<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jpfiset-lamps-attestationkey-eku-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EKU for Attestation Keys">Extended Key Usage (EKU) for X.509 Certificates associated with Attestation Keys</title>
    <seriesInfo name="Internet-Draft" value="draft-jpfiset-lamps-attestationkey-eku-01"/>
    <author initials="J.-P." surname="Fiset" fullname="Jean-Pierre Fiset">
      <organization abbrev="Crypto4A">Crypto4A Inc.</organization>
      <address>
        <postal>
          <street>1550A Laperriere Ave</street>
          <city>Ottawa, Ontario</city>
          <code>K1Z 7T2</code>
          <country>Canada</country>
        </postal>
        <email>jp@crypto4a.com</email>
      </address>
    </author>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road - Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization/>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>montywiseman32@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 49?>

<t>As described in RFC5280, key usages are specified in X.509 certificates using the
certificate extensions "Key Usage" and "Extended Key Usage". This document defines
an Extended Key Usage (EKU) relating to keys that are dedicated to the purpose of
signing attestation evidence as introduced in RFC9334.</t>
    </abstract>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attesters, as defined in Remote Attestation Procedures
(RATS) in <xref target="RFC9334"/>, can use cryptographic private keys to identify the origin of
the evidence and protect its integrity. Those private keys are referred to as
Attestation Keys.</t>
      <t>Attestation Keys can be endorsed by a Certification Authority (CA) by issuing
X.509 certificates (see <xref target="RFC5280"/>). Those certificates <bcp14>SHOULD</bcp14> include an extended
key usage to indicate that the associated key is dedicated to the purpose of attesting
evidence. This allows recipients of signed evidence to trust that the associated key is
controlled according to the constraints specified in this document.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Much of the terms used in this specification are borrowed from RATS (<xref target="RFC9334"/>).
Readers of this specification should review the RATS architecture and its terminology
to put in context the text presented in this specification.</t>
      <t>Attestation Key : A key under the control of the Attester and reserved for the purpose
of signing evidence.</t>
    </section>
    <section anchor="extended-key-usage-for-attestation-key">
      <name>Extended Key Usage for Attestation Key</name>
      <t>This specification defines the KeyPurposeId id-kp-attestationKey. This KeyPurposeId
is reserved for Attestation Keys.</t>
      <t>The term "signing evidence" refers to performing a digital signature
using an Attestation Key over content that includes claims and measurements about the target
environment (see <xref target="RFC9334"/>).</t>
      <t>An Attestation Key must be associated with the "digital signing" key usage, as any
other keys used to performed digital signature. No other key usage should be assigned to
an Attestation Key.</t>
      <t>Furthermore, an Attestation Key <bcp14>MUST</bcp14> adhere to the following constraints:</t>
      <ul spacing="normal">
        <li>
          <t>An Attestation Key <bcp14>SHOULD</bcp14> be used by an Attester only to digitally sign evidence that
the Attester can observe in the target environment. The Attester <bcp14>SHOULD NOT</bcp14> use the
Attestation Key for any other purpose (dedication).</t>
        </li>
        <li>
          <t>An Attestation Key <bcp14>MUST NOT</bcp14> be controlled by any entity other than the associated
Attester. This constraint is to ensure that other entity can not impersonate the
Attester (non-repudiation).</t>
        </li>
      </ul>
      <section anchor="including-the-eku-for-attestation-key-in-certificates">
        <name>Including the EKU for Attestation Key in Certificates</name>
        <t>When the EKU id-kp-attestationKey is included in a X.509, other considerations should
be taken:</t>
        <ul spacing="normal">
          <li>
            <t>The X.509 extension "key usage" <bcp14>MUST</bcp14> be set to "digital signature". In other words,
the value of the associated field includes the bit "digitalSignature" set. Other key
usages <bcp14>MUST NOT</bcp14> be set.</t>
          </li>
          <li>
            <t>The X.509 extension "extended key usage" <bcp14>SHOULD NOT</bcp14> include usage other than the
one defined in this document (id-kp-attestationKey). If other extended key usages
are provided, they <bcp14>MUST</bcp14> be compatible with constraints outlined in this specification.</t>
          </li>
        </ul>
        <t>When the extended key usage id-kp-attestationKey is added to the X.509 EKU extension, it
is not necessary to mark this extension as critical. This is to foster interoperability
between systems that are not aware of this extended key usage. Systems that consume the
evidence signed by an attestation key, such as a Verifier, can enforce the presence of this
extended key usage through policy.</t>
      </section>
      <section anchor="implication-for-a-certificate-authority">
        <name>Implication for a Certificate Authority</name>
        <t>When a Certificate Authority issues a X.509 certificate that includes the extended key
usage defined in this specification, certain additional considerations <bcp14>MUST</bcp14> be taken to ensure
that the constraints defined in this document are respected.</t>
        <t>Issuing a X.509 certificate with the extended key usage id-kp-attestationKey
equates to providing an endorsement of the attester as defined in the RATS architecture.
Therefore, the procedures and practices employed by a Certificate Authority <bcp14>MUST</bcp14> be
augmented to take into account the security considerations relating to the Attestation
Key as outlined in the RATS architecture.</t>
        <t>In particular, it is not sufficient for a CA to verify that the subject of the certificate,
the Attester, has possession of the subject key. It <bcp14>MUST</bcp14> also ensure that the Attester is the only
entity that controls the key. This can be accomplished (but not restricted to) by using
a key confined to specialized hardware under the control of the Attester.</t>
      </section>
      <section anchor="implication-for-the-rats-verifier">
        <name>Implication for the RATS Verifier</name>
        <t>In <xref target="RFC9334"/>, the Verifier is the role that consumes the evidence produced by an
Attester. As part of the verification process, the Verifier assesses endorsements, among
other things. A X.509 certificate containing the EKU id-kp-attestationKey is an
endorsement of the Attester by the issuing authorities.</t>
      </section>
      <section anchor="implication-for-cryptographic-modules">
        <name>Implication for Cryptographic Modules</name>
        <t>Attestation Keys are instantiated and operated on by cryptographic modules. These modules
<bcp14>MUST</bcp14> provide the services required to restrict the use of an Attestation Key to its
associated Attester.</t>
        <t>The mechanisms used to perform those restrictions are out of scope for this specification.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>For attestation evidence to be valuable, coordination between the various roles is required:</t>
      <ul spacing="normal">
        <li>
          <t>The cryptographic module <bcp14>MUST</bcp14> restrict the use of the Attestation Key to the associated Attester.</t>
        </li>
        <li>
          <t>The CA <bcp14>MUST</bcp14> ensure that the Attester is the only entity that controls the Attestation Key which
is subject to the issuance of a certificate.</t>
        </li>
        <li>
          <t>A Verifier must perform the assessment of the presented evidence using all the procedures
required to ascertain as to the origin and validity of the attester.</t>
        </li>
      </ul>
      <t>The risks associated with a failure of this coordination reduces the quality of the trustworthiness
of the evidence.</t>
      <t>The implications are outlines in the Security Considerations section in RATS (<xref target="RFC9334"/>).</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>For the ASN.1 module found in Appendix A, IANA is requested to assign
an object identifier for the module identifier (TBD0) with a
description of "id-mod-attestation-eku-2025". This should be allocated in the
"SMI Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
      <t>For the ASN.1 module found in Appendix A, IANA is requested to assign
an object identifier for the extended key usage value (XX) with a
description of "id-kp-attestationKey". This should be allocated in the
"SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
        <front>
          <title>Remote ATtestation procedureS (RATS) Architecture</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <author fullname="N. Smith" initials="N." surname="Smith"/>
          <author fullname="W. Pan" initials="W." surname="Pan"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9334"/>
        <seriesInfo name="DOI" value="10.17487/RFC9334"/>
      </reference>
      <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 211?>

<section numbered="false" anchor="appendix-a-asn1-module">
      <name>Appendix A. ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications [X.680] and [X.690].
It defines the OID used for Attestation Key Extended Key Usage.</t>
      <artwork><![CDATA[
  AttestationEKU-2025 { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-mod-attestation-eku-2025(TBD0) }

  DEFINITIONS EXPLICIT TAGS ::=

  BEGIN

  -- EXPORTS ALL --

  -- IMPORTS NOTHING --

  -- OID Arc --

  id-kp  OBJECT IDENTIFIER  ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

  -- Attestation Key Extended Key Usage --

  id-kp-attestationKey OBJECT IDENTIFIER ::= { id-kp XX }

  END
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
