<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.24 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-ar4si-04" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="Attestation Results">Attestation Results for Secure Interactions</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-04"/>
    <author initials="E." surname="Voit" fullname="Eric Voit">
      <organization abbrev="Cisco">Cisco Systems</organization>
      <address>
        <email>evoit@cisco.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Hardjono" fullname="Thomas Hardjono">
      <organization>MIT</organization>
      <address>
        <email>hardjono@mit.edu</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="V." surname="Scarlata" fullname="Vincent Scarlata">
      <organization>Intel</organization>
      <address>
        <email>vincent.r.scarlata@intel.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="02"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines reusable Attestation Result information elements.
When these elements are offered to Relying Parties as Evidence, different aspects of Attester trustworthiness can be evaluated.
Additionally, where the Relying Party is interfacing with a heterogeneous mix of Attesting Environment and Verifier types, consistent policies can be applied to subsequent information exchange between each Attester and the Relying Party.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-ar4si"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The first paragraph of the May 2021 US Presidential Executive Order on Improving the Nation's Cybersecurity <xref target="US-Executive-Order"/> ends with the statement "the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is."
Later this order explores aspects of trustworthiness such as an auditable trust relationship, which it defines as an "agreed-upon relationship between two or more system elements that is governed by criteria for secure interaction, behavior, and outcomes."</t>
      <t>The Remote ATtestation procedureS (RATS) architecture <xref target="I-D.ietf-rats-architecture"/> provides a useful context for programmatically establishing and maintaining such auditable trust relationships.
Specifically, the architecture defines conceptual messages conveyed between architectural subsystems to support trustworthiness appraisal.
The RATS conceptual message used to convey evidence of trustworthiness is the Attestation Results.
The Attestation Results includes Verifier generated appraisals of an Attester including such information as the identity of the Attester, the security mechanisms employed on this Attester, and the Attester's current state of trustworthiness.</t>
      <t>Generated Attestation Results are ultimately conveyed to one or more Relying Parties.
Reception of an Attestation Result enables a Relying Party to determine what action to take with regards to an Attester.
Frequently, this action will be to choose whether to allow the Attester to securely interact with the Relying Party over some connection between the two.</t>
      <t>When determining whether to allow secure interactions with an Attester, a Relying Party is challenged with a number of difficult problems which it must be able to handle successfully.
These problems include:</t>
      <ul spacing="normal">
        <li>What Attestation Results (AR) might a Relying Party be willing to trust from a specific Verifier?</li>
        <li>What information does a Relying Party need before allowing interactions or choosing policies to apply to a connection?</li>
        <li>What are the operating/environmental realities of the Attesting Environment where a Relying Party should only be able to associate a certain confidence regarding Attestation Results out of the Verifier?  (In other words, different types of Trusted Execution Environments (TEE) need not be treated as equivalent.)</li>
        <li>How to make direct comparisons where there is a heterogeneous mix of Attesting Environments and Verifier types.</li>
      </ul>
      <t>To address these problems, it is important that specific Attestation Result information elements are framed independently of Attesting Environment specific constraints.
If they are not, a Relying Party would be forced to adapt to the syntax and semantics of many vendor specific environments.
This is not a reasonable ask as there can be many types of Attesters interacting with or connecting to a Relying Party.</t>
      <t>The business need therefore is for common Attestation Result information element definitions.
With these definitions, consistent interaction or connectivity decisions can be made by a Relying Party where there is a heterogenous mix of Attesting Environment types and Verifier types.</t>
      <t>This document defines information elements for Attestation Results in a way which normalizes the trustworthiness assertions that can be made from a diverse set of Attesters.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The following terms are imported from <xref target="I-D.ietf-rats-architecture"/>:
Appraisal Policy for Attestation Results, Attester, Attesting Environment, Claims, Evidence, Relying Party, Target Environment and Verifier.</t>
        <t><xref target="I-D.ietf-rats-architecture"/> also describes topological patterns that illustrate the need for interoperable conceptual messages.
The two patterns called "background-check model" and "passport model" are imported from the RATS architecture and used in this document as a reference to the architectural concepts:
Background-Check Model and Passport Model.</t>
        <t>Newly defined terms for this document:</t>
        <dl>
          <dt>AR-augmented Evidence:</dt>
          <dd>
            <t>a bundle of Evidence which includes at least the following:
</t>
            <ol spacing="normal" type="1"><li>Verifier signed Attestation Results.
These Attestation Results must include Identity Evidence for the Attester, a Trustworthiness Vector describing a Verifier's most recent appraisal of an Attester, and some Verifier Proof-of-Freshness (PoF).</li>
              <li>A Relying Party PoF which is bound to the Attestation Results of (1) by the Attester's Attesting Environment signature.</li>
              <li>Sufficient information to determine the elapsed interval between the Verifier PoF and Relying Party PoF.</li>
            </ol>
          </dd>
          <dt>Identity Evidence:</dt>
          <dd>
            <t>Evidence which unambiguously identifies an identity.
Identity Evidence could take different forms, such as a certificate, or a signature which can be appraised to have only been generated by a specific private/public key pair.</t>
          </dd>
          <dt>Trustworthiness Claim:</dt>
          <dd>
            <t>a specific quanta of trustworthiness which can be assigned by a Verifier based on its appraisal policy.</t>
          </dd>
          <dt>Trustworthiness Tier:</dt>
          <dd>
            <t>a categorization of the levels of trustworthiness which may be assigned by a Verifier to a specific Trustworthiness Claim.
These enumerated categories are: Affirmed, Warning, Contraindicated, and None.</t>
          </dd>
          <dt>Trustworthiness Vector:</dt>
          <dd>
            <t>a set of zero to many Trustworthiness Claims assigned during a single appraisal procedure by a Verifier using Evidence generated by an Attester.
The vector is included within Attestation Results.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="attestation-results-for-secure-interactions">
      <name>Attestation Results for Secure Interactions</name>
      <t>A Verifier generates the Attestation Results used by a Relying Party.
When a Relying Party needs to determine whether to permit communications with an Attester, these Attestation Results must contain a specific set of information elements.
This section defines those information elements, and in some cases encodings for information elements.</t>
      <section anchor="information-driving-a-relying-party-action">
        <name>Information driving a Relying Party Action</name>
        <t>When the action is a communication establishment attempt with an Attester, there is only a limited set of actions which a Relying Party might take.
These actions include:</t>
        <ul spacing="normal">
          <li>Allow or deny information exchange with the Attester.
When there is a deny, reasons should be returned to the Attester.</li>
          <li>Establish a transport connection between an Attester and a specific context within a Relying Party (e.g., a TEE, or Virtual Routing Function (VRF).)</li>
          <li>Apply policies on this connection (e.g., rate limits).</li>
        </ul>
        <t>There are three categories of information which must be conveyed to the Relying Party (which also is integrated with a Verifier) before it determines which of these actions to take.</t>
        <ol spacing="normal" type="1"><li>Non-repudiable Identity Evidence - Evidence which undoubtably identifies one or more entities involved with a communication.</li>
          <li>Trustworthiness Claims - Specifics a Verifier asserts with regards to its trustworthiness findings about an Attester.</li>
          <li>Claim Freshness - Establishes the time of last update (or refresh) of Trustworthiness Claims.</li>
        </ol>
        <t>The following sections detail requirements for these three categories.</t>
      </section>
      <section anchor="identity-section">
        <name>Non-repudiable Identity</name>
        <t>Identity Evidence must be conveyed during the establishment of any trust-based relationship.
Specific use cases will define the minimum types of identities required by a particular Relying Party as it evaluates Attestation Results, and perhaps additional associated Evidence.
At a bare minimum, a Relying Party MUST start with the ability to verify the identity of a Verifier it chooses to trust.
Attester identities may then be acquired through signed or encrypted communications with the Verifier identity and/or the pre-provisioning Attester public keys in the Attester.</t>
        <t>During the Remote Attestation process, the Verifier's identity must be established with a Relying Party, often via a Verifier signature across recent Attestation Results.
This Verifier identity could only have come from a key pair maintained by a trusted developer or operator of the Verifier.</t>
        <t>Additionally, each set of Attestation Results must be provably and non-reputably bound to the identity of the original Attesting Environment which was evaluated by the Verifier.
This is accomplished via satisfying two requirements.
First the Verifier signed Attestation Results MUST include sufficient Identity Evidence to ensure that this Attesting Environment signature refers to the same Attesting Environment appraised by the Verifier.
Second, where the passport model is used as a subsystem, an Attesting Environment signature which spans the Verifier signature MUST also be included.
As the Verifier signature already spans the Attester Identity as well as the Attestation Results, this restricts the viability of spoofing attacks.</t>
        <t>In a subset of use cases, these two pieces of Identity Evidence may be sufficient for a Relying Party to successfully meet the criteria for its Appraisal Policy for Attestation Results.
If the use case is a connection request, a Relying Party may simply then establish a transport session with an Attester after a successful appraisal.
However an Appraisal Policy for Attestation Results will often be more nuanced, and the Relying Party may need additional information.
Some Identity Evidence related policy questions which the Relying Party may consider include:</t>
        <ul spacing="normal">
          <li>Does the Relying Party only trust this Verifier to make Trustworthiness Claims on behalf a specific type of Attesting Environment?  Might a mix of Verifiers be necessary to cover all mandatory Trustworthiness Claims?</li>
          <li>Does the Relying Party only accept connections from a verified-authentic software build from a specific software developer?</li>
          <li>Does the Relying Party only accept connections from specific preconfigured list of Attesters?</li>
        </ul>
        <t>For any of these more nuanced appraisals, additional Identity Evidence or other policy related information must be conveyed or pre-provisioned during the formation of a trust context between the Relying Party, the Attester, the Attester's Attesting Environment, and the Verifier.</t>
        <section anchor="attester-and-attesting-environment">
          <name>Attester and Attesting Environment</name>
          <t>Per <xref target="I-D.ietf-rats-architecture"/> Figure 2, an Attester and a corresponding Attesting Environment might not share common code or even hardware boundaries.
Consequently, an Attester implementation needs to ensure that any Evidence which originates from outside the Attesting Environment MUST have been collected and delivered securely before any Attesting Environment signing may occur.
After the Verifier performs its appraisal, it will include sufficient information in the Attestation Results to enable a Relying Party to have confidence that the Attester's trustworthiness is represented via Trustworthiness Claims signed by the appropriate Attesting Environment.</t>
          <t>This document recognizes three general categories of Attesters.</t>
          <ol spacing="normal" type="1"><li>HSM-based: A Hardware Security Module (HSM) based cryptoprocessor which hashes one or more streams of security measurements from an Attester within the Attesting Environment. Maintenance of this hash enables detection of an Attester which is not reporting the exact set of security measurements (such as log entries) taken within the Attesting Environment. An example of a HSM is a TPM2.0 <xref target="TPM2.0"/>.</li>
            <li>Process-based: An individual process which has its runtime memory encrypted by an Attesting Environment in a way that no other processes can read and decrypt that memory (e.g., <xref target="SGX"/> or <xref target="I-D.tschofenig-rats-psa-token"/>.)</li>
            <li>VM-based: An entire Guest VM (or a set of containers within a host) have been encrypted as a walled-garden unit by an Attesting Environment.  The result is that the host operating system cannot read and decrypt what is executing within that VM (e.g., <xref target="SEV-SNP"/> or <xref target="TDX"/>.)</li>
          </ol>
          <t>Each of these categories of Attesters above will be capable of generating Evidence which is protected using private keys / certificates which are not accessible outside of the corresponding Attesting Environment.
The owner of these secrets is the owner of the identity which is bound within the Attesting Environment.
Effectively this means that for any Attester identity, there will exist a chain of trust ultimately bound to a hardware-based root of trust in the Attesting Environment.
It is upon this root of trust that unique, non-repudiable Attester identities may be founded.</t>
          <t>There are several types of Attester identities defined in this document.  This list is extensible:</t>
          <ul spacing="normal">
            <li>chip-vendor: the vendor of the hardware chip used for the Attesting Environment (e.g., a primary Endorsement Key from a TPM)</li>
            <li>chip-hardware: specific hardware with specific firmware from an 'chip-vendor'</li>
            <li>target-environment: a unique instance of a software build running in an Attester (e.g., MRENCLAVE <xref target="SGX"/>, an Instance ID <xref target="I-D.tschofenig-rats-psa-token"/>, an Identity Block <xref target="SEV-SNP"/>, or a hash which represents a set of software loaded since boot (e.g., TPM based integrity verification.))</li>
            <li>target-developer: the organizational unit responsible for a particular 'target-environment' (e.g., MRSIGNER <xref target="SGX"/>)</li>
            <li>instance: a unique instantiated instance of an Attesting Environment running on 'chip-hardware' (e.g., an LDevID <xref target="IEEE802.1AR"/>)</li>
          </ul>
          <t>Based on the category of the Attesting Environment, different types of identities might be exposed by an Attester.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Attester Identity type</th>
                <th align="left">Process-based</th>
                <th align="left">VM-based</th>
                <th align="left">HSM-based</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">chip-vendor</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
              </tr>
              <tr>
                <td align="left">chip-hardware</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
              </tr>
              <tr>
                <td align="left">target-environment</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Optional</td>
              </tr>
              <tr>
                <td align="left">target-developer</td>
                <td align="left">Mandatory</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
              </tr>
              <tr>
                <td align="left">instance</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
              </tr>
            </tbody>
          </table>
          <t>It is expected that drafts subsequent to this specification will provide the definitions and value domains for specific identities, each of which falling within the Attester identity types listed above.
In some cases the actual unique identities might encoded as complex structures.
An example complex structure might be a 'target-environment' encoded as a Software Bill of Materials (SBOM).</t>
          <t>With the identity definitions and value domains, a Relying Party will have sufficient information to ensure that the Attester identities and Trustworthiness Claims asserted are actually capable of being supported by the underlying type of Attesting Environment.
Consequently, the Relying Party SHOULD require Identity Evidence which indicates of the type of Attesting Environment when it considers its Appraisal Policy for Attestation Results.</t>
        </section>
        <section anchor="verifier">
          <name>Verifier</name>
          <t>For the Verifier identity, it is critical for a Relying Party to review the certificate and chain of trust for that Verifier.
Additionally, the Relying Party must have confidence that the Trustworthiness Claims being relied upon from the Verifier considered the chain of trust for the Attesting Environment.</t>
          <t>There are two categorizations of Verifier identities defined in this document:</t>
          <ul spacing="normal">
            <li>verifier build: a unique instance of a software build running as a Verifier.</li>
            <li>verifier developer: the organizational unit responsible for a particular 'verifier build'.</li>
          </ul>
          <t>Within each category, communicating the identity can be accomplished via a variety of objects and encodings.</t>
        </section>
        <section anchor="communicating-identity">
          <name>Communicating Identity</name>
          <t>Any of the above identities used by the Appraisal Policy for Attestation Results needed to be pre-established by the Relying Party before, or provided during, the exchange of Attestation Results.
When provided during this exchange, the identity may be communicated either implicitly or explicitly.</t>
          <t>An example of explicit communication would be to include the following Identity Evidence directly within the Attestation Results: a unique identifier for an Attesting Environment, the name of a key which can be provably associated with that unique identifier, and the set of Attestation Results which are signed using that key.
As these Attestation Results are signed by the Verifier, it is the Verifier which is explicitly asserting the credentials it believes are trustworthy.</t>
          <t>An example of implicit communication would be to include Identity Evidence in the form of a signature which has been placed over the Attestation Results asserted by a Verifier.
It would be then up to the Relying Party's Appraisal Policy for Attestation Results to extract this signature and confirm that it only could have been generated by an Attesting Environment having access to a specific private key.
This implicit identity communication is only viable if the Attesting Environment's public key is already known by the Relying Party.</t>
          <t>One final step in communicating identity is proving the freshness of the Attestation Results to the degree needed by the Relying Party.
A typical way to accomplish this is to include an element of freshness be embedded within a signed portion of the Attestation Results.
This element of freshness reduces the identity spoofing risks from a replay attack.
For more on this, see <xref target="freshness-section"/>.</t>
        </section>
      </section>
      <section anchor="vector-section">
        <name>Trustworthiness Claims</name>
        <section anchor="design-principles">
          <name>Design Principles</name>
          <t>Trust is not absolute.
Trust is a belief in some aspect about an entity (in this case an Attester), and that this aspect is something which can be depended upon (in this case by a Relying Party.)
Within the context of Remote Attestation, believability of this aspect is facilitated by a Verifier.
This facilitation depends on the Verifier's ability to parse detailed Evidence from an Attester and then to assert conclusions about this aspect in a way interpretable by a Relying Party.</t>
          <t>Specific aspects for which a Verifier will assert trustworthiness are defined in this section.
These are known as Trustworthiness Claims.
These claims have been designed to enable a common understanding between a broad array of Attesters, Verifiers, and Relying Parties.
The following set of design principles have been applied in the Trustworthiness Claim definitions:</t>
          <ol spacing="normal" type="1"><li>
              <t>Expose a small number of Trustworthiness Claims.  </t>
              <t>
Reason: a plethora of similar Trustworthiness Claims will result in divergent choices made on which to support between different Verifiers.  This would place a lot of complexity in the Relying Party as it would be up to the Relying Party (and its policy language) to enable normalization across rich but incompatible Verifier object definitions.</t>
            </li>
            <li>
              <t>Each Trustworthiness Claim enumerates only the specific states that could viably result in a different outcome after the Policy for Attestation Results has been applied.  </t>
              <t>
Reason: by explicitly disallowing the standardization of enumerated states which cannot easily be connected to a use case, we avoid forcing implementers from making incompatible guesses on what these states might mean.</t>
            </li>
            <li>
              <t>Verifier and RP developers need explicit definitions of each state in order to accomplish the goals of (1) and (2).  </t>
              <t>
Reason: without such guidance, the Verifier will append plenty of raw supporting info.  This relieves the Verifier of making the hard decisions.  Of course, this raw info will be mostly non-interpretable and therefore non-actionable by the Relying Party.</t>
            </li>
            <li>
              <t>Support standards and non-standard extensibility for (1) and (2).  </t>
              <t>
Reason: standard types of Verifier generated Trustworthiness Claims should be vetted by the full RATS working group, rather than being maintained in a repository which doesn't follow the RFC process.  This will keep a tight lid on extensions which must be considered by the Relying Party's policy language.  Because this process takes time, non-standard extensions will be needed for implementation speed and flexibility.</t>
            </li>
          </ol>
          <t>These design principles are important to keep the number of Verifier generated claims low, and to retain the complexity in the Verifier rather than the Relying Party.</t>
        </section>
        <section anchor="enumeration-encoding">
          <name>Enumeration Encoding</name>
          <t>Per design principle (2), each Trustworthiness Claim will only expose specific encoded values.
To simplify the processing of these enumerations by the Relying Party, the enumeration will be encoded as a single signed 8 bit integer.  These value assignments for this integer will be in four Trustworthiness Tiers which follow these guidelines:</t>
          <t>None: The Verifier makes no assertions regarding this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>Value 0: The Evidence received is insufficient to make a conclusion. Note: this should always be always treated equivalently by the Relying Party as no claim being made. I.e., the RP's Appraisal Policy for Attestation Results SHOULD NOT make any distinction between a Trustworthiness Claim with enumeration '0', and no Trustworthiness Claim being provided.</li>
            <li>Value 1: The Evidence received contains unknown elements which the Verifier is unable to evaluate. An example might be that the wrong type of Evidence has been delivered.  Another  case is that of Evidence coming from a composite Attester: a Verifier may understand only part of it and leave as "unknown" the Trustworthiness claims related to features it can't appraise.</li>
            <li>Value -1: A verifier malfunction occurred during the Verifier's appraisal processing.</li>
          </ul>
          <t>Affirming: The Verifier affirms the Attester support for this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>Values 2 to 31: A standards enumerated reason for affirming.</li>
            <li>Values -2 to -32: A non-standard reason for affirming.</li>
          </ul>
          <t>Warning: The Verifier warns about this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>Values 32 to 95: A standards enumerated reason for the warning.</li>
            <li>Values -33 to -96: A non-standard reason for the warning.</li>
          </ul>
          <t>Contraindicated: The Verifier asserts the Attester is explicitly untrustworthy in regard to this aspect.</t>
          <ul spacing="normal">
            <li>Values 96 to 127: A standards enumerated reason for the contraindication.</li>
            <li>Values -97 to -128: A non-standard reason for the contraindication.</li>
          </ul>
          <t>This enumerated encoding listed above will simplify the Appraisal Policy for Attestation Results.
Such a policies may be as simple as saying that a specific Verifier has recently asserted Trustworthiness Claims, all of which are Affirming.</t>
        </section>
        <section anchor="assigning-a-trustworthiness-claim-value">
          <name>Assigning a Trustworthiness Claim value</name>
          <t>In order to simplify design, only a single encoded value is asserted by a Verifier for any Trustworthiness Claim within a using the following process.</t>
          <ol spacing="normal" type="1"><li>If applicable, a Verifier MUST assign a standardized value from the Contraindicated tier.</li>
            <li>Else if applicable, a Verifier MUST assign a non-standardized value from the Contraindicated tier.</li>
            <li>Else if applicable, a Verifier MUST assign a standardized value from the Warning tier.</li>
            <li>Else if applicable, a Verifier MUST assign a non-standardized value from the Warning tier.</li>
            <li>Else if applicable, a Verifier MUST assign a standardized value from the Affirming tier.</li>
            <li>Else if applicable, a Verifier MUST assign a non-standardized value from the Affirming tier.</li>
            <li>Else a Verifier MAY assign a 0 or -1.</li>
          </ol>
        </section>
        <section anchor="specific-claims">
          <name>Specific Claims</name>
          <t>Following are the Trustworthiness Claims and their supported enumerations which may be asserted by a Verifier:</t>
          <dl>
            <dt>configuration:</dt>
            <dd>
              <t>A Verifier has appraised an Attester's configuration, and is able to make conclusions regarding the exposure of known vulnerabilities
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>The configuration is a known and approved config.</t>
                </dd>
                <dt>3:</dt>
                <dd>
                  <t>The configuration includes or exposes no known vulnerabilities.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>The configuration includes or exposes known vulnerabilities.</t>
                </dd>
                <dt>36:</dt>
                <dd>
                  <t>Elements of the configuration relevant to security are unavailable to the Verifier.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The configuration is unsupportable as it exposes unacceptable security vulnerabilities.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>executables:</dt>
            <dd>
              <t>A Verifier has appraised and evaluated relevant runtime files, scripts, and/or other objects which have been loaded into the Target environment's memory.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>Only a recognized genuine set of approved executables, scripts, files, and/or objects have been loaded during and after the boot process.</t>
                </dd>
                <dt>3:</dt>
                <dd>
                  <t>Only a recognized genuine set of approved executables have been loaded during the boot process.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>Only a recognized genuine set of executables, scripts, files, and/or objects have been loaded.  However the Verifier cannot vouch for a subset of these due to known bugs or other known vulnerabilities.</t>
                </dd>
                <dt>33:</dt>
                <dd>
                  <t>Runtime memory includes executables, scripts, files, and/or objects which are not recognized.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>Runtime memory includes executables, scripts, files, and/or object which are contraindicated.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>file-system:</dt>
            <dd>
              <t>A Verifier has evaluated a specific set of directories within the Attester's file system.  (Note: the Verifier may or may not indicate what these directory and expected files are via an unspecified management interface.)
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>Only a recognized set of approved files are found.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>The file system includes unrecognized executables, scripts, or files.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The file system includes contraindicated executables, scripts, or files.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>hardware:</dt>
            <dd>
              <t>A Verifier has appraised any Attester hardware and firmware which are able to expose fingerprints of their identity and running code.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>An Attester has passed its hardware and/or firmware verifications needed to demonstrate that these are genuine/supported.</t>
                </dd>
              </dl>
              <t>32: An Attester contains only genuine/supported hardware and/or firmware, but there are known security vulnerabilities.</t>
              <dl>
                <dt>96:</dt>
                <dd>
                  <t>Attester hardware and/or firmware is recognized, but its trustworthiness is contraindicated.</t>
                </dd>
                <dt>97:</dt>
                <dd>
                  <t>A Verifier does not recognize an Attester's hardware or firmware, but it should be recognized.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>instance-identity:</dt>
            <dd>
              <t>A Verifier has appraised an Attesting Environment's unique identity based upon private key signed Evidence which can be correlated to a unique instantiated instance of the Attester.  (Note: this Trustworthiness Claim should only be generated if the Verifier actually expects to recognize the unique identity of the Attester.)
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>The Attesting Environment is recognized, and the associated instance of the Attester is not known to be compromised.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The Attesting Environment is recognized, and but its unique private key indicates a device which is not trustworthy.</t>
                </dd>
                <dt>97:</dt>
                <dd>
                  <t>The Attesting Environment is not recognized; however the Verifier believes it should be.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>runtime-opaque:</dt>
            <dd>
              <t>A Verifier has appraised the visibility of Attester objects in memory from perspectives outside the Attester.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>the Attester's executing Target Environment and Attesting Environments are encrypted and within Trusted Execution Environment(s) opaque to the operating system, virtual machine manager, and peer  applications.  (Note: This value corresponds to the protections asserted by O.RUNTIME_CONFIDENTIALITY from <xref target="GP-TEE-PP"/>)</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>the Attester's executing Target Environment and Attesting Environments inaccessible from any other parallel application or Guest VM running on the Attester's physical device.  (Note that unlike "1" these environments are not encrypted in a way which restricts the Attester's root operator visibility. See O.TA_ISOLATION from <xref target="GP-TEE-PP"/>.)</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The Verifier has concluded that in memory objects are unacceptably visible within the physical host that supports the Attester.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>sourced-data:</dt>
            <dd>
              <t>A Verifier has evaluated of the integrity of data objects from external systems used by the Attester.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>All essential Attester source data objects have been provided by other Attester(s) whose most recent appraisal(s) had both no Trustworthiness Claims of "0" where the current Trustworthiness Claim is "Affirming", as well as no "Warning" or "Contraindicated" Trustworthiness Claims.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>Attester source data objects come from unattested sources, or attested sources with "Warning" type Trustworthiness Claims.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>Attester source data objects come from contraindicated sources.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>storage-opaque:</dt>
            <dd>
              <t>A Verifier has appraised that an Attester is capable of encrypting persistent storage. (Note: Protections must meet the capabilities of <xref target="OMTP-ATE"/> Section 5, but need not be hardware tamper resistant.)
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>the Attester encrypts all secrets in persistent storage via using keys which are never visible outside an HSM or the Trusted Execution Environment hardware.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>the Attester encrypts all persistently stored secrets, but without using hardware backed keys</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>There are persistent secrets which are stored unencrypted in an Attester.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
          </dl>
          <t>It is possible for additonal Trustworthiness Claims and enumerated values to be defined in subsequent documents.
At the same time, the standardized Trustworthiness Claim values listed above have been designed so there is no overlap within a Trustworthiness Tier.
As a result, it is possible to imagine a future where overlapping Trustworthiness Claims within a single Trustworthiness Tier may be defined.
Wherever possible, the Verifier SHOULD assign the best fitting standardized value.</t>
          <t>Where a Relying Party doesn't know how to handle a particular Trustworthiness Claim, it MAY choose an appropriate action based on the Trustworthiness Tier under which the enumerated value fits.</t>
          <t>It is up to the Verifier to publish the types of evaluations it performs when determining how Trustworthiness Claims are derived for a type of any particular type of Attester.
It is out of the scope of this document for the Verifier to provide proof or specific logic on how a particular Trustworthiness Claim which it is asserting was derived.</t>
        </section>
        <section anchor="trustworthiness-vector">
          <name>Trustworthiness Vector</name>
          <t>Multiple Trustworthiness Claims may be asserted about an Attesting Environment at single point in time.
The set of Trustworthiness Claims inserted into an instance of Attestation Results by a Verifier is known as a Trustworthiness Vector.
The order of Claims in the vector is NOT meaningful.
A Trustworthiness Vector with no Trustworthiness Claims (i.e., a null Trustworthiness Vector) is a valid construct.
In this case, the Verifier is making no Trustworthiness Claims but is confirming that an appraisal has been made.</t>
        </section>
        <section anchor="trustworthiness-vector-for-a-type-of-attesting-environment">
          <name>Trustworthiness Vector for a type of Attesting Environment</name>
          <t>Some Trustworthiness Claims are implicit based on the underlying type of Attesting Environment.
For example, a validated MRSIGNER identity can be present where the underlying <xref target="SGX"/> hardware is 'hw-authentic'.
Where such implicit Trustworthiness Claims exist, they do not have to be explicitly included in the Trustworthiness Vector.
However, these implicit Trustworthiness Claims SHOULD be considered as being present by the Relying Party.
Another way of saying this is if a Trustworthiness Claim is automatically supported as a result of coming from a specific type of TEE, that claim need not be redundantly articulated. Such implicit Trustworthiness Claims can be seen in the tables within <xref target="process-based-claims"/> and <xref target="VM-based-claims"/>.</t>
          <t>Additionally, there are some Trustworthiness Claims which cannot be adequately supported by an Attesting Environment.
For example, it would be difficult for an Attester that includes only a TPM (and no other TEE) from ever having a Verifier appraise support for 'runtime-opaque'.
As such, a Relying Party would be acting properly if it rejects any non-supportable Trustworthiness Claims asserted from a Verifier.</t>
          <t>As a result, the need for the ability to carry a specific Trustworthiness Claim will vary by the type of Attesting Environment.
Example mappings can be seen in <xref target="claim-for-TEE-types"/>.</t>
        </section>
      </section>
      <section anchor="freshness-section">
        <name>Freshness</name>
        <t>A Relying Party will care about the recentness of the Attestation Results, and the specific Trustworthiness Claims which are embedded.
All freshness mechanisms of <xref target="I-D.ietf-rats-architecture"/>, Section 10 are supportable by this specification.</t>
        <t>Additionally, a Relying Party may track when a Verifier expires its confidence for the Trustworthiness Claims or the Trustworthiness Vector as a whole.  Mechanisms for such expiry are not defined within this document.</t>
        <t>There is a subset of secure interactions where the freshness of Trustworthiness Claims may need to be revisited asynchronously.
This subset is when trustworthiness depends on the continuous availability of a transport session between the Attester and Relying Party.
With such connectivity dependent Attestation Results, if there is a reboot which resets transport connectivity, all established Trustworthiness Claims should be cleared.
Subsequent connection re-establishment will allow fresh new Trustworthiness Claims to be delivered.</t>
      </section>
    </section>
    <section anchor="secure-interactions-models">
      <name>Secure Interactions Models</name>
      <t>There are multiple ways of providing a Trustworthiness Vector to a Relying Party.
This section describes two alternatives.</t>
      <section anchor="background-check">
        <name>Background-Check</name>
        <section anchor="verifier-retrieval">
          <name>Verifier Retrieval</name>
          <t>It is possible to for a Relying Party to follow the Background-Check Model defined in Section 5.2 of <xref target="I-D.ietf-rats-architecture"/>.
In this case, a Relying Party will receive Attestation Results containing the Trustworthiness Vector directly from a Verifier.
These Attestation Results can then be used by the Relying Party in determining the appropriate treatment for interactions with the Attester.</t>
          <t>While applicable in some cases, the utilization of the Background-Check Model without modification has potential drawbacks in other cases.
These include:</t>
          <ul spacing="normal">
            <li>Verifier scale: if the Attester has many Relying Parties, a Verifier appraising that Attester could be frequently be queried based on the same Evidence.</li>
            <li>Information leak: Evidence which the Attester might consider private can be visible to the Relying Party.  Hiding that Evidence could devalue any resulting appraisal.</li>
            <li>Latency: a Relying Party will need to wait for the Verifier to return Attestation Results before proceeding with secure interactions with the Attester.</li>
          </ul>
          <t>An implementer should examine these potential drawbacks before selecting this alternative.</t>
        </section>
        <section anchor="co-resident-verifier">
          <name>Co-resident Verifier</name>
          <t>A simplified Background-Check Model may exist in a very specific case.
This is where the Relying Party and Verifier functions are co-resident.
This model is appropriate when:</t>
          <ul spacing="normal">
            <li>Some hardware-based private key is used by an Attester while proving its identity as part of a mutually authenticated secure channel establishment with the Relying Party, and</li>
            <li>this Attester identity is accepted as sufficient proof of Attester integrity.</li>
          </ul>
          <t>Effectively this means that detailed forensic capabilities of a robust Verifier are unnecessary because it is accepted that the code and operational behavior of the Attester cannot be manipulated after TEE initialization.</t>
          <t>An example of such a scenario may be when an SGX's MRENCLAVE and MRSIGNER values have been associated with a known QUOTE value.
And the code running within the TEE is not modifiable after launch.</t>
        </section>
      </section>
      <section anchor="below-zero-trust">
        <name>Below Zero Trust</name>
        <t>Zero Trust Architectures are referenced in <xref target="US-Executive-Order"/> eleven times.
However despite this high profile, there is an architectural gap with Zero Trust.
The credentials used for authentication and admission control can be manipulated on the endpoint.
Attestation can fill this gap through the generation of a compound credential called AR-augmented Evidence.
This compound credential is rooted in the hardware based Attesting Environment of an endpoint, plus the trustworthiness of a Verifier.
The overall solution is known as "Below Zero Trust" as the compound credential cannot be manipulated or spoofed by an administrator of an endpoint with root access.
This solution is not adversely impacted by the potential drawbacks with pure background-check described above.</t>
        <t>To kick-off the "Below Zero Trust" compound credential creation sequence, a Verifier evaluates an Attester and returns signed Attestation Results back to this original Attester no less frequently than a well-known interval.
This interval may also be asynchronous, based on the changing of certain Evidence as described in <xref target="I-D.ietf-rats-network-device-subscription"/>.</t>
        <t>When a Relying Party is to receive information about the Attester's trustworthiness, the Attesting Environment assembles the minimal set of Evidence which can be used to confirm or refute whether the Attester remains in the state of trustworthiness represented by the AR.
To this Evidence, the Attesting Environment appends the signature from the most recent AR as well as a Relying Party Proof-of-Freshness.
The Attesting Environment then signs the combination.</t>
        <t>The Attester then assembles AR Augmented Evidence by taking the signed combination and appending the full AR. The assembly now consists of two independent but semantically bound sets of signed Evidence.</t>
        <t>The AR Augmented Evidence is then sent to the Relying Party.
The Relying Party then can appraise these semantically bound sets of signed Evidence by applying an Appraisal Policy for Attestation Results as described below.
This policy will consider both the AR as well as additional information about the Attester within the AR Augmented Evidence the when determining what action to take.</t>
        <t>This alternative combines the <xref target="I-D.ietf-rats-architecture"/> Sections 5.1 Passport Model and Section 5.2 Background-Check Model.
<xref target="interactions"/> describes this flow of information.
The flows within this combined model are mapped to <xref target="I-D.ietf-rats-architecture"/> in the following way.
"Verifier A" below corresponds to the "Verifier" Figure 5 within <xref target="I-D.ietf-rats-architecture"/>.
And "Relying Party/Verifier B" below corresponds to the union of the "Relying Party" and "Verifier" boxes within Figure 6 of <xref target="I-D.ietf-rats-architecture"/>.
This union is possible because Verifier B can be implemented as a simple, self-contained process.
The resulting combined process can appraise the AR-augmented Evidence to determine whether an Attester qualifies for secure interactions with the Relying Party.
The specific steps of this process are defined later in this section.</t>
        <figure anchor="interactions">
          <name>Below Zero Trust</name>
          <artwork><![CDATA[
  .----------------.
  | Attester       |
  | .-------------.|
  | | Attesting   ||             .----------.    .---------------.
  | | Environment ||             | Verifier |    | Relying Party |
  | '-------------'|             |     A    |    |  / Verifier B |
  '----------------'             '----------'    '---------------'
        time(VG)                       |                 |
          |<------Verifier PoF-------time(NS)            |
          |                            |                 |
 time(EG)(1)------Evidence------------>|                 |
          |                          time(RG)            |
          |<------Attestation Results-(2)                |
          ~                            ~                 ~
        time(VG')?                     |                 |
          ~                            ~                 ~
          |<------Relying Party PoF-----------------(3)time(NS')
          |                            |                 |
time(EG')(4)------AR-augmented Evidence----------------->|
          |                            |   time(RG',RA')(5)
                                                        (6)
                                                         ~
                                                      time(RX')
]]></artwork>
        </figure>
        <t>The interaction model depicted above includes specific time related events from Appendix A of <xref target="I-D.ietf-rats-architecture"/>.
With the identification of these time related events, time duration/interval tracking becomes possible.
Such duration/interval tracking can become important if the Relying Party cares if too much time has elapsed between the Verifier PoF and Relying Party PoF.
If too much time has elapsed, perhaps the Attestation Results themselves are no longer trustworthy.</t>
        <t>Note that while time intervals will often be relevant, there is a simplified case that does not require a Relying Party's PoF in step (3).
In this simplified case, the Relying Party trusts that the Attester cannot be meaningfully changed from the outside during any reportable interval.
Based on that assumption, and when this is the case then the step of the Relying Party PoF can be safely omitted.</t>
        <t>In all cases, appraisal policies define the conditions and prerequisites for when an Attester does qualify for secure interactions.
To qualify, an Attester has to be able to provide all of the mandatory affirming Trustworthiness Claims and identities needed by a Relying Party's Appraisal Policy for Attestation Results, and none of the disqualifying detracting Trustworthiness Claims.</t>
        <t>More details on each interaction step of Below Zero Trust are as follows.
The numbers used in this sequence match to the numbered steps in <xref target="interactions"/>:</t>
        <ol spacing="normal" type="1"><li>An Attester sends Evidence which is provably fresh to Verifier A at time(EG).
Freshness from the perspective of Verifier A MAY be established with Verifier PoF such as a nonce.</li>
          <li>
            <t>Verifier A appraises (1), then sends the following items back to that Attester within Attestation Results:  </t>
            <ol spacing="normal" type="1"><li>the verified identity of the Attesting Environment,</li>
              <li>the Verifier A appraised Trustworthiness Vector of an Attester,</li>
              <li>a freshness proof associated with the Attestation Results,</li>
              <li>a Verifier signature across (2.1) though (2.3).</li>
            </ol>
          </li>
          <li>At time(EG') a Relying Party PoF (such as a nonce) known to the Relying Party is sent to the Attester.</li>
          <li>
            <t>The Attester generates and sends AR-augmented Evidence to the Relying Party/Verifier B.
This AR-augmented Evidence includes:  </t>
            <ol spacing="normal" type="1"><li>The Attestation Results from (2)</li>
              <li>Any (optionally) new incremental Evidence from the Attesting Environment</li>
              <li>Attestation Environment signature which spans a hash of the Attestation Results (such as the signature of (2.4)), the proof-of-freshness from (3), and (4.2).  Note: this construct allows the delta of time between (2.3) and (3) to be definitively calculated by the Relying Party.</li>
            </ol>
          </li>
          <li>
            <t>On receipt of (4), the Relying Party applies its Appraisal Policy for Attestation Results.
At minimum, this appraisal policy process must include the following:  </t>
            <ol spacing="normal" type="1"><li>Verify that (4.3) includes the nonce from (3).</li>
              <li>Use a local certificate to validate the signature (4.1).</li>
              <li>Verify that the hash from (4.3) matches (4.1)</li>
              <li>Use the identity of (2.1) to validate the signature of (4.3).</li>
              <li>Failure of any steps (5.1) through (5.4) means the link does not meet minimum validation criteria, therefore appraise the link as having a null Verifier B Trustworthiness Vector.
Jump to step (6.1).</li>
              <li>When there is large or uncertain time gap between time(EG) and time(EG'), the link should be assigned a null Verifier B Trustworthiness Vector.
Jump to step (6.1).</li>
              <li>
                <t>Assemble the Verifier B Trustworthiness Vector
                </t>
                <ol spacing="normal" type="1"><li>Copy Verifier A Trustworthiness Vector to Verifier B Trustworthiness Vector</li>
                  <li>Add implicit Trustworthiness Claims inherent to the type of TEE.</li>
                  <li>Prune any Trustworthiness Claims unsupportable by the Attesting Environment.</li>
                  <li>Prune any Trustworthiness Claims the Relying Party doesn't accept from this Verifier.</li>
                </ol>
              </li>
            </ol>
          </li>
          <li>
            <t>The Relying Party takes action based on Verifier B's appraised Trustworthiness Vector, and applies the Appraisal Policy for Attestation Results.  Following is a reasonable process for such evaluation:  </t>
            <ol spacing="normal" type="1"><li>Prune any Trustworthiness Claims from the Trustworthiness Vector not used in the Appraisal Policy for Attestation Results.</li>
              <li>Allow the information exchange from the Attester into a Relying Party context in the Appraisal Policy for Attestation Results where the Verifier B appraised Trustworthiness Vector includes all the mandatory Trustworthiness Claims are in the "Affirming" value range, and none of the disqualifying Trustworthiness Claims are in the "Contraindicated" value range.</li>
              <li>Disallow any information exchange into a Relying Party context for which that Verifier B appraised Trustworthiness Vector is not qualified.</li>
            </ol>
          </li>
        </ol>
        <t>As link layer protocols re-authenticate, steps (1) to (2) and steps (3) to (6) will independently refresh.
This allows the Trustworthiness of Attester to be continuously re-appraised.
There are only specific event triggers which will drive the refresh of Evidence generation (1), Attestation Result generation (2), or AR-augmented Evidence generation (4):</t>
        <ul spacing="normal">
          <li>life-cycle events, e.g. a change to an Authentication Secret of the Attester or an update of a software component.</li>
          <li>uptime-cycle events, e.g. a hard reset or a re-initialization of an Attester.</li>
          <li>authentication-cycle events, e.g. a link-layer interface reset could result in a new (4).</li>
        </ul>
      </section>
      <section anchor="mutual-attestation">
        <name>Mutual Attestation</name>
        <t>In the interaction models described above, each device on either side of a secure interaction may require remote attestation of its peer.
This process is known as mutual-attestation.
To support mutual-attestation, the interaction models listed above may be run independently on either side of the connection.</t>
      </section>
      <section anchor="transport-protocol-integration">
        <name>Transport Protocol Integration</name>
        <t>Either unidirectional attestation or mutual attestation may be supported within the protocol interactions needed for the establishment of a single transport session.
While this document does not mandate specific transport protocols, messages containing the Attestation Results and AR Augmented Evidence can be passed within an authentication framework such the EAP protocol <xref target="RFC5247"/> over TLS <xref target="RFC8446"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Privacy Considerations Text</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security Considerations Text</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>See Body.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-rats-architecture">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="September" year="2022"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state.  This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-22"/>
        </reference>
        <reference anchor="OMTP-ATE" target="https://www.gsma.com/newsroom/wp-content/uploads/2012/03/omtpadvancedtrustedenvironmentomtptr1v11.pdf">
          <front>
            <title>Open Mobile Terminal Platform - Advanced Trusted Environment</title>
            <author>
              <organization/>
            </author>
            <date year="2009" month="May"/>
          </front>
        </reference>
        <reference anchor="GP-TEE-PP" target="https://globalplatform.org/specs-library/tee-protection-profile-v1-3/">
          <front>
            <title>Global Platform TEE Protection Profile v1.3</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="September"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5247">
          <front>
            <title>Extensible Authentication Protocol (EAP) Key Management Framework</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="D. Simon" initials="D." surname="Simon">
              <organization/>
            </author>
            <author fullname="P. Eronen" initials="P." surname="Eronen">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, enables extensible network access authentication.  This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material and parameters generated by EAP authentication algorithms, known as "methods".  It also provides a detailed system-level security analysis, describing the conditions under which the key management guidelines described in RFC 4962 can be satisfied.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5247"/>
          <seriesInfo name="DOI" value="10.17487/RFC5247"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TPM-ID" target="https://www.trustedcomputinggroup.org/wp-content/uploads/TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf">
          <front>
            <title>TPM Keys for Platform Identity for TPM 1.2</title>
            <author>
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="SEV-SNP" target="https://www.amd.com/system/files/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf">
          <front>
            <title>AMD SEV-SNP: Stregthening VM Isolation with Integrity Protection and More</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="SGX" target="https://software.intel.com/content/dam/develop/external/us/en/documents/intel-sgx-support-for-third-party-attestation-801017.pdf">
          <front>
            <title>Supporting Third Party Attestation for Intel SGX with Intel Data Center Attestation Primitives</title>
            <author>
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="TDX" target="https://software.intel.com/content/dam/develop/external/us/en/documents/tdx-whitepaper-final9-17.pdf">
          <front>
            <title>Intel Trust Domain Extensions</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AR" target="https://ieeexplore.ieee.org/document/8423794">
          <front>
            <title>802.1AR: Secure Device Identity</title>
            <author>
              <organization/>
            </author>
            <date year="2018" month="August" day="02"/>
          </front>
        </reference>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <date day="28" month="February" year="2023"/>
            <abstract>
              <t>   The Platform Security Architecture (PSA) is a family of hardware and
   firmware security specifications, as well as open-source reference
   implementations, to help device makers and chip manufacturers build
   best-practice security into products.  Devices that are PSA compliant
   are able to produce attestation tokens as described in this memo,
   which are the basis for a number of different protocols, including
   secure provisioning and network access control.  This document
   specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profiled Entity Attestation Token
   (EAT).

   This specification describes what claims are used in an attestation
   token generated by PSA compliant systems, how these claims get
   serialized to the wire, and how they are cryptographically protected.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-11"/>
        </reference>
        <reference anchor="I-D.ietf-rats-network-device-subscription">
          <front>
            <title>Attestation Event Stream Subscription</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="September" year="2022"/>
            <abstract>
              <t>   This memo defines how to subscribe to YANG Event Streams for Remote
   Attestation Procedures (RATS).  In RATS, Conceptional Messages, are
   defined.  Analogously, the YANG module defined in this memo augments
   the YANG module for TPM-based Challenge-Response based Remote
   Attestation (CHARRA) to allow for subscription to remote attestation
   Evidence.  Additionally, this memo provides the methods and means to
   define additional Event Streams for other Conceptual Message as
   illustrated in the RATS Architecture, e.g.  Attestation Results,
   Endorsements, or Event Logs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-network-device-subscription-02"/>
        </reference>
        <reference anchor="TPM2.0" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-1-Architecture-01.07-2014-03-13.pdf">
          <front>
            <title>Trusted Platform Module Library - Part 1: Architecture</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="US-Executive-Order" target="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">
          <front>
            <title>Executive Order on Improving the Nation's Cybersecurity</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="May" day="12"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="implementation-guidance">
      <name>Implementation Guidance</name>
      <section anchor="supplementing-trustworthiness-claims">
        <name>Supplementing Trustworthiness Claims</name>
        <t>What has been encoded into each Trustworthiness Claim is the domain of integer values which is likely to drive a different programmatic decision in the Relying Party's Appraisal Policy for Attestation Results.
This will not be the only thing a Relying Party's Operations team might care to track for measurement or debugging purposes.</t>
        <t>There is also the opportunity for the Verifier to include supplementary Evidence beyond a set of asserted Trustworthiness Claims.
It is recommended that if supplementary Evidence is provided by the Verifier within the Attestation Results, that this supplementary Evidence includes a reference to a specific Trustworthiness Claim.
This will allow a deeper understanding of some of the reasoning behind the integer value assigned.</t>
      </section>
    </section>
    <section anchor="claim-for-TEE-types">
      <name>Supportable Trustworthiness Claims</name>
      <t>The following is a table which shows what Claims are supportable by different Attesting Environment types.
Note that claims MAY BE implicit to an Attesting Environment type, and therefore do not have to be included in the Trustworthiness Vector to be considered as set by the Relying Party.</t>
      <section anchor="supportable-trustworthiness-claims-for-hsm-based-cc">
        <name>Supportable Trustworthiness Claims for HSM-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a HSM-based Confidential Computing Attester. (Such as a TPM <xref target="TPM-ID"/>.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">Verifier evaluation of Attester reveals no configuration lines which expose the Attester to known security vulnerabilities.  This may be done with or without the involvement of a TPM PCR.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Yes</td>
              <td align="left">Checks the TPM PCRs for the static operating system, and for any tracked files subsequently loaded</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">No</td>
              <td align="left">Can be supported, but TPM tracking is unlikely</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Yes</td>
              <td align="left">If TPM PCR check ok from BIOS checks, through Master Boot Record configuration</td>
            </tr>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Check IDevID</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">n/a</td>
              <td align="left">TPMs are not recommended to provide a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">n/a</td>
              <td align="left">TPMs are not recommended to provide a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Minimal</td>
              <td align="left">With a TPM, secure storage space exists and is writeable by external applications. But the space is so limited that it often is used just be used to store keys.</td>
            </tr>
          </tbody>
        </table>
        <t>Setting the Trustworthiness Claims may follow the following logic at the Verifier A within (2) of <xref target="interactions"/>:</t>
        <artwork><![CDATA[
Start: Evidence received starts the generation of a new
Trustworthiness Vector.  (e.g.,  TPM Quote Received, log received,
or appraisal timer expired)

Step 0: set Trustworthiness Vector = Null

Step 1: Is there sufficient fresh signed evidence to appraise?
  (yes) - No Action
  (no) -  Goto Step 6

Step 2: Appraise Hardware Integrity PCRs
   if (hardware NOT "0") - push onto vector
   if (hardware NOT affirming or warning), go to Step 6

Step 3: Appraise Attesting Environment identity
   if (instance-identity <> "0") - push onto vector

Step 4: Appraise executable loaded and filesystem integrity
   if (executables NOT "0") - push onto vector
   if (executables NOT affirming or warning), go to Step 6

Step 5: Appraise all remaining Trustworthiness Claims
        Independently and set as appropriate.

Step 6: Assemble Attestation Results, and push to Attester

End

]]></artwork>
      </section>
      <section anchor="process-based-claims">
        <name>Supportable Trustworthiness Claims for process-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a process-based Confidential Computing based Attester. (Such as a SGX Enclaves and TrustZone.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">If done, this is at the Application Layer.  Plus each process needs it own protection mechanism as the protection is limited to the process itself.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">Optional</td>
              <td align="left">Can be supported by application, but process-based CC is not a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Implicit in signature</td>
              <td align="left">At least the TEE is protected here. Other elements of the system outside of the TEE might need additional protections is used by the application process.</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">From the TEE</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">Although the application must assert that this function is used by the code itself.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">Optional</td>
              <td align="left">Will need to be supported by application code</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="VM-based-claims">
        <name>Supportable Trustworthiness Claims for VM-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a VM-based Confidential Computing based Attester. (Such as SEV, TDX, ACCA, SEV-SNP.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">Requires application integration.  Easier than with process-based solution, as the whole protected machine can be evaluated.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">Optional</td>
              <td align="left">Can be supported by application</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Chip dependent</td>
              <td align="left">At least the TEE is protected here. Other elements of the system outside of the TEE might need additional protections is used by the application process.</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">From the TEE</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Chip dependent</td>
              <td align="left">Although the application must assert that this function is used by the code itself.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">Optional</td>
              <td align="left">Will need to be supported by application code</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="some-issues-being-worked">
      <name>Some issues being worked</name>
      <t>It is possible for a cluster/hierarchy of Verifiers to have aggregate AR which are perhaps signed/endorsed by a lead Verifier.
What should be the Proof-of-Freshness or Verifier associated with any of the aggregate set of Trustworthiness Claims?</t>
      <t>There will need to be a subsequent document which documents how these objects which will be translated into a protocol on a wire (e.g. EAP on TLS).
Some breakpoint between what is in this draft, and what is in specific drafts for wire encoding will need to be determined.
Questions like architecting the cluster/hierarchy of Verifiers fall into this breakdown.</t>
      <t>For some Trustworthiness Claims, there could be value in identifying a specific Appraisal Policy for Attestation Results applied within the Attester.
One way this could be done would be a URI which identifies the policy used at Verifier A, and this URI would reference a specific Trustworthiness Claim.
As the URI also could encode the version of the software, it might also act as a mechanism to signal the Relying Party to refresh/re-evaluate its view of Verifier A.
Do we need this type of structure to be included here?
Should it be in subsequent documents?</t>
      <t>Expand the variant of <xref target="interactions"/> which requires no Relying Party PoF into its own picture.</t>
      <t>In what document (if any) do we attempt normalization of the identity claims between different types of TEE.   E.g., does MRSIGNER plus extra loaded software = the sum of TrustZone Signer IDs for loaded components?</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Guy Fedorkow</t>
      <t>Email: gfedorkow@juniper.net</t>
      <t>Dave Thaler</t>
      <t>Email: dthaler@microsoft.com</t>
      <t>Ned Smith</t>
      <t>Email: ned.smith@intel.com</t>
      <t>Lawrence Lundblade</t>
      <t>Email: lgl@island-resort.com</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
