<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lake-ra-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.26.0 -->
  <front>
    <title abbrev="RA-EDHOC">Remote attestation over EDHOC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lake-ra-00"/>
    <author initials="Y." surname="Song" fullname="Yuxuan Song">
      <organization>Inria</organization>
      <address>
        <email>yuxuan.song@inria.fr</email>
      </address>
    </author>
    <date year="2025" month="February" day="11"/>
    <area>Security</area>
    <workgroup>Lightweight Authenticated Key Exchange</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 48?>

<t>This document specifies how to perform remote attestation as part of the lightweight authenticated Diffie-Hellman key exchange protocol EDHOC (Ephemeral Diffie-Hellman Over COSE), based on the Remote ATtestation procedureS (RATS) architecture.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://lake-wg.github.io/ra/draft-ietf-lake-ra.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lake-ra/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Lightweight Authenticated Key Exchange Working Group mailing list (<eref target="mailto:lake@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/lake/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lake-wg/ra"/>.</t>
    </note>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <!--Discuss remote attestation and mention some use cases.-->
<t>Remote attestation is a security process which verifies and confirms the integrity and trustworthiness of a remote device or system in the network.
This process helps establish a level of trust in the remote system before allowing the device to e.g. join the network or get access to some sensitive information and resources.
The use cases that require remote attestation include secure boot and firmware management, cloud computing, network access control, etc.</t>
      <!--Summarize RATS architecture {{RFC9334}} and main roles.-->
<t>The IETF working group Remote ATtestation procedureS (RATS) has defined an architecture <xref target="RFC9334"/> for remote attestation.
The three main roles in the RATS architecture are the Attester, the Verifier and the Relying Party.
The Attester generates the evidence concerning its identity and integrity, which must be appraised by the Verifier for its validity.
Then, the Verifier produces the attestation result, which is consequently used by the Relying Party for the purposes of reliably applying application-specific actions.</t>
      <!--Discuss the two RATS models and say that this specification supports both models.-->
<t>One type of interaction model defined in the RATS architecture is called the background-check model.
It resembles the procedure of how employers perform background checks to determine the prospective employee's trustworthiness, by contacting the respective organization that issues a report.
In this case, the employer acts as the Relying Party, the employee acts as the Attester and the organization acts as the Verifier.
The Attester conveys evidence directly to the Relying Party and the Relying Party forwards the evidence to the Verifier for appraisal.
Once the attestation result is computed by the Verifier, it is sent back to the Relying Party to decide what action to take based on the attestation result.
Another model is called passport model, where the Attester communicates directly with the Verifier.
The Attester presents the evidence to the Verifier and gets an attestation result from the Verifier.
Then the Attester conveys the attestation result to the Relying Party.
This specification employs both the RATS background-check model and the passport model.</t>
      <t>This document specifies the protocol between the Attester and the Relying Party.
The details of the protocol between the Relying Party and the Verifier in the background-check model, and the protocol between the Attester and the Verifier in the passport model are out of the scope.
This communication may be secured through protocols such as EDHOC, TLS or other security protocols that support the secure transmission to and from the Verifier.</t>
      <!--Discuss EAT-->
<t>One way of conveying attestation evidence or the attestation result is the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>.
It provides an attested claims set which can be used to determine a level of trustworthiness.
This specification relies on the EAT as the format for attestation evidence and the attestation result.</t>
      <!--Summarize EDHOC {{RFC9528}}. Mention EAD fields of EDHOC.-->
<t>Ephemeral Diffie-Hellman over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol for highly constrained networks.
In EDHOC, the two parties involved in the key exchange are referred to as the Initiator (I) and the Responder (R).
EDHOC supports the transport of external authorization data, through the dedicated EAD fields.
This specification delivers EAT through EDHOC.
Specifically, EAT is transported as an EAD item.
This specification also defines new EAD items needed to perform remote attesation over EDHOC in <xref target="ead-bg"/> and <xref target="ead-pp"/>.</t>
      <!--Discuss implementation aspects such as the internal attestation service running on the Attester.
Root of trust. Separation between secure and non-secure worlds.-->
<t>For the generation of evidence, the Attester incorporates an internal attestation service, including a specific trusted element known as the "root of trust".
Root of trust serves as the starting point for establishing and validating the trustworthiness appraisals of other components on the system.
The measurements signed by the attestation service are referred to as the Evidence.
The signing is requested through an attestation API.
How the components are separated between the secure and non-secure worlds on a device is out of scope of this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The reader is assumed to be familiar with the terms and concepts defined in EDHOC <xref target="RFC9528"/> and RATS architecture <xref target="RFC9334"/>.</t>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>This specification describes how to perform remote attestation over the EDHOC protocol, following the RATS architecture.
EDHOC provides the benefit of minimal message overhead and reduced round trips for a lightweight authentication.
More importantly, by integrating remote attestation with EDHOC, attestation can be run in parallel with authentication, improving the efficiency and maintaining lightweight properties.</t>
      <t>Remote attestation protocol elements are carried within EDHOC's External Authorization Data (EAD) fields.
EDHOC <xref target="RFC9528"/> supports one or more EAD items in each EAD field.</t>
      <t>In <xref target="attestation-dimensions"/>, this document defines three independent dimensions for performing remote attestation over EDHOC:</t>
      <ol spacing="normal" type="1"><li>
          <t>Target (see <xref target="targets"/>) defining the entity that undergoes the attestation process (IoT device or network service).</t>
        </li>
        <li>
          <t>Model (see <xref target="models"/>) defining the attestation model in use based on the RATS architecture (background-check model or passport model).</t>
        </li>
        <li>
          <t>Message Flow (see <xref target="flow"/>) defining the EDHOC message flow in use (forward message flow or reverse message flow).</t>
        </li>
      </ol>
      <t>This document specifies the cases that are suited for constrained IoT environments.</t>
      <t>EDITOR NOTE: add an overview figure</t>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <t>In background-check model, one assumption is that the Verifier outputs a fresh nonce and that same nonce is passed on to the EDHOC session.
The Verifier is assumed to know how to verify multiple formats of the evidence type.
This specification assumes that the Relying Party also has knowledge about the Attester, so it can narrow down the evidence type selection and send to the Attester only one format of the evidence type.
The Attester should have an explicit relation with the Verifier, such as from device manufacturing, so that the Verifier can evaluate the Evidence that is produced by the Attester.</t>
      <t>In the passport model, the credential identity of the Verifier is assumed to be stored at the Attester and the Relying Party, which means the Verifier is trusted by the Attester and the Relying Party to obtain the attestation result.</t>
      <t>EDITOR NOTE: add attestation public key stored in Verifier</t>
    </section>
    <section anchor="attestation-dimensions">
      <name>Remote Attestation in EDHOC</name>
      <t>This section specifies three independent dimensions that characterize the remote attestation process over EDHOC.</t>
      <section anchor="targets">
        <name>Target</name>
        <t>Defines the entity that undergoes the attestation process.</t>
        <section anchor="iot-device-attestation-iot">
          <name>IoT Device Attestation (IoT)</name>
          <t>The IoT device acts as the Attester.</t>
        </section>
        <section anchor="network-service-attestation-net">
          <name>Network Service Attestation (Net)</name>
          <t>The network service acts as the Attester.</t>
          <t>Unlike IoT devices, network services typically have more computational power and capabilities, enabling them to handle complex attestation processes when more demanding tasks are required of the Attester.</t>
        </section>
      </section>
      <section anchor="models">
        <name>Model</name>
        <t>Defines the attestation models based on RATS architecture.
This specification supports both the RATS background-check model (see <xref target="bg"/>) and the passport model (see <xref target="pp"/>).
The corresponding EAD items for background-check model and the passport model are independent of each other.
The EAD items are specified in <xref target="ead-bg"/> for the background-check model and in <xref target="ead-pp"/> for the passport model.</t>
        <section anchor="bg">
          <name>Background-check Model (BG)</name>
          <t>In the background-check model, the Attester sends the evidence to the Relying Party.
The Relying Party transfers the evidence to the Verifier and gets back the attestation result from the Verifier.</t>
          <t>An EDHOC session is established between the Attester and the Relying Party.
A negotiation of the evidence type is required before the Attester sends the evidence.
All three parties must agree on a selected evidence type.</t>
          <t>The Attester first sends a list of the proposed evidence types to the Relying Party.
The list is formatted as an Attestation proposal in an EDHOC EAD item.
The Relying Party relays the list to the Verifier and receives at least one supported evidence type from the Verifier in return.
If the Relying Party receives more than one evidence type, a single evidence type should be selected by the Relying Party based on its knowledge of the Attester.
The Relying Party then sends it back within the Attestation request to the Attester.</t>
          <t>A nonce, at least 8-bytes long <xref target="I-D.ietf-rats-eat"/>), guarantees the freshness of the attestation session.
The nonce is generated by the Verifier and sent to the Relying Party.
The Relying Party puts the nonce and the selected evidence type together in a tuple to generate an Attestation request.</t>
          <t>Once the Attester receives the Attestation request, it can call its attestation service to generate the evidence, with the nonce value as one of the inputs.</t>
          <section anchor="ead-bg">
            <name>External Authorization Data (EAD) Items for background-check model</name>
            <t>EAD items that are used for the background-check model are defined in this section.</t>
            <section anchor="attestation-proposal">
              <name>Attestation_proposal</name>
              <t>To propose a list of provided evidence types in background-check model, the Attester transports the Proposed_EvidenceType object.
It signals to the Relying Party the proposal to do remote attestation, as well as which types of the attestation claims the Attester supports.
The Proposed_EvidenceType is encoded in CBOR in the form of a sequence.</t>
              <t>The EAD item for an attestation proposal is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD1</t>
                </li>
                <li>
                  <t>ead_value = Attestation_proposal, which is a CBOR byte string:</t>
                </li>
              </ul>
              <artwork><![CDATA[
Attestation_proposal = bstr .cbor Proposed_EvidenceType

Proposed_EvidenceType = [ + content-format ]

content-format = uint
]]></artwork>
              <t>where</t>
              <ul spacing="normal">
                <li>
                  <t>Proposed_EvidenceType is an array that contains all the supported evidence types by the Attester.</t>
                </li>
                <li>
                  <t>There <bcp14>MUST</bcp14> be at least one item in the array.</t>
                </li>
                <li>
                  <t>content-format is an indicator of the format type (e.g., application/eat+cwt with an appropriate eat_profile parameter set), from <xref target="IANA-CoAP-Content-Formats"/>.</t>
                </li>
              </ul>
              <t>The sign of ead_label TBD1 <bcp14>MUST</bcp14> be negative to indicate that the EAD item is critical.
If the receiver cannot recognize the critical EAD item, or cannot process the information in the critical EAD item, then the receiver <bcp14>MUST</bcp14> send an EDHOC error message back as defined in <xref section="6" sectionFormat="of" target="RFC9528"/>.</t>
            </section>
            <section anchor="attestation-request">
              <name>Attestation_request</name>
              <t>As a response to the attestation proposal, the Relying Party signals to the Attester the supported and requested evidence type.
In case none of the evidence types is supported, the Relying Party rejects the first message_1 with an error indicating support for another evidence type.</t>
              <t>The EAD item for an attestation request is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD1</t>
                </li>
                <li>
                  <t>ead_value = Attestation_request, which is a CBOR byte string:</t>
                </li>
              </ul>
              <artwork><![CDATA[
Attestation_request = bstr .cbor Selected_EvidenceType

Selected_EvidenceType = (
  content-format: uint,
  nonce: bstr .size 8..64
)
]]></artwork>
              <t>where</t>
              <ul spacing="normal">
                <li>
                  <t>content-format is the selected evidence type by the Relying Party and supported by the Verifier.</t>
                </li>
                <li>
                  <t>nonce is generated by the Verifier and forwarded by the Relying Party.</t>
                </li>
              </ul>
              <t>The sign of ead_label TBD2 <bcp14>MUST</bcp14> be negative to indicate that the EAD item is critical.
If the receiver cannot recognize the critical EAD item, or cannot process the information in the critical EAD item, then the receiver <bcp14>MUST</bcp14> send an EDHOC error message back as defined in <xref section="6" sectionFormat="of" target="RFC9528"/>.</t>
            </section>
            <section anchor="evidence">
              <name>Evidence</name>
              <t>As a response to the attestation request, the Attester calls its local attestation service to generate and return the serialized EAT <xref target="I-D.ietf-rats-eat"/> as Evidence.</t>
              <t>The EAD item is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD1</t>
                </li>
                <li>
                  <t>ead_value is a serialized EAT.</t>
                </li>
              </ul>
              <t>EAT is specified in <xref target="I-D.ietf-rats-eat"/>.</t>
            </section>
            <section anchor="trigger-bg">
              <name>trigger_bg</name>
              <t>The EAD item trigger_bg is used when the sender triggers the receiver to start a remote attestation in the background-check model.
The receiver <bcp14>MUST</bcp14> reply with an EAD item corresponding to the background-check model.
The ead_value can be empty, as the ead_label serves as the trigger.</t>
              <t>The EAD item is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD2</t>
                </li>
                <li>
                  <t>ead_value = null</t>
                </li>
              </ul>
            </section>
          </section>
        </section>
        <section anchor="pp">
          <name>Passport Model (PP)</name>
          <t>In the passport model, the Attester sends the evidence to the Verifier.
After the Attester receives the attestation result from the Verifier, the Attester sends the attestation result to the Relying Party.</t>
          <t>An EDHOC session is established between the Attester and the Relying Party.
The Attester and the Relying Party should decide from which Verifier the Attester obtains the attestation result and transfers it to the Relying Party.
The Attester first sends a list of the Verifier identities that it can get the attestation result.
The Relying Party selects one trusted Verifier identity and sends it back as a Result request.</t>
          <t>Regarding the freshness in passport model, the Attester could either establish a real-time connection with the selected Verifier, or use a pre-stored attestation result from the selected Verifier.
If the attestation result is not obtained via a real-time connection, it should include a time stamp and/or expiry time to indicate its validity.
Time synchronization is out of scope of this specification.</t>
          <t>Once the Attester obtains the attestation result from the selected Verifier, it sends the attestation result to the Relying Party.</t>
          <section anchor="ead-pp">
            <name>External Authorization Data (EAD) Items for passport model</name>
            <t>EAD items that are used for the passport model are defined in this section.</t>
            <section anchor="result-proposal">
              <name>Result_proposal</name>
              <t>An attestation result proposal contains the identification of the credentials of the Verifiers to indicate Verifiers' indentities.
The identification of credentials relies on COSE header parameters <xref target="IANA-COSE-Header-Parameters"/>, with a header label and credential value.</t>
              <t>The EAD item for the attestation result proposal is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD3</t>
                </li>
                <li>
                  <t>ead_value = Result_proposal, which is a CBOR byte string:</t>
                </li>
              </ul>
              <artwork><![CDATA[
Result_proposal = bstr .cbor Proposed_VerifierIdentity
Proposed_VerifierIdentity = [ + VerifierIdentity ]

VerifierIdentity = {
  label => values
}
]]></artwork>
              <t>where</t>
              <ul spacing="normal">
                <li>
                  <t>Proposed_VerifierIdentity is defined as a list of one or more VerifierIdentity elements.</t>
                </li>
                <li>
                  <t>Each VerifierIdentity within the list is a map defined in <xref target="IANA-COSE-Header-Parameters"/> that:
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>label = int / tstr</t>
                    </li>
                    <li>
                      <t>values = any</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </section>
            <section anchor="result-request">
              <name>Result_request</name>
              <t>As a response to the attestation result proposal, the Relying Party signals to the Attester the trusted Verifier.
In case none of the Verifiers can be trusted by the Relying Party, the session is aborted.
Relying Party generates a nonce to ensure the freshness of the attestation result from the Verifier.</t>
              <t>The EAD item for an attestation result request is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD3</t>
                </li>
                <li>
                  <t>ead_value = Result_request, which is a CBOR byte string:</t>
                </li>
              </ul>
              <artwork><![CDATA[
Result_request = bstr .cbor Request_structure

Request_structure = {
  selected_verifier: VerfierIdentity
}
]]></artwork>
            </section>
            <section anchor="result">
              <name>Result</name>
              <t>The attestation result is generated and signed by the Verifier as a serialized EAT <xref target="I-D.ietf-rats-eat"/>.
The Relying Party can decide what action to take with regards to the Attester based on the information elements in attetation result.</t>
              <t>The EAD item is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD3</t>
                </li>
                <li>
                  <t>ead_value is a serialized EAT.</t>
                </li>
              </ul>
            </section>
            <section anchor="trigger-pp">
              <name>trigger_pp</name>
              <t>The EAD item trigger_pp is used when the sender triggers the receiver to start a remote attestation in the passport model.
The receiver <bcp14>MUST</bcp14> reply with an EAD item correspondign to the passport model.
The ead_value can be empty, as the ead_label serves as the trigger.</t>
              <t>The EAD item is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD4</t>
                </li>
                <li>
                  <t>ead_value = null</t>
                </li>
              </ul>
            </section>
          </section>
        </section>
      </section>
      <section anchor="flow">
        <name>EDHOC Message Flow</name>
        <t>The EDHOC protocol defines two possible message flows, namely the EDHOC forward message flow and the EDHOC reverse message flow (see <xref section="A.2.2" sectionFormat="of" target="RFC9528"/>).
In this specification, both flows can be used to perform remote attestation.</t>
        <section anchor="edhoc-forward-message-flow-fwd">
          <name>EDHOC Forward Message Flow (Fwd)</name>
          <t>In forward message flow, EDHOC may run with the Initiator as a CoAP/HTTP client.
Remote attestation over EDHOC starts with a POST requests to the Uri-Path: "/.well-known/lake-ra".</t>
        </section>
        <section anchor="edhoc-reverse-message-flow-rev">
          <name>EDHOC Reverse Message Flow (Rev)</name>
          <t>In the reverse message flow, the CoAP/HTTP client is the Responder and the server is the Initiator.
A new EDHOC session begins with an empty POST request to the server's resource for EDHOC.</t>
        </section>
      </section>
    </section>
    <section anchor="attestation-combinations">
      <name>Instantiation of Remote Attestation Protocol</name>
      <t>We use the format (Target, Model, Message Flow) to denote instantiations.
For example, (IoT, BG, Fwd) represents IoT device attestation using the background-check model with forward EDHOC message flow.</t>
      <t>Although there are 8 cases (IoT/Net, BG/PP, Fwd/Rev), this document specifies the most relevant instantiations for constrained IoT environments.</t>
      <section anchor="iot-bg-fwd-iot-device-attestation">
        <name>(IoT, BG, Fwd): IoT Device Attestation</name>
        <t>A common use case for (IoT, BG, Fwd) is to attest an IoT device to a network server.
For example, doing remote attestation to verify that the latest version of firmware is running on the IoT device before the network server allows it to join the network (see <xref target="firmware"/>).</t>
        <t>An overview of doing IoT device attestation in background-check model and EDHOC forward message flow is established in <xref target="fig-iot-bg-fwd"/>.
EDHOC Initiator plays the role of the RATS Attester (A).
EDHOC Responder plays the role of the RATS Relying Party (RP).
The Attester and the Relying Party communicate by transporting messages within EDHOC's External Authorization Data (EAD) fields.
An external entity, out of scope of this specification, plays the role of the RATS Verifier (V).
The EAD items specific to the background-check model are defined in <xref target="ead-bg"/>.</t>
        <t>The Attester starts the attestation by sending an Attestation proposal in EDHOC message_1.
The Relying Party generates EAD_2 with the received evidence type and nonce from the Verifier, and sends it to the Attester.
The Attester sends the Evidence to the Relying Party in EAD_3.
The Verifier evaluates the Evidence and sends the Attestation result to the Relying Party.</t>
        <figure anchor="fig-iot-bg-fwd">
          <name>Overview of IoT device attestation in background-check model and EDHOC forward message flow. EDHOC is used between A and RP.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="528" width="616" viewBox="0 0 616 528" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,496" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,128" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,128" fill="none" stroke="black"/>
                <path d="M 344,128 L 344,496" fill="none" stroke="black"/>
                <path d="M 416,32 L 416,128" fill="none" stroke="black"/>
                <path d="M 520,96 L 520,128" fill="none" stroke="black"/>
                <path d="M 568,128 L 568,496" fill="none" stroke="black"/>
                <path d="M 608,96 L 608,128" fill="none" stroke="black"/>
                <path d="M 8,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 272,32 L 416,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 272,64 L 416,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 272,96 L 416,96" fill="none" stroke="black"/>
                <path d="M 520,96 L 608,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 152,128" fill="none" stroke="black"/>
                <path d="M 272,128 L 416,128" fill="none" stroke="black"/>
                <path d="M 520,128 L 608,128" fill="none" stroke="black"/>
                <path d="M 80,176 L 336,176" fill="none" stroke="black"/>
                <path d="M 344,224 L 560,224" fill="none" stroke="black"/>
                <path d="M 352,240 L 568,240" fill="none" stroke="black"/>
                <path d="M 88,304 L 344,304" fill="none" stroke="black"/>
                <path d="M 80,352 L 336,352" fill="none" stroke="black"/>
                <path d="M 344,384 L 560,384" fill="none" stroke="black"/>
                <path d="M 352,400 L 568,400" fill="none" stroke="black"/>
                <path d="M 96,480 L 328,480" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="568,384 556,378.4 556,389.6" fill="black" transform="rotate(0,560,384)"/>
                <polygon class="arrowhead" points="568,224 556,218.4 556,229.6" fill="black" transform="rotate(0,560,224)"/>
                <polygon class="arrowhead" points="360,400 348,394.4 348,405.6" fill="black" transform="rotate(180,352,400)"/>
                <polygon class="arrowhead" points="360,240 348,234.4 348,245.6" fill="black" transform="rotate(180,352,240)"/>
                <polygon class="arrowhead" points="344,352 332,346.4 332,357.6" fill="black" transform="rotate(0,336,352)"/>
                <polygon class="arrowhead" points="344,176 332,170.4 332,181.6" fill="black" transform="rotate(0,336,176)"/>
                <polygon class="arrowhead" points="336,480 324,474.4 324,485.6" fill="black" transform="rotate(0,328,480)"/>
                <polygon class="arrowhead" points="104,480 92,474.4 92,485.6" fill="black" transform="rotate(180,96,480)"/>
                <polygon class="arrowhead" points="96,304 84,298.4 84,309.6" fill="black" transform="rotate(180,88,304)"/>
                <g class="text">
                  <text x="48" y="52">IoT</text>
                  <text x="92" y="52">device</text>
                  <text x="312" y="52">Network</text>
                  <text x="376" y="52">service</text>
                  <text x="40" y="84">EDHOC</text>
                  <text x="104" y="84">Initiator</text>
                  <text x="304" y="84">EDHOC</text>
                  <text x="368" y="84">Responder</text>
                  <text x="84" y="116">Attester</text>
                  <text x="320" y="116">Relying</text>
                  <text x="376" y="116">Party</text>
                  <text x="564" y="116">Verifier</text>
                  <text x="120" y="164">EAD_1</text>
                  <text x="152" y="164">=</text>
                  <text x="208" y="164">Attestation</text>
                  <text x="292" y="164">proposal</text>
                  <text x="400" y="212">Attestation</text>
                  <text x="488" y="212">proposal,</text>
                  <text x="544" y="212">C_R</text>
                  <text x="428" y="260">EvidenceType(s),</text>
                  <text x="520" y="260">Nonce</text>
                  <text x="120" y="292">EAD_2</text>
                  <text x="152" y="292">=</text>
                  <text x="208" y="292">Attestation</text>
                  <text x="288" y="292">request</text>
                  <text x="120" y="340">EAD_3</text>
                  <text x="152" y="340">=</text>
                  <text x="196" y="340">Evidence</text>
                  <text x="432" y="372">Evidence,</text>
                  <text x="488" y="372">C_R</text>
                  <text x="424" y="420">Attestation</text>
                  <text x="500" y="420">result</text>
                  <text x="176" y="500">EDHOC</text>
                  <text x="232" y="500">session</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------+              +-----------------+
|   IoT device    |              | Network service |
+-----------------+              +-----------------+
| EDHOC Initiator |              | EDHOC Responder |
+-----------------+              +-----------------+            +----------+
|     Attester    |              |  Relying Party  |            | Verifier |
+--------+--------+              +--------+--------+            +-----+----+
         |                                |                           |
         |  EAD_1 = Attestation proposal  |                           |
         +------------------------------->|                           |
         |                                |                           |
         |                                | Attestation proposal, C_R |
         |                                +-------------------------->|
         |                                |<--------------------------+
         |                                |  EvidenceType(s), Nonce   |
         |                                |                           |
         |  EAD_2 = Attestation request   |                           |
         |<-------------------------------+                           |
         |                                |                           |
         |  EAD_3 = Evidence              |                           |
         +------------------------------->|                           |
         |                                |      Evidence, C_R        |
         |                                +-------------------------->|
         |                                |<--------------------------+
         |                                |    Attestation result     |
         |                                |                           |
         |                                |                           |
         |                                |                           |
         | <----------------------------> |                           |
         |         EDHOC session          |                           |

]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="net-pp-fwd-network-service-attestation">
        <name>(Net, PP, Fwd): Network Service Attestation</name>
        <t>One use case for (Net, PP, Fwd) is when a network server needs to attest itself to a client (e.g., an IoT device).
For example, the client needs to send some sensitive data to the network server, which requires the network server to be attested first.
In (Net, PP, Fwd), the network server acts as an Attester and the client acts as a Relying Party.</t>
        <t>An overview of the message flow is illustrated in <xref target="fig-net-pp-fwd"/>.
EDHOC Initiator plays the role of the RATS Relying Party.
EDHOC Responder plays the role of the RATS Attester.
An external entity, out of scope of this specification, plays the role of the RATS Verifier.
The EAD items specific to the passport model are defined in <xref target="ead-pp"/>.</t>
        <t>The Relying Party asks the Attester to do a remote attestation by sending a trigger_pp (see <xref target="trigger-pp"/>) in EDHOC message_1.
The Attester replies to the Relying Party with a Result proposal in EAD_2.
Then the Relying Party selects a trusted Verifier identity and sends it as a Result request.
How the Attester negotiates with the selected Verifier to get the attestation result is out of scope of this specification.
A fourth EDHOC message is required to send the Result from the Attester to the Relying Party.</t>
        <figure anchor="fig-net-pp-fwd">
          <name>Overview of network service attestation in passport model and EDHOC forward message flow. EDHOC is used between RP and A. The dashed line illustrates a logical connection that does not need to occur in real time.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="448" width="584" viewBox="0 0 584 448" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,432" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,128" fill="none" stroke="black"/>
                <path d="M 240,32 L 240,128" fill="none" stroke="black"/>
                <path d="M 312,128 L 312,432" fill="none" stroke="black"/>
                <path d="M 384,32 L 384,128" fill="none" stroke="black"/>
                <path d="M 488,96 L 488,128" fill="none" stroke="black"/>
                <path d="M 536,128 L 536,432" fill="none" stroke="black"/>
                <path d="M 576,96 L 576,128" fill="none" stroke="black"/>
                <path d="M 8,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 240,32 L 384,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 240,64 L 384,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 240,96 L 384,96" fill="none" stroke="black"/>
                <path d="M 488,96 L 576,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 152,128" fill="none" stroke="black"/>
                <path d="M 240,128 L 384,128" fill="none" stroke="black"/>
                <path d="M 488,128 L 576,128" fill="none" stroke="black"/>
                <path d="M 80,176 L 304,176" fill="none" stroke="black"/>
                <path d="M 88,224 L 312,224" fill="none" stroke="black"/>
                <path d="M 80,272 L 304,272" fill="none" stroke="black"/>
                <path d="M 312,288 L 336,288" fill="none" stroke="black"/>
                <path d="M 360,288 L 376,288" fill="none" stroke="black"/>
                <path d="M 400,288 L 416,288" fill="none" stroke="black"/>
                <path d="M 440,288 L 456,288" fill="none" stroke="black"/>
                <path d="M 480,288 L 496,288" fill="none" stroke="black"/>
                <path d="M 512,288 L 528,288" fill="none" stroke="black"/>
                <path d="M 320,304 L 344,304" fill="none" stroke="black"/>
                <path d="M 368,304 L 384,304" fill="none" stroke="black"/>
                <path d="M 408,304 L 424,304" fill="none" stroke="black"/>
                <path d="M 448,304 L 464,304" fill="none" stroke="black"/>
                <path d="M 480,304 L 496,304" fill="none" stroke="black"/>
                <path d="M 520,304 L 536,304" fill="none" stroke="black"/>
                <path d="M 88,352 L 312,352" fill="none" stroke="black"/>
                <path d="M 96,416 L 296,416" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="536,288 524,282.4 524,293.6" fill="black" transform="rotate(0,528,288)"/>
                <polygon class="arrowhead" points="328,304 316,298.4 316,309.6" fill="black" transform="rotate(180,320,304)"/>
                <polygon class="arrowhead" points="312,272 300,266.4 300,277.6" fill="black" transform="rotate(0,304,272)"/>
                <polygon class="arrowhead" points="312,176 300,170.4 300,181.6" fill="black" transform="rotate(0,304,176)"/>
                <polygon class="arrowhead" points="304,416 292,410.4 292,421.6" fill="black" transform="rotate(0,296,416)"/>
                <polygon class="arrowhead" points="104,416 92,410.4 92,421.6" fill="black" transform="rotate(180,96,416)"/>
                <polygon class="arrowhead" points="96,352 84,346.4 84,357.6" fill="black" transform="rotate(180,88,352)"/>
                <polygon class="arrowhead" points="96,224 84,218.4 84,229.6" fill="black" transform="rotate(180,88,224)"/>
                <g class="text">
                  <text x="48" y="52">IoT</text>
                  <text x="92" y="52">device</text>
                  <text x="280" y="52">Network</text>
                  <text x="344" y="52">service</text>
                  <text x="40" y="84">EDHOC</text>
                  <text x="104" y="84">Initiator</text>
                  <text x="272" y="84">EDHOC</text>
                  <text x="336" y="84">Responder</text>
                  <text x="56" y="116">Relying</text>
                  <text x="112" y="116">Party</text>
                  <text x="316" y="116">Attester</text>
                  <text x="532" y="116">Verifier</text>
                  <text x="120" y="164">EAD_1</text>
                  <text x="152" y="164">=</text>
                  <text x="204" y="164">trigger_PP</text>
                  <text x="120" y="212">EAD_2</text>
                  <text x="152" y="212">=</text>
                  <text x="188" y="212">Result</text>
                  <text x="252" y="212">proposal</text>
                  <text x="120" y="260">EAD_3</text>
                  <text x="152" y="260">=</text>
                  <text x="188" y="260">Result</text>
                  <text x="248" y="260">request</text>
                  <text x="416" y="276">(request)</text>
                  <text x="412" y="324">Result</text>
                  <text x="120" y="340">EAD_4</text>
                  <text x="152" y="340">=</text>
                  <text x="188" y="340">Result</text>
                  <text x="160" y="436">EDHOC</text>
                  <text x="216" y="436">session</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------+          +-----------------+
|   IoT device    |          | Network service |
+-----------------+          +-----------------+
| EDHOC Initiator |          | EDHOC Responder |
+-----------------+          +-----------------+            +----------+
|  Relying Party  |          |     Attester    |            | Verifier |
+--------+--------+          +--------+--------+            +-----+----+
         |                            |                           |
         |  EAD_1 = trigger_PP        |                           |
         +--------------------------->|                           |
         |                            |                           |
         |  EAD_2 = Result proposal   |                           |
         |<---------------------------+                           |
         |                            |                           |
         |  EAD_3 = Result request    |                           |
         +--------------------------->|        (request)          |
         |                            +---  ---  ---  ---  --- -->|
         |                            |<---  ---  ---  --- ---  --+
         |                            |         Result            |
         |  EAD_4 = Result            |                           |
         |<---------------------------+                           |
         |                            |                           |
         |                            |                           |
         |                            |                           |
         | <------------------------> |                           |
         |       EDHOC session        |                           |
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="mutual-attestation">
      <name>Mutual Attestation in EDHOC</name>
      <t>Mutual attestation over EDHOC combines the cases where one of the EDHOC parties uses the IoT device attestation and the other uses the Network service attestation.
Performing mutual attestation to a single EDHOC message flow acheives a lightweight use with reduced message overhead.
Note that the message flow for the two parties in mutual attestation needs to be the same.</t>
      <t>In this specification, we list the most relevant mutual attestation example for constrained IoT environments.</t>
      <section anchor="iot-bg-fwd-net-pp-fwd">
        <name>(IoT, BG, Fwd) - (Net, PP, Fwd)</name>
        <t>In this example, the mutual attestation is performed in EDHOC forward message flow, by one IoT device attestation in background-check model and another network service attestation in passport model.
The process is illustrated in <xref target="fig-mutual-attestation-BP"/>.
How the Network service connects with the Verifier_1 and potential Verifier_2 is out of scope in this specification.</t>
        <t>The first remote attestation is initiated by the IoT device (A_1) in background-check model.
In parallel, the IoT device (A_1) requests the network service (A_2) to perform a remote attestation in passport model.
EAD_2 carries the EAD items Attestation request and Result proposal.
EAD_3 carries the EAD items Evidence and Result request.
EAD_4 carries the EAD item Result for the passport model.</t>
        <figure anchor="fig-mutual-attestation-BP">
          <name>Overview of mutual attestation of (IoT, BG, Fwd) - (Net, PP, Fwd). EDHOC is used between A and RP. The dashed line illustrates a logical connection that does not need to occur in real time.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="864" viewBox="0 0 864 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,720" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,128" fill="none" stroke="black"/>
                <path d="M 280,32 L 280,128" fill="none" stroke="black"/>
                <path d="M 352,128 L 352,720" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,128" fill="none" stroke="black"/>
                <path d="M 528,96 L 528,128" fill="none" stroke="black"/>
                <path d="M 584,128 L 584,720" fill="none" stroke="black"/>
                <path d="M 632,96 L 632,128" fill="none" stroke="black"/>
                <path d="M 752,96 L 752,128" fill="none" stroke="black"/>
                <path d="M 808,128 L 808,720" fill="none" stroke="black"/>
                <path d="M 856,96 L 856,128" fill="none" stroke="black"/>
                <path d="M 8,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 280,32 L 424,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 280,64 L 424,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 280,96 L 424,96" fill="none" stroke="black"/>
                <path d="M 528,96 L 632,96" fill="none" stroke="black"/>
                <path d="M 752,96 L 856,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 152,128" fill="none" stroke="black"/>
                <path d="M 280,128 L 424,128" fill="none" stroke="black"/>
                <path d="M 528,128 L 632,128" fill="none" stroke="black"/>
                <path d="M 752,128 L 856,128" fill="none" stroke="black"/>
                <path d="M 80,192 L 344,192" fill="none" stroke="black"/>
                <path d="M 352,256 L 576,256" fill="none" stroke="black"/>
                <path d="M 360,272 L 584,272" fill="none" stroke="black"/>
                <path d="M 88,336 L 352,336" fill="none" stroke="black"/>
                <path d="M 80,416 L 344,416" fill="none" stroke="black"/>
                <path d="M 352,464 L 576,464" fill="none" stroke="black"/>
                <path d="M 352,480 L 376,480" fill="none" stroke="black"/>
                <path d="M 392,480 L 408,480" fill="none" stroke="black"/>
                <path d="M 424,480 L 440,480" fill="none" stroke="black"/>
                <path d="M 456,480 L 472,480" fill="none" stroke="black"/>
                <path d="M 488,480 L 504,480" fill="none" stroke="black"/>
                <path d="M 520,480 L 536,480" fill="none" stroke="black"/>
                <path d="M 560,480 L 584,480" fill="none" stroke="black"/>
                <path d="M 600,480 L 616,480" fill="none" stroke="black"/>
                <path d="M 640,480 L 656,480" fill="none" stroke="black"/>
                <path d="M 680,480 L 696,480" fill="none" stroke="black"/>
                <path d="M 712,480 L 728,480" fill="none" stroke="black"/>
                <path d="M 744,480 L 760,480" fill="none" stroke="black"/>
                <path d="M 776,480 L 800,480" fill="none" stroke="black"/>
                <path d="M 360,544 L 584,544" fill="none" stroke="black"/>
                <path d="M 360,576 L 384,576" fill="none" stroke="black"/>
                <path d="M 408,576 L 424,576" fill="none" stroke="black"/>
                <path d="M 448,576 L 464,576" fill="none" stroke="black"/>
                <path d="M 488,576 L 504,576" fill="none" stroke="black"/>
                <path d="M 528,576 L 544,576" fill="none" stroke="black"/>
                <path d="M 568,576 L 584,576" fill="none" stroke="black"/>
                <path d="M 600,576 L 616,576" fill="none" stroke="black"/>
                <path d="M 640,576 L 656,576" fill="none" stroke="black"/>
                <path d="M 680,576 L 696,576" fill="none" stroke="black"/>
                <path d="M 712,576 L 728,576" fill="none" stroke="black"/>
                <path d="M 752,576 L 768,576" fill="none" stroke="black"/>
                <path d="M 784,576 L 808,576" fill="none" stroke="black"/>
                <path d="M 88,624 L 352,624" fill="none" stroke="black"/>
                <path d="M 96,704 L 336,704" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="808,480 796,474.4 796,485.6" fill="black" transform="rotate(0,800,480)"/>
                <polygon class="arrowhead" points="584,464 572,458.4 572,469.6" fill="black" transform="rotate(0,576,464)"/>
                <polygon class="arrowhead" points="584,256 572,250.4 572,261.6" fill="black" transform="rotate(0,576,256)"/>
                <polygon class="arrowhead" points="368,576 356,570.4 356,581.6" fill="black" transform="rotate(180,360,576)"/>
                <polygon class="arrowhead" points="368,544 356,538.4 356,549.6" fill="black" transform="rotate(180,360,544)"/>
                <polygon class="arrowhead" points="368,272 356,266.4 356,277.6" fill="black" transform="rotate(180,360,272)"/>
                <polygon class="arrowhead" points="352,416 340,410.4 340,421.6" fill="black" transform="rotate(0,344,416)"/>
                <polygon class="arrowhead" points="352,192 340,186.4 340,197.6" fill="black" transform="rotate(0,344,192)"/>
                <polygon class="arrowhead" points="344,704 332,698.4 332,709.6" fill="black" transform="rotate(0,336,704)"/>
                <polygon class="arrowhead" points="104,704 92,698.4 92,709.6" fill="black" transform="rotate(180,96,704)"/>
                <polygon class="arrowhead" points="96,624 84,618.4 84,629.6" fill="black" transform="rotate(180,88,624)"/>
                <polygon class="arrowhead" points="96,336 84,330.4 84,341.6" fill="black" transform="rotate(180,88,336)"/>
                <g class="text">
                  <text x="48" y="52">IoT</text>
                  <text x="92" y="52">device</text>
                  <text x="320" y="52">Network</text>
                  <text x="384" y="52">service</text>
                  <text x="40" y="84">EDHOC</text>
                  <text x="104" y="84">Initiator</text>
                  <text x="312" y="84">EDHOC</text>
                  <text x="376" y="84">Responder</text>
                  <text x="76" y="116">A_1/RP_2</text>
                  <text x="348" y="116">RP_1/A_2</text>
                  <text x="580" y="116">Verifier_1</text>
                  <text x="804" y="116">Verifier_2</text>
                  <text x="120" y="164">EAD_1</text>
                  <text x="152" y="164">=</text>
                  <text x="208" y="164">Attestation</text>
                  <text x="296" y="164">proposal,</text>
                  <text x="204" y="180">trigger_PP</text>
                  <text x="416" y="244">Attestation</text>
                  <text x="504" y="244">proposal,</text>
                  <text x="560" y="244">C_R</text>
                  <text x="444" y="292">EvidenceType(s),</text>
                  <text x="536" y="292">Nonce</text>
                  <text x="120" y="308">EAD_2</text>
                  <text x="152" y="308">=</text>
                  <text x="208" y="308">Attestation</text>
                  <text x="292" y="308">request,</text>
                  <text x="188" y="324">Result</text>
                  <text x="252" y="324">proposal</text>
                  <text x="120" y="388">EAD_3</text>
                  <text x="152" y="388">=</text>
                  <text x="200" y="388">Evidence,</text>
                  <text x="188" y="404">Result</text>
                  <text x="248" y="404">request</text>
                  <text x="448" y="452">Evidence,</text>
                  <text x="504" y="452">C_R</text>
                  <text x="696" y="468">(Request)</text>
                  <text x="432" y="532">Attestation</text>
                  <text x="508" y="532">result</text>
                  <text x="476" y="596">Result</text>
                  <text x="120" y="612">EAD_4</text>
                  <text x="152" y="612">=</text>
                  <text x="188" y="612">Result</text>
                  <text x="184" y="724">EDHOC</text>
                  <text x="240" y="724">session</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------+               +-----------------+
|   IoT device    |               | Network service |
+-----------------+               +-----------------+
| EDHOC Initiator |               | EDHOC Responder |
+-----------------+               +-----------------+            +------------+              +------------+
|    A_1/RP_2     |               |    RP_1/A_2     |            | Verifier_1 |              | Verifier_2 |
+--------+--------+               +--------+--------+            +------+-----+              +------+-----+
         |                                 |                            |                           |
         |  EAD_1 = Attestation proposal,  |                            |                           |
         |          trigger_PP             |                            |                           |
         +-------------------------------->|                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |  Attestation proposal, C_R |                           |
         |                                 +--------------------------->|                           |
         |                                 |<---------------------------+                           |
         |                                 |   EvidenceType(s), Nonce   |                           |
         |  EAD_2 = Attestation request,   |                            |                           |
         |          Result proposal        |                            |                           |
         |<--------------------------------+                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |  EAD_3 = Evidence,              |                            |                           |
         |          Result request         |                            |                           |
         +-------------------------------->|                            |                           |
         |                                 |                            |                           |
         |                                 |       Evidence, C_R        |                           |
         |                                 +--------------------------->|         (Request)         |
         |                                 +--- --- --- --- --- ---  ---+ ---  ---  --- --- --- --->|
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |    Attestation result      |                           |
         |                                 |<---------------------------+                           |
         |                                 |                            |                           |
         |                                 |<---  ---  ---  ---  ---  --+ ---  ---  --- ---  --- ---+
         |                                 |            Result          |                           |
         |  EAD_4 = Result                 |                            |                           |
         |<--------------------------------+                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         | <-----------------------------> |                            |                           |
         |          EDHOC session          |                            |                           |

]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="error-handling">
      <name>Error Handling</name>
      <t>This section specifies a new EDHOC error code and how it is used in the proposed protocol.</t>
      <section anchor="edhoc-error-attestation-failed">
        <name>EDHOC Error "Attestation failed"</name>
        <t>This section specifies a new EDHOC error "Attestation failed".
The format of the error message follows the one in EDHOC protocol(see <xref section="6" sectionFormat="of" target="RFC9528"/>).</t>
        <figure anchor="fig-error">
          <name>EDHOC error code and error information for Attestation failed.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="568" viewBox="0 0 568 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
                <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
                <path d="M 232,32 L 232,96" fill="none" stroke="black"/>
                <path d="M 560,32 L 560,96" fill="none" stroke="black"/>
                <path d="M 8,32 L 560,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 560,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 560,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 560,96" fill="none" stroke="black"/>
                <g class="text">
                  <text x="52" y="52">ERR_CODE</text>
                  <text x="140" y="52">ERR_INFO</text>
                  <text x="196" y="52">Type</text>
                  <text x="288" y="52">Description</text>
                  <text x="68" y="84">TBD5</text>
                  <text x="152" y="84">attestation</text>
                  <text x="288" y="84">Attestation</text>
                  <text x="364" y="84">failed</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+----------+----------------+----------------------------------------+
| ERR_CODE | ERR_INFO Type  | Description                            |
+==========+================+========================================+
|     TBD5 | attestation    | Attestation failed                     |
+----------+----------------+----------------------------------------+
]]></artwork>
          </artset>
        </figure>
        <t>Error code TBD5 indicates to the receiver that the remote attestation is failed after the evidence is sent.
This can occur in two cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>The Verifier evaluates the attestation evidence and returns a negative result based on the Verifier's appraisal policy.</t>
          </li>
          <li>
            <t>The Verifier provides a positive attestation result to the Relying Party, but the Relying Party can not establish a sufficient level of trust to proceed decision-specific actions based on its appraisal policy.</t>
          </li>
        </ol>
        <t>In case 1, the Verifier signals the error to the Relying Party, which then generates an EDHOC "Attestation failed" error and send it to the Attester.
In case 2, the Relying Party directly generates and sends the "Attestation failed" error to the Attester.
The application decides how to handle the error message.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification is performed over EDHOC <xref target="RFC9528"/> by using EDHOC's EAD fields.
The privacy considerations of EADs in EDHOC apply to this specification.</t>
      <t>EAD_1 is not resistant to either active attackers or passive attackers, because neither the Initiator nor the Responder has been authenticated.</t>
      <t>Although EAD_2 is encrypted, the Initiator has not been authenticated, rendering EAD_2 vulnerable against the active attackers.</t>
      <t>The ead items in EAD_1 and EAD_2 <bcp14>MAY</bcp14> be very specific and potentially reveal sensitive information about the device.
The leaking of the data in EAD_1 and/or EAD_2 <bcp14>MAY</bcp14> risk to be used by the attackers for malicious purposes.
Data in EAD_3 and EAD_4 are protected between the Initiator and the Responder in EDHOC.</t>
      <t>Mutual attestation carries a lower risk for EAD items when the Responder is the Attester.
For the mutual attestation at the EDHOC Responder, only the Attestation_proposal/Result_proposal in EAD_2 is not protected to active attackers.
Both the Attestation_request/Result_request in EAD_3 and the Evidence/Result in EAD_4 are protected.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="edhoc-external-authorization-data-registry">
        <name>EDHOC External Authorization Data Registry</name>
        <t>IANA is requested to register the following entry in the "EDHOC External Authorization Data" registry under the group name "Ephemeral Diffie-Hellman Over Cose (EDHOC)".</t>
        <ul spacing="normal">
          <li>
            <t>The ead_label = TBD1 corresponds to the ead_value Attestation_proposal in <xref target="attestation-proposal"/>, Attestation_request in <xref target="attestation-request"/> and Evidence in <xref target="evidence"/>.</t>
          </li>
          <li>
            <t>The ead_label = TBD2 corresponds to the EAT item trigger_bg as specified in <xref target="trigger-bg"/>.</t>
          </li>
          <li>
            <t>The ead_label = TBD3 corresponds to the ead_value Result_proposal in <xref target="result-proposal"/>, Result_request in <xref target="result-request"/> and the Result in <xref target="result"/>.</t>
          </li>
          <li>
            <t>The ead_label = TBD4 corresponds to the EAT item trigger_pp as specified in <xref target="trigger-pp"/>.</t>
          </li>
        </ul>
        <figure anchor="fig-ead-labels">
          <name>EAD labels.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="536" viewBox="0 0 536 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 104,32 L 104,256" fill="none" stroke="black"/>
                <path d="M 168,32 L 168,256" fill="none" stroke="black"/>
                <path d="M 368,32 L 368,256" fill="none" stroke="black"/>
                <path d="M 528,32 L 528,256" fill="none" stroke="black"/>
                <path d="M 8,32 L 528,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 528,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 528,66" fill="none" stroke="black"/>
                <path d="M 8,112 L 528,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 528,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 528,208" fill="none" stroke="black"/>
                <path d="M 8,256 L 528,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Name</text>
                  <text x="136" y="52">Label</text>
                  <text x="224" y="52">Description</text>
                  <text x="416" y="52">Reference</text>
                  <text x="32" y="84">TBD</text>
                  <text x="132" y="84">TBD1</text>
                  <text x="188" y="84">BG</text>
                  <text x="224" y="84">model</text>
                  <text x="208" y="100">related</text>
                  <text x="288" y="100">information</text>
                  <text x="408" y="100">Section</text>
                  <text x="472" y="100">5.2.1.1</text>
                  <text x="32" y="132">TBD</text>
                  <text x="132" y="132">TBD2</text>
                  <text x="208" y="132">trigger</text>
                  <text x="252" y="132">to</text>
                  <text x="288" y="132">start</text>
                  <text x="224" y="148">attestation</text>
                  <text x="284" y="148">in</text>
                  <text x="308" y="148">BG</text>
                  <text x="404" y="148">Secion</text>
                  <text x="464" y="148">5.2.1.1</text>
                  <text x="32" y="180">TBD</text>
                  <text x="132" y="180">TBD3</text>
                  <text x="188" y="180">PP</text>
                  <text x="224" y="180">model</text>
                  <text x="208" y="196">related</text>
                  <text x="288" y="196">information</text>
                  <text x="408" y="196">Section</text>
                  <text x="472" y="196">5.2.2.1</text>
                  <text x="32" y="228">TBD</text>
                  <text x="132" y="228">TBD4</text>
                  <text x="208" y="228">trigger</text>
                  <text x="252" y="228">to</text>
                  <text x="288" y="228">start</text>
                  <text x="224" y="244">attestation</text>
                  <text x="284" y="244">in</text>
                  <text x="308" y="244">PP</text>
                  <text x="404" y="244">Secion</text>
                  <text x="464" y="244">5.2.2.1</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+-----------+-------+------------------------+-------------------+
| Name      | Label | Description            | Reference         |
+===========+=======+========================+===================+
| TBD       | TBD1  | BG model               |                   |
|           |       | related information    | Section 5.2.1.1   |
+-----------+-------+------------------------+-------------------+
| TBD       | TBD2  | trigger to start       |                   |
|           |       | attestation in BG      | Secion 5.2.1.1    |
+-----------+-------+------------------------+-------------------+
| TBD       | TBD3  | PP model               |                   |
|           |       | related information    | Section 5.2.2.1   |
+-----------+-------+------------------------+-------------------+
| TBD       | TBD4  | trigger to start       |                   |
|           |       | attestation in PP      | Secion 5.2.2.1    |
+-----------+-------+------------------------+-------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9393">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="IANA.CWT.Claims" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA-CoAP-Content-Formats" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>CoAP Content-Formats</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-lake-authz">
          <front>
            <title>Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE (ELA)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Geovane Fedrecheski" initials="G." surname="Fedrecheski">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   Ephemeral Diffie-Hellman Over COSE (EDHOC) is a lightweight
   authenticated key exchange protocol intended for use in constrained
   scenarios.  This document specifies Lightweight Authorization using
   EDHOC (ELA).  The procedure allows authorizing enrollment of new
   devices using the extension point defined in EDHOC.  ELA is
   applicable to zero-touch onboarding of new devices to a constrained
   network leveraging trust anchors installed at manufacture time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-authz-03"/>
        </reference>
        <reference anchor="IANA-COSE-Header-Parameters" target="https://www.iana.org/cose/header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 639?>

<section anchor="example-remote-attestation-flow">
      <name>Example: Remote Attestation Flow</name>
      <figure anchor="_figure-iot-example">
        <name>Example of remote attestation.</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="992" width="576" viewBox="0 0 576 992" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,112" fill="none" stroke="black"/>
              <path d="M 32,112 L 32,976" fill="none" stroke="black"/>
              <path d="M 136,72 L 136,104" fill="none" stroke="black"/>
              <path d="M 168,112 L 168,976" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,112" fill="none" stroke="black"/>
              <path d="M 288,48 L 288,112" fill="none" stroke="black"/>
              <path d="M 368,112 L 368,976" fill="none" stroke="black"/>
              <path d="M 440,352 L 440,360" fill="none" stroke="black"/>
              <path d="M 448,48 L 448,112" fill="none" stroke="black"/>
              <path d="M 480,80 L 480,112" fill="none" stroke="black"/>
              <path d="M 528,112 L 528,976" fill="none" stroke="black"/>
              <path d="M 568,80 L 568,112" fill="none" stroke="black"/>
              <path d="M 8,32 L 224,32" fill="none" stroke="black"/>
              <path d="M 288,48 L 448,48" fill="none" stroke="black"/>
              <path d="M 8,64 L 224,64" fill="none" stroke="black"/>
              <path d="M 288,80 L 448,80" fill="none" stroke="black"/>
              <path d="M 480,80 L 568,80" fill="none" stroke="black"/>
              <path d="M 8,112 L 224,112" fill="none" stroke="black"/>
              <path d="M 288,112 L 448,112" fill="none" stroke="black"/>
              <path d="M 480,112 L 568,112" fill="none" stroke="black"/>
              <path d="M 168,240 L 360,240" fill="none" stroke="black"/>
              <path d="M 368,288 L 520,288" fill="none" stroke="black"/>
              <path d="M 376,400 L 528,400" fill="none" stroke="black"/>
              <path d="M 176,480 L 368,480" fill="none" stroke="black"/>
              <path d="M 40,560 L 168,560" fill="none" stroke="black"/>
              <path d="M 32,624 L 160,624" fill="none" stroke="black"/>
              <path d="M 168,704 L 360,704" fill="none" stroke="black"/>
              <path d="M 368,800 L 520,800" fill="none" stroke="black"/>
              <path d="M 376,864 L 528,864" fill="none" stroke="black"/>
              <path d="M 368,880 L 392,880" fill="none" stroke="black"/>
              <path d="M 376,912 L 392,912" fill="none" stroke="black"/>
              <path d="M 176,960 L 360,960" fill="none" stroke="black"/>
              <path d="M 392,880 C 400.83064,880 408,887.16936 408,896" fill="none" stroke="black"/>
              <path d="M 392,912 C 400.83064,912 408,904.83064 408,896" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="528,800 516,794.4 516,805.6" fill="black" transform="rotate(0,520,800)"/>
              <polygon class="arrowhead" points="528,288 516,282.4 516,293.6" fill="black" transform="rotate(0,520,288)"/>
              <polygon class="arrowhead" points="384,912 372,906.4 372,917.6" fill="black" transform="rotate(180,376,912)"/>
              <polygon class="arrowhead" points="384,864 372,858.4 372,869.6" fill="black" transform="rotate(180,376,864)"/>
              <polygon class="arrowhead" points="384,400 372,394.4 372,405.6" fill="black" transform="rotate(180,376,400)"/>
              <polygon class="arrowhead" points="368,960 356,954.4 356,965.6" fill="black" transform="rotate(0,360,960)"/>
              <polygon class="arrowhead" points="368,704 356,698.4 356,709.6" fill="black" transform="rotate(0,360,704)"/>
              <polygon class="arrowhead" points="368,240 356,234.4 356,245.6" fill="black" transform="rotate(0,360,240)"/>
              <polygon class="arrowhead" points="184,960 172,954.4 172,965.6" fill="black" transform="rotate(180,176,960)"/>
              <polygon class="arrowhead" points="184,480 172,474.4 172,485.6" fill="black" transform="rotate(180,176,480)"/>
              <polygon class="arrowhead" points="168,624 156,618.4 156,629.6" fill="black" transform="rotate(0,160,624)"/>
              <polygon class="arrowhead" points="48,560 36,554.4 36,565.6" fill="black" transform="rotate(180,40,560)"/>
              <g class="text">
                <text x="72" y="52">EDHOC</text>
                <text x="136" y="52">Initiator</text>
                <text x="328" y="68">EDHOC</text>
                <text x="392" y="68">Responder</text>
                <text x="64" y="84">Attestation</text>
                <text x="180" y="84">Attester</text>
                <text x="48" y="100">Service</text>
                <text x="336" y="100">Relying</text>
                <text x="392" y="100">Party</text>
                <text x="524" y="100">Verifier</text>
                <text x="192" y="164">EDHOC</text>
                <text x="256" y="164">message_1</text>
                <text x="208" y="180">{...}</text>
                <text x="212" y="196">EAD_1(</text>
                <text x="252" y="212">types(a,b,c)</text>
                <text x="192" y="228">)</text>
                <text x="432" y="276">types(a,b,c),</text>
                <text x="504" y="276">C_R</text>
                <text x="400" y="340">Body:</text>
                <text x="432" y="340">{</text>
                <text x="416" y="356">nonce</text>
                <text x="200" y="372">EDHOC</text>
                <text x="264" y="372">message_2</text>
                <text x="436" y="372">types(a,b)</text>
                <text x="208" y="388">{...}</text>
                <text x="384" y="388">}</text>
                <text x="212" y="404">EAD_2(</text>
                <text x="228" y="420">nonce,</text>
                <text x="232" y="436">type(a)</text>
                <text x="192" y="452">)</text>
                <text x="260" y="468">Auth_CRED(Sig/MAC)</text>
                <text x="84" y="500">Body:{</text>
                <text x="92" y="516">nonce,</text>
                <text x="96" y="532">type(a)</text>
                <text x="64" y="548">}</text>
                <text x="68" y="580">Body:{</text>
                <text x="92" y="596">Evidence</text>
                <text x="48" y="612">}</text>
                <text x="200" y="644">EDHOC</text>
                <text x="264" y="644">message_3</text>
                <text x="208" y="660">{...}</text>
                <text x="240" y="676">Evidence(EAT)</text>
                <text x="260" y="692">Auth_CRED(sig/MAC)</text>
                <text x="400" y="772">Body:</text>
                <text x="432" y="772">{</text>
                <text x="404" y="788">EAT,</text>
                <text x="444" y="788">C_R}</text>
                <text x="400" y="820">Body:</text>
                <text x="432" y="820">{</text>
                <text x="432" y="836">att-result:</text>
                <text x="500" y="836">AR{}</text>
                <text x="384" y="852">}</text>
                <text x="444" y="900">verify</text>
                <text x="492" y="900">AR{}</text>
                <text x="248" y="948">application</text>
                <text x="316" y="948">data</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
.--------------------------.
|     EDHOC Initiator      |       .-------------------.
+--------------------------+       |  EDHOC Responder  |
| Attestation   | Attester |       +-------------------+   .----------.
| Service       |          |       |  Relying Party    |   | Verifier |
'--+----------------+------'       '---------+---------'   '-----+----'
   |                |                        |                   |
   |                |                        |                   |
   |                |EDHOC message_1         |                   |
   |                |  {...}                 |                   |
   |                |  EAD_1(                |                   |
   |                |    types(a,b,c)        |                   |
   |                |  )                     |                   |
   |                +----------------------->|                   |
   |                |                        |                   |
   |                |                        | types(a,b,c), C_R |
   |                |                        +------------------>|
   |                |                        |                   |
   |                |                        |                   |
   |                |                        | Body: {           |
   |                |                        |   nonce,          |
   |                | EDHOC message_2        |   types(a,b)      |
   |                |  {...}                 | }                 |
   |                |  EAD_2(                |<------------------+
   |                |    nonce,              |                   |
   |                |    type(a)             |                   |
   |                |  )                     |                   |
   |                |  Auth_CRED(Sig/MAC)    |                   |
   |                |<-----------------------+                   |
   |   Body:{       |                        |                   |
   |    nonce,      |                        |                   |
   |    type(a)     |                        |                   |
   |   }            |                        |                   |
   |<---------------+                        |                   |
   | Body:{         |                        |                   |
   |   Evidence     |                        |                   |
   | }              |                        |                   |
   +--------------->|                        |                   |
   |                | EDHOC message_3        |                   |
   |                |  {...}                 |                   |
   |                |  Evidence(EAT)         |                   |
   |                |  Auth_CRED(sig/MAC)    |                   |
   |                +----------------------->|                   |
   |                |                        |                   |
   |                |                        |                   |
   |                |                        |                   |
   |                |                        | Body: {           |
   |                |                        |  EAT, C_R}        |
   |                |                        +------------------>|
   |                |                        | Body: {           |
   |                |                        |  att-result: AR{} |
   |                |                        | }                 |
   |                |                        |<------------------+
   |                |                        +---.               |
   |                |                        |    | verify AR{}  |
   |                |                        |<--'               |
   |                |                        |                   |
   |                |    application data    |                   |
   |                |<---------------------->|                   |
   |                |                        |                   |
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="remote-attestation-in-parallel-with-enrollment-authorization">
      <name>Remote attestation in parallel with enrollment authorization</name>
      <t>This section discusses the possibility of doing remote attestation in parallel with the enrollment authorization procedure defined in <xref target="I-D.ietf-lake-authz"/>.
In this case, the message count is much decreased.</t>
      <t>The detailed procedure is TBD.</t>
    </section>
    <section anchor="firmware">
      <name>Example: Firmware Version</name>
      <t>The goal in this example is to verify that the firmware running on the device is the latest version, and is neither tampered or compromised.
A device acts as the Attester, currently in an untrusted state.
The Attester needs to generate the evidence to attest itself.
A gateway that can communicate with the Attester and can control its access to the network acts as the Relying Party.
The gateway will finally decide whether the device can join the network or not depending on the attestation result.
The attestation result is produced by the Verifier, which is a web server that can be seen as the manufacturer of the device.
Therefore it can appraise the evidence that is sent by the Attester.
The remote attestation session starts with the Attester sending EAD_1 in EDHOC message 1.</t>
      <t>An example of the EAD_1 in EDHOC message_1 could be:</t>
      <artwork><![CDATA[
[60,61,258]
]]></artwork>
      <t>If the Verifier and the Relying Party can support at least one evidence type that is proposed by the Attester, the Relying Party will include in the EAD_2 field the same evidence type, alongside a nonce for message freshness.</t>
      <artwork><![CDATA[
(258, h'a29f62a4c6cdaae5')
]]></artwork>
      <t>The Evidence in EAD_3 field is an Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>, with the measurements claim formatted in CoSWID<xref target="RFC9393"/>.
The components of the Evidence should at least be:</t>
      <artwork><![CDATA[
{
/eat-nonce/                 10: h'a29f62a4c6cdaae5',
/ueid/                      256: 'aaabbcc',
/measurements/              273: [
  /CoAP Content-Format ID/        [ 258,
  /evidence in CoSWID/              {
                                      0: 'tagID'             /tag-id/
                                      12: 0                  /tag-version/
                                      1: "DotBot firmware"   /software-name/
                                      2: {                   /entity/
                                          31: "Attester"     /entity-name/
                                          33: 1              /role, must be "tag-creator" which is 1/
                                          },
                                      3: {                   /evidence/
                                          17: [              /file/
                                               {
                                                24: "partition0-nrf52840dk.bin",   /fs-name/
                                                7: [                               /hash of file/
                                                    1,                             /alg SHA-256/
                                                    h'06294f6806b9c685eea795048579cfd02a0c025bc8b5abca42a19ea0ec23e81a'
                                                    ]                              /hash value/
                                                }
                                               ]
                                          }
                                    }
                                  ]
                                 ]
}
]]></artwork>
      <t>The infomation above serves as the payload of the COSE object.
The complete resulting COSE object is:</t>
      <artwork><![CDATA[
18([
    /*protected header*/
    h'a10127',

    /*unprotected header*/
    {},

    /*payload*/
    h'A30A48A29F62A4C6CDAAE519010047616161626263631901118182190102A50045746
    16749440C00016F446F74426F74206669726D7761726502A2181F684174746573746572
    18210103A11181A218187819706172746974696F6E302D6E72663532383430646B2E626
    96E078201582006294F6806B9C685EEA795048579CFD02A0C025BC8B5ABCA42A19EA0EC
    23E81A',

    /*signature*/
    h'd4100901f4c3e51312c3110c6ddc8dcf7f68d8f5d3791c19133f2f0ac158c1f5ee6ed
    afe9d7c3d6eb3d2d197f82e733d375fdda9fb258b304961dfc38558950d'
])
]]></artwork>
      <t>which has the following base16 encoding:</t>
      <artwork><![CDATA[
D28443A10127A05890A30A48A29F62A4C6CDAAE51901004761616162626363190111818
2190102A5004574616749440C00016F446F74426F74206669726D7761726502A2181F68
417474657374657218210103A11181A218187819706172746974696F6E302D6E7266353
2383430646B2E62696E078201582006294F6806B9C685EEA795048579CFD02A0C025BC8
B5ABCA42A19EA0EC23E81A5840D4100901F4C3E51312C3110C6DDC8DCF7F68D8F5D3791
C19133F2F0AC158C1F5EE6EDAFE9D7C3D6EB3D2D197F82E733D375FDDA9FB258B304961
DFC38558950D
]]></artwork>
      <t>The Relying Party (co-located with the gateway) then treats the Evidence as opaque and sends it to the Verifier.
Once the Verifier sends back the Attestation Result, the Relying Party can be assured on the version of the firmware that the device is running.</t>
    </section>
    <section anchor="open-discussion-remote-attestation-over-edhoc-over-oscore">
      <name>Open discussion: remote attestation over EDHOC/ over OSCORE</name>
      <t>TBD</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author would like to thank Thomas Fossati, Goran Selander, Malisa Vucinic, Ionut Mihalcea, Muhammad Usama Sardar, Michael Richardson and Geovane Fedrecheski for the provided ideas and feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
