (FQDN) that goes into the Subject Alt Name (SAN) for a certificate.
Prior to ACME, the authorization process of obtaining a certificate from an operator of a (public) certification authority was non-standard and ad-hoc.
It ranged from sending faxes on company letterhead to answering an email sent to a well-known email address like <tt>hostmaster@example.com</tt>, evolving into a process where some randomized nonce could be placed in a particular place on the target web server.
The point of this process is to prove that the given DNS FQDN was controlled by the client system.</t>
      <t>ACME standardized the process, allowing for automation for certificate issuance.
It has been a massive success: increasing HTTPS usage from 27% in 2013 to over 80% in 2019 <xref target="letsencrypt"/>.</t>
      <t>While the process supports many kinds of identifiers: email addresses, DTN node IDs, and can create certificates for client use.
However, these combinations have not yet become as popular, in part because these types of certificates are usually located on much more general purpose systems such as laptops and computers used by people.</t>
      <t>The concern that Enterprises have with the use of client side certificates has been the trustworthiness of the client system itself.
Such systems have many more configurations, and are often considered harder to secure as a result.
While well managed mutual TLS (client and server authentication via PKIX certificate) has significant advantages over the more common login via username/passowrd,  if the private key associated with a client certificates is disclosed or lost, then the impact can be more significant.</t>
      <t>The use case envisioned here is that of an enterprise.  A Network Operations Center (NOC)
(which may be internal or an external contracted entity) will issue (client) certificates to devices that can prove via remote attestation that they are running an up-to-date operating system as well as the enterprise-required endpoint security software.</t>
      <t>This is a place where Remote Attestation can offer additional assurance <xref target="RFC9334"/>.
If the software on the client is properly designed, and is up to date, then it is easier to assure that the private key will be safe.</t>
      <t>This can be extended to Bring Your Own Device (BYOD) by having those devices provide an equivalent Attestation Result.</t>
      <t>In this document, we propose an approach where ACME Server MAY challenge the ACME Client to produce an Attestation Evidence or Attestation Result in any format that is supported by the RATS Conceptual Message Wrapper <xref target="I-D.ietf-rats-msg-wrap"/>, for instance, an EAT (entity attestation token).
The ACME Server then verifies the attestation result against an appraisal policy as required by by the requested certificate profile.</t>
      <t>ACME can presently offer certificates with multiple identities.
Typically, in a server certificate situation, each identity represents a unique FQDN that would be placed into the certificate as distinct Subject Alt Names (SAN).
For instance each of the names: example.com, www.example.com, www.example.net and marketing.example.com might be placed in a single certificate for a server that provides web content under those four names.</t>
      <t>This document defines a new identity type, <tt>trustworthy</tt> that the ACME client can ask for.
A new <tt>attestation-result-01</tt> challenge is defined as a new method that can be used to authorize this identity using a RATS Passport model.
The <tt>attestation-evidence-02</tt> challenge is also defined, enabling a background check mechanism.</t>
      <t>In this way, the Certification Authority (CA) or Registration Authority (RA) issues certificates only to devices that can provide an appropriate attestation result, indicating that the device from which the ACME request originates has passed the required security checks.</t>
      <t>Attested ACME requests can form an essential building block towards the continuous monitoring/validation requirement of Zero-Trust principle when coupled with other operational measures, such as issuing only short-lived certificates.</t>
      <t>For ease of denotion, we omit the "ACME" adjective from now on, where Server means ACME Server and Client means ACME Client.</t>
      <section anchor="attestation-results-only">
        <name>Attestation Results only</name>
        <t>This document currently only defines the a mechanism to carry Attestation Results from the ACME client to the ACME server.
It limits itself to the Passport model defined in <xref target="RFC9334"/>.</t>
        <t>This is done to simplify the combinations, but also because it is likely that the Evidence required to make a reasonable assessment includes potentially privacy violating claims.
This is particularly true when a device is a personal (BYOD) device; in that case the Verifier might not even be owned by the Enterprise,  but rather the device manufacturer.</t>
        <t>In order to make use of the background check that Evidence would need to be encrypted from the Attesting Environment to the Verifier, via the ACME Server -- the Relying Party.
Secondly, in order for the ACME Server to be able to securely communicate with an Enterprise located Verifier with that Evidence, then more complex trust relationships would need to be established.
Thirdly, the Enterprise Verifier system would then have to expose itself to the ACME Server, which may be located outside of the Enterprise.
The ACME Server, for resiliency and loading reasons may be a numerous and dynamic cluster of systems, and providing appropriate network access controls to enable this communication may be difficult.</t>
        <t>Instead, the use of the Passport model allows all Evidence to remain within an Enterprise,
and for Verifier operations to be more self-contained.</t>
      </section>
      <section anchor="related-work">
        <name>Related work</name>
        <t><xref target="CSRATT"/> define trustworthy claims about the physical storage location of a key pair's private key.
This mechanism only relates to how the private key is kept.
It does not provide any claim about the rest of the mechanisms around access to the key.
A key could well be stored in the most secure way imaginable, but in order to use the key some command mechanism must exist to invoke it.</t>
        <t>The mechanism created in this document allows certification authority to access the trustworthiness of the entire system.
That accessment goes well beyond how and where the private key is stored.
ACME uses Certificate Signing Requests, so there is no reason that <xref target="CSRATT"/> could not be combined with the mechanism described in this document.</t>
        <t><xref target="RATSPA"/> defines a summary of a local assessment of posture for managed systems and across various  layers.
The claims and mechanisms defined in <xref target="RATSPA"/> are a good basis for the assessment that will need to be done in order to satisfy the trustworthiness challenge detailed in this document.</t>
      </section>
    </section>
    <section anchor="extensions-trustworthy-identifier">
      <name>Extensions -- trustworthy identifier</name>
      <t>This is a new identifier type.</t>
      <dl>
        <dt>type (required, string):</dt>
        <dd>
          <t>The string "trusthworthy".</t>
        </dd>
        <dt>value (required, string):</dt>
        <dd>
          <t>The constant string "trustworthy"</t>
        </dd>
      </dl>
      <t>The following sections detail the changes.</t>
      <section anchor="step-1-neworder-request-object">
        <name>Step 1: newOrder Request Object</name>
        <t>During the certificate order creation step, the Client sends a /newOrder JWS request (Section 7.4 of <xref target="RFC8555"/>) whose payload contains an array of identifiers.</t>
        <t>The client adds the <tt>trustworthy</tt> identifier to the array.</t>
        <t>This MUST NOT be the only identifier in the array, as this identity type does not, on its own, provide enough authorization to issue a certificate.
In this example, a <tt>dns</tt> identity is chosen for the domain name <tt>client01.finance.example</tt>.</t>
        <t>An example extended newOrder JWS request:</t>
        <artwork><![CDATA[
  POST /acme/new-order HTTP/1.1
  Content-Type: application/json
  {
    "protected": base64url({
      "alg": "ES256",
    }),
    "payload": base64url({
      "identifiers": [
        { "type": "truthworthy", "value": "trustworthy" },
        { "type": "dns", "value": "client01.finance.example" },
      ],
    }),
    "signature": "H6ZXtGjTZyUnPeKn...wEA4TklBdh3e454g"
  }
]]></artwork>
      </section>
      <section anchor="step-2-order-object">
        <name>Step 2: Order Object</name>
        <t>As explained in <xref section="7.1.3" sectionFormat="comma" target="RFC8555"/>, the server returns an Order Object.</t>
        <t>An example extended Order Object that includes</t>
        <artwork><![CDATA[
  POST /acme/new-order HTTP/1.1
  ...

  HTTP/1.1 200 OK
  Content-Type: application/json
  {
    "status": "pending",

    "identifiers": [
      { "type": "trustworthy", "value": "trustworthy" },
      { "type": "dns",         "value": "0123456789abcdef" },
    ],

    "authorizations": [
      "https://example.com/acme/authz/PAniVnsZcis",
      "https://example.com/acme/authz/C1uq5Dr+x8GSEJTSKW5B",
    ],

    "finalize": "https://example.com/acme/order/T..fgo/finalize",
  }
]]></artwork>
        <t>Note that the URLs listed in the <tt>authorizations</tt> array are arbitrary URLs created by the ACME server.
The last component is a randomly created string created by the server.
For simplicity, the first URL is identical to the example given in <xref target="RFC8555"/>.</t>
      </section>
      <section anchor="step-3-authorization-object">
        <name>Step 3: Authorization Object</name>
        <t>The Server has created an Authorization Object for the trustworthy and dns identifiers.</t>
        <t>The client accesses each authorization object from the URLs given in the Order Object.
In this example, the <tt>PAniVnsZcis</tt> authorization relates to the <tt>dns</tt> identifier, and
it is not changed from <xref section="8" sectionFormat="comma" target="RFC8555"/>.</t>
        <t>The <tt>C1uq5Dr+x8GSEJTSKW5B</tt> authorization is a new authorization type, <tt>trustworthy</tt>, it is detailed in <xref target="trustworthyauthorization"/> and <xref target="evidenceauthorization"/>.</t>
        <t>Here is an example:</t>
        <artwork><![CDATA[
   GET https://example.com/acme/authz/C1uq5Dr+x8GSEJTSKW5B HTTP/1.1
   ..

   HTTP/1.1 200 OK
   Content-Type: application/json
   {
     "status": "pending",
     "expires": "2025-09-30T14:09:07.99Z",

     "identifier": {
       "type": "trustworthy",
       "value": "trustworthy"
     },

     "challenges": [
       {
         "type": "trustworthy",
         "status": "pending",
         "token": "yoW1RL2zPBzYEHBQ06Jy",
         "url": "https://example.com/acme/chall/prV_8235AD9d",
       }
     ],
   }
]]></artwork>
      </section>
      <section anchor="step-4-obtain-attestation-result">
        <name>Step 4: Obtain Attestation Result</name>
        <t>The client now uses the token <tt>yoW1RL2zPBzYEHBQ06Jy</tt> as a fresh nonce.
It produces fresh Evidence, and provides this to the Verifier.</t>
        <t>The details of this step are not in scope for this document.
As an example, it might use TPM-CHARRA <xref target="RFC9684"/>, or X, or Y (XXX: insert more options)</t>
        <t>The format result is described in <xref target="attestation-response"/> and <xref target="evidence-response"/>.
(An example from <xref target="I-D.ietf-rats-ar4si"/> would be good here)</t>
        <t>This result is sent as a POST to <tt>https://example.com/acme/chall/prV_8235AD9d</tt></t>
        <artwork><![CDATA[
   POST https://example.com/acme/chall/prV_8235AD9d HTTP/1.1
   ..

   HTTP/1.1 200 OK
   Content-Type: application/cmw+cbor

   yePAuQj5xXAnz87/7ItOkDTk5Y4syoW1RL2zPBzYEHBQ06JyUvZDYPYjeTqwlPszb9Grbxw0UAEFx5DxObV1
]]></artwork>
        <t>(EDIT: change to cwm+jws example)</t>
        <t>The Server decodes the provided CMW <xref target="I-D.ietf-rats-msg-wrap"/>.
The Attestation Results found within will be digitally signed by the Verifier.</t>
        <t>The Server MUST verify the signature.
The signature MUST be from a Verifier that the ACME Server has a trust anchor for.
The list of trust anchors that a Server will trust is an attribute of the ACME Account in use.
The details of how these trust anchors are configured is not in scope for this document.</t>
        <t>At this point, if the client were to retrieve the authorization object from step 3, it would observe (if everything was accepted, verified) that the status for this challenge would now be marked as valid.</t>
      </section>
      <section anchor="step-5-perform-other-challenges">
        <name>Step 5: Perform other challenges</name>
        <t>The client SHOULD now perform any other challenges that were listed in the Order Object from step 2.
ACME provides no ordering constraint on the challenges, so they could well have occured concurrently.</t>
      </section>
      <section anchor="step-6-finalize-order-retrieve-certificate">
        <name>Step 6: Finalize Order, retrieve certificate</name>
        <t>At this point, the process continues as described in <xref section="7.4" sectionFormat="comma" target="RFC8555"/>.
This means that the finalize action is used, which includes a CSR.
If all is well, it will result in a certificate being issued.</t>
      </section>
    </section>
    <section anchor="trustworthyauthorization">
      <name>ACME Extensions -- attestation-result-01 challenge type</name>
      <t>A <tt>attestation-result-01</tt> challenge type asks the Client to prove provide a fresh Attestation Result.
This section describes the challenge/response extensions and procedures to use them.</t>
      <section anchor="attestation-result-01-challenge">
        <name>attestation-result-01 Challenge</name>
        <t>The <tt>attestation-result-01</tt> Challenge works with Passport Model of RATS.</t>
        <t>The corresponding Challenge Object is:</t>
        <dl>
          <dt>type (required, string):</dt>
          <dd>
            <t>The string "attestation-result-01".</t>
          </dd>
          <dt>token (required, string):</dt>
          <dd>
            <t>A randomly created nonce provided by the server which MUST be included in the Attestation Results to provide freshness.</t>
          </dd>
          <dt>attestClaimsHint (optional, list of string)</dt>
          <dd>
            <t>If the Server requires attestation of specific claims or properties in order to issue the requested certificate profile, then it MAY list one or more types of claims from the newly-defined ACME Attest Claims Hints registry defined in <xref target="claimshints"/>.</t>
          </dd>
        </dl>
        <t>Once fresh Attestation Results have been obtained from an appropriate RATS Verifier, then this result is posted to the URL provided in the <tt>url</tt> attribute.</t>
      </section>
      <section anchor="attestation-response">
        <name>attestion-result-01 Response</name>
        <t>The data sent SHOULD be Attestation Results in the form of of a CMW <xref section="5.2" sectionFormat="comma" target="I-D.ietf-rats-msg-wrap"/> tagged JSON encoded Attestation Results for Secure Interactions (AR4SI) <xref target="I-D.ietf-rats-ar4si"/>.
The CM-type MUST include attestation-results, and MUST NOT include any other wrapped values.
Other formats are permitted by prior arrangement, however, they MUST use the CMW format so that they can be distinguished.</t>
      </section>
    </section>
    <section anchor="evidenceauthorization">
      <name>ACME Extensions -- attestation-evidence-01 challenge type</name>
      <t>A <tt>attestation-evidence-01</tt> challenge type asks the Client to send fresh Evidence to the Server.
The Server will use the RATS background model to connect to a Verifier, obtaining Attestation Results.</t>
      <section anchor="attestation-evidence-01-challenge">
        <name>attestation-evidence-01 Challenge</name>
        <t>The <tt>attestation-evidence-01</tt> Challenge works with Background Model of RATS.</t>
        <t>The corresponding Challenge Object is:</t>
        <dl>
          <dt>type (required, string):</dt>
          <dd>
            <t>The string "attestation-evidence-01".</t>
          </dd>
          <dt>token (required, string):</dt>
          <dd>
            <t>A randomly created nonce provided by the server which MUST be included in the Evidence to provide freshness.</t>
          </dd>
          <dt>verifierEncryptionCredential (optional, base64 encoded)</dt>
          <dd>
            <t>This mode is for cases where the evidence of a device contains specific identifiers that could be linkable to a person and therefore qualify as Personally Identifiable Information. In these cases, the Server MAY opt to pass the evidence encrypted to the Verifier so that it never needs to handle to decrypted PII. The verifierENcryptionCredential can be of any type that is compatible with JWE encryption.</t>
          </dd>
        </dl>
      </section>
      <section anchor="evidence-response">
        <name>attestion-evidence-01 Response</name>
        <t>Once fresh Evidence has been collected, then it is posted to the URL provided in the <tt>url</tt> attribute.</t>
        <t>The data sent SHOULD be Evidence in the form of of a CMW <xref section="5.2" sectionFormat="comma" target="I-D.ietf-rats-msg-wrap"/> tagged JSON encoded Evidence.
The CMW-type MUST include Evidence, and MUST NOT include any other wrapped values.
Other formats are permitted by prior arrangement, however, they MUST use the CMW format so that they can be distinguished.</t>
        <t>If a verifierEncryptionCredential was provided by the Server, then the Client MUST encrypt the evidence by placing the entire CMW as the payload of a JWE encrypted for the verifierEncryptionCredential.</t>
      </section>
    </section>
    <section anchor="claimshints">
      <name>ACME Attest Claims Hint Registry</name>
      <t>(EDIT: unclear if this is still important)</t>
      <t>In order to facilitate the Server requesting attestation of specific types claims or properties, we define a new registry of ACME Claims Hints. In order to preserve flexibility, the Claim Hints are intended to be generic in nature, allowing for the client to reply with any type of attestation result that contains the requested information.
As such, these values are not intended to map one-to-one with any specific remote attestation evidence or attestation result format, but instead they are to serve as a hint to the ACME Client about what type of attestation it needs to collect from the device. Ultimately, the CA's certificate policies will be the authority on what evidence or attestation results it will accept.</t>
      <t>The ACME Attest Claims Hint Registry is intended to help clients to collect evidence or attestation results that are most likely to be acceptable to the Server, but are not a guaranteed replacement for performing interoperability testing between a given attesting device and a given CA. Similarly, an ACME attestation hint may not map one-to-one with attestation functionality exposed by the underlying attesting device, so ACME clients might need to act as intermediaries mapping ACME hints to vendor-specific functionality on a per-hardware-vendor basis.</t>
      <t>See <xref target="iana-claimshints"/> for the initial contents of this new registry.</t>
    </section>
    <section anchor="example-use-cases">
      <name>Example use cases</name>
      <section anchor="conflicting-duties">
        <name>Conflicting duties</name>
        <t>(EDIT: This text might be stale)</t>
        <ol spacing="normal" type="1"><li>
            <t>Integration/compatibility difficulty: Integrating SOC and NOC requires plenty of customized, case-by-case developing work. Especially considering different system vendors, system versions, different data models and formats due to different client needs... Let alone possible updates.</t>
          </li>
          <li>
            <t>Conflict of duties: NOC people do not want SOC people to interfere with their daily work, and so do SOC people. Also, NOC people may have limited security knowledge, and SOC people vice versa. Where to draw the line and what is the best tool to help them collaborate is a question.</t>
          </li>
        </ol>
      </section>
      <section anchor="enterprise-wifi-access">
        <name>Enterprise WiFi Access</name>
        <t>In enterprise access cases, security administrators wish to check the security status of an accessing end device before it connects to the internal network.
Endpoint Detection and Response (EDR) softwares can check the security/trustworthiness statuses of the device and produce an Attestation Result (AR) if the check passes. ACME-RATS procedures can then be used to redeem a certificate using the AR.</t>
        <t>With that being said, a more specific use case is as follows: an enterprise employee visits multiple campuses, and connects to each one's WiFi. For example, an inspector visits many (tens of) power substations a day, connects to the local WiFi, download log data, proceed to the next and repeat the process.</t>
        <t>Current access solution include: 1. The inspector remembers the password for each WiFi, and conduct the 802.1X EAP password-based (PAP/CHAP/MS-CHAPv2) authentication. or 2. an enterprise MDM receives the passwords and usernames over application layer connection from the MDM server, and enter them on user's behalf. While Solution 1 obviously suffer from management burdens induced by massive number of password pairs, and password rotation requirements, the drawback of Solution 2 is more obsecure, which include:</t>
        <t>a. Bring Your Own Device (BYOD) situation and MDM is not available.
b. Password could risk leakage due to APP compromise, or during Internet transmission. Anyone with leaked password can access, without binding of trusted/usual devices.
c. The RADIUS Client/Access Point/Switch is not aware of the identity of the accessing device, therefore cannot enforce more fine-grained access policies.</t>
        <t>An ideal user story is:
1. When the inspector is at base (or whenever the Remote Attestation-based check is available), he get his device inspected and redeem a certificate using ACME-RATS.
2. When at substation, the inspector authenticate to the WiFi using EAP-TLS, where all the substations have the company root CA installed.
2*. Alternatively, the Step 2 can use EAP-repeater mode, where the RADIUS Client redirects the request back to the RADIUS Server for more advanced checks.</t>
      </section>
      <section anchor="byod-devices">
        <name>BYOD devices</name>
        <t>Another example is issuing S/MIME certificates to BYOD devices only if they can prove via attestation that they are registered to a corporate MDM and the user they are registered to matches the user for which a certificate has been requested.</t>
        <t>In this case, the Server might challenge the client to prove that it is properly-registered to the enterprise to the same user as the subject of the requested S/MIME certificate, and that the device is running the corporate-approved security agents.</t>
      </section>
      <section anchor="private-key-in-hardware">
        <name>Private key in hardware</name>
        <t>In some scenarios the CA might require that the private key corresponding to the certificate request is stored in cryptographic hardware and non-extractable. For example, the certificate profile for some types of administrative credentials may be required to be stored in a token or smartcard. Or the CA might be required to enforce that the private key is stored in a FIPS-certified HSM running in a configuration compliant with its FIPS certificate -- this is the case, for example, with CA/Browser Forum Code Signing certificates <xref target="CABF-CSBRs"/> which can be attested for example via <xref target="RATSKA"/>.</t>
        <t>It could also be possible that the requested certificate profile does not require the requested key to be hardware-backed, but that the CA will issue the certificate with extra assurance, for example an extra policy OID or a longer expiry period, if attestation of hardware can be provided.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The attestation-result-01 challenge (the Passport Model) is the mandatory to implement.
The encrypted-evidence-01 challenge (the background-check model) is optional.</t>
      <t>In all cases the Server has to be able to verify Attestation Results from the Verifier.
To do that it requires appropriate trust anchors.</t>
      <t>In the Passport model, Evidence -- which may contain personally identifiable information (PII)) -- is never seen by the ACME Server.
Additionally, there is no need for the Verifier to accept connections from ACME Server(s).
The Attester/Verifier relationship used in the Passport Model leverages a pre-existing relationship.
For instance if the Verifier is operated by the manufacturer of the Attester (or their designate), then this is the same relationship that would be used to obtain updated software/firmware.
In this case, the trust anchors may also be publically available, but the Server does not need any further relationship with the Verifier.</t>
      <t>In the background-check model, Evidence is sent from the Attester to the ACME Server.
The ACME Server then relays this Evidence to a Verifier.
The Evidence is encrypted so that the Server it never able to see any PII which might be included.
The choice of Verifier is more complex in the background-check model.
Not only does ACME Server have to have the correct trust anchors to verify the resulting Attestation Results, but the ACME Server will need some kind of business relationship with the Verifier in order for the Verifier to be willing to appraise Evidence.</t>
      <t>The <tt>trustworthy</tt> identifier and challenge/response is not an actual identifier.
It does not result in any specific contents to the certificate Subject or SubjectAltName.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="iana-claimshints">
        <name>ACME Attest Claims Hint Registry</name>
        <t>IANA is requested to open a new registry, XXXXXXXX</t>
        <t>Type: designated expert</t>
        <t>The registry has the following columns:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Hint: the string value to be placed within an ACME device-attest-02 or device-attest-03 challenge.</t>
          </li>
          <li>
            <t>Descryption: a descryption of the general type of attestation evidence or attestation result that the client is expected to produce.</t>
          </li>
        </ul>
        <t>The initial registry contents is shown in the table below.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim Hint</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">FIPS_mode</td>
              <td align="left">Attestation that the device is currently booted in FIPS mode.</td>
            </tr>
            <tr>
              <td align="left">OS_patch_level</td>
              <td align="left">Attestation to the version or patch level of the device's operating system.</td>
            </tr>
            <tr>
              <td align="left">sw_manifest</td>
              <td align="left">A manifest list of all software currently running on the device.</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Independent</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="11" month="December" year="2025"/>
            <abstract>
              <t>   The Conceptual Messages introduced by the RATS architecture (RFC
   9334) are protocol-agnostic data units that are conveyed between RATS
   roles during remote attestation procedures.  Conceptual Messages
   describe the meaning and function of such data units within RATS data
   flows without specifying a wire format, encoding, transport
   mechanism, or processing details.  The initial set of Conceptual
   Messages is defined in Section 8 of RFC 9334 and includes Evidence,
   Attestation Results, Endorsements, Reference Values, and Appraisal
   Policies.

   This document introduces the Conceptual Message Wrapper (CMW) that
   provides a common structure to encapsulate these messages.  It
   defines a dedicated CBOR tag, corresponding JSON Web Token (JWT) and
   CBOR Web Token (CWT) claims, and an X.509 extension.

   This allows CMWs to be used in CBOR-based protocols, web APIs using
   JWTs and CWTs, and PKIX artifacts like X.509 certificates.
   Additionally, the draft defines a media type and a CoAP content
   format to transport CMWs over protocols like HTTP, MIME, and CoAP.

   The goal is to improve the interoperability and flexibility of remote
   attestation protocols.  Introducing a shared message format such as
   CMW enables consistent support for different attestation message
   types, evolving message serialization formats without breaking
   compatibility, and avoiding the need to redefine how messages are
   handled within each protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-23"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="15" month="August" year="2025"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-09"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CSRATT">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="5" month="October" year="2025"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of RATS conceptual messages (see Section 8 of
   [RFC9334], such as Evidence, Endorsements and Attestation Results, in
   Certificate Signing Requests (CSRs), such as PKCS#10 or Certificate
   Request Message Format (CRMF) payloads.  This provides an elegant and
   automatable mechanism for transporting attestation data to a
   Certification Authority.

   Including Evidence, Endorsements and Attestation Results along with a
   CSR can help to improve the assessment of the security posture for
   the private key, and can help the Certification Authority to assess
   whether it satisfies the requested certificate profile.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-21"/>
        </reference>
        <reference anchor="RATSPA">
          <front>
            <title>Remote Posture Assessment for Systems, Containers, and Applications at Scale</title>
            <author fullname="Kathleen Moriarty" initials="K." surname="Moriarty">
              <organization>Transforming Information Security LLC</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
              <organization>Beyond Identity</organization>
            </author>
            <author fullname="A.J. Stein" initials="A. J." surname="Stein">
         </author>
            <author fullname="Chandra Nelogal" initials="C." surname="Nelogal">
              <organization>Dell Technologies</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document establishes an architectural pattern whereby a remote
   attestation could be issued for a complete set of benchmarks or
   controls that are defined and grouped by an external entity,
   eliminating the need to send over individual attestations for each
   item within a benchmark or control framework.  This document
   establishes a pattern to list sets of benchmarks and controls within
   CWT and JWT formats for use as an Entity Attestation Token (EAT).
   While the discussion below pertains mostly to TPM, other Roots of
   Trust such as TCG DICE, and non-TCG defined components will also be
   included.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-posture-assessment-03"/>
        </reference>
        <reference anchor="RATSKA">
          <front>
            <title>PKIX Evidence for Remote Attestation of Hardware Security Modules</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Jean-Pierre Fiset" initials="J." surname="Fiset">
              <organization>Crypto4A Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies a vendor-agnostic format for evidence
   produced and verified within a PKIX context.  The evidence produced
   this way includes claims collected about a cryptographic module and
   elements found within it such as cryptographic keys.

   One scenario envisaged is that the state information about the
   cryptographic module can be securely presented to a remote operator
   or auditor in a vendor-agnostic verifiable format.  A more complex
   scenario would be to submit this evidence to a Certification
   Authority to aid in determining whether the storage properties of
   this key meet the requirements of a given certificate profile.

   This specification also offers a format for requesting a
   cryptographic module to produce evidence tailored for expected use.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-pkix-key-attestation-02"/>
        </reference>
        <reference anchor="I-D.draft-bweeks-acme-device-attest-01">
          <front>
            <title>Automated Certificate Management Environment (ACME) Device Attestation Extension</title>
            <author fullname="Brandon Weeks" initials="B." surname="Weeks">
              <organization>Google</organization>
            </author>
            <date day="7" month="August" year="2022"/>
            <abstract>
              <t>   This document specifies new identifiers and a challenge for the
   Automated Certificate Management Environment (ACME) protocol which
   allows validating the identity of a device using attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bweeks-acme-device-attest-01"/>
        </reference>
        <reference anchor="letsencrypt" target="https://www.eff.org/deeplinks/2023/08/celebrating-ten-years-encrypting-web-lets-encrypt">
          <front>
            <title>Celebrating Ten Years of Encrypting the Web with Let’s Encrypt</title>
            <author>
              <organization>Electronic Frontier Foundation</organization>
            </author>
            <date year="2025" month="August" day="20"/>
          </front>
        </reference>
        <reference anchor="CABF-CSBRs" target="https://cabforum.org/working-groups/code-signing/documents/">
          <front>
            <title>Baseline Requirements for Code-Signing Certificates</title>
            <author>
              <organization>CA/BROWSER FORUM</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC9684">
          <front>
            <title>A YANG Data Model for Challenge-Response-Based Remote Attestation (CHARRA) Procedures Using Trusted Platform Modules (TPMs)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="M. Eckel" initials="M." surname="Eckel"/>
            <author fullname="S. Bhandari" initials="S." surname="Bhandari"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="B. Sulzen" initials="B." surname="Sulzen"/>
            <author fullname="L. Xia" initials="L." surname="Xia"/>
            <author fullname="T. Laffey" initials="T." surname="Laffey"/>
            <author fullname="G. C. Fedorkow" initials="G. C." surname="Fedorkow"/>
            <date month="December" year="2024"/>
            <abstract>
              <t>This document defines the YANG Remote Procedure Calls (RPCs) and configuration nodes that are required to retrieve attestation evidence about integrity measurements from a device, following the operational context defined in RFC 9683 "TPM-based Network Device Remote Integrity Verification". Complementary measurement logs originating from one or more Roots of Trust for Measurement (RTMs) are also provided by the YANG RPCs. The defined module requires the inclusion of the following in the device components of the composite device on which the YANG server is running: at least one Trusted Platform Module (TPM) of either version 1.2 or 2.0 as well as a corresponding TPM Software Stack (TSS), or an equivalent hardware implementation that includes the protected capabilities as provided by TPMs as well as a corresponding software stack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9684"/>
          <seriesInfo name="DOI" value="10.17487/RFC9684"/>
        </reference>
      </references>
    </references>
    <?line 457?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
