<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lake-ra-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RA-EDHOC">Remote attestation over EDHOC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lake-ra-03"/>
    <author initials="Y." surname="Song" fullname="Yuxuan Song">
      <organization>Inria</organization>
      <address>
        <email>yuxuan.song@inria.fr</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>Lightweight Authenticated Key Exchange</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 55?>

<t>This document specifies how to perform remote attestation as part of the lightweight authenticated Diffie-Hellman key exchange protocol EDHOC (Ephemeral Diffie-Hellman Over COSE), based on the Remote ATtestation procedureS (RATS) architecture.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://lake-wg.github.io/ra/draft-ietf-lake-ra.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lake-ra/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Lightweight Authenticated Key Exchange Working Group mailing list (<eref target="mailto:lake@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/lake/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lake-wg/ra"/>.</t>
    </note>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <!--Discuss remote attestation and mention some use cases.-->
<t>Remote attestation is a security process which verifies and confirms the integrity and trustworthiness of a remote target (e.g., device, system, group of devices) in the network.
This process helps establish a level of trust in the remote system before allowing the device to e.g. join the network or get access to some sensitive information and resources.
The use cases that require remote attestation include secure boot and firmware management, cloud computing, network access control, etc.</t>
      <!--Summarize RATS architecture {{RFC9334}} and main roles.-->
<t>The IETF working group Remote ATtestation procedureS (RATS) has defined an architecture <xref target="RFC9334"/> for remote attestation.
The three main roles in the RATS architecture are the Attester, the Verifier and the Relying Party.
The Attester generates evidence (a set of claims) concerning its identity and integrity, which must be appraised by the Verifier for its validity.
Then, the Verifier produces the attestation result, which is consequently used by the Relying Party for the purposes of reliably applying application-specific actions.</t>
      <!--Discuss the two RATS models and say that this specification supports both models.-->
<t>One type of interaction model defined in the RATS architecture is called the background-check model.
It resembles the procedure of how employers perform background checks to determine the prospective employee's trustworthiness, by contacting the respective organization that issues a report.
In this case, the employer acts as the Relying Party, the employee acts as the Attester and the organization acts as the Verifier.
The Attester conveys evidence directly to the Relying Party and the Relying Party forwards the evidence to the Verifier for appraisal.
Once the attestation result is computed by the Verifier, it is sent back to the Relying Party to decide what action to take based on the attestation result.
Another model is called passport model, where the Attester communicates directly with the Verifier.
The Attester presents the evidence to the Verifier and gets an attestation result from the Verifier.
Then the Attester conveys the attestation result to the Relying Party.
This specification employs both the RATS background-check model and the passport model.</t>
      <t>This document specifies the protocol between the Attester and the Relying Party.
The details of the protocol between the Relying Party and the Verifier in the background-check model, and the protocol between the Attester and the Verifier in the passport model are out of the scope.
This communication may be secured through protocols such as EDHOC, TLS or other security protocols that support the secure transmission to and from the Verifier.</t>
      <!--Discuss EAT-->
<t>One way of conveying attestation evidence or the attestation result is the Entity Attestation Token (EAT) <xref target="RFC9711"/>.
It provides an attested claims set which can be used to determine a level of trustworthiness.
This specification relies on the EAT as the format for attestation evidence and the attestation result.</t>
      <!--Summarize EDHOC {{RFC9528}}. Mention EAD fields of EDHOC.-->
<t>Ephemeral Diffie-Hellman over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol for highly constrained networks.
In EDHOC, the two parties involved in the key exchange are referred to as the Initiator (I) and the Responder (R).
EDHOC supports the transport of external authorization data, through the dedicated EAD fields.
This specification delivers EAT through EDHOC.
Specifically, EAT is transported as an EAD item.
This specification also defines new EAD items needed to perform remote attesation over EDHOC in <xref target="bg"/> and <xref target="pp"/>.</t>
      <!--Discuss implementation aspects such as the internal attestation service running on the Attester.
Root of trust. Separation between secure and non-secure worlds.-->
<t>For the generation of evidence, the Attester incorporates an internal attestation service, including a specific trusted element known as the "root of trust".
Root of trust serves as the starting point for establishing and validating the trustworthiness appraisals of other components on the system.
The measurements signed by the attestation service are referred to as the Evidence.
The signing is requested through an attestation API.
How the components are separated between the secure and non-secure worlds on a target is out of scope of this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The reader is assumed to be familiar with the terms and concepts defined in EDHOC <xref target="RFC9528"/> and RATS architecture <xref target="RFC9334"/>.</t>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>EDHOC provides the benefit of minimal message overhead and reduced round trips for lightweight authentication between an Initiator and a Responder.
However, authentication ensures only identity-level security, and additional integrity assurance may be required through remote attestation.
This specification describes how to perform remote attestation over the EDHOC protocol, following the RATS architecture.
More importantly, by integrating remote attestation with EDHOC, attestation can be run in parallel with authentication, improving the efficiency and maintaining lightweight properties.</t>
      <t>Remote attestation protocol elements are carried within EDHOC's External Authorization Data (EAD) fields.
EDHOC <xref target="RFC9528"/> supports one or more EAD items in each EAD field.</t>
      <t>The Attester can act as either the EDHOC Initiator or the EDHOC Responder, depending on the attesting target.
In the background-check model, the Attester (EDHOC Initiator/IoT device) exchanges evidence with the Relying Party (EDHOC Responder/Network service) during the EDHOC session.
In the passport model, the Attester (EDHOC Responder/Network servie) exhcnages the attestation result with the Relying Party (EDHOC Initiator/IoT device) during the EDHOC session.
Section <xref target="attestation-dimensions"/> defines three independent dimensions for performing remote attestation over EDHOC:</t>
      <ol spacing="normal" type="1"><li>
          <t>Target (see <xref target="iot"/>, <xref target="net"/>) defining the entity that undergoes the attestation process (IoT device or network service).</t>
        </li>
        <li>
          <t>Model (see <xref target="bg"/>, <xref target="pp"/>) defining the attestation model in use based on the RATS architecture (background-check model or passport model).</t>
        </li>
        <li>
          <t>Message Flow (see <xref target="fwd_flow"/>, <xref target="rev_flow"/>) defining the EDHOC message flow in use (forward message flow or reverse message flow).</t>
        </li>
      </ol>
      <t>This document specifies the cases that are suited for constrained IoT environments.
See this document <xref target="I-D.ietf-iotops-7228bis"/> as a reference for classification of IoT devices.</t>
      <t>The remote attestation operation defined in this document preserves the properties of EDHOC:</t>
      <ol spacing="normal" type="1"><li>
          <t>The EDHOC protocol is not modified, the remote attestation elements are carried within EDHOC EAD fields.</t>
        </li>
        <li>
          <t>The attestation protocol is in parallel but does not interfere with the authentication flow.</t>
        </li>
        <li>
          <t>The privacy and security properties of EDHOC are not changed.</t>
        </li>
      </ol>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <t>In the background-check model, the Verifier is assumed to support verification of at least one evidence format provided by the Attester.
The Verifier is assumed to be provisioned with the Attester's attestation public key and the reference values required for evidence validation prior to the attestation procedure.
It is assumed that the Relying Party also has knowledge about the Attester, so it can narrow down the evidence type selection and send to the Attester only one format of the evidence type.</t>
      <t>In the passport model, the credential identity of the Verifier is assumed to be stored at the Attester and the Relying Party, which means the Verifier is trusted by the Attester and the Relying Party to obtain the attestation result.
If timestamps are used to ensure freshness in the passport model, synchronized time between the Attester and Relying Party is assumed.
For detailed time considerations, refer to <xref section="A" sectionFormat="of" target="RFC9334"/>.</t>
    </section>
    <section anchor="attestation-dimensions">
      <name>Remote Attestation in EDHOC</name>
      <t>This section specifies three independent dimensions that characterize the remote attestation process over EDHOC.</t>
      <ol spacing="normal" type="1"><li>
          <t>Target: Defines the entity that undergoes the attestation process.</t>
        </li>
        <li>
          <t>Model: Defines the attestation models based on RATS architecture.
This specification supports both the RATS background-check model (see <xref target="bg"/>) and the passport model (see <xref target="pp"/>).
The corresponding EAD items for background-check model and the passport model are independent of each other.</t>
        </li>
        <li>
          <t>EDHOC message flow: The EDHOC protocol defines two possible message flows, namely the EDHOC forward message flow and the EDHOC reverse message flow (see <xref section="A.2.2" sectionFormat="of" target="RFC9528"/>).
In this specification, both flows can be used to perform remote attestation.</t>
        </li>
      </ol>
      <section anchor="iot">
        <name>Target: IoT Device Attestation (IoT)</name>
        <t>The IoT device acts as the Attester.</t>
      </section>
      <section anchor="net">
        <name>Target: Network Service Attestation (Net)</name>
        <t>The network service acts as the Attester.</t>
        <t>This attestation pattern applies when constrained devices need to establish trust with a network gateway.
For example, before transmitting sensitive data to a network gateway, a constrained device requires attestation of the network gateway.</t>
      </section>
      <section anchor="bg">
        <name>Model: Background-check Model (BG)</name>
        <t>In the background-check model, the Attester sends the evidence to the Relying Party.
The Relying Party transfers the evidence to the Verifier and gets back the attestation result from the Verifier.</t>
        <t>An EDHOC session is established between the Attester and the Relying Party.
A negotiation of the evidence type is required before the Attester sends the evidence.
All three parties must agree on a selected evidence type.</t>
        <t>The Attester first sends a list of the proposed evidence types to the Relying Party.
The list is formatted as an Attestation proposal in an EDHOC EAD item.
The Relying Party relays the list to the Verifier and receives at least one supported evidence type from the Verifier in return.
If the Relying Party receives more than one evidence type, a single evidence type should be selected by the Relying Party based on its knowledge of the Attester.
The Relying Party then sends it back within the Attestation request to the Attester.</t>
        <t>A nonce, at least 8-bytes long <xref target="RFC9711"/>), guarantees the freshness of the attestation session.
The nonce is generated by the Verifier and sent to the Relying Party.
The Relying Party puts the nonce and the selected evidence type together in a tuple to generate an Attestation request.</t>
        <t>Once the Attester receives the Attestation request, it can call its attestation service to generate the evidence, with the nonce value as one of the inputs.</t>
        <t>The ead_label for Attestation_proposal, Attestation_request and Evidence is the same (TBD1) because these EAD items appear in distinct and fixed positions within the EDHOC message sequence.
Specifically, they are conveyed in EAD_1, EAD_2, and EAD_3 of EDHOC messaage_1, EDHOC message_2, and EDHOC message_3, respectively.
As their positions identify each item, separate labels are not required.</t>
        <section anchor="attestation-proposal">
          <name>Attestation_proposal</name>
          <t>To propose a list of provided evidence types in background-check model, the Attester transports the Proposed_EvidenceType object.
It signals to the Relying Party the proposal to do remote attestation, as well as which types of the attestation claims the Attester supports.
The Proposed_EvidenceType is encoded in CBOR in the form of a sequence.</t>
          <t>The EAD item for an attestation proposal is:</t>
          <ul spacing="normal">
            <li>
              <t>ead_label = TBD1</t>
            </li>
            <li>
              <t>ead_value = Attestation_proposal, which is a CBOR byte string:</t>
            </li>
          </ul>
          <artwork><![CDATA[
Attestation_proposal = bstr .cbor Proposed_EvidenceType

Proposed_EvidenceType = [ + content-format ]

content-format = uint
]]></artwork>
          <t>where</t>
          <ul spacing="normal">
            <li>
              <t>Proposed_EvidenceType is an array that contains all the supported evidence types by the Attester.</t>
            </li>
            <li>
              <t>There <bcp14>MUST</bcp14> be at least one item in the array.</t>
            </li>
            <li>
              <t>content-format is an indicator of the format type (e.g., application/eat+cwt with an appropriate eat_profile parameter set), from <xref target="IANA-CoAP-Content-Formats"/>.</t>
            </li>
          </ul>
          <t>The sign of ead_label TBD1 <bcp14>MUST</bcp14> be negative to indicate that the EAD item is critical.
If the receiver (EDHOC Responder/Relying Party) cannot recognize the critical EAD item, or cannot process the information in the critical EAD item, then the receiver <bcp14>MUST</bcp14> abort the EDHOC session, as defined in <xref section="3.8" sectionFormat="of" target="RFC9528"/>.</t>
        </section>
        <section anchor="attestation-request">
          <name>Attestation_request</name>
          <t>As a response to the attestation proposal, the Relying Party signals to the Attester the supported and requested evidence type.
In case none of the evidence types is supported, the Relying Party rejects the first message_1 with an error indicating support for another evidence type.</t>
          <t>The EAD item for an attestation request is:</t>
          <ul spacing="normal">
            <li>
              <t>ead_label = TBD1</t>
            </li>
            <li>
              <t>ead_value = Attestation_request, which is a CBOR byte string:</t>
            </li>
          </ul>
          <artwork><![CDATA[
Attestation_request = bstr .cbor Selected_EvidenceType

Selected_EvidenceType = (
  content-format: uint,
  nonce: bstr .size 8..64
)
]]></artwork>
          <t>where</t>
          <ul spacing="normal">
            <li>
              <t>content-format is the selected evidence type by the Relying Party and supported by the Verifier.</t>
            </li>
            <li>
              <t>nonce is generated by the Verifier and forwarded by the Relying Party.</t>
            </li>
          </ul>
          <t>The sign of ead_label TBD1 <bcp14>MUST</bcp14> be negative to indicate that the EAD item is critical.
If the receiver (EDHOC Initiator/Attester) cannot recognize the critical EAD item, or cannot process the information in the critical EAD item, then the receiver <bcp14>MUST</bcp14> abort the EDHOC session, as defined in <xref section="3.8" sectionFormat="of" target="RFC9528"/>.</t>
        </section>
        <section anchor="evidence">
          <name>Evidence</name>
          <t>The Attester calls its local attestation service to generate and return a serialized Entity Attestation Token (EAT) <xref target="RFC9711"/> as Evidence.
The Evidence is sent in EAD_3 within EDHOC message_3.</t>
          <t>The EAD item is:</t>
          <ul spacing="normal">
            <li>
              <t>ead_label = TBD1</t>
            </li>
            <li>
              <t>ead_value is a serialized EAT.</t>
            </li>
          </ul>
          <t>For remote attestation over EDHOC, The EAT <bcp14>MUST</bcp14> be formatted as a CBOR Web Token (CWT) containing attestation-oriented claims.
The complete set of attestation claims for the EAT is specified in <xref target="RFC9711"/>.</t>
          <t>A minimal claims set <bcp14>MAY</bcp14> be implemented when the Attester operates under constrained message size requirements and/or limited computational resources.</t>
          <artwork><![CDATA[
{
/eat-nonce/          10: bstr .size 8
/ueid/               256: bstr .size (7..33)
/measurements/       273: measurements-type
}
]]></artwork>
          <t>The measurements claim <bcp14>MAY</bcp14> be formatted according to <xref target="RFC9393"/>.
When CoSWID <xref target="RFC9393"/> is used, the claim <bcp14>MUST</bcp14> be an evidence CoSWID rather than a payload CoSWID.
Formats other than CoSWID are permitted and <bcp14>MUST</bcp14> be identified by CoAP Content Format.</t>
          <artwork><![CDATA[
measurements-type = [+ measurements-format]

measurements-format = [
      content-format: uint,
      content: bytes
]
]]></artwork>
        </section>
      </section>
      <section anchor="pp">
        <name>Model: Passport Model (PP)</name>
        <t>In the passport model, the Attester sends the evidence to the Verifier.
After the Attester receives the attestation result from the Verifier, the Attester sends the attestation result to the Relying Party.</t>
        <t>An EDHOC session is established between the Attester (EDHOC Responder) and the Relying Party (EDHOC Initiator).
The Attester and the Relying Party should decide from which Verifier the Attester obtains the attestation result and transfers it to the Relying Party.
The Attester first sends a list of the Verifier identities that it can get the attestation result.
The Relying Party selects one trusted Verifier identity and sends it back as a Result request.</t>
        <t>Regarding the freshness in passport model, the Attester could either establish a real-time connection with the selected Verifier, or use a pre-stored attestation result from the selected Verifier.
If the attestation result is not obtained via a real-time connection, it <bcp14>MUST</bcp14> include a time stamp and/or expiry time to indicate its validity.
Time synchronization is out of scope of this specification.</t>
        <t>Once the Attester obtains the attestation result from the selected Verifier, it sends the attestation result to the Relying Party.</t>
        <t>The ead_label for Result_proposal, Result_request and Result is the same (TBD2) because these EAD items appear in distinct and fixed positions within the EDHOC message sequence.
Specifically, they are conveyed in EAD_2, EAD_3, and EAD_4 of EDHOC messaage_2, EDHOC message_3, and EDHOC message_4, respectively.
As their positions identify each item, separate labels are not required.</t>
        <section anchor="result-proposal">
          <name>Result_proposal</name>
          <t>An attestation result proposal contains the identification of the credentials of the Verifiers to indicate Verifiers' indentities.
The identification of credentials relies on COSE header parameters <xref target="IANA-COSE-Header-Parameters"/>, with a header label and credential value.</t>
          <t>The EAD item for the attestation result proposal is:</t>
          <ul spacing="normal">
            <li>
              <t>ead_label = TBD2</t>
            </li>
            <li>
              <t>ead_value = Result_proposal, which is a CBOR byte string:</t>
            </li>
          </ul>
          <artwork><![CDATA[
Result_proposal = bstr .cbor Proposed_VerifierIdentity
Proposed_VerifierIdentity = [ + VerifierIdentity ]

VerifierIdentity = {
  label => values
}
]]></artwork>
          <t>where</t>
          <ul spacing="normal">
            <li>
              <t>Proposed_VerifierIdentity is defined as a list of one or more VerifierIdentity elements.</t>
            </li>
            <li>
              <t>Each VerifierIdentity within the list is a map defined in <xref target="IANA-COSE-Header-Parameters"/> that:
              </t>
              <ul spacing="normal">
                <li>
                  <t>label = int / tstr</t>
                </li>
                <li>
                  <t>values = any</t>
                </li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="result-request">
          <name>Result_request</name>
          <t>As a response to the attestation result proposal, the Relying Party signals to the Attester the trusted Verifier.
In case none of the Verifiers can be trusted by the Relying Party, the session is aborted.
Relying Party generates a nonce to ensure the freshness of the attestation result from the Verifier.</t>
          <t>The EAD item for an attestation result request is:</t>
          <ul spacing="normal">
            <li>
              <t>ead_label = TBD2</t>
            </li>
            <li>
              <t>ead_value = Result_request, which is a CBOR byte string:</t>
            </li>
          </ul>
          <artwork><![CDATA[
Result_request = bstr .cbor Request_structure

Request_structure = {
  selected_verifier: VerfierIdentity,
  ? nonce: bstr .size 8..64
}
]]></artwork>
        </section>
        <section anchor="result">
          <name>Result</name>
          <t>The attestation result is generated and signed by the Verifier as a serialized EAT <xref target="RFC9711"/>.
The Relying Party can decide what action to take with regards to the Attester based on the information elements in attetation result.</t>
          <t>The EAD item is:</t>
          <ul spacing="normal">
            <li>
              <t>ead_label = TBD2</t>
            </li>
            <li>
              <t>ead_value is a serialized EAT.</t>
            </li>
          </ul>
        </section>
        <section anchor="trigger-pp">
          <name>trigger_pp</name>
          <t>The EAD item trigger_pp is used when the sender (EDHOC Initiator/Relying Party) triggers the receiver (EDHOC Responder/Attester) to start a remote attestation in the passport model.
The receiver <bcp14>MUST</bcp14> reply with an EAD item correspondign to the passport model, either a result proposal in <xref target="result-proposal"/> or a result in <xref target="result"/>.
The ead_value <bcp14>MUST</bcp14> not be present, as the ead_label serves as the trigger.</t>
          <t>The EAD item is:</t>
          <ul spacing="normal">
            <li>
              <t>ead_label = TBD3</t>
            </li>
            <li>
              <t>ead_value = null</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="fwd_flow">
        <name>EDHOC forward Message Flow (Fwd)</name>
        <t>In forward message flow, EDHOC may run with the Initiator as a CoAP/HTTP client.
Remote attestation over EDHOC starts with a POST requests to the Uri-Path: "/.well-known/lake-ra".</t>
      </section>
      <section anchor="rev_flow">
        <name>EDHOC reverse Message Flow (Rev)</name>
        <t>In the reverse message flow, the CoAP/HTTP client is the Responder and the server is the Initiator.
A new EDHOC session begins with an empty POST request to the server's resource for EDHOC.</t>
      </section>
    </section>
    <section anchor="attestation-combinations">
      <name>Instantiation of Remote Attestation Protocol</name>
      <t>We use the format (Target, Model, Message Flow) to denote instantiations.
For example, (IoT, BG, Fwd) represents IoT device attestation using the background-check model with forward EDHOC message flow.</t>
      <t>There are 8 possible instantiations combining IoT/Net, BG/PP, and Fwd/Rev configurations.
Considering practical feasibility, IoT device attestation in the passport model and Network Service attestation in the background model are less viable.
These instantiations require IoT devices to maintain multiple network connections and perform complex computations, which exceed the capabilities of typical low-power, resource-constrained IoT devices.</t>
      <t>In this document, only the most relevant instantiations for constrained IoT environments are specified.</t>
      <section anchor="iot-attesation">
        <name>(IoT, BG, Fwd): IoT Device Attestation</name>
        <t>A common use case for (IoT, BG, Fwd) is to attest an IoT device to a network server.
For example, a simple illustratice case is doing remote attestation to verify that the latest version of firmware is running on the IoT device before the network server allows it to join the network (see <xref target="firmware"/>).</t>
        <t>An overview of doing IoT device attestation in background-check model and EDHOC forward message flow is established in <xref target="fig-iot-bg-fwd"/>.
EDHOC Initiator plays the role of the RATS Attester (A).
EDHOC Responder plays the role of the RATS Relying Party (RP).
The Attester and the Relying Party communicate by transporting messages within EDHOC's External Authorization Data (EAD) fields.
An external entity, out of scope of this specification, plays the role of the RATS Verifier (V).
The EAD items specific to the background-check model are defined in <xref target="bg"/>.</t>
        <t>The Attester starts the attestation by sending an Attestation proposal in EDHOC message_1.
The Relying Party generates EAD_2 with the received evidence type and nonce from the Verifier, and sends it to the Attester.
The Attester sends the Evidence to the Relying Party in EAD_3.
The Verifier evaluates the Evidence and sends the Attestation result to the Relying Party.</t>
        <figure anchor="fig-iot-bg-fwd">
          <name>Overview of IoT device attestation in background-check model and EDHOC forward message flow. EDHOC is used between A and RP.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="528" width="616" viewBox="0 0 616 528" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,496" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,128" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,128" fill="none" stroke="black"/>
                <path d="M 344,128 L 344,496" fill="none" stroke="black"/>
                <path d="M 416,32 L 416,128" fill="none" stroke="black"/>
                <path d="M 520,96 L 520,128" fill="none" stroke="black"/>
                <path d="M 568,128 L 568,496" fill="none" stroke="black"/>
                <path d="M 608,96 L 608,128" fill="none" stroke="black"/>
                <path d="M 8,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 272,32 L 416,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 272,64 L 416,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 272,96 L 416,96" fill="none" stroke="black"/>
                <path d="M 520,96 L 608,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 152,128" fill="none" stroke="black"/>
                <path d="M 272,128 L 416,128" fill="none" stroke="black"/>
                <path d="M 520,128 L 608,128" fill="none" stroke="black"/>
                <path d="M 80,176 L 336,176" fill="none" stroke="black"/>
                <path d="M 344,224 L 560,224" fill="none" stroke="black"/>
                <path d="M 352,240 L 568,240" fill="none" stroke="black"/>
                <path d="M 88,304 L 344,304" fill="none" stroke="black"/>
                <path d="M 80,352 L 336,352" fill="none" stroke="black"/>
                <path d="M 344,384 L 560,384" fill="none" stroke="black"/>
                <path d="M 352,400 L 568,400" fill="none" stroke="black"/>
                <path d="M 96,480 L 328,480" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="568,384 556,378.4 556,389.6" fill="black" transform="rotate(0,560,384)"/>
                <polygon class="arrowhead" points="568,224 556,218.4 556,229.6" fill="black" transform="rotate(0,560,224)"/>
                <polygon class="arrowhead" points="360,400 348,394.4 348,405.6" fill="black" transform="rotate(180,352,400)"/>
                <polygon class="arrowhead" points="360,240 348,234.4 348,245.6" fill="black" transform="rotate(180,352,240)"/>
                <polygon class="arrowhead" points="344,352 332,346.4 332,357.6" fill="black" transform="rotate(0,336,352)"/>
                <polygon class="arrowhead" points="344,176 332,170.4 332,181.6" fill="black" transform="rotate(0,336,176)"/>
                <polygon class="arrowhead" points="336,480 324,474.4 324,485.6" fill="black" transform="rotate(0,328,480)"/>
                <polygon class="arrowhead" points="104,480 92,474.4 92,485.6" fill="black" transform="rotate(180,96,480)"/>
                <polygon class="arrowhead" points="96,304 84,298.4 84,309.6" fill="black" transform="rotate(180,88,304)"/>
                <g class="text">
                  <text x="48" y="52">IoT</text>
                  <text x="92" y="52">device</text>
                  <text x="312" y="52">Network</text>
                  <text x="376" y="52">service</text>
                  <text x="40" y="84">EDHOC</text>
                  <text x="104" y="84">Initiator</text>
                  <text x="304" y="84">EDHOC</text>
                  <text x="368" y="84">Responder</text>
                  <text x="84" y="116">Attester</text>
                  <text x="320" y="116">Relying</text>
                  <text x="376" y="116">Party</text>
                  <text x="564" y="116">Verifier</text>
                  <text x="120" y="164">EAD_1</text>
                  <text x="152" y="164">=</text>
                  <text x="208" y="164">Attestation</text>
                  <text x="292" y="164">proposal</text>
                  <text x="408" y="212">Attestation</text>
                  <text x="492" y="212">proposal</text>
                  <text x="428" y="260">EvidenceType(s),</text>
                  <text x="520" y="260">Nonce</text>
                  <text x="120" y="292">EAD_2</text>
                  <text x="152" y="292">=</text>
                  <text x="208" y="292">Attestation</text>
                  <text x="288" y="292">request</text>
                  <text x="120" y="340">EAD_3</text>
                  <text x="152" y="340">=</text>
                  <text x="196" y="340">Evidence</text>
                  <text x="452" y="372">Evidence</text>
                  <text x="424" y="420">Attestation</text>
                  <text x="500" y="420">result</text>
                  <text x="176" y="500">EDHOC</text>
                  <text x="232" y="500">session</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------+              +-----------------+
|   IoT device    |              | Network service |
+-----------------+              +-----------------+
| EDHOC Initiator |              | EDHOC Responder |
+-----------------+              +-----------------+            +----------+
|     Attester    |              |  Relying Party  |            | Verifier |
+--------+--------+              +--------+--------+            +-----+----+
         |                                |                           |
         |  EAD_1 = Attestation proposal  |                           |
         +------------------------------->|                           |
         |                                |                           |
         |                                |  Attestation proposal     |
         |                                +-------------------------->|
         |                                |<--------------------------+
         |                                |  EvidenceType(s), Nonce   |
         |                                |                           |
         |  EAD_2 = Attestation request   |                           |
         |<-------------------------------+                           |
         |                                |                           |
         |  EAD_3 = Evidence              |                           |
         +------------------------------->|                           |
         |                                |         Evidence          |
         |                                +-------------------------->|
         |                                |<--------------------------+
         |                                |    Attestation result     |
         |                                |                           |
         |                                |                           |
         |                                |                           |
         | <----------------------------> |                           |
         |         EDHOC session          |                           |

]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="network-attestation">
        <name>(Net, PP, Fwd): Network Service Attestation</name>
        <t>One use case for (Net, PP, Fwd) is when a network server needs to attest itself to a client (e.g., an IoT device).
For example, the client needs to send some sensitive data to the network server, which requires the network server to be attested first.
In (Net, PP, Fwd), the network server acts as an Attester and the client acts as a Relying Party.</t>
        <t>An overview of the message flow is illustrated in <xref target="fig-net-pp-fwd"/>.
EDHOC Initiator plays the role of the RATS Relying Party.
EDHOC Responder plays the role of the RATS Attester.
An external entity, out of scope of this specification, plays the role of the RATS Verifier.
The EAD items specific to the passport model are defined in <xref target="pp"/>.</t>
        <t>The Relying Party asks the Attester to do a remote attestation by sending a trigger_pp (see <xref target="trigger-pp"/>) in EDHOC message_1.
The Attester replies to the Relying Party with a Result proposal in EAD_2.
Then the Relying Party selects a trusted Verifier identity and sends it as a Result request.
How the Attester negotiates with the selected Verifier to get the attestation result is out of scope of this specification.
A fourth EDHOC message is required to send the Result from the Attester to the Relying Party.</t>
        <figure anchor="fig-net-pp-fwd">
          <name>Overview of network service attestation in passport model and EDHOC forward message flow. EDHOC is used between RP and A. The dashed line illustrates a logical connection that does not need to occur in real time.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="448" width="584" viewBox="0 0 584 448" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,432" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,128" fill="none" stroke="black"/>
                <path d="M 240,32 L 240,128" fill="none" stroke="black"/>
                <path d="M 312,128 L 312,432" fill="none" stroke="black"/>
                <path d="M 384,32 L 384,128" fill="none" stroke="black"/>
                <path d="M 488,96 L 488,128" fill="none" stroke="black"/>
                <path d="M 536,128 L 536,432" fill="none" stroke="black"/>
                <path d="M 576,96 L 576,128" fill="none" stroke="black"/>
                <path d="M 8,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 240,32 L 384,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 240,64 L 384,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 240,96 L 384,96" fill="none" stroke="black"/>
                <path d="M 488,96 L 576,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 152,128" fill="none" stroke="black"/>
                <path d="M 240,128 L 384,128" fill="none" stroke="black"/>
                <path d="M 488,128 L 576,128" fill="none" stroke="black"/>
                <path d="M 80,176 L 304,176" fill="none" stroke="black"/>
                <path d="M 88,224 L 312,224" fill="none" stroke="black"/>
                <path d="M 80,272 L 304,272" fill="none" stroke="black"/>
                <path d="M 312,288 L 336,288" fill="none" stroke="black"/>
                <path d="M 360,288 L 376,288" fill="none" stroke="black"/>
                <path d="M 400,288 L 416,288" fill="none" stroke="black"/>
                <path d="M 440,288 L 456,288" fill="none" stroke="black"/>
                <path d="M 480,288 L 496,288" fill="none" stroke="black"/>
                <path d="M 512,288 L 528,288" fill="none" stroke="black"/>
                <path d="M 320,304 L 344,304" fill="none" stroke="black"/>
                <path d="M 368,304 L 384,304" fill="none" stroke="black"/>
                <path d="M 408,304 L 424,304" fill="none" stroke="black"/>
                <path d="M 448,304 L 464,304" fill="none" stroke="black"/>
                <path d="M 480,304 L 496,304" fill="none" stroke="black"/>
                <path d="M 520,304 L 536,304" fill="none" stroke="black"/>
                <path d="M 88,352 L 312,352" fill="none" stroke="black"/>
                <path d="M 96,416 L 296,416" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="536,288 524,282.4 524,293.6" fill="black" transform="rotate(0,528,288)"/>
                <polygon class="arrowhead" points="328,304 316,298.4 316,309.6" fill="black" transform="rotate(180,320,304)"/>
                <polygon class="arrowhead" points="312,272 300,266.4 300,277.6" fill="black" transform="rotate(0,304,272)"/>
                <polygon class="arrowhead" points="312,176 300,170.4 300,181.6" fill="black" transform="rotate(0,304,176)"/>
                <polygon class="arrowhead" points="304,416 292,410.4 292,421.6" fill="black" transform="rotate(0,296,416)"/>
                <polygon class="arrowhead" points="104,416 92,410.4 92,421.6" fill="black" transform="rotate(180,96,416)"/>
                <polygon class="arrowhead" points="96,352 84,346.4 84,357.6" fill="black" transform="rotate(180,88,352)"/>
                <polygon class="arrowhead" points="96,224 84,218.4 84,229.6" fill="black" transform="rotate(180,88,224)"/>
                <g class="text">
                  <text x="48" y="52">IoT</text>
                  <text x="92" y="52">device</text>
                  <text x="280" y="52">Network</text>
                  <text x="344" y="52">service</text>
                  <text x="40" y="84">EDHOC</text>
                  <text x="104" y="84">Initiator</text>
                  <text x="272" y="84">EDHOC</text>
                  <text x="336" y="84">Responder</text>
                  <text x="56" y="116">Relying</text>
                  <text x="112" y="116">Party</text>
                  <text x="316" y="116">Attester</text>
                  <text x="532" y="116">Verifier</text>
                  <text x="120" y="164">EAD_1</text>
                  <text x="152" y="164">=</text>
                  <text x="204" y="164">trigger_PP</text>
                  <text x="120" y="212">EAD_2</text>
                  <text x="152" y="212">=</text>
                  <text x="188" y="212">Result</text>
                  <text x="252" y="212">proposal</text>
                  <text x="120" y="260">EAD_3</text>
                  <text x="152" y="260">=</text>
                  <text x="188" y="260">Result</text>
                  <text x="248" y="260">request</text>
                  <text x="388" y="276">Evidence</text>
                  <text x="432" y="276">+</text>
                  <text x="464" y="276">Nonce</text>
                  <text x="412" y="324">Result</text>
                  <text x="120" y="340">EAD_4</text>
                  <text x="152" y="340">=</text>
                  <text x="188" y="340">Result</text>
                  <text x="160" y="436">EDHOC</text>
                  <text x="216" y="436">session</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------+          +-----------------+
|   IoT device    |          | Network service |
+-----------------+          +-----------------+
| EDHOC Initiator |          | EDHOC Responder |
+-----------------+          +-----------------+            +----------+
|  Relying Party  |          |     Attester    |            | Verifier |
+--------+--------+          +--------+--------+            +-----+----+
         |                            |                           |
         |  EAD_1 = trigger_PP        |                           |
         +--------------------------->|                           |
         |                            |                           |
         |  EAD_2 = Result proposal   |                           |
         |<---------------------------+                           |
         |                            |                           |
         |  EAD_3 = Result request    |                           |
         +--------------------------->|     Evidence + Nonce      |
         |                            +---  ---  ---  ---  --- -->|
         |                            |<---  ---  ---  --- ---  --+
         |                            |         Result            |
         |  EAD_4 = Result            |                           |
         |<---------------------------+                           |
         |                            |                           |
         |                            |                           |
         |                            |                           |
         | <------------------------> |                           |
         |       EDHOC session        |                           |
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="mutual-attestation">
      <name>Mutual Attestation in EDHOC</name>
      <t>Mutual attestation over EDHOC combines the cases where one of the EDHOC parties uses the IoT device attestation and the other uses the Network service attestation.
Performing mutual attestation to a single EDHOC message flow acheives a lightweight use with reduced message overhead.
Note that the message flow for the two parties in mutual attestation needs to be the same.</t>
      <t>In this specification, we list the most relevant mutual attestation example for constrained IoT environments.</t>
      <section anchor="iot-bg-fwd-net-pp-fwd">
        <name>(IoT, BG, Fwd) - (Net, PP, Fwd)</name>
        <t>In this example, the mutual attestation is performed in EDHOC forward message flow, by one IoT device attestation in background-check model and another network service attestation in passport model.
The process is illustrated in <xref target="fig-mutual-attestation-BP"/>.
How the Network service connects with the Verifier_1 and potential Verifier_2 is out of scope in this specification.</t>
        <t>The first remote attestation is initiated by the IoT device (A_1) in background-check model.
In parallel, the IoT device (A_1) requests the network service (A_2) to perform a remote attestation in passport model.
EAD_2 carries the EAD items Attestation request and Result proposal.
EAD_3 carries the EAD items Evidence and Result request.
EAD_4 carries the EAD item Result for the passport model.</t>
        <figure anchor="fig-mutual-attestation-BP">
          <name>Overview of mutual attestation of (IoT, BG, Fwd) - (Net, PP, Fwd). EDHOC is used between A and RP. The dashed line illustrates a logical connection that does not need to occur in real time.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="864" viewBox="0 0 864 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,720" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,128" fill="none" stroke="black"/>
                <path d="M 280,32 L 280,128" fill="none" stroke="black"/>
                <path d="M 352,128 L 352,720" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,128" fill="none" stroke="black"/>
                <path d="M 528,96 L 528,128" fill="none" stroke="black"/>
                <path d="M 584,128 L 584,720" fill="none" stroke="black"/>
                <path d="M 632,96 L 632,128" fill="none" stroke="black"/>
                <path d="M 752,96 L 752,128" fill="none" stroke="black"/>
                <path d="M 808,128 L 808,720" fill="none" stroke="black"/>
                <path d="M 856,96 L 856,128" fill="none" stroke="black"/>
                <path d="M 8,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 280,32 L 424,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 280,64 L 424,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 280,96 L 424,96" fill="none" stroke="black"/>
                <path d="M 528,96 L 632,96" fill="none" stroke="black"/>
                <path d="M 752,96 L 856,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 152,128" fill="none" stroke="black"/>
                <path d="M 280,128 L 424,128" fill="none" stroke="black"/>
                <path d="M 528,128 L 632,128" fill="none" stroke="black"/>
                <path d="M 752,128 L 856,128" fill="none" stroke="black"/>
                <path d="M 80,192 L 344,192" fill="none" stroke="black"/>
                <path d="M 352,256 L 576,256" fill="none" stroke="black"/>
                <path d="M 360,272 L 584,272" fill="none" stroke="black"/>
                <path d="M 88,336 L 352,336" fill="none" stroke="black"/>
                <path d="M 80,416 L 344,416" fill="none" stroke="black"/>
                <path d="M 352,464 L 576,464" fill="none" stroke="black"/>
                <path d="M 352,480 L 376,480" fill="none" stroke="black"/>
                <path d="M 392,480 L 408,480" fill="none" stroke="black"/>
                <path d="M 424,480 L 440,480" fill="none" stroke="black"/>
                <path d="M 456,480 L 472,480" fill="none" stroke="black"/>
                <path d="M 488,480 L 504,480" fill="none" stroke="black"/>
                <path d="M 520,480 L 536,480" fill="none" stroke="black"/>
                <path d="M 560,480 L 584,480" fill="none" stroke="black"/>
                <path d="M 600,480 L 616,480" fill="none" stroke="black"/>
                <path d="M 640,480 L 656,480" fill="none" stroke="black"/>
                <path d="M 680,480 L 696,480" fill="none" stroke="black"/>
                <path d="M 712,480 L 728,480" fill="none" stroke="black"/>
                <path d="M 744,480 L 760,480" fill="none" stroke="black"/>
                <path d="M 776,480 L 800,480" fill="none" stroke="black"/>
                <path d="M 360,544 L 584,544" fill="none" stroke="black"/>
                <path d="M 360,576 L 384,576" fill="none" stroke="black"/>
                <path d="M 408,576 L 424,576" fill="none" stroke="black"/>
                <path d="M 448,576 L 464,576" fill="none" stroke="black"/>
                <path d="M 488,576 L 504,576" fill="none" stroke="black"/>
                <path d="M 528,576 L 544,576" fill="none" stroke="black"/>
                <path d="M 568,576 L 584,576" fill="none" stroke="black"/>
                <path d="M 600,576 L 616,576" fill="none" stroke="black"/>
                <path d="M 640,576 L 656,576" fill="none" stroke="black"/>
                <path d="M 680,576 L 696,576" fill="none" stroke="black"/>
                <path d="M 712,576 L 728,576" fill="none" stroke="black"/>
                <path d="M 752,576 L 768,576" fill="none" stroke="black"/>
                <path d="M 784,576 L 808,576" fill="none" stroke="black"/>
                <path d="M 88,624 L 352,624" fill="none" stroke="black"/>
                <path d="M 96,704 L 336,704" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="808,480 796,474.4 796,485.6" fill="black" transform="rotate(0,800,480)"/>
                <polygon class="arrowhead" points="584,464 572,458.4 572,469.6" fill="black" transform="rotate(0,576,464)"/>
                <polygon class="arrowhead" points="584,256 572,250.4 572,261.6" fill="black" transform="rotate(0,576,256)"/>
                <polygon class="arrowhead" points="368,576 356,570.4 356,581.6" fill="black" transform="rotate(180,360,576)"/>
                <polygon class="arrowhead" points="368,544 356,538.4 356,549.6" fill="black" transform="rotate(180,360,544)"/>
                <polygon class="arrowhead" points="368,272 356,266.4 356,277.6" fill="black" transform="rotate(180,360,272)"/>
                <polygon class="arrowhead" points="352,416 340,410.4 340,421.6" fill="black" transform="rotate(0,344,416)"/>
                <polygon class="arrowhead" points="352,192 340,186.4 340,197.6" fill="black" transform="rotate(0,344,192)"/>
                <polygon class="arrowhead" points="344,704 332,698.4 332,709.6" fill="black" transform="rotate(0,336,704)"/>
                <polygon class="arrowhead" points="104,704 92,698.4 92,709.6" fill="black" transform="rotate(180,96,704)"/>
                <polygon class="arrowhead" points="96,624 84,618.4 84,629.6" fill="black" transform="rotate(180,88,624)"/>
                <polygon class="arrowhead" points="96,336 84,330.4 84,341.6" fill="black" transform="rotate(180,88,336)"/>
                <g class="text">
                  <text x="48" y="52">IoT</text>
                  <text x="92" y="52">device</text>
                  <text x="320" y="52">Network</text>
                  <text x="384" y="52">service</text>
                  <text x="40" y="84">EDHOC</text>
                  <text x="104" y="84">Initiator</text>
                  <text x="312" y="84">EDHOC</text>
                  <text x="376" y="84">Responder</text>
                  <text x="76" y="116">A_1/RP_2</text>
                  <text x="348" y="116">RP_1/A_2</text>
                  <text x="580" y="116">Verifier_1</text>
                  <text x="804" y="116">Verifier_2</text>
                  <text x="120" y="164">EAD_1</text>
                  <text x="152" y="164">=</text>
                  <text x="208" y="164">Attestation</text>
                  <text x="296" y="164">proposal,</text>
                  <text x="204" y="180">trigger_PP</text>
                  <text x="424" y="244">Attestation</text>
                  <text x="508" y="244">proposal</text>
                  <text x="444" y="292">EvidenceType(s),</text>
                  <text x="536" y="292">Nonce</text>
                  <text x="120" y="308">EAD_2</text>
                  <text x="152" y="308">=</text>
                  <text x="208" y="308">Attestation</text>
                  <text x="292" y="308">request,</text>
                  <text x="188" y="324">Result</text>
                  <text x="252" y="324">proposal</text>
                  <text x="120" y="388">EAD_3</text>
                  <text x="152" y="388">=</text>
                  <text x="200" y="388">Evidence,</text>
                  <text x="188" y="404">Result</text>
                  <text x="248" y="404">request</text>
                  <text x="460" y="452">Evidence</text>
                  <text x="696" y="468">(Request)</text>
                  <text x="432" y="532">Attestation</text>
                  <text x="508" y="532">result</text>
                  <text x="460" y="596">Result</text>
                  <text x="120" y="612">EAD_4</text>
                  <text x="152" y="612">=</text>
                  <text x="188" y="612">Result</text>
                  <text x="184" y="724">EDHOC</text>
                  <text x="240" y="724">session</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------+               +-----------------+
|   IoT device    |               | Network service |
+-----------------+               +-----------------+
| EDHOC Initiator |               | EDHOC Responder |
+-----------------+               +-----------------+            +------------+              +------------+
|    A_1/RP_2     |               |    RP_1/A_2     |            | Verifier_1 |              | Verifier_2 |
+--------+--------+               +--------+--------+            +------+-----+              +------+-----+
         |                                 |                            |                           |
         |  EAD_1 = Attestation proposal,  |                            |                           |
         |          trigger_PP             |                            |                           |
         +-------------------------------->|                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |   Attestation proposal     |                           |
         |                                 +--------------------------->|                           |
         |                                 |<---------------------------+                           |
         |                                 |   EvidenceType(s), Nonce   |                           |
         |  EAD_2 = Attestation request,   |                            |                           |
         |          Result proposal        |                            |                           |
         |<--------------------------------+                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |  EAD_3 = Evidence,              |                            |                           |
         |          Result request         |                            |                           |
         +-------------------------------->|                            |                           |
         |                                 |                            |                           |
         |                                 |         Evidence           |                           |
         |                                 +--------------------------->|         (Request)         |
         |                                 +--- --- --- --- --- ---  ---+ ---  ---  --- --- --- --->|
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |    Attestation result      |                           |
         |                                 |<---------------------------+                           |
         |                                 |                            |                           |
         |                                 |<---  ---  ---  ---  ---  --+ ---  ---  --- ---  --- ---+
         |                                 |          Result            |                           |
         |  EAD_4 = Result                 |                            |                           |
         |<--------------------------------+                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         | <-----------------------------> |                            |                           |
         |          EDHOC session          |                            |                           |

]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="verifier">
      <name>Verifier</name>
      <t>The Verifier maintains an explicit trust relationship with the Attester, whereby the Verifier is provisioned with the Attester's attestation public key prior to the remote attestation process.
This explicit relationship may be established through various means, such as manufacturer provisioning, trusted certification authorities, or direct configuration.
Reference values used for comparison against received evidence should also be provided to the Verifier before the attesation.
The evaluation policy employed by the Verifer varies according to specific use cases and should be determined prior to the attestation; such policy definition is out of scope in this specification.</t>
      <t>The Verifier maintains an implicit trust relationship with the Relying Party, established through mechanisms such as web PKI with trusted Certificate Authority (CA) certificates, enabling the Relying Party to trust the attestation result that is generated by the Verifier.</t>
      <section anchor="processing-in-the-background-check-model">
        <name>Processing in the Background-check Model</name>
        <t>The Verifier is connected with the Relying Party and is responsible for evaluating evidence forwarded by the Relying Party.
After the Relying Party receives EDHOC message_1 from the Attester, it extracts and transmits the Attestation proposal to the Verifier.
The Verifier must support at least one evidence type for evaluation, otherwise it returns an empty list.
Alongside the selected evidence type, the Verifier generates a random nonce and sends both elements to the Relying Party.</t>
        <t>When the Relying Party obtains EDHOC message_3, it forwards the evidence to the Verifier for evaluation.</t>
        <t>The evidence evaluation process should include the verification of the signature, nonce validation, and measurement value comparison.
An example evaluation procedure for evidence formatted as an Entity Attestation Token (EAT) within a COSE_Sign1 structure is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Decode the COSE_Sign1 structure and extract constituent components: Headers, Payload, Signature.</t>
          </li>
          <li>
            <t>Verify the signature using the Attester's attestation public key.</t>
          </li>
          <li>
            <t>Verify that the nonce exists in the Verifier's local nonce list. If the nonce is found, validation passes and the nonce is removed from the list to prevent replay attacks.</t>
          </li>
          <li>
            <t>Compare the received evidence measurement values against the reference value.
The attestation result is returned to the Relying Party, with result generation conforming to the attestation token format defined in <xref target="RFC9711"/>.</t>
          </li>
        </ol>
      </section>
      <section anchor="processing-in-the-passport-model">
        <name>Processing in the Passport Model</name>
        <t>When the Attester utilizes a cached attestation result previously generated by the Verifier, real-time re-evaluation by the Verifier is not required.
If the Attester receives result_request from the Relying Party and performs real-time attestation with the Verifier, the Verifier then generates the attestation result formatted as an Entity Attestation Token (EAT).
The token uses the "Software Measurement Results (measres)" claim as defined in <xref target="RFC9711"/>, and incorporates the nonce generated by the Relying Party as an input parameter.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification is performed over EDHOC <xref target="RFC9528"/> by using EDHOC's EAD fields.
The privacy considerations of EADs in EDHOC apply to this specification.</t>
      <t>EAD_1 is not resistant to either active attackers or passive attackers, because neither the Initiator nor the Responder has been authenticated.</t>
      <t>Although EAD_2 is encrypted, the Initiator has not been authenticated, rendering EAD_2 vulnerable against the active attackers.</t>
      <t>The ead items in EAD_1 and EAD_2 <bcp14>MAY</bcp14> be very specific and potentially reveal sensitive information about the device.
The leaking of the data in EAD_1 and/or EAD_2 <bcp14>MAY</bcp14> risk to be used by the attackers for malicious purposes.
Data in EAD_3 and EAD_4 are protected between the Initiator and the Responder in EDHOC.</t>
      <t>Mutual attestation carries a lower risk for EAD items when the Responder is the Attester.
For the mutual attestation at the EDHOC Responder, only the Attestation_proposal/Result_proposal in EAD_2 is not protected to active attackers.
Both the Attestation_request/Result_request in EAD_3 and the Evidence/Result in EAD_4 are protected.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="edhoc-external-authorization-data-registry">
        <name>EDHOC External Authorization Data Registry</name>
        <t>IANA is requested to register the following entry in the "EDHOC External Authorization Data" registry under the group name "Ephemeral Diffie-Hellman Over Cose (EDHOC)".</t>
        <ul spacing="normal">
          <li>
            <t>The ead_label = TBD1 corresponds to the ead_value Attestation_proposal in <xref target="attestation-proposal"/>, Attestation_request in <xref target="attestation-request"/> and Evidence in <xref target="evidence"/>.</t>
          </li>
          <li>
            <t>The ead_label = TBD2 corresponds to the ead_value Result_proposal in <xref target="result-proposal"/>, Result_request in <xref target="result-request"/> and the Result in <xref target="result"/>.</t>
          </li>
          <li>
            <t>The ead_label = TBD3 corresponds to the EAT item trigger_pp as specified in <xref target="trigger-pp"/>.</t>
          </li>
        </ul>
        <figure anchor="fig-ead-labels">
          <name>EAD labels.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="536" viewBox="0 0 536 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,208" fill="none" stroke="black"/>
                <path d="M 104,32 L 104,208" fill="none" stroke="black"/>
                <path d="M 168,32 L 168,208" fill="none" stroke="black"/>
                <path d="M 368,32 L 368,208" fill="none" stroke="black"/>
                <path d="M 528,32 L 528,208" fill="none" stroke="black"/>
                <path d="M 8,32 L 528,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 528,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 528,66" fill="none" stroke="black"/>
                <path d="M 8,112 L 528,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 528,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 528,208" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Name</text>
                  <text x="136" y="52">Label</text>
                  <text x="224" y="52">Description</text>
                  <text x="416" y="52">Reference</text>
                  <text x="32" y="84">TBD</text>
                  <text x="132" y="84">TBD1</text>
                  <text x="188" y="84">BG</text>
                  <text x="224" y="84">model</text>
                  <text x="208" y="100">related</text>
                  <text x="288" y="100">information</text>
                  <text x="408" y="100">Section</text>
                  <text x="472" y="100">5.2.1.1</text>
                  <text x="32" y="132">TBD</text>
                  <text x="132" y="132">TBD2</text>
                  <text x="188" y="132">PP</text>
                  <text x="224" y="132">model</text>
                  <text x="208" y="148">related</text>
                  <text x="288" y="148">information</text>
                  <text x="408" y="148">Section</text>
                  <text x="472" y="148">5.2.2.1</text>
                  <text x="32" y="180">TBD</text>
                  <text x="132" y="180">TBD3</text>
                  <text x="208" y="180">trigger</text>
                  <text x="252" y="180">to</text>
                  <text x="288" y="180">start</text>
                  <text x="224" y="196">attestation</text>
                  <text x="284" y="196">in</text>
                  <text x="308" y="196">PP</text>
                  <text x="408" y="196">Section</text>
                  <text x="472" y="196">5.2.2.1</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+-----------+-------+------------------------+-------------------+
| Name      | Label | Description            | Reference         |
+===========+=======+========================+===================+
| TBD       | TBD1  | BG model               |                   |
|           |       | related information    | Section 5.2.1.1   |
+-----------+-------+------------------------+-------------------+
| TBD       | TBD2  | PP model               |                   |
|           |       | related information    | Section 5.2.2.1   |
+-----------+-------+------------------------+-------------------+
| TBD       | TBD3  | trigger to start       |                   |
|           |       | attestation in PP      | Section 5.2.2.1   |
+-----------+-------+------------------------+-------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9393">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="I-D.ietf-iotops-7228bis">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Mehmet Ersue" initials="M." surname="Ersue">
         </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Carles Gomez" initials="C." surname="Gomez">
              <organization>Universitat Politecnica de Catalunya</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   The Internet Protocol Suite is increasingly used on small devices
   with severe constraints on power, memory, and processing resources,
   creating constrained-node networks.  This document provides a number
   of basic terms that have been useful in the standardization work for
   constrained-node networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-7228bis-02"/>
        </reference>
        <reference anchor="IANA.CWT.Claims" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA-CoAP-Content-Formats" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>CoAP Content-Formats</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-lake-authz">
          <front>
            <title>Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE (ELA)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Geovane Fedrecheski" initials="G." surname="Fedrecheski">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   Ephemeral Diffie-Hellman Over COSE (EDHOC) is a lightweight
   authenticated key exchange protocol intended for use in constrained
   scenarios.  This document specifies Lightweight Authorization using
   EDHOC (ELA).  The procedure allows authorizing enrollment of new
   devices using the extension point defined in EDHOC.  ELA is
   applicable to zero-touch onboarding of new devices to a constrained
   network leveraging trust anchors installed at manufacture time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-authz-05"/>
        </reference>
        <reference anchor="IANA-COSE-Header-Parameters" target="https://www.iana.org/cose/header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 668?>

<section anchor="example-remote-attestation-flow">
      <name>Example: Remote Attestation Flow</name>
      <figure anchor="_figure-iot-example">
        <name>Example of remote attestation.</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="992" width="576" viewBox="0 0 576 992" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,112" fill="none" stroke="black"/>
              <path d="M 32,112 L 32,976" fill="none" stroke="black"/>
              <path d="M 136,72 L 136,104" fill="none" stroke="black"/>
              <path d="M 168,112 L 168,976" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,112" fill="none" stroke="black"/>
              <path d="M 288,48 L 288,112" fill="none" stroke="black"/>
              <path d="M 368,112 L 368,976" fill="none" stroke="black"/>
              <path d="M 440,352 L 440,360" fill="none" stroke="black"/>
              <path d="M 448,48 L 448,112" fill="none" stroke="black"/>
              <path d="M 480,80 L 480,112" fill="none" stroke="black"/>
              <path d="M 528,112 L 528,976" fill="none" stroke="black"/>
              <path d="M 568,80 L 568,112" fill="none" stroke="black"/>
              <path d="M 8,32 L 224,32" fill="none" stroke="black"/>
              <path d="M 288,48 L 448,48" fill="none" stroke="black"/>
              <path d="M 8,64 L 224,64" fill="none" stroke="black"/>
              <path d="M 288,80 L 448,80" fill="none" stroke="black"/>
              <path d="M 480,80 L 568,80" fill="none" stroke="black"/>
              <path d="M 8,112 L 224,112" fill="none" stroke="black"/>
              <path d="M 288,112 L 448,112" fill="none" stroke="black"/>
              <path d="M 480,112 L 568,112" fill="none" stroke="black"/>
              <path d="M 168,240 L 360,240" fill="none" stroke="black"/>
              <path d="M 368,288 L 520,288" fill="none" stroke="black"/>
              <path d="M 376,400 L 528,400" fill="none" stroke="black"/>
              <path d="M 176,480 L 368,480" fill="none" stroke="black"/>
              <path d="M 40,560 L 168,560" fill="none" stroke="black"/>
              <path d="M 32,624 L 160,624" fill="none" stroke="black"/>
              <path d="M 168,704 L 360,704" fill="none" stroke="black"/>
              <path d="M 368,800 L 520,800" fill="none" stroke="black"/>
              <path d="M 376,864 L 528,864" fill="none" stroke="black"/>
              <path d="M 368,880 L 392,880" fill="none" stroke="black"/>
              <path d="M 376,912 L 392,912" fill="none" stroke="black"/>
              <path d="M 176,960 L 360,960" fill="none" stroke="black"/>
              <path d="M 392,880 C 400.83064,880 408,887.16936 408,896" fill="none" stroke="black"/>
              <path d="M 392,912 C 400.83064,912 408,904.83064 408,896" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="528,800 516,794.4 516,805.6" fill="black" transform="rotate(0,520,800)"/>
              <polygon class="arrowhead" points="528,288 516,282.4 516,293.6" fill="black" transform="rotate(0,520,288)"/>
              <polygon class="arrowhead" points="384,912 372,906.4 372,917.6" fill="black" transform="rotate(180,376,912)"/>
              <polygon class="arrowhead" points="384,864 372,858.4 372,869.6" fill="black" transform="rotate(180,376,864)"/>
              <polygon class="arrowhead" points="384,400 372,394.4 372,405.6" fill="black" transform="rotate(180,376,400)"/>
              <polygon class="arrowhead" points="368,960 356,954.4 356,965.6" fill="black" transform="rotate(0,360,960)"/>
              <polygon class="arrowhead" points="368,704 356,698.4 356,709.6" fill="black" transform="rotate(0,360,704)"/>
              <polygon class="arrowhead" points="368,240 356,234.4 356,245.6" fill="black" transform="rotate(0,360,240)"/>
              <polygon class="arrowhead" points="184,960 172,954.4 172,965.6" fill="black" transform="rotate(180,176,960)"/>
              <polygon class="arrowhead" points="184,480 172,474.4 172,485.6" fill="black" transform="rotate(180,176,480)"/>
              <polygon class="arrowhead" points="168,624 156,618.4 156,629.6" fill="black" transform="rotate(0,160,624)"/>
              <polygon class="arrowhead" points="48,560 36,554.4 36,565.6" fill="black" transform="rotate(180,40,560)"/>
              <g class="text">
                <text x="72" y="52">EDHOC</text>
                <text x="136" y="52">Initiator</text>
                <text x="328" y="68">EDHOC</text>
                <text x="392" y="68">Responder</text>
                <text x="64" y="84">Attestation</text>
                <text x="180" y="84">Attester</text>
                <text x="48" y="100">Service</text>
                <text x="336" y="100">Relying</text>
                <text x="392" y="100">Party</text>
                <text x="524" y="100">Verifier</text>
                <text x="192" y="164">EDHOC</text>
                <text x="256" y="164">message_1</text>
                <text x="208" y="180">{...}</text>
                <text x="212" y="196">EAD_1(</text>
                <text x="252" y="212">types(a,b,c)</text>
                <text x="192" y="228">)</text>
                <text x="428" y="276">types(a,b,c)</text>
                <text x="400" y="340">Body:</text>
                <text x="432" y="340">{</text>
                <text x="416" y="356">nonce</text>
                <text x="200" y="372">EDHOC</text>
                <text x="264" y="372">message_2</text>
                <text x="436" y="372">types(a,b)</text>
                <text x="208" y="388">{...}</text>
                <text x="384" y="388">}</text>
                <text x="212" y="404">EAD_2(</text>
                <text x="228" y="420">nonce,</text>
                <text x="232" y="436">type(a)</text>
                <text x="192" y="452">)</text>
                <text x="260" y="468">Auth_CRED(Sig/MAC)</text>
                <text x="84" y="500">Body:{</text>
                <text x="92" y="516">nonce,</text>
                <text x="96" y="532">type(a)</text>
                <text x="64" y="548">}</text>
                <text x="68" y="580">Body:{</text>
                <text x="92" y="596">Evidence</text>
                <text x="48" y="612">}</text>
                <text x="200" y="644">EDHOC</text>
                <text x="264" y="644">message_3</text>
                <text x="208" y="660">{...}</text>
                <text x="240" y="676">Evidence(EAT)</text>
                <text x="260" y="692">Auth_CRED(sig/MAC)</text>
                <text x="400" y="772">Body:</text>
                <text x="432" y="772">{</text>
                <text x="452" y="788">EAT}</text>
                <text x="400" y="820">Body:</text>
                <text x="432" y="820">{</text>
                <text x="432" y="836">att-result:</text>
                <text x="500" y="836">AR{}</text>
                <text x="384" y="852">}</text>
                <text x="444" y="900">verify</text>
                <text x="492" y="900">AR{}</text>
                <text x="248" y="948">application</text>
                <text x="316" y="948">data</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
.--------------------------.
|     EDHOC Initiator      |       .-------------------.
+--------------------------+       |  EDHOC Responder  |
| Attestation   | Attester |       +-------------------+   .----------.
| Service       |          |       |  Relying Party    |   | Verifier |
'--+----------------+------'       '---------+---------'   '-----+----'
   |                |                        |                   |
   |                |                        |                   |
   |                |EDHOC message_1         |                   |
   |                |  {...}                 |                   |
   |                |  EAD_1(                |                   |
   |                |    types(a,b,c)        |                   |
   |                |  )                     |                   |
   |                +----------------------->|                   |
   |                |                        |                   |
   |                |                        | types(a,b,c)      |
   |                |                        +------------------>|
   |                |                        |                   |
   |                |                        |                   |
   |                |                        | Body: {           |
   |                |                        |   nonce,          |
   |                | EDHOC message_2        |   types(a,b)      |
   |                |  {...}                 | }                 |
   |                |  EAD_2(                |<------------------+
   |                |    nonce,              |                   |
   |                |    type(a)             |                   |
   |                |  )                     |                   |
   |                |  Auth_CRED(Sig/MAC)    |                   |
   |                |<-----------------------+                   |
   |   Body:{       |                        |                   |
   |    nonce,      |                        |                   |
   |    type(a)     |                        |                   |
   |   }            |                        |                   |
   |<---------------+                        |                   |
   | Body:{         |                        |                   |
   |   Evidence     |                        |                   |
   | }              |                        |                   |
   +--------------->|                        |                   |
   |                | EDHOC message_3        |                   |
   |                |  {...}                 |                   |
   |                |  Evidence(EAT)         |                   |
   |                |  Auth_CRED(sig/MAC)    |                   |
   |                +----------------------->|                   |
   |                |                        |                   |
   |                |                        |                   |
   |                |                        |                   |
   |                |                        | Body: {           |
   |                |                        |        EAT}       |
   |                |                        +------------------>|
   |                |                        | Body: {           |
   |                |                        |  att-result: AR{} |
   |                |                        | }                 |
   |                |                        |<------------------+
   |                |                        +---.               |
   |                |                        |    | verify AR{}  |
   |                |                        |<--'               |
   |                |                        |                   |
   |                |    application data    |                   |
   |                |<---------------------->|                   |
   |                |                        |                   |
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="remote-attestation-in-parallel-with-enrollment-authorization">
      <name>Remote attestation in parallel with enrollment authorization</name>
      <t>This section discusses the possibility of doing remote attestation in parallel with the enrollment authorization procedure defined in <xref target="I-D.ietf-lake-authz"/>.
In this case, the message count is much decreased.</t>
      <t>The detailed procedure is TBD.</t>
    </section>
    <section anchor="firmware">
      <name>Example: Firmware Version</name>
      <t>The goal in this example is to verify that the firmware running on the device is the latest version, and is neither tampered or compromised.
A device acts as the Attester, currently in an untrusted state.
The Attester needs to generate the evidence to attest itself.
A gateway that can communicate with the Attester and can control its access to the network acts as the Relying Party.
The gateway will finally decide whether the device can join the network or not depending on the attestation result.
The attestation result is produced by the Verifier, which is a web server that can be seen as the manufacturer of the device.
Therefore it can appraise the evidence that is sent by the Attester.
The remote attestation session starts with the Attester sending EAD_1 in EDHOC message 1.</t>
      <t>An example of the EAD_1 in EDHOC message_1 could be:</t>
      <artwork><![CDATA[
[60,61,258]
]]></artwork>
      <t>If the Verifier and the Relying Party can support at least one evidence type that is proposed by the Attester, the Relying Party will include in the EAD_2 field the same evidence type, alongside a nonce for message freshness.</t>
      <artwork><![CDATA[
(258, h'a29f62a4c6cdaae5')
]]></artwork>
      <t>The Evidence in EAD_3 field is an Entity Attestation Token (EAT) <xref target="RFC9711"/>, with the measurements claim formatted in CoSWID<xref target="RFC9393"/>.
The components of the Evidence should at least be:</t>
      <artwork><![CDATA[
{
/eat-nonce/                 10: h'a29f62a4c6cdaae5',
/ueid/                      256: 'aaabbcc',
/measurements/              273: [
  /CoAP Content-Format ID/        [ 258,
  /evidence in CoSWID/              {
                                      0: 'tagID'             /tag-id/
                                      12: 0                  /tag-version/
                                      1: "DotBot firmware"   /software-name/
                                      2: {                   /entity/
                                          31: "Attester"     /entity-name/
                                          33: 1              /role, must be "tag-creator" which is 1/
                                          },
                                      3: {                   /evidence/
                                          17: [              /file/
                                               {
                                                24: "partition0-nrf52840dk.bin",   /fs-name/
                                                7: [                               /hash of file/
                                                    1,                             /alg SHA-256/
                                                    h'06294f6806b9c685eea795048579cfd02a0c025bc8b5abca42a19ea0ec23e81a'
                                                    ]                              /hash value/
                                                }
                                               ]
                                          }
                                    }
                                  ]
                                 ]
}
]]></artwork>
      <t>The infomation above serves as the payload of the COSE object.
The complete resulting COSE object is:</t>
      <artwork><![CDATA[
18([
    /*protected header*/
    h'a10127',

    /*unprotected header*/
    {},

    /*payload*/
    h'A30A48A29F62A4C6CDAAE519010047616161626263631901118182190102A50045746
    16749440C00016F446F74426F74206669726D7761726502A2181F684174746573746572
    18210103A11181A218187819706172746974696F6E302D6E72663532383430646B2E626
    96E078201582006294F6806B9C685EEA795048579CFD02A0C025BC8B5ABCA42A19EA0EC
    23E81A',

    /*signature*/
    h'd4100901f4c3e51312c3110c6ddc8dcf7f68d8f5d3791c19133f2f0ac158c1f5ee6ed
    afe9d7c3d6eb3d2d197f82e733d375fdda9fb258b304961dfc38558950d'
])
]]></artwork>
      <t>which has the following base16 encoding:</t>
      <artwork><![CDATA[
D28443A10127A05890A30A48A29F62A4C6CDAAE51901004761616162626363190111818
2190102A5004574616749440C00016F446F74426F74206669726D7761726502A2181F68
417474657374657218210103A11181A218187819706172746974696F6E302D6E7266353
2383430646B2E62696E078201582006294F6806B9C685EEA795048579CFD02A0C025BC8
B5ABCA42A19EA0EC23E81A5840D4100901F4C3E51312C3110C6DDC8DCF7F68D8F5D3791
C19133F2F0AC158C1F5EE6EDAFE9D7C3D6EB3D2D197F82E733D375FDDA9FB258B304961
DFC38558950D
]]></artwork>
      <t>The Relying Party (co-located with the gateway) then treats the Evidence as opaque and sends it to the Verifier.
Once the Verifier sends back the Attestation Result, the Relying Party can be assured on the version of the firmware that the device is running.</t>
    </section>
    <section anchor="post-handshake-attestation-over-oscore">
      <name>Post-handshake Attestation over OSCORE</name>
      <t>Beyond the intra-handshake attestation defined in this document, remote attestation after an EDHOC session can be performed via post-handshake attestation over Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>.
OSCORE provides application-layer protection for the Constrained Application Protocol (CoAP) using CBOR Object Signing and Encryption (COSE).
As specified in <xref target="RFC9668"/>, EDHOC can run over CoAP to establish a Security Context for OSCORE.</t>
      <t>Post-handshake attestation decouples attestation process from the initial handshake, enabling continuous attestation throughout the session lifetime and guaranteeing the runtime integrity.</t>
      <section anchor="mapping-attestation-to-oscore">
        <name>Mapping Attestation to OSCORE</name>
        <t>This section outlines how remote attestation is performed in the background-check model over OSCORE.</t>
        <t>EDITOR NOTE: put a figure</t>
        <section anchor="flight-1">
          <name>Flight 1</name>
          <t>The CoAP client (Attester) initiates attestation with a CoAP request:</t>
          <ul spacing="normal">
            <li>
              <t>The request method is POST.</t>
            </li>
            <li>
              <t>The Uri-path is set to ".well-known/attest".</t>
            </li>
            <li>
              <t>The payload is the Attestation_proposal CBOR sequence, where Attestation_proposal is constructed as defined in <xref target="attestation-proposal"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="flight-2">
          <name>Flight 2</name>
          <t>The CoAP server (Relying Party) receives the request and processes it as described in <xref target="bg"/> then prepares Attestation_request as defined in <xref target="attestation-request"/>.
The CoAP server maps the message to a CoAP response:</t>
          <ul spacing="normal">
            <li>
              <t>The response code is 2.04 Changed.</t>
            </li>
            <li>
              <t>The payload is the Attestation_request CBOR sequence, as defined in <xref target="attestation-request"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="flight-3">
          <name>Flight 3</name>
          <t>The CoAP client (Attester) receives the response and processes it as described in <xref target="bg"/> then generates the evidence.
The CoAP client maps the message to a CoAP request:</t>
          <ul spacing="normal">
            <li>
              <t>The request method is POST.</t>
            </li>
            <li>
              <t>The Uri-path is set to ".well-known/attest".</t>
            </li>
            <li>
              <t>The payload is the Evidence CBOR sequence, as defined in <xref target="evidence"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="differences-between-intra-handshake-and-post-handshake-attestation">
        <name>Differences between Intra-handshake and Post-handshake Attestation</name>
        <t>Intra-handshake attestation embeds evidence exchange into the authentication handshake, cryptographically tying identity to device state and blocking unauthenticated and untrusted devices from completing the handshake.
Post-handshake attestation separates attestation from the authentication handshake, providing modularity that allows attestation mechanisms to be integrated independently of the handshake protocol.
This section compares the two different types of remote attestation methods in terms of performance and security properties.</t>
        <section anchor="performance-properties">
          <name>Performance properties</name>
          <t>Intra-handshake attestation provides round-trip efficiency as attestation occurs within the handshake, requiring no additional round trips.
The intra-handshake attestation defined in this document does not modify the EDHOC protocol itself, though other intra-handshake designs may require changes.
Post-handshake has higher modularity which the attestation is integrated independently but it requires additional round trips.</t>
        </section>
        <section anchor="security-properties">
          <name>Security properties</name>
          <t>Remote attestation provides security properties including evidence integrity, freshness guarantees, and replay protection.
Besides, intra-handshake attestation is cryptographically bound to the authentication process, and the trust is established before the session begins.
Post-handshake attestation gurantees the runtime integrity which can obtain dynamic mesurements during device execution, and can be repeatedly performed throughout the session which has the continuous assurance.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author would like to thank Thomas Fossati, Malisa Vucinic, Ionut Mihalcea, Muhammad Usama Sardar, Michael Richardson and Geovane Fedrecheski for the provided ideas and feedback.</t>
      <t>Work on this document has in part been supported by the Horizon Europe Framework Programme project OpenSwarm (grant agreement No. 101093046).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
