<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-lamps-attestation-freshness-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Nonce Extension for CMP/EST">Nonce-based Freshness for Remote Attestation in Certificate Signing Requests (CSRs) for the Certification Management Protocol (CMP) and for Enrollment over Secure Transport (EST)</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>

    <date year="2024" month="July" day="08"/>

    <area>Security</area>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 67?>

<t>When an end entity includes attestation Evidence in a Certificate Signing Request (CSR), it may be necessary to demonstrate the freshness of the provided Evidence. Current attestation technology commonly achieves this using nonces.</t>

<t>This document outlines the process through which nonces are supplied to the end entity by an RA/CA for inclusion in Evidence, leveraging the Certificate Management Protocol (CMP) and Enrollment over Secure Transport (EST)</t>



    </abstract>



  </front>

  <middle>


<?line 73?>

<section anchor="introduction"><name>Introduction</name>

<t>The management of certificates, encompassing issuance, CA certificate provisioning, renewal, and revocation, has been streamlined through standardized protocols.</t>

<t>The Certificate Management Protocol (CMP) <xref target="I-D.ietf-lamps-rfc4210bis"/> defines messages for X.509v3 certificate creation and management. CMP facilitates interactions between end entities and PKI management entities, such as Registration Authorities (RAs) and Certification Authorities (CAs). For Certificate Signing Requests (CSRs), CMP primarily utilizes the Certificate Request Message Format (CRMF) <xref target="RFC4211"/> but also supports PKCS#10 <xref target="RFC2986"/>.</t>

<t>Enrollment over Secure Transport (EST) (<xref target="RFC7030"/>, <xref target="RFC8295"/>) is another certificate management protocol that provides a subset of CMP's features, primarily using PKCS#10 for CSRs.</t>

<t>When an end entity requests a certificate from a Certification Authority (CA), it may need to assert credible claims about the protections of the corresponding private key, such as the use of a hardware security module or the protective capabilities provided by the hardware, as well as claims about the platform itself.</t>

<t>To include these claims as Evidence in remote attestation, the remote attestation extension <xref target="I-D.ietf-lamps-csr-attestation"/> has been defined. It specifies how Evidence produced by an Attester is encoded for inclusion in CRMF or PKCS#10, along with any necessary certificates for its validation.</t>

<t>For a Verifier or Relying Party to ensure the freshness of the Evidence, knowing the exact time of its production is crucial. Current attestation technologies, like T<xref target="TPM20"/> and <xref target="I-D.tschofenig-rats-psa-token"/>, often employ nonces to ensure the freshness of Evidence. Further details on ensuring Evidence freshness can be found in Section 10 of <xref target="RFC9334"/>.</t>

<t>Since an end entity requires a nonce from the Verifier via the Relying Party, an additional roundtrip is necessary. However, a CSR is a one-shot message. Therefore, CMP and EST enable the end entity to request information from the RA/CA before submitting a certification request conveniently.</t>

<t>Once the nonce is obtained, the end entity invokes an API on the Attester, providing the nonce as an input parameter. The Attester then returns the Evidence, which is embedded into a CSR and submitted back to the RA/CA in a certification request message.</t>

<t><xref target="fig-arch"/> illustrates this interaction:</t>

<t><list style="symbols">
  <t>The nonce is acquired in step (1) using the extension to CMP/EST defined in this document.</t>
  <t>The CSR extension <xref target="I-D.ietf-lamps-csr-attestation"/> conveys Evidence to the RA/CA in step (2).</t>
  <t>The Verifier processes the received information and sends an Attestation Result to the Relying Party in step (3).</t>
</list></t>

<figure title="Architecture with Background Check Model." anchor="fig-arch"><artset><artwork  type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="448" viewBox="0 0 448 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
<path d="M 8,176 L 8,320" fill="none" stroke="black"/>
<path d="M 48,240 L 48,272" fill="none" stroke="black"/>
<path d="M 112,176 L 112,320" fill="none" stroke="black"/>
<path d="M 240,32 L 240,96" fill="none" stroke="black"/>
<path d="M 240,176 L 240,200" fill="none" stroke="black"/>
<path d="M 240,216 L 240,320" fill="none" stroke="black"/>
<path d="M 280,104 L 280,208" fill="none" stroke="black"/>
<path d="M 320,104 L 320,240" fill="none" stroke="black"/>
<path d="M 344,104 L 344,168" fill="none" stroke="black"/>
<path d="M 368,32 L 368,96" fill="none" stroke="black"/>
<path d="M 368,176 L 368,320" fill="none" stroke="black"/>
<path d="M 240,32 L 368,32" fill="none" stroke="black"/>
<path d="M 240,96 L 368,96" fill="none" stroke="black"/>
<path d="M 8,176 L 112,176" fill="none" stroke="black"/>
<path d="M 240,176 L 272,176" fill="none" stroke="black"/>
<path d="M 288,176 L 312,176" fill="none" stroke="black"/>
<path d="M 328,176 L 368,176" fill="none" stroke="black"/>
<path d="M 120,208 L 280,208" fill="none" stroke="black"/>
<path d="M 120,240 L 232,240" fill="none" stroke="black"/>
<path d="M 248,240 L 320,240" fill="none" stroke="black"/>
<path d="M 8,320 L 112,320" fill="none" stroke="black"/>
<path d="M 240,320 L 368,320" fill="none" stroke="black"/>
<polygon class="arrowhead" points="352,168 340,162.4 340,173.6 " fill="black" transform="rotate(90,344,168)"/>
<polygon class="arrowhead" points="328,104 316,98.4 316,109.6 " fill="black" transform="rotate(270,320,104)"/>
<polygon class="arrowhead" points="240,240 228,234.4 228,245.6 " fill="black" transform="rotate(0,232,240)"/>
<polygon class="arrowhead" points="128,208 116,202.4 116,213.6 " fill="black" transform="rotate(180,120,208)"/>
<polygon class="arrowhead" points="56,272 44,266.4 44,277.6 " fill="black" transform="rotate(90,48,272)"/>
<polygon class="arrowhead" points="56,240 44,234.4 44,245.6 " fill="black" transform="rotate(270,48,240)"/>
<g class="text">
<text x="300" y="68">Verifier</text>
<text x="392" y="116">(3)</text>
<text x="400" y="132">Attestation</text>
<text x="396" y="148">Result</text>
<text x="168" y="164">(1)</text>
<text x="160" y="180">Nonce</text>
<text x="196" y="180">in</text>
<text x="152" y="196">CMP</text>
<text x="180" y="196">or</text>
<text x="208" y="196">EST</text>
<text x="40" y="212">End</text>
<text x="52" y="228">Entity</text>
<text x="172" y="260">Evidence</text>
<text x="280" y="260">Relying</text>
<text x="148" y="276">in</text>
<text x="176" y="276">CSR</text>
<text x="272" y="276">Party</text>
<text x="328" y="276">(RA/CA)</text>
<text x="60" y="292">Attester</text>
<text x="168" y="292">(2)</text>
</g>
</svg>
</artwork><artwork  type="ascii-art"><![CDATA[
                              .---------------.
                              |               |
                              |   Verifier    |
                              |               |
                              '---------------'
                                   |    ^  |    (3)
                                   |    |  | Attestation
                                   |    |  |   Result
                    (1)            |    |  v
 .------------.   Nonce in    .----|----|-----.
 |            |   CMP or EST  |    |    |     |
 |  End       |<-------------------+    |     |
 |  Entity    |               |         |     |
 |    ^       |-------------->|---------'     |
 |    |       |   Evidence    | Relying       |
 |    v       |   in CSR      | Party (RA/CA) |
 |  Attester  |     (2)       |               |
 |            |               |               |
 '------------'               '---------------'
]]></artwork></artset></figure>

<t>The functionality described in this document is divided into two sections:</t>

<t><list style="symbols">
  <t><xref target="CMP"/> describes how to convey the nonce using CMP.</t>
  <t><xref target="EST"/> describes the equivalent functionality for EST.</t>
</list></t>

</section>
<section anchor="terminology-and-requirements-language"><name>Terminology and Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>

<t>The terms Attester, Relying Party, Verifier and Evidence are defined
in <xref target="RFC9334"/>. The terms end entity, certification authority (CA),
and registration authority (RA) are defined in <xref target="RFC5280"/>.</t>

<t>We use the terms Certificate Signing Request (CSR) and certification
request interchangeably.</t>

</section>
<section anchor="CMP"><name>Conveying a Nonce in CMP</name>

<t>Section 5.3.19 of <xref target="I-D.ietf-lamps-rfc4210bis"/> defines the
general request message (genm) and general response (genp).
The NonceRequest payload of the genm message, sent by the end
entity to request a nonce, optionally includes details on the
required length of the nonce from the Attester. The NonceResponse
payload of the genp message, sent by the CA/RA in response to the
request, contains the nonce itself.</t>

<figure><artwork><![CDATA[
 GenMsg:    {id-it TBD1}, NonceRequestValue
 GenRep:    {id-it TBD2}, NonceResponseValue | < absent >

 id-it-nonceRequest OBJECT IDENTIFIER ::= { id-it TBD1 }
 NonceRequestValue ::= SEQUENCE {
    len INTEGER OPTIONAL,
    -- indicates the required length of the requested nonce
    hint EvidenceHint OPTIONAL
    -- indicates which Verifier to request a nonce from
 }

 id-it-nonceResponse OBJECT IDENTIFIER ::= { id-it TBD2 }
 NonceResponseValue ::= SEQUENCE {
    nonce OCTET STRING
    -- contains the nonce of length len
    -- provided by the Verifier indicated with hint
    expiry Time OPTIONAL
    -- indicates how long the Verifier considers the
    -- nonce valid
 }
]]></artwork></figure>

<t>Note: The EvidenceHint structure is defined in <xref target="I-D.ietf-lamps-csr-attestation"/>.
It allows the Attester to specify to the Relying Party which Verifier should be
contacted to obtain the nonce.</t>

<t>The use of the general request/response message exchange leads to an
extra roundtrip to convey the nonce from the CA/RA to the end entity
(and ultimately to the Attester inside the end entity).</t>

<t>The use of the general request/response message exchange introduces an additional
roundtrip for transmitting the nonce from the CA/RA to the end entity (and
subsequently to the Attester within the end entity).</t>

<t>The end entity MUST construct a NonceRequest message to prompt
the RA/CA to send a nonce in response.</t>

<t>Open Issue: Should the request message indicate the remote attestation capability
of the Attester rather than relying solely on "policy information"? This might
allow the Attester (and the end entity) to inform the RA/CA about the specific
attestation technologies available.</t>

<t>If the end entity supports remote attestation and the policy dictates the inclusion
of Evidence in a CSR, the RA/CA responds with a NonceResponse message containing
the requested nonce.</t>

<t>The interaction is illustrated in <xref target="fig-cmp-msg"/>.</t>

<figure title="CMP Exchange with Nonce and Evidence." anchor="fig-cmp-msg"><artwork><![CDATA[
End Entity                                          RA/CA
==========                                      =============

              -->>-- NonceRequest -->>--
                                                Verify request
                                                Generate nonce*
                                                Create response
              --<<-- NonceResponse --<<--
                    (nonce, expiry)

Generate key pair
Generate Evidence*
Generate certification request message
              -->>-- certification request -->>--
                   +Evidence including nonce)
                                               Verify request
                                               Verify Evidence*
                                               Check for replay*
                                               Issue certificate
                                               Create response
              --<<-- certification response --<<--
Handle response
Store certificate

*: These steps require interactions with the Attester
(on the EE side) and with the Verifier (on the RA/CA side).
]]></artwork></figure>

<t>If HTTP is used to transfer the NonceRequest and NonceResponse
messages, the OPTIONAL &lt;operation&gt; path segment defined in Section 3.6
of <xref target="I-D.ietf-lamps-rfc4210bis"/> MAY be used.</t>

<figure><artwork><![CDATA[
 +------------------------+-----------------+-------------------+
 | Operation              |Operation path   | Details           |
 +========================+=================+===================+
 | Get Attestation        | getnonce        | {{CMP}}           |
 | Freshness Nonce        |                 |                   |
 +------------------------+-----------------+-------------------+
]]></artwork></figure>

<t>If CoAP is used for transferring NonceRequest and NonceResponse messages,
the OPTIONAL &lt;operation&gt; path segment defined in Section 2.1 of
<xref target="RFC9482"/> MAY be used.</t>

<figure><artwork><![CDATA[
 +------------------------+-----------------+-------------------+
 | Operation              |Operation path   | Details           |
 +========================+=================+===================+
 | Get Attestation        | nonce           | {{CMP}}           |
 | Freshness Nonce        |                 |                   |
 +------------------------+-----------------+-------------------+
]]></artwork></figure>

</section>
<section anchor="EST"><name>Conveying a Nonce in EST</name>

<t>The EST client requests a nonce for its Attester from the EST server.
This function typically follows the request for CA certificates and
precedes other EST operations.</t>

<t>The EST server MUST support the path-prefix of "/.well-known/" as
defined in <xref target="RFC5785"/> and the registered name of "est".
Therefore, a valid EST server URI path begins with
"https://www.example.com/.well-known/est". Each EST operation is
indicated by a path-suffix that specifies the intended operation.</t>

<t>The following operation is defined by this specification:</t>

<figure><artwork><![CDATA[
 +------------------------+-----------------+-------------------+
 | Operation              |Operation path   | Details           |
 +========================+=================+===================+
 | Retrieval of a nonce   | /nonce          | {{EST}}           |
 +------------------------+-----------------+-------------------+
]]></artwork></figure>
<t>The operation path is appended to the path-prefix to form the URI
used with HTTP GET or POST to perform the desired EST operation.
An example of a valid URI absolute path for the "/nonce" operation
is "/.well-known/est/nonce".</t>

<section anchor="request-methods"><name>Request Methods</name>

<t>An EST client uses either a GET or a POST method, depending on
whether additional parameters need to be conveyed:</t>

<t><list style="symbols">
  <t>A GET request MUST be used when the EST client does not want to
convey extra parameters.</t>
  <t>A POST request MUST be used when parameters, such as nonce length
or a hint about the verification service, are included in the request.</t>
</list></t>

<figure><artwork><![CDATA[
 +-------------------+---------------------------------+---------------+
 | Message type      | Media type(s)                   | Reference     |
 | (per operation)   |                                 |               |
 +===================+=================================+===============+
 | Nonce Request     | N/A (for GET) or                | This section  |
 |                   | application/json (for POST)     |               |
 +===================+=================================+===============+
 | Nonce Response    | application/json                | This section  |
 |                   |                                 |               |
 +===================+=================================+===============+
]]></artwork></figure>

</section>
<section anchor="example-requests"><name>Example Requests</name>

<t>To retrieve a nonce using a GET request:</t>

<figure><artwork><![CDATA[
GET /.well-known/est/nonce HTTP/1.1
]]></artwork></figure>

<t>To retrieve a nonce while specifying the size and providing a hint about the
verification service using a POST request:</t>

<figure><artwork><![CDATA[
POST /.well-known/est/nonce HTTP/1.1
Content-Type: application/json
{
  "len": 8,
  "hint": "https://example.com"
}
]]></artwork></figure>

<t>The payload in a POST request MUST be of content-type "application/json" and
MUST contain a JSON object  <xref target="RFC7159"/> with the member "len" indicating the
length of the requested nonce value in bytes, and optionally the "hint" member,
which specifies an FQDN based on the definition in the EvidenceHint structure
from <xref target="I-D.ietf-lamps-csr-attestation"/>).</t>

</section>
<section anchor="server-response"><name>Server Response</name>

<t>If successful, the EST server MUST respond with an HTTP 200 status code and a
content-type of "application/json", containing a JSON object <xref target="RFC7159"/> with
the "nonce" member. The "expiry" member is optional and indicates the validity
period of the nonce.</t>

<t>The EST server MAY request HTTP-based client authentication, as
explained in Section 3.2.3 of <xref target="RFC7030"/>.</t>

<t>If the request is successful, the EST server response MUST contain
a HTTP 200 response code with a content-type of "application/json"
and a JSON object  <xref target="RFC7159"/> with the member nonce. The expiry
member is optional and indicates the time the nonce is considered
valid. After the expiry time is expired, the session is likely
garbage collected.</t>

<t>Below is an example response:</t>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json

{
    "nonce": "MTIzNDU2Nzg5MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTI=",
    "expiry": "2031-10-12T07:20:50.52Z"
}
]]></artwork></figure>

<t>Open Issue: Should a specific content type be registered for use
with EST over CoAP, where the nonce and expiry fields are encoded
in a CBOR structure?</t>

</section>
</section>
<section anchor="nonce-processing-guidelines"><name>Nonce Processing Guidelines</name>

<t>When the RA/CA is requested to provide a nonce to an
end entity, it interacts with the Verifier.
According to the IETF RATS architecture <xref target="RFC9334"/>, the Verifier is
responsible for validating Evidence about an Attester and generating
Attestation Results for use by a Relying Party. The Verifier also acts as
the source of the nonce to prevent replay attacks.</t>

<t>The nonce value MUST contain a random byte sequence whereby the length
depends on the used remote attestation technology as specific nonce
length may be required by the end entity. This specification assumes
that the RA/CA possesses knowledge, either out-of-band or through the
len field in the NonceRequest, regarding the required nonce length for
the attestation technology. Nonces of incorrect length will cause the
remote attestation protocol to fail.</t>

<t>For instance, the PSA attestation token <xref target="I-D.tschofenig-rats-psa-token"/>
supports nonce lengths of 32, 48, and 64 bytes. Other attestation
technologies employ nonces of similar lengths.</t>

<t>When the end entity requests a nonce, the RA/CA SHOULD respond with a nonce
in the specified length.</t>

<t>If a specific length was requested, the RA/CA must provide a nonce of that size.
The end entity MUST use the received nonce if the remote attestation supports
the requested length. If necessary, the end entity MAY adjust the length of the
nonce by truncating or padding it accordingly.</t>

<t>While this specification does not address the semantics of the attestation API
or the underlying software/hardware architecture, the API returns Evidence from
the Attester in a format specific to the attestation technology used. The
returned Evidence is encapsulated within the CSR, as defined in
<xref target="I-D.ietf-lamps-csr-attestation"/>. The software generating the CSR treats
the Evidence as an opaque blob and does not interpret its format. It's crucial
to note that the nonce is included in the Evidence, either implicitly or
explicitly, and MUST NOT be conveyed in CSR structures outside of the Evidence
payload.</t>

<t>The processing of CSRs containing Evidence is detailed  in
<xref target="I-D.ietf-lamps-csr-attestation"/>. mportantly, certificates issued based
on this process do not contain the nonce, as specified in
<xref target="I-D.ietf-lamps-csr-attestation"/>.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document adds new entries to the "CMP Well-Known URI Path Segments"
registry defined in <xref target="RFC8615"/>.</t>

<figure><artwork><![CDATA[
 +----------------+---------------------------+-----------------+
 | Path Segment   | Description               | Reference       |
 +================+===========================+=================+
 | getnonce       | Get Attestation Freshness | {{cmp}}         |
 |                | Nonce over HTTP           |                 |
 +----------------+---------------------------+-----------------+
 | nonce          | Get Attestation Freshness | {{cmp}}         |
 |                | Nonce over CoAP           |                 |
 +----------------+---------------------------+-----------------+
]]></artwork></figure>

<t>[Open Issue: Register path segments for EST]</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This specification details the process of obtaining a nonce via CMP and EST, assuming that the nonce does not require confidentiality protection while maintaining the security properties of the remote attestation protocol. <xref target="RFC9334"/> defines the IETF remote attestation architecture and extensively discusses nonce-based freshness.</t>

<t>Section 8.4 of <xref target="I-D.ietf-rats-eat"/> specifies requirements for the randomness and privacy of nonce generation when used with the Entity Attestation Token (EAT). These requirements, which are also adopted by attestation technologies like the PSA attestation token <xref target="I-D.tschofenig-rats-psa-token"/>, provide general utility:</t>

<t><list style="symbols">
  <t>The nonce MUST have at least 64 bits of entropy.</t>
  <t>To prevent disclosure of privacy-sensitive information, it should be derived using a salt from a genuinely random number generator or another reliable source of randomness.</t>
</list></t>

<t>Each attestation technology specification offers guidance on replay protection using nonces and other techniques. Specific recommendations are deferred to these individual specifications in this document.</t>

<t>Regarding the use of Evidence in a CSR, the security considerations outlined in <xref target="I-D.ietf-lamps-csr-attestation"/> are pertinent to this specification.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>


<reference anchor="I-D.ietf-lamps-csr-attestation">
   <front>
      <title>Use of Remote Attestation with Certification Signing Requests</title>
      <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
         <organization>Entrust Limited</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>Siemens</organization>
      </author>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         <organization>Beyond Identity</organization>
      </author>
      <author fullname="Ned Smith" initials="N." surname="Smith">
         <organization>Intel Corporation</organization>
      </author>
      <date day="7" month="July" year="2024"/>
      <abstract>
	 <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of Evidence in Certificate Signing Requests (CSRs)
   such as PKCS#10 or Certificate Request Message Format (CRMF) payloads
   which provides an elegant and automatable mechanism for transporting
   Evidence to a Certification Authority.

   Including Evidence along with a CSR can help to improve the
   assessment of the security posture for the private key, and can help
   the Certification Authority to assess whether it satisfies the
   requested certificate profile.  These Evidence Claims can include
   information about the hardware component&#x27;s manufacturer, the version
   of installed or running firmware, the version of software installed
   or running in layers above the firmware, or the presence of hardware
   components providing specific protection capabilities or shielded
   locations (e.g., to protect keys).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-10"/>
   
</reference>


<reference anchor="I-D.ietf-lamps-rfc4210bis">
   <front>
      <title>Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)</title>
      <author fullname="Hendrik Brockhaus" initials="H." surname="Brockhaus">
         <organization>Siemens</organization>
      </author>
      <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
         <organization>Siemens</organization>
      </author>
      <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
         <organization>Entrust</organization>
      </author>
      <author fullname="John Gray" initials="J." surname="Gray">
         <organization>Entrust</organization>
      </author>
      <date day="8" month="July" year="2024"/>
      <abstract>
	 <t>   This document describes the Internet X.509 Public Key Infrastructure
   (PKI) Certificate Management Protocol (CMP).  Protocol messages are
   defined for X.509v3 certificate creation and management.  CMP
   provides interactions between client systems and PKI components such
   as a Registration Authority (RA) and a Certification Authority (CA).

   This document obsoletes RFC 4210 by including the updates specified
   by CMP Updates RFC 9480 Section 2 and Appendix A.2 maintaining
   backward compatibility with CMP version 2 wherever possible and
   obsoletes both documents.  Updates to CMP version 2 are: improving
   crypto agility, extending the polling mechanism, adding new general
   message types, and adding extended key usages to identify special CMP
   server authorizations.  Introducing CMP version 3 to be used only for
   changes to the ASN.1 syntax, which are: support of EnvelopedData
   instead of EncryptedValue, hashAlg for indicating a hash
   AlgorithmIdentifier in certConf messages, and RootCaKeyUpdateContent
   in ckuann messages.

   In addition to the changes specified in CMP Updates RFC 9480 this
   document adds support for management of KEM certificates.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc4210bis-12"/>
   
</reference>

<reference anchor="RFC8295">
  <front>
    <title>EST (Enrollment over Secure Transport) Extensions</title>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="January" year="2018"/>
    <abstract>
      <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8295"/>
  <seriesInfo name="DOI" value="10.17487/RFC8295"/>
</reference>

<reference anchor="RFC7030">
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
    <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
    <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7030"/>
  <seriesInfo name="DOI" value="10.17487/RFC7030"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="RFC5785">
  <front>
    <title>Defining Well-Known Uniform Resource Identifiers (URIs)</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <author fullname="E. Hammer-Lahav" initials="E." surname="Hammer-Lahav"/>
    <date month="April" year="2010"/>
    <abstract>
      <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5785"/>
  <seriesInfo name="DOI" value="10.17487/RFC5785"/>
</reference>

<reference anchor="RFC8615">
  <front>
    <title>Well-Known Uniform Resource Identifiers (URIs)</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="May" year="2019"/>
    <abstract>
      <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
      <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8615"/>
  <seriesInfo name="DOI" value="10.17487/RFC8615"/>
</reference>

<reference anchor="RFC7159">
  <front>
    <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
    <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
    <date month="March" year="2014"/>
    <abstract>
      <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
      <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7159"/>
  <seriesInfo name="DOI" value="10.17487/RFC7159"/>
</reference>

<reference anchor="RFC9482">
  <front>
    <title>Constrained Application Protocol (CoAP) Transfer for the Certificate Management Protocol</title>
    <author fullname="M. Sahni" initials="M." role="editor" surname="Sahni"/>
    <author fullname="S. Tripathi" initials="S." role="editor" surname="Tripathi"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies the use of the Constrained Application Protocol (CoAP) as a transfer mechanism for the Certificate Management Protocol (CMP). CMP defines the interaction between various PKI entities for the purpose of certificate creation and management. CoAP is an HTTP-like client-server protocol used by various constrained devices in the Internet of Things space.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9482"/>
  <seriesInfo name="DOI" value="10.17487/RFC9482"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2986">
  <front>
    <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
    <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <date month="November" year="2000"/>
    <abstract>
      <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2986"/>
  <seriesInfo name="DOI" value="10.17487/RFC2986"/>
</reference>

<reference anchor="RFC4211">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="September" year="2005"/>
    <abstract>
      <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4211"/>
  <seriesInfo name="DOI" value="10.17487/RFC4211"/>
</reference>

<reference anchor="RFC9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>


<reference anchor="I-D.tschofenig-rats-psa-token">
   <front>
      <title>Arm&#x27;s Platform Security Architecture (PSA) Attestation Token</title>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Simon Frost" initials="S." surname="Frost">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Mathias Brossard" initials="M." surname="Brossard">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
         <organization>HP Labs</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>Linaro</organization>
      </author>
      <date day="24" month="June" year="2024"/>
      <abstract>
	 <t>   The Arm Platform Security Architecture (PSA) is a family of hardware
   and firmware security specifications, as well as open-source
   reference implementations, to help device makers and chip
   manufacturers build best-practice security into products.  Devices
   that are PSA compliant can produce attestation tokens as described in
   this memo, which are the basis for many different protocols,
   including secure provisioning and network access control.  This
   document specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by PSA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with Arm&#x27;s architecture.  It is not a
   standard nor a product of the IETF.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-23"/>
   
</reference>


<reference anchor="I-D.ietf-rats-eat">
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
         <organization>Mediatek USA</organization>
      </author>
      <author fullname="Jeremy O&#x27;Donoghue" initials="J." surname="O&#x27;Donoghue">
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname="Carl Wallace" initials="C." surname="Wallace">
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day="8" month="July" year="2024"/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-29"/>
   
</reference>


<reference anchor="TPM20" target="https://trustedcomputinggroup.org/resource/tpm-library-specification/">
  <front>
    <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="November"/>
  </front>
</reference>


    </references>


<?line 442?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>We would like to thank Russ Housley, Thomas Fossati, Watson Ladd, Ionut Mihalcea,
Carl Wallace, and Michael StJohns for their review comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

