<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-key-attestation-ext-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.0 -->
  <front>
    <title abbrev="Key Attestation Extension">Key Attestation Extension for Certificate Management Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-key-attestation-ext-00"/>
    <author initials="C." surname="Wallace" fullname="Carl Wallace">
      <organization abbrev="Red Hound">Red Hound Software</organization>
      <address>
        <email>carl@redhoundsoftware.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization abbrev="sn3rd">sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="17"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Certification Authorities (CAs) issue certificates for public keys conveyed to the CA via a certificate management message or protocol. In some cases, a CA may wish to tailor certificate contents based on whether the corresponding private key is secured by hardware in non-exportable form. This document describes extensions that may be included in any of several widely used certificate management protocols to convey attestations about the private key to the CA to support this determination.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-key-attestation-ext/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        spasm Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Many different certificate management protocols exist, including:</t>
      <ul spacing="normal">
        <li>PKCS #10 <xref target="RFC2986"/></li>
        <li>Simple Certificate Enrolment Protocol (SCEP) <xref target="RFC8894"/></li>
        <li>Certificate Management over CMS (CMC) <xref target="RFC5272"/></li>
        <li>Certificate Management Protocol (CMP) <xref target="RFC4210"/></li>
        <li>Certificate Request Management Format (CRMF) <xref target="RFC4211"/></li>
        <li>Enrollment over Secure Transport (EST) <xref target="RFC7030"/></li>
        <li>Automatic Certificate Management Environment (ACME) <xref target="RFC8555"/></li>
      </ul>
      <t>Each of these specifications defines extensibility mechanisms to customize requests sent to a Certification Authority (CA), Registration Authority (RA), or certificate management server. This document addresses the first six specifications in the above list, as all can be customized using attributes or extensions. <xref target="RFC8555"/> is somewhat different and is addressed by <xref target="I-D.draft-bweeks-acme-device-attest"/>.</t>
      <t>Many operating system and device vendors offer functionality enabling a device to generate a cryptographic attestation that can be used to establish the provenance of a key:</t>
      <ul spacing="normal">
        <li>
          <eref target="https://source.android.com/security/keystore/attestation">Android Key Attestation</eref></li>
        <li>
          <eref target="https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/component-updates/tpm-key-attestation">Trusted Platform Module</eref></li>
        <li>
          <eref target="https://developer.apple.com/documentation/devicecheck/dcappattestservice/3573911-attestkey">Apple Key Attestation</eref></li>
        <li>
          <eref target="https://developers.yubico.com/PIV/Introduction/PIV_attestation.html">Yubico PIV Attestation</eref></li>
      </ul>
      <t><xref target="WebAuthn"/> defines an "API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users." In support of this goal, it defines a model and corresponding formats to support attestation functionality. Section 6.5 of <xref target="WebAuthn"/> describes the general attestation structure and section 8 defines some specific attestation formats. Similar to <xref target="I-D.draft-bweeks-acme-device-attest"/>, this specification uses the attestation object definition from <xref target="WebAuthn"/> as a means of supporting a variety of attestation formats, which are defined in the IANA registry that was established by <xref target="RFC8809"/>; see <xref target="WebAuthnReg"/>.</t>
      <t>This document defines a structure, KeyAttestation, that can be used to convey a <xref target="WebAuthn"/> attestation statement as an attribute or extension when using the protocols listed above.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="key-attestation-attribute-or-extension">
      <name>Key Attestation Attribute or Extension</name>
      <t>A key attestation attribute or extension <bcp14>MAY</bcp14> be included in certificate request messages to convey an attestation statement for the private key corresponding to the public key contained in the request.  The attribute definition and the certificate extension definition are exactly the same, and they are identified by the same object identifier.</t>
      <artwork><![CDATA[
ext-keyAttestation EXTENSION ::= {
  SYNTAX KeyAttestation IDENTIFIED BY id-pe-keyAttestation }

attr-keyAttestation ATTRIBUTE ::= {
  SYNTAX KeyAttestation IDENTIFIED BY id-pe-keyAttestation }

id-pe-keyAttestation OBJECT IDENTIFIER ::=  { id-pe TBD }

KeyAttestation ::= OCTET STRING
]]></artwork>
      <t>The KeyAttestation conveys an attestation statement as defined in <xref target="WebAuthn"/> encoded as an OCTET STRING.</t>
      <t>While the format of an attestation statement varies, all attestation statement formats conveyed via a keyAttestation extension <bcp14>MUST</bcp14> include the public key that is the subject of the corresponding certificate management request. Certificate request messages that contain a key attestation that does not include a public key or that contain a public key that does not match the public key in the certificate request <bcp14>SHOULD</bcp14> be rejected with no certificate issued, however, a CA  <bcp14>MAY</bcp14> elect to issue a certificate as if the request did not contain a key attestation per local policy.</t>
      <t>Some attestation statement formats support the use of challenge password or nonce values. While the means of conveying challenge password value or a nonce value to certificate request clients is outside the scope of this document, each of SCEP <xref target="RFC8894"/>, CMC <xref target="RFC5272"/>, CMP <xref target="RFC4210"/> and EST <xref target="RFC7030"/> define means for conveying nonce values to certificate request clients. In some cases, challenge password or nonce values may be conveyed outside of a certificate management protocol.  For example, SCEP payloads in Apple's Over-the-Air Profile Delivery and Configuration specification <xref target="OTA"/> deliver challenge passwords in an XML-formatted set of instructions.</t>
      <t>Similarly, use and verification of a nonce value relative to an attestation statement is outside the scope of this document. Verification procedures for currently defined attestation statement formats can be found in Section 8 of <xref target="WebAuthn"/>. Certificate request messages that contain a key attestation that cannot be validated, including processing any nonce or challenge password values, <bcp14>SHOULD</bcp14> be rejected with no certificate issued, however, a CA  <bcp14>MAY</bcp14> elect to issue a certificate as if the request did not contain a key attestation per local policy.</t>
      <section anchor="usage-in-pkcs-10-requests">
        <name>Usage in PKCS #10 requests</name>
        <t>The PKCS #10 structure may be used directly or in SCEP, CMC, CMP or EST contexts. Where PKCS #10 is used, the public key in the attestation statement <bcp14>MUST</bcp14> match the public key in the CertificationRequestInfo.subjectPKInfo field and the keyAttestation attribute <bcp14>MUST</bcp14> appear in the CertificationRequestInfo.attributes field.</t>
      </section>
      <section anchor="usage-in-crmf-requests">
        <name>Usage in CRMF requests</name>
        <t>The CRMF structure may be used in CMC, CMP or EST. Where CRMF is used, the public key in the attestation statement <bcp14>MUST</bcp14> match the public key in the CertTemplate.publicKey field and the keyAttestation extension <bcp14>MUST</bcp14> appear in the CertTemplate.extensions field.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See Section 13 of <xref target="WebAuthn"/> for additional security considerations related to attestation statement formats, including certificate revocation.</t>
      <t>CAs, RAs and certificate management servers will need a set of trust anchors to validate attestation statements that may originate from any number of sources. Where possible, a dedicated trust anchor and issuing CA should be used when verifying a given type of attestation statement. Where a trust anchor or issuing CA are shared for mulitple sources of attestation statements, including constraints in attestation signer certificates or attestation certificates is recommended. <xref target="COTS"/> and <xref target="fido-metadata"/> define structures for conveying trust anchors that may be used for verifying attestations such that constraints are implied or are explicitly stated. Expression and validation of constraints imposed on trust anchors, CAs or attestation signers is beyond the scope of this specification.</t>
      <t>Key attestation statements may include a variety of information in addition to the public key being attested. While not described in this document, CAs, RAs and certificate management servers are free to use any policy when evaluating this information. This evaluation can result in rejection of a certificate request that features a verifiable key attestation for the public key contained in the request. For example, an attestation statement may indicate use of an unacceptable firmware version.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="key-attestation-extension-object-identifier">
        <name>Key attestation extension object identifier</name>
        <t>An object identifier from the id-pe arc defined in <xref target="RFC7299"/> should be assigned for id-pe-keyAttestation.</t>
      </section>
      <section anchor="key-attestation-extension-asn1-module-object-identifier">
        <name>Key attestation extension ASN.1 module object identifier</name>
        <t>An object identifier from the id-mod arc defined in <xref target="RFC7299"/> should be assigned for id-mod-keyAttestation.</t>
      </section>
      <section anchor="attestation-statement-formats">
        <name>Attestation statement formats</name>
        <t><xref section="2.1" sectionFormat="of" target="RFC8809"/> describes registration of new attestation statement format types used when authenticating users via <xref target="WebAuthn"/>. This specification reuses the same format, but, because the context for use is different, a different registry is required. This section defines IANA registries for W3C Web Authentication (WebAuthn) attestation statement format identifiers and extension identifiers used in the context of a certificate request. This specification establishes two registries:</t>
        <ul spacing="normal">
          <li>the "WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols" registry</li>
          <li>the "WebAuthn Extension Identifiers for Certificate Request Protocols" registry</li>
        </ul>
        <t>Any additional processes established by the expert(s) after the publication of this document will be recorded on the registry web page at the discretion of the expert(s), who may differ from the experts associated with the registry established by <xref target="RFC8809"/>.</t>
        <t>NOTE: these two registries are shared with <xref target="I-D.draft-bweeks-acme-device-attest"/>, which features similar registry establishment language. The registries need be created only one time. Delete these sections if registry is already in place.</t>
        <section anchor="webauthn-attestation-statement-format-identifiers-for-certificate-request-protocols">
          <name>WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols</name>
          <t>WebAuthn attestation statement format identifiers are strings whose semantic, syntactic, and string-matching criteria are specified in the "Attestation Statement Format Identifiers" (https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-attstn-fmt-ids) section of <xref target="WebAuthn"/>, along with the concepts of attestation and attestation statement formats.</t>
          <t>Registered attestation statement format identifiers are those that have been added to the registry by following the procedure in <xref target="registering-attestation-statement-format-identifiers"/>.</t>
          <t>Each attestation statement format identifier added to this registry <bcp14>MUST</bcp14> be unique amongst the set of registered attestation statement format identifiers.</t>
          <t>Registered attestation statement format identifiers <bcp14>MUST</bcp14> be a maximum of 32 octets in length and <bcp14>MUST</bcp14> consist only of printable ASCII [RFC20] characters, excluding backslash and double quote, i.e., VCHAR as defined in [RFC5234] but without %x22 and %x5c.  Attestation statement format identifiers are case sensitive and may not match other registered identifiers in a case-insensitive manner unless the designated experts determine that there is a compelling reason to allow an exception.</t>
          <section anchor="registering-attestation-statement-format-identifiers">
            <name>Registering Attestation Statement Format Identifiers</name>
            <t>WebAuthn attestation statement format identifiers are registered using the Specification Required policy (see Section 4.6 of [RFC8126]).</t>
            <t>The "WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols" registry is located at <eref target="https://www.iana.org/assignments/webauthn_for_certreq">https://www.iana.org/assignments/webauthn_for_certreq</eref>.  Registration requests can be made by following the instructions located there or by sending an email to the webauthn-for-certreq-reg-review@ietf.org mailing list.</t>
            <t>Registration requests consist of at least the following information:</t>
            <ul spacing="normal">
              <li>
                <t>WebAuthn Attestation Statement Format Identifier:
                </t>
                <ul spacing="normal">
                  <li>An identifier meeting the requirements given in <xref target="webauthn-attestation-statement-format-identifiers-for-certificate-request-protocols"/>.</li>
                </ul>
              </li>
              <li>
                <t>Description:
                </t>
                <ul spacing="normal">
                  <li>A relatively short description of the attestation format.</li>
                </ul>
              </li>
              <li>
                <t>Specification Document(s):
                </t>
                <ul spacing="normal">
                  <li>Reference to the document or documents that specify the attestation statement format.</li>
                </ul>
              </li>
              <li>
                <t>Change Controller:
                </t>
                <ul spacing="normal">
                  <li>For Standards Track RFCs, list "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</li>
                </ul>
              </li>
              <li>
                <t>Notes:
                </t>
                <ul spacing="normal">
                  <li>[optional]</li>
                </ul>
              </li>
            </ul>
            <t>Registrations <bcp14>MUST</bcp14> reference a freely available, stable specification, e.g., as described in Section 4.6 of [RFC8126].  This specification <bcp14>MUST</bcp14> include security and privacy considerations relevant to the attestation statement format.</t>
            <t>Note that WebAuthn attestation statement format identifiers can be registered by third parties (including the expert(s) themselves), if the expert(s) determines that an unregistered attestation statement format is widely deployed and not likely to be registered in a timely manner otherwise.  Such registrations still are subject to the requirements defined, including the need to reference a specification.</t>
          </section>
          <section anchor="registration-request-processing">
            <name>Registration Request Processing</name>
            <t>As noted in <xref target="registering-attestation-statement-format-identifiers"/>, WebAuthn attestation statement format identifiers are registered using the Specification Required policy.</t>
            <t>The expert(s) will clearly identify any issues that cause a registration to be refused, such as an incompletely specified attestation format.</t>
            <t>When a request is approved, the expert(s) will inform IANA, and the registration will be processed.  The IESG is the arbiter of any objection.</t>
          </section>
          <section anchor="initial-values-in-the-webauthn-attestation-statement-format-identifiers-for-certificate-request-protocols-registry">
            <name>Initial Values in the WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols Registry</name>
            <t>The initial values for the "WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols" registry have been populated with the values listed in the "WebAuthn Attestation Statement Format Identifier Registrations" (https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-att-fmt-reg) section of <xref target="WebAuthn"/>.  Also, the Change Controller entry for each of those registrations is:</t>
            <ul spacing="normal">
              <li>
                <t>Change Controller:
                </t>
                <ul spacing="normal">
                  <li>W3C Web Authentication Working Group (public-webauthn@w3.org)</li>
                </ul>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="webauthn-extension-identifiers-for-certificate-request-protocols">
          <name>WebAuthn Extension Identifiers for Certificate Request Protocols</name>
          <t>WebAuthn extension identifiers are strings whose semantic, syntactic, and string-matching criteria are specified in the "Extension Identifiers" (https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-extension-id) section of <xref target="WebAuthn"/>.</t>
          <t>Registered extension identifiers are those that have been added to the registry by following the procedure in <xref target="registering-extension-identifiers"/>.</t>
          <t>Each extension identifier added to this registry <bcp14>MUST</bcp14> be unique amongst the set of registered extension identifiers.</t>
          <t>Registered extension identifiers <bcp14>MUST</bcp14> be a maximum of 32 octets in length and <bcp14>MUST</bcp14> consist only of printable ASCII characters, excluding backslash and double quote, i.e., VCHAR as defined in [RFC5234] but without %x22 and %x5c.  Extension identifiers are case sensitive and may not match other registered identifiers in a case-insensitive manner unless the designated experts determine that there is a compelling reason to allow an exception.</t>
          <section anchor="registering-extension-identifiers">
            <name>Registering Extension Identifiers</name>
            <t>WebAuthn extension identifiers are registered using the Specification Required policy (see Section 4.6 of [RFC8126]).</t>
            <t>The "WebAuthn Extension Identifiers" registry is located at <eref target="https://www.iana.org/assignments/webauthn">https://www.iana.org/assignments/webauthn</eref>.  Registration requests can be made by following the instructions located there or by sending an email to the webauthn-for-certreq-reg-review@ietf.org mailing list.</t>
            <t>Registration requests consist of at least the following information:</t>
            <ul spacing="normal">
              <li>
                <t>WebAuthn Extension Identifier:
                </t>
                <ul spacing="normal">
                  <li>An identifier meeting the requirements given in <xref target="webauthn-extension-identifiers-for-certificate-request-protocols"/>.</li>
                </ul>
              </li>
              <li>
                <t>Description:
                </t>
                <ul spacing="normal">
                  <li>A relatively short description of the extension.</li>
                </ul>
              </li>
              <li>
                <t>Specification Document(s):
                </t>
                <ul spacing="normal">
                  <li>Reference to the document or documents that specify the extension.</li>
                </ul>
              </li>
              <li>
                <t>Change Controller:
                </t>
                <ul spacing="normal">
                  <li>For Standards Track RFCs, list "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</li>
                </ul>
              </li>
              <li>
                <t>Notes:
                </t>
                <ul spacing="normal">
                  <li>[optional]</li>
                </ul>
              </li>
            </ul>
            <t>Registrations <bcp14>MUST</bcp14> reference a freely available, stable specification, e.g., as described in Section 4.6 of [RFC8126].  This specification <bcp14>MUST</bcp14> include security and privacy considerations relevant to the extension.</t>
            <t>Note that WebAuthn extensions can be registered by third parties (including the expert(s) themselves), if the expert(s) determines that an unregistered extension is widely deployed and not likely to be registered in a timely manner otherwise.  Such registrations still are subject to the requirements defined, including the need to reference a specification.</t>
          </section>
          <section anchor="registration-request-processing-1">
            <name>Registration Request Processing</name>
            <t>As noted in <xref target="registering-extension-identifiers"/>, WebAuthn extension identifiers are registered using the Specification Required policy.</t>
            <t>The expert(s) will clearly identify any issues that cause a registration to be refused, such as an incompletely specified extension.</t>
            <t>When a request is approved, the expert(s) will inform IANA, and the registration will be processed.  The IESG is the arbiter of any objection.</t>
          </section>
          <section anchor="initial-values-in-the-webauthn-extension-identifiers-registry">
            <name>Initial Values in the WebAuthn Extension Identifiers Registry</name>
            <t>The initial values for the "WebAuthn Extension Identifiers" registry have been populated with the values listed in the "WebAuthn Extension Identifier Registrations" <eref target="https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-extensions-reg">https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-extensions-reg</eref> section of <xref target="WebAuthn"/>.  Also, the Change Controller entry for each of those registrations is:</t>
            <ul spacing="normal">
              <li>
                <t>Change Controller:
                </t>
                <ul spacing="normal">
                  <li>W3C Web Authentication Working Group (public-webauthn@w3.org)</li>
                </ul>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <t>The following ASN.1 module makes use of the conventions from <xref target="RFC5912"/>.</t>
      <artwork><![CDATA[
KeyAttestationExtn-2022
  { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-keyAttestation(TBD2) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS

  id-pe
  FROM PKIX1Explicit-2009 -- from [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-explicit-02(51) }

  EXTENSION, ATTRIBUTE
  FROM PKIX-CommonTypes-2009 -- from [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57) }
  ;

-- EXPORT ALL --

ext-keyAttestation EXTENSION ::= {
  SYNTAX KeyAttestation IDENTIFIED BY id-pe-keyAttestation }

attr-keyAttestation ATTRIBUTE ::= {
  TYPE KeyAttestation IDENTIFIED BY id-pe-keyAttestation }

id-pe-keyAttestation OBJECT IDENTIFIER ::=  { id-pe TBD }

KeyAttestation ::= OCTET STRING

END
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom">
              <organization/>
            </author>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski">
              <organization/>
            </author>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC8894">
          <front>
            <title>Simple Certificate Enrolment Protocol</title>
            <author fullname="P. Gutmann" initials="P." surname="Gutmann">
              <organization/>
            </author>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies the Simple Certificate Enrolment Protocol (SCEP), a PKI protocol that leverages existing technology by using Cryptographic Message Syntax (CMS, formerly known as PKCS #7) and PKCS #10 over HTTP.  SCEP is the evolution of the enrolment protocol sponsored by Cisco Systems, which enjoys wide support in both client and server implementations, as well as being relied upon by numerous other industry standards that work with certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8894"/>
          <seriesInfo name="DOI" value="10.17487/RFC8894"/>
        </reference>
        <reference anchor="RFC5272">
          <front>
            <title>Certificate Management over CMS (CMC)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="M. Myers" initials="M." surname="Myers">
              <organization/>
            </author>
            <date month="June" year="2008"/>
            <abstract>
              <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
              <t>1.  The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
              <t>2.  The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
              <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5272"/>
          <seriesInfo name="DOI" value="10.17487/RFC5272"/>
        </reference>
        <reference anchor="RFC4210">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="T. Kause" initials="T." surname="Kause">
              <organization/>
            </author>
            <author fullname="T. Mononen" initials="T." surname="Mononen">
              <organization/>
            </author>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP).  Protocol messages are defined for X.509v3 certificate creation and management.  CMP provides on-line interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4210"/>
          <seriesInfo name="DOI" value="10.17487/RFC4210"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics.  This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production.  The request will typically include a public key and the associated registration information.  This document does not define a certificate request protocol.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin">
              <organization/>
            </author>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee">
              <organization/>
            </author>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group.  This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8809">
          <front>
            <title>Registries for Web Authentication (WebAuthn)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam">
              <organization/>
            </author>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <date month="August" year="2020"/>
            <abstract>
              <t>This specification defines IANA registries for W3C Web Authentication (WebAuthn) attestation statement format identifiers and extension identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8809"/>
          <seriesInfo name="DOI" value="10.17487/RFC8809"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="WebAuthn" target="https://www.w3.org/TR/webauthn-2/">
          <front>
            <title>Web Authentication: An API for accessing Public Key Credentials Level 2</title>
            <author fullname="Jeff Hodges">
              <organization>Google</organization>
            </author>
            <author fullname="J.C. Jones">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Michael B. Jones">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Akshay Kumar">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Emil Lundberg">
              <organization>Yubico</organization>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews">
              <organization/>
            </author>
            <author fullname="D. McCarney" initials="D." surname="McCarney">
              <organization/>
            </author>
            <author fullname="J. Kasten" initials="J." surname="Kasten">
              <organization/>
            </author>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  As of this writing, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.draft-bweeks-acme-device-attest">
          <front>
            <title>Automated Certificate Management Environment (ACME) Device Attestation Extension</title>
            <author fullname="Brandon Weeks" initials="B." surname="Weeks">
              <organization>Google</organization>
            </author>
            <date day="7" month="August" year="2022"/>
            <abstract>
              <t>   This document specifies new identifiers and a challenge for the
   Automated Certificate Management Environment (ACME) protocol which
   allows validating the identity of a device using attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bweeks-acme-device-attest-01"/>
        </reference>
        <reference anchor="WebAuthnReg" target="https://www.iana.org/assignments/webauthn/webauthn.xhtml">
          <front>
            <title>WebAuthn Attestation Statement Format Identifiers</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COTS">
          <front>
            <title>Concise TA Stores (CoTS)</title>
            <author fullname="Carl Wallace">
              <organization>Red Hound Software</organization>
            </author>
            <author fullname="Russ Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="OTA" target="https://developer.apple.com/library/archive/documentation/NetworkingInternet/Conceptual/iPhoneOTAConfiguration/Introduction/Introduction.html">
          <front>
            <title>Over-the-Air Profile Delivery and Configuration</title>
            <author>
              <organization>Apple</organization>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="fido-metadata" target="https://fidoalliance.org/specs/mds/fido-metadata-statement-v3.0-ps-20210518.html">
          <front>
            <title>FIDO Metadata Statement</title>
            <author>
              <organization>FIDO Alliance</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
