<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-csr-attestation-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="Remote Attestation with CSRs">Use of Remote Attestation with Certificate Signing Requests</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-00"/>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2023" month="August" day="24"/>
    <keyword>PKI</keyword>
    <keyword>PKCS#10</keyword>
    <keyword>CFMF</keyword>
    <keyword>Attestation</keyword>
    <keyword>Evidence</keyword>
    <keyword>Certificate Signing Requests</keyword>
    <abstract>
      <t>A client requesting a certificate from a Certification Authority (CA) may wish to offer believable claims about the protections afforded to the corresponding private key, such as whether the private key resides on a hardware securtiy model or trusted platform module, and the protection capabilities provided by the hardware module.
Including this evidence along with the certificate request can help to improve the assessment of the security posture for the private key, and suitability of the submitted key to the requested certificate profile.
These evidence claims can include information about the hardware component's manufacturer, the version of installed or running firmware, the version of software installed or running in layers above the firmware, or the presence of hardware components providing specific protection capabilities or shielded locations (e.g., to protect keys).
Producing, conveying, and appraising such believable claims is enabled via remote attestation procedures where the device holding the private key takes on the role of an attester and produces evidence that is made available to remote parties in a cryptographically secured way.
This document describes two new extensions to encode evidence produced by an attester
for inclusion in PKCS#10 or CRMF certificate signing requests: an ASN.1 Attribute or Extension definition to convey a cryptographically-signed evidence statement to a Registration Authority or to a Certification Authority, and an ASN.1 Attribute or Extension to carry any certificates necessary for validating the cryptographically-signed evidence statement.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://lamps-wg.github.io/csr-attestation/draft-ounsworth-csr-attestation.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-csr-attestation/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/csr-attestation"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>At the time that it is requesting a certificate from a Certification Authority (CA), a PKI end entity may wish to provide evidence of the security properties of the environment in which the private key is stored.
This evidence is to be verified by a relying party such as the Registration Authority or the Certificate Authority as part of validating an incoming certificate request against a given certificate policy.
This specification provides a newly defined evidence attribute for carrying evidence in Certificate Requests (CSR) in either PKCS#10 <xref target="RFC2986"/> or Certificate Request Message Format (CRMF) <xref target="RFC4211"/>.</t>
      <t>As outlined in the RATS Architecture <xref target="RFC9334"/>, an Attester (typically
a device) produces a signed collection of evidence about its running environment.
The term "attestation" is intentionally not defined in RFC 9334, but it is often taken to mean the overall process of producing and verifying evidence.
A Relying Party may consult that evidence, or an attestation result produced by a verifier who has checked the evidence, in making policy decisions about the trustworthiness of the
target environment being attested. <xref target="architecture"/> overviews how the various roles
in the RATS architecture map to a certificate requester and a CA/RA.</t>
      <t>At the time of writing, several standard and several proprietary attestation technologies
are in use.
This specification thereby tries to be technology-agnostic with regards to the transport of the produced signed claims.</t>
      <t>This document is focused on the transport of evidence
inside a CSR and makes minimal assumptions about content or format of the transported evidence.
We also enable conveyance of a set of certificates used for validation of
evidence. These certificates typically contain one or more certificate chains
rooted in a device manufacture trust anchor and the leaf certificate being
on the device in question; the latter is the Attestation Key that signs the evidence statement.</t>
      <t>This document creates two ATTRIBUTE/Attribute definitions. The first
Attribute may be used to carry a set of certificates or public keys that
may be necessary to validate evidence. The second Attribute carries a
structure that may be used to carry evidence.</t>
      <t>A CSR may contain one or more evidence, for example evidence
asserting the storage properties of the private key as well evidence
asserting the firmware version and other general properties
of the device, or evidence signed by certificate chains
on different cryptographic algorithms.</t>
      <t>With these attributes, an RA or CA has additional
information about whether to issue a certificate and what information
to populate into the certificate. The scope of this document is, however,
limited to the transport of evidence via a CSR. The exact format of the
evidence being carried is defined in various standard and proprietary
specifications.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>This document re-uses the terms defined in RFC 9334 related to remote
attestation. Readers of this document are assumed to be familiar with
the following terms: evidence, claim, attestation result, attester,
verifier, and relying party.</t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t><xref target="fig-arch"/> shows the high-level communication pattern of the RATS passport
model where the attester transmits the evidence in the CSR to the RA
and the CA. The verifier processes the received evidence and computes
an attestation result, which is then processed by the RA/CA prior to the
certificate issuance.</t>
      <t>Note that the verifier is a logical role that may be included in the
RA/CA product. In this case the Relying Party and Verifier collapse into a
single entity. The verifier functionality can, however,
also be kept separate from the RA/CA functionality, such as a utility or
library provided by the device manufacturer. For example,
security concerns may require parsers of evidence formats to be logically
or physically separated from the core CA functionality.</t>
      <figure anchor="fig-arch">
        <name>Architecture</name>
        <artwork><![CDATA[
                              .-------------.
                              |             | Compare Evidence
                              |   Verifier  | against
                              |             | policy
                              '--------+----'
                                   ^   |
                          Evidence |   | Attestation
                                   |   | Result
                                   |   v
 .------------.               .----|----------.
 |            +-------------->|----'          | Compare Attestation
 |  Attester  |   Evidence    | Relying       | Result against
 |            |   in CSR      | Party (RA/CA) | policy
 '------------'               '---------------'
]]></artwork>
      </figure>
      <t>As discussed in RFC 9334, different security and privacy aspects need to be
considered. For example, evidence may need to be protected against replay and
Section 10 of RFC 9334 lists approach for offering freshness. There are also
concerns about the exposure of persistent identifiers by utilizing attestation
technology, which are discussed in Section 11 of RFC 9334. Finally, the keying
material used by the attester need to be protected against unauthorized access,
and against signing arbitrary content that originated from outside the device.
This aspect is described in Section 12 of RFC 9334. Most of these aspects are,
however, outside the scope of this specification but relevant for use with a
given attestation technology. The focus of this specification is on the
transport of evidence from the attester to the relying party via existing
certification request messages.</t>
    </section>
    <section anchor="asn1-elements">
      <name>ASN.1 Elements</name>
      <section anchor="object-identifiers">
        <name>Object Identifiers</name>
        <t>We reference <tt>id-pkix</tt> and <tt>id-aa</tt>, both defined in <xref target="RFC5912"/>.</t>
        <t>We define:</t>
        <artwork><![CDATA[
-- Arc for evidence types
id-ata OBJECT IDENTIFIER ::= { id-pkix (TBD1) }
]]></artwork>
      </section>
      <section anchor="evidence-attribute-and-extension">
        <name>Evidence Attribute and Extension</name>
        <t>By definition, Attributes within a PKCS#10 CSR are
typed as ATTRIBUTE and within a CRMF CSR are typed as EXTENSION.
This attribute definition contains one or more
evidence statements of a type "EvidenceStatement".</t>
        <artwork><![CDATA[
id-aa-evidenceStatement OBJECT IDENTIFIER ::= { id-aa (TBDAA2) }

-- For PKCS#10
attr-evidence ATTRIBUTE ::= {
  TYPE EvidenceStatement
  IDENTIFIED BY id-aa-evidenceStatement
}

-- For CRMF
ext-evidence EXTENSION ::= {
  TYPE EvidenceStatement
  IDENTIFIED BY id-aa-evidenceStatement
}
]]></artwork>
        <t>A CSR <bcp14>MAY</bcp14> contain one or more instance of <tt>EvidenceAttribute</tt>.</t>
        <t>The Extension version is intended only for use within CRMF CSRs and is <bcp14>NOT RECOMMENDED</bcp14> for use within X.509 certificates due to the privacy implications of publishing evidence about the end entity's hardware environment. See <xref target="security-considerations"/> for more discussion.</t>
      </section>
      <section anchor="evidencestatement">
        <name>EvidenceStatement</name>
        <t>An EvidenceStatement is a simple type-value pair identified by an OID
<tt>type</tt> and containing a value <tt>stmt</tt>.</t>
        <t>encoded as
a sequence, of which the type of the "value" field is
controlled by the value of the "type" field, similar to an Attribute
definition.</t>
        <artwork><![CDATA[
EVIDENCE-STATEMENT ::= TYPE-IDENTIFIER

EvidenceStatementSet EVIDENCE-STATEMENT ::= {
   ... -- Empty for now --
}

EvidenceStatement {EVIDENCE-STATEMENT:EvidenceStatementSet} ::= SEQUENCE {
   type   EVIDENCE-STATEMENT.&id({EvidenceStatementSet}),
   stmt   EVIDENCE-STATEMENT.&Type({EvidenceStatementSet}{@type})
}

id-aa-evidenceStatement OBJECT IDENTIFIER ::= { id-aa aa-evidenceStatement(TBDAA2) }

-- For PKCS#10
attr-evidence ATTRIBUTE ::= {
  TYPE EvidenceStatement
  IDENTIFIED BY id-aa-evidenceStatement
}

-- For CRMF
ext-evidence EXTENSION ::= {
  TYPE EvidenceStatement
  IDENTIFIED BY id-aa-evidenceStatement
}
]]></artwork>
      </section>
      <section anchor="evidencecerts">
        <name>EvidenceCerts</name>
        <t>The "EvidenceCertsAttribute" contains a set of certificates that
may be needed to validate the contents of an evidence statement
contained in an evidenceAttribute. The set of certificates should contain
the object that contains the public key needed to directly validate the
EvidenceAttribute.  The remaining elements should chain that data back to
an agreed upon trust anchor used for attestation. No order is implied, it is
the Verifier's responsibility to perform the appropriate certification path
construction.</t>
        <t>A CSR <bcp14>MUST</bcp14> contain at zero or one <tt>EvidenceCertsAttribute</tt>. In the case where
the CSR contains multiple instances of <tt>EvidenceAttribute</tt> representing
multiple evidence statements, all necessary certificates <bcp14>MUST</bcp14> be contained in
the same instance of <tt>EvidenceCertsAttribute</tt>.
<tt>EvidenceCertsAttribute</tt> <bcp14>MAY</bcp14> be omitted if there are no certificates to convey, for example if they are already known to the verifier, or if they are contained in the evidence statement.</t>
        <artwork><![CDATA[
id-aa-evidenceChainCerts OBJECT IDENTIFIER ::= { id-aa (TBDAA1) }

-- For PKCS#10
attr-evidenceCerts ATTRIBUTE ::= {
  TYPE SEQUENCE OF CertificateChoice
  COUNTS MAX 1
  IDENTIFIED BY id-aa-evidenceChainCerts
}

-- For CRMF
ext-evidenceCerts EXTENSION ::= {
  TYPE SEQUENCE OF CertificateChoice
  COUNTS MAX 1
  IDENTIFIED BY id-aa-evidenceChainCerts
}
]]></artwork>
        <t>The Extension version is intended only for use within CRMF CSRs and is <bcp14>NOT RECOMMENDED</bcp14> for use within X.509 certificates due to the privacy implications of publishing evidence about the end entity's hardware environment. See <xref target="security-considerations"/> for more discussion.</t>
      </section>
      <section anchor="certificatechoice">
        <name>CertificateChoice</name>
        <t>This is an ASN.1 CHOICE construct used to represent an encoding of a
broad variety of certificate types.</t>
        <artwork><![CDATA[
CertificateChoice ::=
   CHOICE {
      cert Certificate,
      opaqueCert    [0] IMPLICIT OCTET STRING,
      typedCert     [1] IMPLICIT TypedCert,
      typedFlatCert [2] IMPLICIT TypedFlatCert
   }
]]></artwork>
        <t>"Certificate" is a standard X.509 certificate that <bcp14>MUST</bcp14> be compliant</t>
        <t>with RFC 5280.  Enforcement of this constraint is left to the relying
parties.</t>
        <t>"opaqueCert" should be used sparingly as it requires the verifier to implictly know its format.
It is encoded as an OCTET STRING.</t>
        <t>"TypedCert" is an ASN.1 construct that has the charateristics of a
certificate, but is not encoded as an X.509 certificate.  The
certType Field (below) indicates how to interpret the certBody field.  While
it is possible to carry any type of data in this structure, it's
intended the content field include data for at least one public key
formatted as a SubjectPublicKeyInfo (see <xref target="RFC5912"/>).</t>
        <artwork><![CDATA[
TYPED-CERT ::= TYPE-IDENTIFIER

CertType ::= TYPED-CERT.&id

TypedCert ::= SEQUENCE {
              certType     TYPED-CERT.&id({TypedCertSet}),
              content     TYPED-CERT.&Type ({TypedCertSet}{@certType})
          }

TypedCertSet TYPED-CERT ::= {
             ... -- Empty for now,
             }
]]></artwork>
        <t>"TypedFlatCert" is a certificate that does not have a valid ASN.1
encoding.
These are often compact or implicit certificates used by smart cards.
certType indicates the format of the data in the
certBody field, and ideally refers to a published specification.</t>
        <artwork><![CDATA[
TypedFlatCert ::= SEQUENCE {
    certType OBJECT IDENTIFIER,
    certBody OCTET STRING
}
]]></artwork>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>The IANA is requested to open one new registry, allocate a value
from the "SMI Security for PKIX Module Identifier" registry for the
included ASN.1 module, and allocate values from "SMI Security for
S/MIME Attributes" to identify two Attributes defined within.</t>
      <section anchor="object-identifier-allocations">
        <name>Object Identifier Allocations</name>
        <section anchor="module-registration-smi-security-for-pkix-module-identifer">
          <name>Module Registration - SMI Security for PKIX Module Identifer</name>
          <ul spacing="normal">
            <li>Decimal: IANA Assigned - Replace TBDMOD</li>
            <li>Description: CSR-ATTESTATION-2023 - id-mod-pkix-attest-01</li>
            <li>References: This Document</li>
          </ul>
        </section>
        <section anchor="object-identifier-registrations-smi-security-for-smime-attributes">
          <name>Object Identifier Registrations - SMI Security for S/MIME Attributes</name>
          <ul spacing="normal">
            <li>
              <t>Attest Statement  </t>
              <ul spacing="normal">
                <li>Decimal: IANA Assigned - Replace TBDAA2</li>
                <li>Description: id-aa-evidenceStatement</li>
                <li>References: This Document</li>
              </ul>
            </li>
            <li>
              <t>Attest Certificate Chain  </t>
              <ul spacing="normal">
                <li>Decimal: IANA Assigned - Replace TBDAA1</li>
                <li>Description: id-aa-evidenceChainCerts</li>
                <li>References: This Document</li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="smi-security-for-pkix-evidence-statement-formats-registry">
          <name>"SMI Security for PKIX Evidence Statement Formats" Registry</name>
          <t>Please open up a registry for evidence Statement Formats within
the SMI-numbers registry, allocating an assignment from id-pkix ("SMI
Security for PKIX" Registry) for the purpose.</t>
          <ul spacing="normal">
            <li>Decimal: IANA Assigned - replace TBD1</li>
            <li>Description: id-ata</li>
            <li>References: This document</li>
            <li>Initial contents: None</li>
            <li>Registration Regime: Specification Required.
Document must specify an EVIDENCE-STATEMENT definition to which this Object Identifier shall be bound.</li>
          </ul>
          <t>Columns:</t>
          <ul spacing="normal">
            <li>Decimal: The subcomponent under id-ata</li>
            <li>Description: Begins with id-ata</li>
            <li>References: RFC or other document</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The evidence communicated in the attributes and
structures defined in this document are meant to be used in
a PKCS#10 or Certificate Signing Request (CSR). It is up to the
verifier and to the relying party (RA/CA) to place as much or
as little trust in this information as dictated by policies.</t>
      <t>This document defines the transport of evidence of different formats
in a CSR. Some of these evidence formats are based on standards
while others are proprietary formats. A verifier will need to understand
these formats for matching the received values against policies.</t>
      <t>Policies drive the processing of evidence at the verifier:
the Verifier's Appraisal Policy for Evidence will often be specified by the manufacturer of a hardware security module or specified by a regulatory body such as the CA Browser Forum Code-Signing Baseline Requirements <xref target="CSBR"/> which specifies certain properties, such as non-exportability, which must be enabled for storing publicly-trusted code-signing keys.</t>
      <t>The relying party is ultimately responsible for making a decision of what attestation-related  information in the CSR it will accept. The presence of the attributes
defined in this specification provide the relying party with additional
assurance about attester. Policies used at the verifier and the relying
party are implementation dependent and out of scope for this document.
Whether to require the use of evidence in the CSR is out-of-scope
for this document.</t>
      <section anchor="freshness">
        <name>Freshness</name>
        <t>Evidence generated by an attester generally needs to be fresh to provide
value to the verifier since the configuration on the device may change
over time. Section 10 of <xref target="RFC9334"/> discusses different approaches for
providing freshness, including a nonce-based approach, the use of timestamps
and an epoch-based technique.  The use of nonces requires an extra message
exchange via the relying party and the use of timestamps requires
synchronized clocks.
Epochs also require (unidirectional) communication.
None of these things are practical when interacting with Hardware Security Modules (HSM).</t>
        <t>Additionally, the definition of "fresh" is somewhat ambiguous in the context of CSRs, especially
considering that non-automated certificate enrollments are often asyncronous,
and considering the common practice of re-using the same CSR
for multiple certificate renewals across the lifetime of a key.
"Freshness" typically implies both asserting that the data was generated
at a certain point-in-time, as well as providing non-replayability.
Certain use cases may have special properties impacting the freshness requirements. For example, HSMs are typically designed to not allow downgrade of private key storage
properties; for example if a given key was asserted at time T to have been
generated inside the hardware boundary and to be non-exportable,
then it can be assumed that those properties of that key will continue
to hold into the future.
Developers, operators, and designers of protocols which embed
evidence-carrying-CSRs need to consider what notion of freshness is
appropriate and available in-context; thus the issue of freshness is
left up to the discretion of protocol designers and implementors.</t>
      </section>
      <section anchor="publishing-evidence-in-an-x509-extension">
        <name>Publishing evidence in an X.509 extension</name>
        <t>This document specifies and Extension for carrying evidence in a CRMF Certificate Signing Request (CSR), but it is intentionally <bcp14>NOT RECOMMENDED</bcp14> for a CA to copy the ext-evidence or ext-evidenceCerts extensions into the published certificate.
The reason for this is that certificates are considered public information and the evidence might contain detailed information about hardware and patch levels of the device on which the private key resides.
The certificate requester has consented to sharing this detailed device information with the CA but might not consent to having these details published.
These privacy considerations are beyond the scope of this document and may require additional signaling mechanisms in the CSR to prevent unintended publication of sensitive information, so we leave it as "<bcp14>NOT RECOMMENDED</bcp14>".</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC2986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <date day="5" month="July" year="2023"/>
            <abstract>
              <t>   The Platform Security Architecture (PSA) is a family of hardware and
   firmware security specifications, as well as open-source reference
   implementations, to help device makers and chip manufacturers build
   best-practice security into products.  Devices that are PSA compliant
   are able to produce attestation tokens as described in this memo,
   which are the basis for a number of different protocols, including
   secure provisioning and network access control.  This document
   specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profiled Entity Attestation Token
   (EAT).

   This specification describes what claims are used in an attestation
   token generated by PSA compliant systems, how these claims get
   serialized to the wire, and how they are cryptographically protected.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-12"/>
        </reference>
        <reference anchor="TPM20" target="https://trustedcomputinggroup.org/resource/tpm-library-specification/">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November"/>
          </front>
        </reference>
        <reference anchor="CSBR" target="https://cabforum.org/wp-content/uploads/Baseline-Requirements-for-the-Issuance-and-Management-of-Code-Signing.v3.3.pdf">
          <front>
            <title>Baseline Requirements for Code-Signing Certificates, v.3.3</title>
            <author>
              <organization>CA/Browser Forum</organization>
            </author>
            <date year="2023" month="June"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="examples">
      <name>Examples</name>
      <t>This section provides two non-normative examples for embedding evidence
in in CSRs. The first example conveys Arm Platform Security Architecture
tokens, which provides claims about the used hardware and software platform,
into the CSR. The second example embeds the TPM v2.0 evidence in the CSR.</t>
      <section anchor="tpm-v20-evidence-in-csr">
        <name>TPM V2.0 Evidence in CSR</name>
        <t>The following example illustrates a CSR with a signed TPM Quote based on
<xref target="TPM20"/>. The Platform Configuration Registers (PCRs) are fixed-size
registers in a TPM that record measurements of software and configuration
information and are therefore used to capture the system state. The digests
stored in these registers are then digitially signed with an attestation
key known to the hardware.</t>
        <t>Note: The information conveyed in the value field of the EvidenceStatement
structure may contain more information than the signed TPM Quote structure
defined in the TPM v2.0 specification <xref target="TPM20"/>, such as plaintext PCR values,
the up-time, the event log, etc. The detailed structure of such
payload is, however, not defined in this document and may be subject to
future standardization work in supplementary documents.</t>
        <figure anchor="fig-example-tpm">
          <name>CSR with TPM V2.0</name>
          <artwork><![CDATA[
Certification Request:
    Data:
        Version: 1 (0x0)
        Subject: CN = server.example.com
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b9:7c:02:a1:1f:9c:f3:f4:c4:55:3a:d9:3e:26:
                    e8:e5:11:63:84:36:5f:93:a6:99:7d:d7:43:23:0a:
                    4f:c0:a8:40:46:7e:8d:b2:1a:38:19:ff:6a:a7:38:
                    16:06:1e:12:9f:d1:d5:58:55:e6:be:6d:bb:e1:fb:
                    f7:70:a7:5c:c9
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        Attributes:
            EvidenceStatement
               type: TBD2 (identifying use of TPM V2.0)
               value:
                    80:02:00:00:01:99:00:00:00:00:00:00:01:86:00:7e
                    ff:54:43:47:80:18:00:22:00:0b:76:71:0f:61:80:95
                    8d:89:32:38:a6:cc:40:43:02:4a:da:26:d5:ea:11:71
                    99:d7:a5:59:a4:18:54:1e:7b:86:00:0d:30:2e:66:6e
                    6a:37:66:63:39:31:76:62:74:00:00:00:00:00:00:36
                    5b:bc:0b:71:4f:d8:84:90:09:01:42:82:48:a6:46:53
                    98:96:00:00:00:01:00:0b:03:0f:00:00:00:20:49:ce
                    66:9a:aa:7e:52:ff:93:0e:dd:9f:27:97:88:eb:75:cb
                    ad:53:22:e5:ad:2c:9d:44:1e:dd:65:48:6b:88:00:14
                    00:0b:01:00:15:a4:95:8a:0e:af:04:36:be:35:f7:27
                    85:bd:7f:87:46:74:18:e3:67:2f:32:f2:bf:b2:e7:af
                    a1:1b:f5:ca:1a:eb:83:8f:2f:36:71:cd:7c:18:ab:50
                    3d:e6:6e:ab:2e:78:a7:e4:6d:cf:1f:03:e6:46:74:28
                    a7:6c:d6:1e:44:3f:88:89:36:9a:a3:f0:9a:45:07:7e
                    01:5e:4c:97:7d:3f:e2:f7:15:59:96:5f:0e:9a:1c:b3
                    a0:6b:4a:77:a5:c0:e0:93:53:cb:b7:50:59:3d:23:ee
                    5c:31:00:48:6c:0b:1a:b8:04:a4:14:05:a6:63:bc:36
                    aa:7f:b9:aa:1f:19:9e:ee:49:48:08:e1:3a:d6:af:5f
                    d5:eb:96:28:bf:41:3c:89:7a:05:4b:b7:32:a2:fc:e7
                    f6:ad:c7:98:a6:98:99:f6:e9:a4:30:d4:7f:5e:b3:cb
                    d7:cc:76:90:ef:2e:cc:4f:7d:94:ab:33:8c:9d:35:5d
                    d7:57:0b:3c:87:9c:63:89:61:d9:5c:a0:b7:5c:c4:75
                    21:ae:dc:c9:7c:e3:18:a2:b3:f8:15:27:ff:a9:28:2f
                    cb:9b:17:fe:96:04:53:c4:19:0e:bf:51:0e:9d:1c:83
                    49:7e:51:64:03:a1:40:f1:72:8b:74:e3:16:79:af:f1
                    14:a8:5e:44:00:00:01:00:00
    Signature Algorithm: ecdsa-with-SHA256
    Signature Value:
        30:45:02:21:00:93:fd:81:03:75:d1:7d:ab:53:6c:a5:19:a7:
        68:3d:d6:e2:39:14:d6:9e:47:24:38:b5:76:db:18:a6:ca:c4:
        8a:02:20:36:be:3d:71:93:5d:05:c3:ac:fa:a8:f3:e5:46:db:
        57:f9:23:ee:93:47:6d:d6:d3:4f:c2:b7:cc:0d:89:71:fe
]]></artwork>
        </figure>
      </section>
      <section anchor="platform-security-architecture-attestation-token-in-csr">
        <name>Platform Security Architecture Attestation Token in CSR</name>
        <t>The example shown in <xref target="fig-example-psa"/> illustrates how the Arm
Platform Security Architecture (PSA) Attestation Token
is conveyed in a CSR. The content of the evidence in this example is re-used
from <xref target="I-D.tschofenig-rats-psa-token"/> and contains an Entity Attestation
Token (EAT) digitally signed with an attestation private key.</t>
        <figure anchor="fig-example-psa">
          <name>CSR with embedded PSA Attestation Token</name>
          <artwork><![CDATA[
Certification Request:
    Data:
        Version: 1 (0x0)
        Subject: CN = server.example.com
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b9:7c:02:a1:1f:9c:f3:f4:c4:55:3a:d9:3e:26:
                    e8:e5:11:63:84:36:5f:93:a6:99:7d:d7:43:23:0a:
                    4f:c0:a8:40:46:7e:8d:b2:1a:38:19:ff:6a:a7:38:
                    16:06:1e:12:9f:d1:d5:58:55:e6:be:6d:bb:e1:fb:
                    f7:70:a7:5c:c9
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        Attributes:
            EvidenceStatement
               type: TBD1 (referring to the PSA Attestation Token)
               value: d2:84:43:a1:01:26:a0:59:01:3b:aa:19:01:09:78:
                      18:68:74:74:70:3a:2f:2f:61:72:6d:2e:63:6f:6d:
                      2f:70:73:61:2f:32:2e:30:2e:30:19:09:5a:1a:7f:
                      ff:ff:ff:19:09:5b:19:30:00:19:09:5c:58:20:00:
                      00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:
                      00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:
                      00:19:09:5d:48:00:00:00:00:00:00:00:00:19:09:
                      5e:73:31:32:33:34:35:36:37:38:39:30:31:32:33:
                      2d:31:32:33:34:35:19:09:5f:81:a2:02:58:20:03:
                      03:03:03:03:03:03:03:03:03:03:03:03:03:03:03:
                      03:03:03:03:03:03:03:03:03:03:03:03:03:03:03:
                      03:05:58:20:04:04:04:04:04:04:04:04:04:04:04:
                      04:04:04:04:04:04:04:04:04:04:04:04:04:04:04:
                      04:04:04:04:04:04:0a:58:20:01:01:01:01:01:01:
                      01:01:01:01:01:01:01:01:01:01:01:01:01:01:01:
                      01:01:01:01:01:01:01:01:01:01:01:19:01:00:58:
                      21:01:02:02:02:02:02:02:02:02:02:02:02:02:02:
                      02:02:02:02:02:02:02:02:02:02:02:02:02:02:02:
                      02:02:02:02:19:09:60:78:2e:68:74:74:70:73:3a:
                      2f:2f:76:65:72:61:69:73:6f:6e:2e:65:78:61:6d:
                      70:6c:65:2f:76:31:2f:63:68:61:6c:6c:65:6e:67:
                      65:2d:72:65:73:70:6f:6e:73:65:58:40:56:f5:0d:
                      13:1f:a8:39:79:ae:06:4e:76:e7:0d:c7:5c:07:0b:
                      6d:99:1a:ec:08:ad:f9:f4:1c:ab:7f:1b:7e:2c:47:
                      f6:7d:ac:a8:bb:49:e3:11:9b:7b:ae:77:ae:c6:c8:
                      91:62:71:3e:0c:c6:d0:e7:32:78:31:e6:7f:32:84:
                      1a
    Signature Algorithm: ecdsa-with-SHA256
    Signature Value:
        30:45:02:21:00:93:fd:81:03:75:d1:7d:ab:53:6c:a5:19:a7:
        68:3d:d6:e2:39:14:d6:9e:47:24:38:b5:76:db:18:a6:ca:c4:
        8a:02:20:36:be:3d:71:93:5d:05:c3:ac:fa:a8:f3:e5:46:db:
        57:f9:23:ee:93:47:6d:d6:d3:4f:c2:b7:cc:0d:89:71:fe
]]></artwork>
        </figure>
        <t>The decoded evidence is shown in Appendix A of
<xref target="I-D.tschofenig-rats-psa-token"/>, the shown evidence, provides the following
information to an RA/CA:</t>
        <ul spacing="normal">
          <li>Boot seed,</li>
          <li>Firmware measurements,</li>
          <li>Hardware security certification reference,</li>
          <li>Identification of the immutable root of trust implementation, and</li>
          <li>Lifecycle state information.</li>
        </ul>
      </section>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <artwork><![CDATA[
CSR-ATTESTATION-2023
           {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) id-mod-pkix-attest-01(TBDMOD)}

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS

Certificate
 FROM PKIX1Explicit-2009
     {iso(1) identified-organization(3) dod(6) internet(1) security(5)
     mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-explicit-02(51)}


EXTENSION, ATTRIBUTE, AttributeSet{}, SingleAttribute{}, id-pkix 
    FROM PKIX-CommonTypes-2009 -- from [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57) }

id-aa
FROM SecureMimeMessageV3dot1
    { iso(1) member-body(2) us(840) rsadsi(113549)
        pkcs(1) pkcs-9(9) smime(16) modules(0) msg-v3dot1(21) }
  ;


-- Branch for attestation statement types
id-ata OBJECT IDENTIFIER ::= { id-pkix ata(TBD1) }


CertificateChoice ::=
   CHOICE {
      cert Certificate,
      opaqueCert    [0] IMPLICIT OCTET STRING,
      typedCert     [1] IMPLICIT TypedCert,
      typedFlatCert [2] IMPLICIT TypedFlatCert
   }

TYPED-CERT ::= TYPE-IDENTIFIER

CertType ::= TYPED-CERT.&id

TypedCert ::= SEQUENCE {
      certType     TYPED-CERT.&id({TypedCertSet}),
      content     TYPED-CERT.&Type ({TypedCertSet}{@certType})
  }

TypedCertSet TYPED-CERT ::= {
  ... -- Empty for now,
  }

TypedFlatCert ::= SEQUENCE {
    certType OBJECT IDENTIFIER,
    certBody OCTET STRING
}

EVIDENCE-STATEMENT ::= TYPE-IDENTIFIER

EvidenceStatementSet EVIDENCE-STATEMENT ::= {
   ... -- Empty for now --
}
 
EvidenceStatement {EVIDENCE-STATEMENT:EvidenceStatementSet} ::= SEQUENCE {
   type   EVIDENCE-STATEMENT.&id({EvidenceStatementSet}),
   stmt   EVIDENCE-STATEMENT.&Type({EvidenceStatementSet}{@type})
}

id-aa-evidenceStatement OBJECT IDENTIFIER ::= { id-aa aa-evidenceStatement(TBDAA2) }

-- For PKCS#10
attr-evidence ATTRIBUTE ::= {
  TYPE EvidenceStatement
  IDENTIFIED BY id-aa-evidenceStatement
}

-- For CRMF
ext-evidence EXTENSION ::= {
  TYPE EvidenceStatement
  IDENTIFIED BY id-aa-evidenceStatement
}

id-aa-evidenceChainCerts OBJECT IDENTIFIER ::= { id-aa aa-evidenceChainCerts(TBDAA1) }

-- For PKCS#10
attr-evidenceCerts ATTRIBUTE ::= {
  TYPE SEQUENCE OF CertificateChoice
  COUNTS MAX 1
  IDENTIFIED BY id-aa-evidenceChainCerts
}

-- For CRMF
ext-evidenceCerts EXTENSION ::= {
  TYPE SEQUENCE OF CertificateChoice
  COUNTS MAX 1
  IDENTIFIED BY id-aa-evidenceChainCerts
}

END
]]></artwork>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This specification is the work of a design team created by the chairs of the
LAMPS working group. The following persons, in no specific order,
contributed to the work: Richard Kettlewell, Chris Trufan, Bruno Couillard,
Jean-Pierre Fiset, Sander Temme, Jethro Beekman, Zsolt Rózsahegyi, Ferenc
Pető, Mike Agrenius Kushner, Tomas Gustavsson, Dieter Bong, Christopher Meyer,
Michael StJohns, Carl Wallace, Michael Ricardson, Tomofumi Okubo, Olivier
Couillard, John Gray, Eric Amador, Johnson Darren, Herman Slatman, Tiru Reddy,
Thomas Fossati, Corey Bonnel, Argenius Kushner, James Hagborg.</t>
      <t>We would like to specifically thank Mike StJohns for his work on an earlier
version of this draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
