<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-ar4si-05" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="Attestation Results">Attestation Results for Secure Interactions</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-05"/>
    <author initials="E." surname="Voit" fullname="Eric Voit">
      <organization abbrev="Cisco">Cisco Systems</organization>
      <address>
        <email>evoit@cisco.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Hardjono" fullname="Thomas Hardjono">
      <organization>MIT</organization>
      <address>
        <email>hardjono@mit.edu</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="V." surname="Scarlata" fullname="Vincent Scarlata">
      <organization>Intel</organization>
      <address>
        <email>vincent.r.scarlata@intel.com</email>
      </address>
    </author>
    <date year="2023" month="August" day="30"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 94?>

<t>This document defines reusable Attestation Result information elements.
When these elements are offered to Relying Parties as Evidence, different aspects of Attester trustworthiness can be evaluated.
Additionally, where the Relying Party is interfacing with a heterogeneous mix of Attesting Environment and Verifier types, consistent policies can be applied to subsequent information exchange between each Attester and the Relying Party.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-ar4si"/>.</t>
    </note>
  </front>
  <middle>
    <?line 101?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The first paragraph of the May 2021 US Presidential Executive Order on Improving the Nation's Cybersecurity <xref target="US-Executive-Order"/> ends with the statement "the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is."
Later this order explores aspects of trustworthiness such as an auditable trust relationship, which it defines as an "agreed-upon relationship between two or more system elements that is governed by criteria for secure interaction, behavior, and outcomes."</t>
      <t>The Remote ATtestation procedureS (RATS) architecture <xref target="RFC9334"/> provides a useful context for programmatically establishing and maintaining such auditable trust relationships.
Specifically, the architecture defines conceptual messages conveyed between architectural subsystems to support trustworthiness appraisal.
The RATS conceptual message used to convey evidence of trustworthiness is the Attestation Results.
The Attestation Results includes Verifier generated appraisals of an Attester including such information as the identity of the Attester, the security mechanisms employed on this Attester, and the Attester's current state of trustworthiness.</t>
      <t>Generated Attestation Results are ultimately conveyed to one or more Relying Parties.
Reception of an Attestation Result enables a Relying Party to determine what action to take with regards to an Attester.
Frequently, this action will be to choose whether to allow the Attester to securely interact with the Relying Party over some connection between the two.</t>
      <t>When determining whether to allow secure interactions with an Attester, a Relying Party is challenged with a number of difficult problems which it must be able to handle successfully.
These problems include:</t>
      <ul spacing="normal">
        <li>What Attestation Results (AR) might a Relying Party be willing to trust from a specific Verifier?</li>
        <li>What information does a Relying Party need before allowing interactions or choosing policies to apply to a connection?</li>
        <li>What are the operating/environmental realities of the Attesting Environment where a Relying Party should only be able to associate a certain confidence regarding Attestation Results out of the Verifier?  (In other words, different types of Trusted Execution Environments (TEE) need not be treated as equivalent.)</li>
        <li>How to make direct comparisons where there is a heterogeneous mix of Attesting Environments and Verifier types.</li>
      </ul>
      <t>To address these problems, it is important that specific Attestation Result information elements are framed independently of Attesting Environment specific constraints.
If they are not, a Relying Party would be forced to adapt to the syntax and semantics of many vendor specific environments.
This is not a reasonable ask as there can be many types of Attesters interacting with or connecting to a Relying Party.</t>
      <t>The business need therefore is for common Attestation Result information element definitions.
With these definitions, consistent interaction or connectivity decisions can be made by a Relying Party where there is a heterogenous mix of Attesting Environment types and Verifier types.</t>
      <t>This document defines information elements for Attestation Results in a way which normalizes the trustworthiness assertions that can be made from a diverse set of Attesters.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The following terms are imported from <xref target="RFC9334"/>:
Appraisal Policy for Attestation Results, Attester, Attesting Environment, Claims, Evidence, Relying Party, Target Environment and Verifier.</t>
        <t><xref target="RFC9334"/> also describes topological patterns that illustrate the need for interoperable conceptual messages.
The two patterns called "background-check model" and "passport model" are imported from the RATS architecture and used in this document as a reference to the architectural concepts:
Background-Check Model and Passport Model.</t>
        <t>Newly defined terms for this document:</t>
        <dl>
          <dt>AR-augmented Evidence:</dt>
          <dd>
            <t>a bundle of Evidence which includes at least the following:
</t>
            <ol spacing="normal" type="1"><li>Verifier signed Attestation Results.
These Attestation Results must include Identity Evidence for the Attester, a Trustworthiness Vector describing a Verifier's most recent appraisal of an Attester, and some Verifier Proof-of-Freshness (PoF).</li>
              <li>A Relying Party PoF which is bound to the Attestation Results of (1) by the Attester's Attesting Environment signature.</li>
              <li>Sufficient information to determine the elapsed interval between the Verifier PoF and Relying Party PoF.</li>
            </ol>
          </dd>
          <dt>Identity Evidence:</dt>
          <dd>
            <t>Evidence which unambiguously identifies an identity.
Identity Evidence could take different forms, such as a certificate, or a signature which can be appraised to have only been generated by a specific private/public key pair.</t>
          </dd>
          <dt>Trustworthiness Claim:</dt>
          <dd>
            <t>a specific quanta of trustworthiness which can be assigned by a Verifier based on its appraisal policy.</t>
          </dd>
          <dt>Trustworthiness Tier:</dt>
          <dd>
            <t>a categorization of the levels of trustworthiness which may be assigned by a Verifier to a specific Trustworthiness Claim.
These enumerated categories are: Affirming, Warning, Contraindicated, and None.</t>
          </dd>
          <dt>Trustworthiness Vector:</dt>
          <dd>
            <t>a set of zero to many Trustworthiness Claims assigned during a single appraisal procedure by a Verifier using Evidence generated by an Attester.
The vector is included within Attestation Results.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="attestation-results-for-secure-interactions">
      <name>Attestation Results for Secure Interactions</name>
      <t>A Verifier generates the Attestation Results used by a Relying Party.
When a Relying Party needs to determine whether to permit communications with an Attester, these Attestation Results must contain a specific set of information elements.
This section defines those information elements, and in some cases encodings for information elements.</t>
      <section anchor="information-driving-a-relying-party-action">
        <name>Information driving a Relying Party Action</name>
        <t>When the action is a communication establishment attempt with an Attester, there is only a limited set of actions which a Relying Party might take.
These actions include:</t>
        <ul spacing="normal">
          <li>Allow or deny information exchange with the Attester.
When there is a deny, reasons should be returned to the Attester.</li>
          <li>Establish a transport connection between an Attester and a specific context within a Relying Party (e.g., a TEE, or Virtual Routing Function (VRF).)</li>
          <li>Apply policies on this connection (e.g., rate limits).</li>
        </ul>
        <t>There are three categories of information which must be conveyed to the Relying Party (which also is integrated with a Verifier) before it determines which of these actions to take.</t>
        <ol spacing="normal" type="1"><li>Non-repudiable Identity Evidence – Evidence which undoubtably identifies one or more entities involved with a communication.</li>
          <li>Trustworthiness Claims – Specifics a Verifier asserts with regards to its trustworthiness findings about an Attester.</li>
          <li>Claim Freshness – Establishes the time of last update (or refresh) of Trustworthiness Claims.</li>
        </ol>
        <t>The following sections detail requirements for these three categories.</t>
      </section>
      <section anchor="identity-section">
        <name>Non-repudiable Identity</name>
        <t>Identity Evidence must be conveyed during the establishment of any trust-based relationship.
Specific use cases will define the minimum types of identities required by a particular Relying Party as it evaluates Attestation Results, and perhaps additional associated Evidence.
At a bare minimum, a Relying Party MUST start with the ability to verify the identity of a Verifier it chooses to trust.
Attester identities may then be acquired through signed or encrypted communications with the Verifier identity and/or the pre-provisioning Attester public keys in the Attester.</t>
        <t>During the Remote Attestation process, the Verifier's identity must be established with a Relying Party, often via a Verifier signature across recent Attestation Results.
This Verifier identity could only have come from a key pair maintained by a trusted developer or operator of the Verifier.</t>
        <t>Additionally, each set of Attestation Results must be provably and non-reputably bound to the identity of the original Attesting Environment which was evaluated by the Verifier.
This is accomplished via satisfying two requirements.
First the Verifier signed Attestation Results MUST include sufficient Identity Evidence to ensure that this Attesting Environment signature refers to the same Attesting Environment appraised by the Verifier.
Second, where the passport model is used as a subsystem, an Attesting Environment signature which spans the Verifier signature MUST also be included.
As the Verifier signature already spans the Attester Identity as well as the Attestation Results, this restricts the viability of spoofing attacks.</t>
        <t>In a subset of use cases, these two pieces of Identity Evidence may be sufficient for a Relying Party to successfully meet the criteria for its Appraisal Policy for Attestation Results.
If the use case is a connection request, a Relying Party may simply then establish a transport session with an Attester after a successful appraisal.
However an Appraisal Policy for Attestation Results will often be more nuanced, and the Relying Party may need additional information.
Some Identity Evidence related policy questions which the Relying Party may consider include:</t>
        <ul spacing="normal">
          <li>Does the Relying Party only trust this Verifier to make Trustworthiness Claims on behalf a specific type of Attesting Environment?  Might a mix of Verifiers be necessary to cover all mandatory Trustworthiness Claims?</li>
          <li>Does the Relying Party only accept connections from a verified-authentic software build from a specific software developer?</li>
          <li>Does the Relying Party only accept connections from specific preconfigured list of Attesters?</li>
        </ul>
        <t>For any of these more nuanced appraisals, additional Identity Evidence or other policy related information must be conveyed or pre-provisioned during the formation of a trust context between the Relying Party, the Attester, the Attester's Attesting Environment, and the Verifier.</t>
        <section anchor="attester-and-attesting-environment">
          <name>Attester and Attesting Environment</name>
          <t>Per <xref target="RFC9334"/> Figure 2, an Attester and a corresponding Attesting Environment might not share common code or even hardware boundaries.
Consequently, an Attester implementation needs to ensure that any Evidence which originates from outside the Attesting Environment MUST have been collected and delivered securely before any Attesting Environment signing may occur.
After the Verifier performs its appraisal, it will include sufficient information in the Attestation Results to enable a Relying Party to have confidence that the Attester's trustworthiness is represented via Trustworthiness Claims signed by the appropriate Attesting Environment.</t>
          <t>This document recognizes three general categories of Attesters.</t>
          <ol spacing="normal" type="1"><li>HSM-based: A Hardware Security Module (HSM) based cryptoprocessor which hashes one or more streams of security measurements from an Attester within the Attesting Environment. Maintenance of this hash enables detection of an Attester which is not reporting the exact set of security measurements (such as log entries) taken within the Attesting Environment. An example of a HSM is a TPM2.0 <xref target="TPM2.0"/>.</li>
            <li>Process-based: An individual process which has its runtime memory encrypted by an Attesting Environment in a way that no other processes can read and decrypt that memory (e.g., <xref target="SGX"/> or <xref target="I-D.tschofenig-rats-psa-token"/>.)</li>
            <li>VM-based: An entire Guest VM (or a set of containers within a host) have been encrypted as a walled-garden unit by an Attesting Environment.  The result is that the host operating system cannot read and decrypt what is executing within that VM (e.g., <xref target="SEV-SNP"/> or <xref target="TDX"/>.)</li>
          </ol>
          <t>Each of these categories of Attesters above will be capable of generating Evidence which is protected using private keys / certificates which are not accessible outside of the corresponding Attesting Environment.
The owner of these secrets is the owner of the identity which is bound within the Attesting Environment.
Effectively this means that for any Attester identity, there will exist a chain of trust ultimately bound to a hardware-based root of trust in the Attesting Environment.
It is upon this root of trust that unique, non-repudiable Attester identities may be founded.</t>
          <t>There are several types of Attester identities defined in this document.  This list is extensible:</t>
          <ul spacing="normal">
            <li>chip-vendor: the vendor of the hardware chip used for the Attesting Environment (e.g., a primary Endorsement Key from a TPM)</li>
            <li>chip-hardware: specific hardware with specific firmware from an 'chip-vendor'</li>
            <li>target-environment: a unique instance of a software build running in an Attester (e.g., MRENCLAVE <xref target="SGX"/>, an Instance ID <xref target="I-D.tschofenig-rats-psa-token"/>, an Identity Block <xref target="SEV-SNP"/>, or a hash which represents a set of software loaded since boot (e.g., TPM based integrity verification.))</li>
            <li>target-developer: the organizational unit responsible for a particular 'target-environment' (e.g., MRSIGNER <xref target="SGX"/>)</li>
            <li>instance: a unique instantiated instance of an Attesting Environment running on 'chip-hardware' (e.g., an LDevID <xref target="IEEE802.1AR"/>)</li>
          </ul>
          <t>Based on the category of the Attesting Environment, different types of identities might be exposed by an Attester.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Attester Identity type</th>
                <th align="left">Process-based</th>
                <th align="left">VM-based</th>
                <th align="left">HSM-based</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">chip-vendor</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
              </tr>
              <tr>
                <td align="left">chip-hardware</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
              </tr>
              <tr>
                <td align="left">target-environment</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Optional</td>
              </tr>
              <tr>
                <td align="left">target-developer</td>
                <td align="left">Mandatory</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
              </tr>
              <tr>
                <td align="left">instance</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
              </tr>
            </tbody>
          </table>
          <t>It is expected that drafts subsequent to this specification will provide the definitions and value domains for specific identities, each of which falling within the Attester identity types listed above.
In some cases the actual unique identities might encoded as complex structures.
An example complex structure might be a 'target-environment' encoded as a Software Bill of Materials (SBOM).</t>
          <t>With the identity definitions and value domains, a Relying Party will have sufficient information to ensure that the Attester identities and Trustworthiness Claims asserted are actually capable of being supported by the underlying type of Attesting Environment.
Consequently, the Relying Party SHOULD require Identity Evidence which indicates of the type of Attesting Environment when it considers its Appraisal Policy for Attestation Results.</t>
        </section>
        <section anchor="verifier">
          <name>Verifier</name>
          <t>For the Verifier identity, it is critical for a Relying Party to review the certificate and chain of trust for that Verifier.
Additionally, the Relying Party must have confidence that the Trustworthiness Claims being relied upon from the Verifier considered the chain of trust for the Attesting Environment.</t>
          <t>There are two categorizations of Verifier identities defined in this document:</t>
          <ul spacing="normal">
            <li>verifier build: a unique instance of a software build running as a Verifier.</li>
            <li>verifier developer: the organizational unit responsible for a particular 'verifier build'.</li>
          </ul>
          <t>Within each category, communicating the identity can be accomplished via a variety of objects and encodings.</t>
        </section>
        <section anchor="communicating-identity">
          <name>Communicating Identity</name>
          <t>Any of the above identities used by the Appraisal Policy for Attestation Results needed to be pre-established by the Relying Party before, or provided during, the exchange of Attestation Results.
When provided during this exchange, the identity may be communicated either implicitly or explicitly.</t>
          <t>An example of explicit communication would be to include the following Identity Evidence directly within the Attestation Results: a unique identifier for an Attesting Environment, the name of a key which can be provably associated with that unique identifier, and the set of Attestation Results which are signed using that key.
As these Attestation Results are signed by the Verifier, it is the Verifier which is explicitly asserting the credentials it believes are trustworthy.</t>
          <t>An example of implicit communication would be to include Identity Evidence in the form of a signature which has been placed over the Attestation Results asserted by a Verifier.
It would be then up to the Relying Party's Appraisal Policy for Attestation Results to extract this signature and confirm that it only could have been generated by an Attesting Environment having access to a specific private key.
This implicit identity communication is only viable if the Attesting Environment's public key is already known by the Relying Party.</t>
          <t>One final step in communicating identity is proving the freshness of the Attestation Results to the degree needed by the Relying Party.
A typical way to accomplish this is to include an element of freshness be embedded within a signed portion of the Attestation Results.
This element of freshness reduces the identity spoofing risks from a replay attack.
For more on this, see <xref target="freshness-section"/>.</t>
        </section>
      </section>
      <section anchor="vector-section">
        <name>Trustworthiness Claims</name>
        <section anchor="design-principles">
          <name>Design Principles</name>
          <t>Trust is not absolute.
Trust is a belief in some aspect about an entity (in this case an Attester), and that this aspect is something which can be depended upon (in this case by a Relying Party.)
Within the context of Remote Attestation, believability of this aspect is facilitated by a Verifier.
This facilitation depends on the Verifier's ability to parse detailed Evidence from an Attester and then to assert conclusions about this aspect in a way interpretable by a Relying Party.</t>
          <t>Specific aspects for which a Verifier will assert trustworthiness are defined in this section.
These are known as Trustworthiness Claims.
These claims have been designed to enable a common understanding between a broad array of Attesters, Verifiers, and Relying Parties.
The following set of design principles have been applied in the Trustworthiness Claim definitions:</t>
          <ol spacing="normal" type="1"><li>
              <t>Expose a small number of Trustworthiness Claims.  </t>
              <t>
Reason: a plethora of similar Trustworthiness Claims will result in divergent choices made on which to support between different Verifiers.  This would place a lot of complexity in the Relying Party as it would be up to the Relying Party (and its policy language) to enable normalization across rich but incompatible Verifier object definitions.</t>
            </li>
            <li>
              <t>Each Trustworthiness Claim enumerates only the specific states that could viably result in a different outcome after the Policy for Attestation Results has been applied.  </t>
              <t>
Reason: by explicitly disallowing the standardization of enumerated states which cannot easily be connected to a use case, we avoid forcing implementers from making incompatible guesses on what these states might mean.</t>
            </li>
            <li>
              <t>Verifier and RP developers need explicit definitions of each state in order to accomplish the goals of (1) and (2).  </t>
              <t>
Reason: without such guidance, the Verifier will append plenty of raw supporting info.  This relieves the Verifier of making the hard decisions.  Of course, this raw info will be mostly non-interpretable and therefore non-actionable by the Relying Party.</t>
            </li>
            <li>
              <t>Support standards and non-standard extensibility for (1) and (2).  </t>
              <t>
Reason: standard types of Verifier generated Trustworthiness Claims should be vetted by the full RATS working group, rather than being maintained in a repository which doesn't follow the RFC process.  This will keep a tight lid on extensions which must be considered by the Relying Party's policy language.  Because this process takes time, non-standard extensions will be needed for implementation speed and flexibility.</t>
            </li>
          </ol>
          <t>These design principles are important to keep the number of Verifier generated claims low, and to retain the complexity in the Verifier rather than the Relying Party.</t>
        </section>
        <section anchor="enumeration-encoding">
          <name>Enumeration Encoding</name>
          <t>Per design principle (2), each Trustworthiness Claim will only expose specific encoded values.
To simplify the processing of these enumerations by the Relying Party, the enumeration will be encoded as a single signed 8 bit integer.  These value assignments for this integer will be in four Trustworthiness Tiers which follow these guidelines:</t>
          <t>None: The Verifier makes no assertions regarding this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>Value 0: The Evidence received is insufficient to make a conclusion. Note: this should always be always treated equivalently by the Relying Party as no claim being made. I.e., the RP's Appraisal Policy for Attestation Results SHOULD NOT make any distinction between a Trustworthiness Claim with enumeration '0', and no Trustworthiness Claim being provided.</li>
            <li>Value 1: The Evidence received contains unknown elements which the Verifier is unable to evaluate. An example might be that the wrong type of Evidence has been delivered.  Another  case is that of Evidence coming from a composite Attester: a Verifier may understand only part of it and leave as "unknown" the Trustworthiness claims related to features it can't appraise.</li>
            <li>Value -1: A verifier malfunction occurred during the Verifier's appraisal processing.</li>
          </ul>
          <t>Affirming: The Verifier affirms the Attester support for this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>Values 2 to 31: A standards enumerated reason for affirming.</li>
            <li>Values -2 to -32: A non-standard reason for affirming.</li>
          </ul>
          <t>Warning: The Verifier warns about this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>Values 32 to 95: A standards enumerated reason for the warning.</li>
            <li>Values -33 to -96: A non-standard reason for the warning.</li>
          </ul>
          <t>Contraindicated: The Verifier asserts the Attester is explicitly untrustworthy in regard to this aspect.</t>
          <ul spacing="normal">
            <li>Values 96 to 127: A standards enumerated reason for the contraindication.</li>
            <li>Values -97 to -128: A non-standard reason for the contraindication.</li>
          </ul>
          <t>This enumerated encoding listed above will simplify the Appraisal Policy for Attestation Results.
Such a policies may be as simple as saying that a specific Verifier has recently asserted Trustworthiness Claims, all of which are Affirming.</t>
        </section>
        <section anchor="assigning-a-trustworthiness-claim-value">
          <name>Assigning a Trustworthiness Claim value</name>
          <t>In order to simplify design, only a single encoded value is asserted by a Verifier for any Trustworthiness Claim within a using the following process.</t>
          <ol spacing="normal" type="1"><li>If applicable, a Verifier MUST assign a standardized value from the Contraindicated tier.</li>
            <li>Else if applicable, a Verifier MUST assign a non-standardized value from the Contraindicated tier.</li>
            <li>Else if applicable, a Verifier MUST assign a standardized value from the Warning tier.</li>
            <li>Else if applicable, a Verifier MUST assign a non-standardized value from the Warning tier.</li>
            <li>Else if applicable, a Verifier MUST assign a standardized value from the Affirming tier.</li>
            <li>Else if applicable, a Verifier MUST assign a non-standardized value from the Affirming tier.</li>
            <li>Else a Verifier MAY assign a 0 or -1.</li>
          </ol>
        </section>
        <section anchor="specific-claims">
          <name>Specific Claims</name>
          <t>Following are the Trustworthiness Claims and their supported enumerations which may be asserted by a Verifier:</t>
          <dl>
            <dt>configuration:</dt>
            <dd>
              <t>A Verifier has appraised an Attester's configuration, and is able to make conclusions regarding the exposure of known vulnerabilities
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>The configuration is a known and approved config.</t>
                </dd>
                <dt>3:</dt>
                <dd>
                  <t>The configuration includes or exposes no known vulnerabilities.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>The configuration includes or exposes known vulnerabilities.</t>
                </dd>
                <dt>36:</dt>
                <dd>
                  <t>Elements of the configuration relevant to security are unavailable to the Verifier.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The configuration is unsupportable as it exposes unacceptable security vulnerabilities.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>executables:</dt>
            <dd>
              <t>A Verifier has appraised and evaluated relevant runtime files, scripts, and/or other objects which have been loaded into the Target environment's memory.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>Only a recognized genuine set of approved executables, scripts, files, and/or objects have been loaded during and after the boot process.</t>
                </dd>
                <dt>3:</dt>
                <dd>
                  <t>Only a recognized genuine set of approved executables have been loaded during the boot process.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>Only a recognized genuine set of executables, scripts, files, and/or objects have been loaded.  However the Verifier cannot vouch for a subset of these due to known bugs or other known vulnerabilities.</t>
                </dd>
                <dt>33:</dt>
                <dd>
                  <t>Runtime memory includes executables, scripts, files, and/or objects which are not recognized.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>Runtime memory includes executables, scripts, files, and/or object which are contraindicated.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>file-system:</dt>
            <dd>
              <t>A Verifier has evaluated a specific set of directories within the Attester's file system.  (Note: the Verifier may or may not indicate what these directory and expected files are via an unspecified management interface.)
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>Only a recognized set of approved files are found.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>The file system includes unrecognized executables, scripts, or files.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The file system includes contraindicated executables, scripts, or files.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>hardware:</dt>
            <dd>
              <t>A Verifier has appraised any Attester hardware and firmware which are able to expose fingerprints of their identity and running code.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>An Attester has passed its hardware and/or firmware verifications needed to demonstrate that these are genuine/supported.</t>
                </dd>
              </dl>
              <t>32: An Attester contains only genuine/supported hardware and/or firmware, but there are known security vulnerabilities.</t>
              <dl>
                <dt>96:</dt>
                <dd>
                  <t>Attester hardware and/or firmware is recognized, but its trustworthiness is contraindicated.</t>
                </dd>
                <dt>97:</dt>
                <dd>
                  <t>A Verifier does not recognize an Attester's hardware or firmware, but it should be recognized.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>instance-identity:</dt>
            <dd>
              <t>A Verifier has appraised an Attesting Environment's unique identity based upon private key signed Evidence which can be correlated to a unique instantiated instance of the Attester.  (Note: this Trustworthiness Claim should only be generated if the Verifier actually expects to recognize the unique identity of the Attester.)
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>The Attesting Environment is recognized, and the associated instance of the Attester is not known to be compromised.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The Attesting Environment is recognized, and but its unique private key indicates a device which is not trustworthy.</t>
                </dd>
                <dt>97:</dt>
                <dd>
                  <t>The Attesting Environment is not recognized; however the Verifier believes it should be.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>runtime-opaque:</dt>
            <dd>
              <t>A Verifier has appraised the visibility of Attester objects in memory from perspectives outside the Attester.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>the Attester's executing Target Environment and Attesting Environments are encrypted and within Trusted Execution Environment(s) opaque to the operating system, virtual machine manager, and peer  applications.  (Note: This value corresponds to the protections asserted by O.RUNTIME_CONFIDENTIALITY from <xref target="GP-TEE-PP"/>)</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>the Attester's executing Target Environment and Attesting Environments inaccessible from any other parallel application or Guest VM running on the Attester's physical device.  (Note that unlike "1" these environments are not encrypted in a way which restricts the Attester's root operator visibility. See O.TA_ISOLATION from <xref target="GP-TEE-PP"/>.)</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The Verifier has concluded that in memory objects are unacceptably visible within the physical host that supports the Attester.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>sourced-data:</dt>
            <dd>
              <t>A Verifier has evaluated of the integrity of data objects from external systems used by the Attester.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>All essential Attester source data objects have been provided by other Attester(s) whose most recent appraisal(s) had both no Trustworthiness Claims of "0" where the current Trustworthiness Claim is "Affirming", as well as no "Warning" or "Contraindicated" Trustworthiness Claims.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>Attester source data objects come from unattested sources, or attested sources with "Warning" type Trustworthiness Claims.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>Attester source data objects come from contraindicated sources.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>storage-opaque:</dt>
            <dd>
              <t>A Verifier has appraised that an Attester is capable of encrypting persistent storage. (Note: Protections must meet the capabilities of <xref target="OMTP-ATE"/> Section 5, but need not be hardware tamper resistant.)
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>the Attester encrypts all secrets in persistent storage via using keys which are never visible outside an HSM or the Trusted Execution Environment hardware.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>the Attester encrypts all persistently stored secrets, but without using hardware backed keys</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>There are persistent secrets which are stored unencrypted in an Attester.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
          </dl>
          <t>It is possible for additonal Trustworthiness Claims and enumerated values to be defined in subsequent documents.
At the same time, the standardized Trustworthiness Claim values listed above have been designed so there is no overlap within a Trustworthiness Tier.
As a result, it is possible to imagine a future where overlapping Trustworthiness Claims within a single Trustworthiness Tier may be defined.
Wherever possible, the Verifier SHOULD assign the best fitting standardized value.</t>
          <t>Where a Relying Party doesn't know how to handle a particular Trustworthiness Claim, it MAY choose an appropriate action based on the Trustworthiness Tier under which the enumerated value fits.</t>
          <t>It is up to the Verifier to publish the types of evaluations it performs when determining how Trustworthiness Claims are derived for a type of any particular type of Attester.
It is out of the scope of this document for the Verifier to provide proof or specific logic on how a particular Trustworthiness Claim which it is asserting was derived.</t>
        </section>
        <section anchor="trustworthiness-vector">
          <name>Trustworthiness Vector</name>
          <t>Multiple Trustworthiness Claims may be asserted about an Attesting Environment at single point in time.
The set of Trustworthiness Claims inserted into an instance of Attestation Results by a Verifier is known as a Trustworthiness Vector.
The order of Claims in the vector is NOT meaningful.
A Trustworthiness Vector with no Trustworthiness Claims (i.e., a null Trustworthiness Vector) is a valid construct.
In this case, the Verifier is making no Trustworthiness Claims but is confirming that an appraisal has been made.</t>
        </section>
        <section anchor="trustworthiness-vector-for-a-type-of-attesting-environment">
          <name>Trustworthiness Vector for a type of Attesting Environment</name>
          <t>Some Trustworthiness Claims are implicit based on the underlying type of Attesting Environment.
For example, a validated MRSIGNER identity can be present where the underlying <xref target="SGX"/> hardware is 'hw-authentic'.
Where such implicit Trustworthiness Claims exist, they do not have to be explicitly included in the Trustworthiness Vector.
However, these implicit Trustworthiness Claims SHOULD be considered as being present by the Relying Party.
Another way of saying this is if a Trustworthiness Claim is automatically supported as a result of coming from a specific type of TEE, that claim need not be redundantly articulated. Such implicit Trustworthiness Claims can be seen in the tables within <xref target="process-based-claims"/> and <xref target="VM-based-claims"/>.</t>
          <t>Additionally, there are some Trustworthiness Claims which cannot be adequately supported by an Attesting Environment.
For example, it would be difficult for an Attester that includes only a TPM (and no other TEE) from ever having a Verifier appraise support for 'runtime-opaque'.
As such, a Relying Party would be acting properly if it rejects any non-supportable Trustworthiness Claims asserted from a Verifier.</t>
          <t>As a result, the need for the ability to carry a specific Trustworthiness Claim will vary by the type of Attesting Environment.
Example mappings can be seen in <xref target="claim-for-TEE-types"/>.</t>
        </section>
      </section>
      <section anchor="freshness-section">
        <name>Freshness</name>
        <t>A Relying Party will care about the recentness of the Attestation Results, and the specific Trustworthiness Claims which are embedded.
All freshness mechanisms of <xref target="RFC9334"/>, Section 10 are supportable by this specification.</t>
        <t>Additionally, a Relying Party may track when a Verifier expires its confidence for the Trustworthiness Claims or the Trustworthiness Vector as a whole.  Mechanisms for such expiry are not defined within this document.</t>
        <t>There is a subset of secure interactions where the freshness of Trustworthiness Claims may need to be revisited asynchronously.
This subset is when trustworthiness depends on the continuous availability of a transport session between the Attester and Relying Party.
With such connectivity dependent Attestation Results, if there is a reboot which resets transport connectivity, all established Trustworthiness Claims should be cleared.
Subsequent connection re-establishment will allow fresh new Trustworthiness Claims to be delivered.</t>
      </section>
    </section>
    <section anchor="secure-interactions-models">
      <name>Secure Interactions Models</name>
      <t>There are multiple ways of providing a Trustworthiness Vector to a Relying Party.
This section describes two alternatives.</t>
      <section anchor="background-check">
        <name>Background-Check</name>
        <section anchor="verifier-retrieval">
          <name>Verifier Retrieval</name>
          <t>It is possible to for a Relying Party to follow the Background-Check Model defined in Section 5.2 of <xref target="RFC9334"/>.
In this case, a Relying Party will receive Attestation Results containing the Trustworthiness Vector directly from a Verifier.
These Attestation Results can then be used by the Relying Party in determining the appropriate treatment for interactions with the Attester.</t>
          <t>While applicable in some cases, the utilization of the Background-Check Model without modification has potential drawbacks in other cases.
These include:</t>
          <ul spacing="normal">
            <li>Verifier scale: if the Attester has many Relying Parties, a Verifier appraising that Attester could be frequently be queried based on the same Evidence.</li>
            <li>Information leak: Evidence which the Attester might consider private can be visible to the Relying Party.  Hiding that Evidence could devalue any resulting appraisal.</li>
            <li>Latency: a Relying Party will need to wait for the Verifier to return Attestation Results before proceeding with secure interactions with the Attester.</li>
          </ul>
          <t>An implementer should examine these potential drawbacks before selecting this alternative.</t>
        </section>
        <section anchor="co-resident-verifier">
          <name>Co-resident Verifier</name>
          <t>A simplified Background-Check Model may exist in a very specific case.
This is where the Relying Party and Verifier functions are co-resident.
This model is appropriate when:</t>
          <ul spacing="normal">
            <li>Some hardware-based private key is used by an Attester while proving its identity as part of a mutually authenticated secure channel establishment with the Relying Party, and</li>
            <li>this Attester identity is accepted as sufficient proof of Attester integrity.</li>
          </ul>
          <t>Effectively this means that detailed forensic capabilities of a robust Verifier are unnecessary because it is accepted that the code and operational behavior of the Attester cannot be manipulated after TEE initialization.</t>
          <t>An example of such a scenario may be when an SGX's MRENCLAVE and MRSIGNER values have been associated with a known QUOTE value.
And the code running within the TEE is not modifiable after launch.</t>
        </section>
      </section>
      <section anchor="below-zero-trust">
        <name>Below Zero Trust</name>
        <t>Zero Trust Architectures are referenced in <xref target="US-Executive-Order"/> eleven times.
However despite this high profile, there is an architectural gap with Zero Trust.
The credentials used for authentication and admission control can be manipulated on the endpoint.
Attestation can fill this gap through the generation of a compound credential called AR-augmented Evidence.
This compound credential is rooted in the hardware based Attesting Environment of an endpoint, plus the trustworthiness of a Verifier.
The overall solution is known as "Below Zero Trust" as the compound credential cannot be manipulated or spoofed by an administrator of an endpoint with root access.
This solution is not adversely impacted by the potential drawbacks with pure background-check described above.</t>
        <t>To kick-off the "Below Zero Trust" compound credential creation sequence, a Verifier evaluates an Attester and returns signed Attestation Results back to this original Attester no less frequently than a well-known interval.
This interval may also be asynchronous, based on the changing of certain Evidence as described in <xref target="I-D.ietf-rats-network-device-subscription"/>.</t>
        <t>When a Relying Party is to receive information about the Attester's trustworthiness, the Attesting Environment assembles the minimal set of Evidence which can be used to confirm or refute whether the Attester remains in the state of trustworthiness represented by the AR.
To this Evidence, the Attesting Environment appends the signature from the most recent AR as well as a Relying Party Proof-of-Freshness.
The Attesting Environment then signs the combination.</t>
        <t>The Attester then assembles AR Augmented Evidence by taking the signed combination and appending the full AR. The assembly now consists of two independent but semantically bound sets of signed Evidence.</t>
        <t>The AR Augmented Evidence is then sent to the Relying Party.
The Relying Party then can appraise these semantically bound sets of signed Evidence by applying an Appraisal Policy for Attestation Results as described below.
This policy will consider both the AR as well as additional information about the Attester within the AR Augmented Evidence the when determining what action to take.</t>
        <t>This alternative combines the <xref target="RFC9334"/> Sections 5.1 Passport Model and Section 5.2 Background-Check Model.
<xref target="interactions"/> describes this flow of information.
The flows within this combined model are mapped to <xref target="RFC9334"/> in the following way.
"Verifier A" below corresponds to the "Verifier" Figure 5 within <xref target="RFC9334"/>.
And "Relying Party/Verifier B" below corresponds to the union of the "Relying Party" and "Verifier" boxes within Figure 6 of <xref target="RFC9334"/>.
This union is possible because Verifier B can be implemented as a simple, self-contained process.
The resulting combined process can appraise the AR-augmented Evidence to determine whether an Attester qualifies for secure interactions with the Relying Party.
The specific steps of this process are defined later in this section.</t>
        <figure anchor="interactions">
          <name>Below Zero Trust</name>
          <artwork><![CDATA[
  .----------------.
  | Attester       |
  | .-------------.|
  | | Attesting   ||             .----------.    .---------------.
  | | Environment ||             | Verifier |    | Relying Party |
  | '-------------'|             |     A    |    |  / Verifier B |
  '----------------'             '----------'    '---------------'
        time(VG)                       |                 |
          |<------Verifier PoF-------time(NS)            |
          |                            |                 |
 time(EG)(1)------Evidence------------>|                 |
          |                          time(RG)            |
          |<------Attestation Results-(2)                |
          ~                            ~                 ~
        time(VG')?                     |                 |
          ~                            ~                 ~
          |<------Relying Party PoF-----------------(3)time(NS')
          |                            |                 |
time(EG')(4)------AR-augmented Evidence----------------->|
          |                            |   time(RG',RA')(5)
                                                        (6)
                                                         ~
                                                      time(RX')
]]></artwork>
        </figure>
        <t>The interaction model depicted above includes specific time related events from Appendix A of <xref target="RFC9334"/>.
With the identification of these time related events, time duration/interval tracking becomes possible.
Such duration/interval tracking can become important if the Relying Party cares if too much time has elapsed between the Verifier PoF and Relying Party PoF.
If too much time has elapsed, perhaps the Attestation Results themselves are no longer trustworthy.</t>
        <t>Note that while time intervals will often be relevant, there is a simplified case that does not require a Relying Party's PoF in step (3).
In this simplified case, the Relying Party trusts that the Attester cannot be meaningfully changed from the outside during any reportable interval.
Based on that assumption, and when this is the case then the step of the Relying Party PoF can be safely omitted.</t>
        <t>In all cases, appraisal policies define the conditions and prerequisites for when an Attester does qualify for secure interactions.
To qualify, an Attester has to be able to provide all of the mandatory affirming Trustworthiness Claims and identities needed by a Relying Party's Appraisal Policy for Attestation Results, and none of the disqualifying detracting Trustworthiness Claims.</t>
        <t>More details on each interaction step of Below Zero Trust are as follows.
The numbers used in this sequence match to the numbered steps in <xref target="interactions"/>:</t>
        <ol spacing="normal" type="1"><li>An Attester sends Evidence which is provably fresh to Verifier A at time(EG).
Freshness from the perspective of Verifier A MAY be established with Verifier PoF such as a nonce.</li>
          <li>
            <t>Verifier A appraises (1), then sends the following items back to that Attester within Attestation Results:  </t>
            <ol spacing="normal" type="1"><li>the verified identity of the Attesting Environment,</li>
              <li>the Verifier A appraised Trustworthiness Vector of an Attester,</li>
              <li>a freshness proof associated with the Attestation Results,</li>
              <li>a Verifier signature across (2.1) though (2.3).</li>
            </ol>
          </li>
          <li>At time(EG') a Relying Party PoF (such as a nonce) known to the Relying Party is sent to the Attester.</li>
          <li>
            <t>The Attester generates and sends AR-augmented Evidence to the Relying Party/Verifier B.
This AR-augmented Evidence includes:  </t>
            <ol spacing="normal" type="1"><li>The Attestation Results from (2)</li>
              <li>Any (optionally) new incremental Evidence from the Attesting Environment</li>
              <li>Attestation Environment signature which spans a hash of the Attestation Results (such as the signature of (2.4)), the proof-of-freshness from (3), and (4.2).  Note: this construct allows the delta of time between (2.3) and (3) to be definitively calculated by the Relying Party.</li>
            </ol>
          </li>
          <li>
            <t>On receipt of (4), the Relying Party applies its Appraisal Policy for Attestation Results.
At minimum, this appraisal policy process must include the following:  </t>
            <ol spacing="normal" type="1"><li>Verify that (4.3) includes the nonce from (3).</li>
              <li>Use a local certificate to validate the signature (4.1).</li>
              <li>Verify that the hash from (4.3) matches (4.1)</li>
              <li>Use the identity of (2.1) to validate the signature of (4.3).</li>
              <li>Failure of any steps (5.1) through (5.4) means the link does not meet minimum validation criteria, therefore appraise the link as having a null Verifier B Trustworthiness Vector.
Jump to step (6.1).</li>
              <li>When there is large or uncertain time gap between time(EG) and time(EG'), the link should be assigned a null Verifier B Trustworthiness Vector.
Jump to step (6.1).</li>
              <li>
                <t>Assemble the Verifier B Trustworthiness Vector
                </t>
                <ol spacing="normal" type="1"><li>Copy Verifier A Trustworthiness Vector to Verifier B Trustworthiness Vector</li>
                  <li>Add implicit Trustworthiness Claims inherent to the type of TEE.</li>
                  <li>Prune any Trustworthiness Claims unsupportable by the Attesting Environment.</li>
                  <li>Prune any Trustworthiness Claims the Relying Party doesn't accept from this Verifier.</li>
                </ol>
              </li>
            </ol>
          </li>
          <li>
            <t>The Relying Party takes action based on Verifier B's appraised Trustworthiness Vector, and applies the Appraisal Policy for Attestation Results.  Following is a reasonable process for such evaluation:  </t>
            <ol spacing="normal" type="1"><li>Prune any Trustworthiness Claims from the Trustworthiness Vector not used in the Appraisal Policy for Attestation Results.</li>
              <li>Allow the information exchange from the Attester into a Relying Party context in the Appraisal Policy for Attestation Results where the Verifier B appraised Trustworthiness Vector includes all the mandatory Trustworthiness Claims are in the "Affirming" value range, and none of the disqualifying Trustworthiness Claims are in the "Contraindicated" value range.</li>
              <li>Disallow any information exchange into a Relying Party context for which that Verifier B appraised Trustworthiness Vector is not qualified.</li>
            </ol>
          </li>
        </ol>
        <t>As link layer protocols re-authenticate, steps (1) to (2) and steps (3) to (6) will independently refresh.
This allows the Trustworthiness of Attester to be continuously re-appraised.
There are only specific event triggers which will drive the refresh of Evidence generation (1), Attestation Result generation (2), or AR-augmented Evidence generation (4):</t>
        <ul spacing="normal">
          <li>life-cycle events, e.g. a change to an Authentication Secret of the Attester or an update of a software component.</li>
          <li>uptime-cycle events, e.g. a hard reset or a re-initialization of an Attester.</li>
          <li>authentication-cycle events, e.g. a link-layer interface reset could result in a new (4).</li>
        </ul>
      </section>
      <section anchor="mutual-attestation">
        <name>Mutual Attestation</name>
        <t>In the interaction models described above, each device on either side of a secure interaction may require remote attestation of its peer.
This process is known as mutual-attestation.
To support mutual-attestation, the interaction models listed above may be run independently on either side of the connection.</t>
      </section>
      <section anchor="transport-protocol-integration">
        <name>Transport Protocol Integration</name>
        <t>Either unidirectional attestation or mutual attestation may be supported within the protocol interactions needed for the establishment of a single transport session.
While this document does not mandate specific transport protocols, messages containing the Attestation Results and AR Augmented Evidence can be passed within an authentication framework such the EAP protocol <xref target="RFC5247"/> over TLS <xref target="RFC8446"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Privacy Considerations Text</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security Considerations Text</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>See Body.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="OMTP-ATE" target="https://www.gsma.com/newsroom/wp-content/uploads/2012/03/omtpadvancedtrustedenvironmentomtptr1v11.pdf">
          <front>
            <title>Open Mobile Terminal Platform - Advanced Trusted Environment</title>
            <author>
              <organization/>
            </author>
            <date year="2009" month="May"/>
          </front>
        </reference>
        <reference anchor="GP-TEE-PP" target="https://globalplatform.org/specs-library/tee-protection-profile-v1-3/">
          <front>
            <title>Global Platform TEE Protection Profile v1.3</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="September"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5247">
          <front>
            <title>Extensible Authentication Protocol (EAP) Key Management Framework</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, enables extensible network access authentication. This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material and parameters generated by EAP authentication algorithms, known as "methods". It also provides a detailed system-level security analysis, describing the conditions under which the key management guidelines described in RFC 4962 can be satisfied. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5247"/>
          <seriesInfo name="DOI" value="10.17487/RFC5247"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TPM-ID" target="https://www.trustedcomputinggroup.org/wp-content/uploads/TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf">
          <front>
            <title>TPM Keys for Platform Identity for TPM 1.2</title>
            <author>
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="SEV-SNP" target="https://www.amd.com/system/files/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf">
          <front>
            <title>AMD SEV-SNP: Stregthening VM Isolation with Integrity Protection and More</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="SGX" target="https://software.intel.com/content/dam/develop/external/us/en/documents/intel-sgx-support-for-third-party-attestation-801017.pdf">
          <front>
            <title>Supporting Third Party Attestation for Intel SGX with Intel Data Center Attestation Primitives</title>
            <author>
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="TDX" target="https://software.intel.com/content/dam/develop/external/us/en/documents/tdx-whitepaper-final9-17.pdf">
          <front>
            <title>Intel Trust Domain Extensions</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AR" target="https://ieeexplore.ieee.org/document/8423794">
          <front>
            <title>802.1AR: Secure Device Identity</title>
            <author>
              <organization/>
            </author>
            <date year="2018" month="August" day="02"/>
          </front>
        </reference>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <date day="5" month="July" year="2023"/>
            <abstract>
              <t>   The Platform Security Architecture (PSA) is a family of hardware and
   firmware security specifications, as well as open-source reference
   implementations, to help device makers and chip manufacturers build
   best-practice security into products.  Devices that are PSA compliant
   are able to produce attestation tokens as described in this memo,
   which are the basis for a number of different protocols, including
   secure provisioning and network access control.  This document
   specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profiled Entity Attestation Token
   (EAT).

   This specification describes what claims are used in an attestation
   token generated by PSA compliant systems, how these claims get
   serialized to the wire, and how they are cryptographically protected.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-12"/>
        </reference>
        <reference anchor="I-D.ietf-rats-network-device-subscription">
          <front>
            <title>Attestation Event Stream Subscription</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="10" month="March" year="2023"/>
            <abstract>
              <t>   This memo defines how to subscribe to YANG Event Streams for Remote
   Attestation Procedures (RATS).  In RATS, Conceptional Messages, are
   defined.  Analogously, the YANG module defined in this memo augments
   the YANG module for TPM-based Challenge-Response based Remote
   Attestation (CHARRA) to allow for subscription to remote attestation
   Evidence.  Additionally, this memo provides the methods and means to
   define additional Event Streams for other Conceptual Message as
   illustrated in the RATS Architecture, e.g.  Attestation Results,
   Endorsements, or Event Logs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-network-device-subscription-03"/>
        </reference>
        <reference anchor="TPM2.0" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-1-Architecture-01.07-2014-03-13.pdf">
          <front>
            <title>Trusted Platform Module Library - Part 1: Architecture</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="US-Executive-Order" target="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">
          <front>
            <title>Executive Order on Improving the Nation's Cybersecurity</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="May" day="12"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 823?>

<section anchor="implementation-guidance">
      <name>Implementation Guidance</name>
      <section anchor="supplementing-trustworthiness-claims">
        <name>Supplementing Trustworthiness Claims</name>
        <t>What has been encoded into each Trustworthiness Claim is the domain of integer values which is likely to drive a different programmatic decision in the Relying Party's Appraisal Policy for Attestation Results.
This will not be the only thing a Relying Party's Operations team might care to track for measurement or debugging purposes.</t>
        <t>There is also the opportunity for the Verifier to include supplementary Evidence beyond a set of asserted Trustworthiness Claims.
It is recommended that if supplementary Evidence is provided by the Verifier within the Attestation Results, that this supplementary Evidence includes a reference to a specific Trustworthiness Claim.
This will allow a deeper understanding of some of the reasoning behind the integer value assigned.</t>
      </section>
    </section>
    <section anchor="claim-for-TEE-types">
      <name>Supportable Trustworthiness Claims</name>
      <t>The following is a table which shows what Claims are supportable by different Attesting Environment types.
Note that claims MAY BE implicit to an Attesting Environment type, and therefore do not have to be included in the Trustworthiness Vector to be considered as set by the Relying Party.</t>
      <section anchor="supportable-trustworthiness-claims-for-hsm-based-cc">
        <name>Supportable Trustworthiness Claims for HSM-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a HSM-based Confidential Computing Attester. (Such as a TPM <xref target="TPM-ID"/>.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">Verifier evaluation of Attester reveals no configuration lines which expose the Attester to known security vulnerabilities.  This may be done with or without the involvement of a TPM PCR.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Yes</td>
              <td align="left">Checks the TPM PCRs for the static operating system, and for any tracked files subsequently loaded</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">No</td>
              <td align="left">Can be supported, but TPM tracking is unlikely</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Yes</td>
              <td align="left">If TPM PCR check ok from BIOS checks, through Master Boot Record configuration</td>
            </tr>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Check IDevID</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">n/a</td>
              <td align="left">TPMs are not recommended to provide a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">n/a</td>
              <td align="left">TPMs are not recommended to provide a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Minimal</td>
              <td align="left">With a TPM, secure storage space exists and is writeable by external applications. But the space is so limited that it often is used just be used to store keys.</td>
            </tr>
          </tbody>
        </table>
        <t>Setting the Trustworthiness Claims may follow the following logic at the Verifier A within (2) of <xref target="interactions"/>:</t>
        <artwork><![CDATA[
Start: Evidence received starts the generation of a new
Trustworthiness Vector.  (e.g.,  TPM Quote Received, log received,
or appraisal timer expired)

Step 0: set Trustworthiness Vector = Null

Step 1: Is there sufficient fresh signed evidence to appraise?
  (yes) - No Action
  (no) -  Goto Step 6

Step 2: Appraise Hardware Integrity PCRs
   if (hardware NOT "0") - push onto vector
   if (hardware NOT affirming or warning), go to Step 6

Step 3: Appraise Attesting Environment identity
   if (instance-identity <> "0") - push onto vector

Step 4: Appraise executable loaded and filesystem integrity
   if (executables NOT "0") - push onto vector
   if (executables NOT affirming or warning), go to Step 6

Step 5: Appraise all remaining Trustworthiness Claims
        Independently and set as appropriate.

Step 6: Assemble Attestation Results, and push to Attester

End

]]></artwork>
      </section>
      <section anchor="process-based-claims">
        <name>Supportable Trustworthiness Claims for process-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a process-based Confidential Computing based Attester. (Such as a SGX Enclaves and TrustZone.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">If done, this is at the Application Layer.  Plus each process needs it own protection mechanism as the protection is limited to the process itself.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">Optional</td>
              <td align="left">Can be supported by application, but process-based CC is not a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Implicit in signature</td>
              <td align="left">At least the TEE is protected here. Other elements of the system outside of the TEE might need additional protections is used by the application process.</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">From the TEE</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">Although the application must assert that this function is used by the code itself.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">Optional</td>
              <td align="left">Will need to be supported by application code</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="VM-based-claims">
        <name>Supportable Trustworthiness Claims for VM-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a VM-based Confidential Computing based Attester. (Such as SEV, TDX, ACCA, SEV-SNP.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">Requires application integration.  Easier than with process-based solution, as the whole protected machine can be evaluated.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">Optional</td>
              <td align="left">Can be supported by application</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Chip dependent</td>
              <td align="left">At least the TEE is protected here. Other elements of the system outside of the TEE might need additional protections is used by the application process.</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">From the TEE</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Chip dependent</td>
              <td align="left">Although the application must assert that this function is used by the code itself.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">Optional</td>
              <td align="left">Will need to be supported by application code</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="some-issues-being-worked">
      <name>Some issues being worked</name>
      <t>It is possible for a cluster/hierarchy of Verifiers to have aggregate AR which are perhaps signed/endorsed by a lead Verifier.
What should be the Proof-of-Freshness or Verifier associated with any of the aggregate set of Trustworthiness Claims?</t>
      <t>There will need to be a subsequent document which documents how these objects which will be translated into a protocol on a wire (e.g. EAP on TLS).
Some breakpoint between what is in this draft, and what is in specific drafts for wire encoding will need to be determined.
Questions like architecting the cluster/hierarchy of Verifiers fall into this breakdown.</t>
      <t>For some Trustworthiness Claims, there could be value in identifying a specific Appraisal Policy for Attestation Results applied within the Attester.
One way this could be done would be a URI which identifies the policy used at Verifier A, and this URI would reference a specific Trustworthiness Claim.
As the URI also could encode the version of the software, it might also act as a mechanism to signal the Relying Party to refresh/re-evaluate its view of Verifier A.
Do we need this type of structure to be included here?
Should it be in subsequent documents?</t>
      <t>Expand the variant of <xref target="interactions"/> which requires no Relying Party PoF into its own picture.</t>
      <t>In what document (if any) do we attempt normalization of the identity claims between different types of TEE.   E.g., does MRSIGNER plus extra loaded software = the sum of TrustZone Signer IDs for loaded components?</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Guy Fedorkow</t>
      <t>Email: gfedorkow@juniper.net</t>
      <t>Dave Thaler</t>
      <t>Email: dthaler@microsoft.com</t>
      <t>Ned Smith</t>
      <t>Email: ned.smith@intel.com</t>
      <t>Lawrence Lundblade</t>
      <t>Email: lgl@island-resort.com</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
