<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-liu-acme-rats-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="acme-rats">Automated Certificate Management Environment (ACME) rats Identifier and Challenge Type</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-acme-rats-01"/>
    <author fullname="Chunchi Peter Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <author fullname="Mike Ounsworth">
      <organization>Entrust Limited</organization>
      <address>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author fullname="Michael Richardson">
      <organization>Sandelman Software Works Inc</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Security</area>
    <workgroup>Automated Certificate Management Environment</workgroup>
    <keyword>ACME</keyword>
    <keyword>RATS</keyword>
    <keyword>Zero Trust</keyword>
    <abstract>
      <?line 53?>

<t>This document describes an approach where an ACME Server can challenge an ACME Client to provide a Remote Attestation Evidence or Remote Attestation Result in any format supported by the Conceptual Message Wrapper. The ACME Server can optionally challenge the Client for specific claims that it wishes attestation for.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://liuchunchi.github.io/draft-liu-acme-rats/draft-liu-acme-rats.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-liu-acme-rats/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Automated Certificate Management Environment Working Group mailing list (<eref target="mailto:acme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/acme/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/acme/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/liuchunchi/draft-liu-acme-rats"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>ACME <xref target="RFC8555"/> is a standard protocol for issuing and renewing certificates automatically, widely used in the Internet scenario, help an ACME Client prove its ownership to an identifier like domain name or email address.</t>
      <t>In order to prevent issuing certificates to malicious devices, a few works are ongoing in the LAMPS and RATS WG.</t>
      <ul spacing="normal">
        <li>
          <t><xref target="I-D.ietf-lamps-csr-attestation"/> define trustworthy claims about device's platform generating the certification signing requests (CSR) and the private key resides on this platform.</t>
        </li>
        <li>
          <t><xref target="I-D.draft-moriarty-rats-posture-assessment"/> define a summary of a local assessment of posture for managed systems and across various layers.</t>
        </li>
      </ul>
      <t>This document builds on <xref target="I-D.draft-bweeks-acme-device-attest-01"/> which provides a mechanism for WebAuthn attestations over ACME. This document is broader in scope to support a broad range of attestation formats.</t>
      <t>In this document, we propose an approach where ACME Server MAY challenge the ACME Client to produce an Attestation Evidence or Attestation Result in any format that is supported by the RATS Conceptual Message Wrapper <xref target="I-D.draft-ietf-rats-msg-wrap"/>. The ACME Server then checks if the ACME Clients presented a valid remote attestation evidence or remote attestation result, for instance, an EAT (entity attestation token). The ACME Server MAY perform any necessary checks against the provided remote attestation, as required by by the requested certificate profile; this conforms to the RATS concept of an Appraisal Policy.</t>
      <t>This document defines a new ACME "rats" identifier and the challenge types "device-attest-02" and "device-attest-03" which are respectively use to challenge for a RATS background check and passport model type attestation. In this way, the CA / RA issues certificates only to devices that can provide an appropriate attestation result, indicating such device has passed the required security checks. By repeating this process and issuing only short-lived certificates to qualified devices, we also fulfill the continuous monitoring/validation requirement of Zero-Trust principle.</t>
      <t>Some example use cases include an enterprise scenario where Network Operations Center (NOC) issue certificates to devices that can prove via remote attestation that they are running an up-to-date operating system as well as the enterprise-required endpoint security software. Another example is issuing S/MIME certificates to BYOD devices only if they can prove via attestation that they are registered to a corporate MDM and the user they are registered to matches the user for which a certificate has been requested.</t>
      <t>For ease of denotion, we omit the "ACME" adjective from now on, where Server means ACME Server and Client means ACME Client.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="extensions-rats-identifier">
      <name>Extensions -- rats identifier</name>
      <t>An rats identifier type represents a unique identifier to an attestation result. It extends a "rats" identifier type and a string value.</t>
      <dl>
        <dt>type (required, string):</dt>
        <dd>
          <t>The string "rats".</t>
        </dd>
        <dt>value (required, string):</dt>
        <dd>
          <t>The identifier itself.</t>
        </dd>
      </dl>
      <t>The following steps are the ones that will be affected:</t>
      <t>1. newOrder Request Object - identifiers: During the certificate order creation step, the Client sends a /newOrder JWS request (Section 7.4 of <xref target="RFC8555"/>) whose payload contains an array of identifiers. The Client adds an rats identifier to the array.</t>
      <t>An example extended newOrder JWS request:</t>
      <artwork><![CDATA[
  {
    "protected": base64url({
      "alg": "ES256",
    }),
    "payload": base64url({
      "identifiers": [
        { "type": "rats", "value": "0123456789abcdef" },
      ],
    }),
    "signature": "H6ZXtGjTZyUnPeKn...wEA4TklBdh3e454g"
  }
]]></artwork>
      <t>2. Order Object - identifiers: After a newOrder request is sent to the Server, the Account Object creates an Order Object (Section 7.1.3 of <xref target="RFC8555"/>) with "rats" identifiers and values from Step 1.</t>
      <t>An example extended Order Object:</t>
      <artwork><![CDATA[
  {
    "status": "pending",

    "identifiers": [
      { "type": "rats", "value": "0123456789abcdef" },
    ],

    "authorizations": [
      "https://example.com/acme/authz/PAniVnsZcis",
    ],

    "finalize": "https://example.com/acme/order/T..fgo/finalize",
  }
]]></artwork>
      <t>3. Authorization Object - identifier: The Server creates an Authorization Object that has rats identifier (Section 7.1.4 of <xref target="RFC8555"/>)</t>
      <t>4. Challenge Object - identifier: The Server creates a Challenge Object that has rats challenge type.</t>
      <t>An example extended Authorization Object (that contains a Challenge Object):</t>
      <artwork><![CDATA[
{
  "status": "pending",

  "identifier": {
    "type": "rats",
    "value": "0123456789abcdef"
  },

  "challenges": [
    {
      "type": "rats",
      "url": "https://example.com/acme/chall/prV_B7yEyA4",
      "status": "pending",
      "token": "DGyRejmCefe7v4NfDGDKfA",
    },
    {
      "type": "http-01",
      "url": "https://example.com/acme/chall/prV_B7yEyA4",
      "status": "pending",
      "token": "DGyRejmCefe7v4NfDGDKfA",
    }
  ],
}
]]></artwork>
    </section>
    <section anchor="extensions-rats-challenge-types">
      <name>Extensions -- rats challenge types</name>
      <t>A rats challenge type help the Client prove ownership to its attestation result identifier. This section describes the challenge/response extensions and procedures to use them.</t>
      <section anchor="rats01">
        <name>device-attest-02 Challenge</name>
        <t>device-attest-02 Challenge simply works with Passport Model of RATS. The corresponding Challenge Object is:</t>
        <dl>
          <dt>type (required, string):</dt>
          <dd>
            <t>The string "device-attest-02".</t>
          </dd>
          <dt>url (required, string):</dt>
          <dd>
            <t>The URL that the Client post its response to.</t>
          </dd>
          <dt>token (required, string):</dt>
          <dd>
            <t>Same as Section 8.3 of RFC8555.</t>
          </dd>
          <dt>nonce (optional, string):</dt>
          <dd>
            <t>If attestation freshness is required, then the Server MAY present a nonce which then MUST be echoed in the provided attestation. In some situations, the nonce will come from a separate RATS Verifier, and therefore needs to be a distinct value from the ACME token.</t>
          </dd>
          <dt>attestClaimsHint (optional, list of string)</dt>
          <dd>
            <t>If the Server requires attestation of specific claims or properties in order to issue the requested certificate profile, then it MAY list one or more types of claims from the newly-defined ACME Attest Claims Hints registry defined in "sec-claimshints"(cite-fail).</t>
          </dd>
        </dl>
        <t>The response sent to the url is:</t>
        <artwork><![CDATA[
keyAuthorization = token || '.' || cmw
]]></artwork>
        <t>where <tt>cmw</tt> MAY be either a CMW in JWT format, or a Base64 CMW in CWT format as per <xref target="I-D.draft-ietf-rats-msg-wrap"/>.</t>
      </section>
      <section anchor="rats02">
        <name>device-attest-03 Challenge</name>
        <t>device-attest-03 Challenge works the same way as device-attest-02, but expects the Client to return RATS evidence in accordance with the Background Check Model of RATS.</t>
      </section>
    </section>
    <section anchor="claimshints">
      <name>ACME Attest Claims Hint Registry</name>
      <t>In order to facilitate the Server requesting attestation of specific types claims or properties, we define a new registry of ACME Claims Hints. In order to preserve flexibility, the Claim Hints are intended to be generic in nature, allowing for the client to reply with any type of attestation evidence or attestation result that contains the requested information. As such, these values are not intended to map one-to-one with any specific remote attestation evidence or attestation result format, but instead they are to serve as a hint to the ACME Client about what type of attestation it needs to collect from the device. Ultimately, the CA's certificate policies will be the authority on what evidence or attestation results it will accept.</t>
      <t>See <xref target="iana-claimshints"/> for the initial contents of this new registry.</t>
    </section>
    <section anchor="example-use-case-enterprise-access">
      <name>Example use case -- enterprise access</name>
      <t>In an enterprise network scenario, it is hard to coordinate Security Operations Center (SOC) and Network Operations Center (NOC) to work together due to various of reasons:</t>
      <ol spacing="normal" type="1"><li>
          <t>Integration/compatibility difficulty: Integrating SOC and NOC requires plenty of customized, case-by-case developing work. Especially considering differrnt system vendors, system versions, different data models and formats due to different client needs... Let alone possible updates.</t>
        </li>
        <li>
          <t>Conflict of duties: NOC people do not want SOC people to interfere with their daily work, and so do SOC people. Also, NOC people may have limited security knowledge, and SOC people vice versa. Where to draw the line and what is the best tool to help them collaborate is a question.</t>
        </li>
      </ol>
      <t>This work proposes a way to help SOC and NOC work together, with separated duties (to avoid conflict) and ease of working together (proper abstraction).</t>
      <t>An Endpoint Detection and Response (EDR) software and Security Operations Center (SOC) is responsible for checking the security status of an accessing end device. If the device passed latest security checks, EDR/SOC should issue fresh attestation results (consider as a security clearance). Otherwise, EDR/SOC should refuse to issue (new) attestation results. A Network Operations Center (NOC) could use ACME to issue short-lived certificates to only devices with fresh attestation results. In this way, the NOC can follow a Zero-Trust philosophy and issue network access to only devices that are continuously monitored and have no known security risks up-to-date. SOC can also have flexible security policies and decide what to check.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to open a new registry, XXXXXXXX</t>
      <t>Type: designated expert</t>
      <t>The registry has the following columns:</t>
      <ul spacing="normal">
        <li>
          <t>Claim Hint: the string value to be placed within an ACME device-attest-02 or device-attest-03 challenge.</t>
        </li>
        <li>
          <t>Descryption: a descryption of the general type of attestation evidence or attestation result that the client is expected to produce.</t>
        </li>
      </ul>
      <t>The initial registry contents is shown in the table below.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Claim Hint</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">FIPS_mode</td>
            <td align="left">Attestation that the device is currently booted in FIPS mode.</td>
          </tr>
          <tr>
            <td align="left">OS_patch_level</td>
            <td align="left">Attestation to the version or patch level of the device's operating system.</td>
          </tr>
          <tr>
            <td align="left">sw_manifest</td>
            <td align="left">A manifest list of all software currently running on the device.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="iana-claimshints">
        <name>ACME Attest Claims Hint Registry</name>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.draft-ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="28" month="February" year="2025"/>
            <abstract>
              <t>   This document defines a conceptual message wrapper (CMW) format - an
   encapsulation method applicable to any RATS conceptual message, such
   as Evidence, Attestation Results, Endorsements, and Reference Values.
   It also describes a collection type that aggregates one or more CMWs
   into a single message.

   In addition, this document specifies a corresponding CBOR tag, JSON
   Web Tokens (JWT) and CBOR Web Tokens (CWT) claims, and an X.509
   extension.  These mechanisms enable the embedding of enveloped
   conceptual messages into CBOR-based protocols, web APIs, and PKIX
   protocols.  Moreover, a Media Type and a CoAP Content-Format are
   defined for transporting CMWs over HTTP, MIME, CoAP, and other
   Internet protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-12"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
              <organization>Beyond Identity</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="2" month="March" year="2025"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of Evidence and Attestation Results in Certificate
   Signing Requests (CSRs), such as PKCS#10 or Certificate Request
   Message Format (CRMF) payloads.  This provides an elegant and
   automatable mechanism for transporting Evidence to a Certification
   Authority.

   Including Evidence and Attestation Results along with a CSR can help
   to improve the assessment of the security posture for the private
   key, and can help the Certification Authority to assess whether it
   satisfies the requested certificate profile.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-17"/>
        </reference>
        <reference anchor="I-D.draft-moriarty-rats-posture-assessment">
          <front>
            <title>Remote Posture Assessment for Systems, Containers, and Applications</title>
            <author fullname="Kathleen Moriarty" initials="K." surname="Moriarty">
              <organization>Transforming Information Security LLC</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
              <organization>Beyond Identity</organization>
            </author>
            <author fullname="A.J. Stein" initials="A." surname="Stein">
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date day="2" month="July" year="2024"/>
            <abstract>
              <t>   This document establishes an architectural pattern whereby a remote
   attestation could be issued for a complete set of benchmarks or
   controls that are defined and grouped by an external entity,
   preventing the need to send over individual attestations for each
   item within a benchmark or control framework.  This document
   establishes a pattern to list sets of benchmarks and controls within
   CWT and JWT formats for use as an Entity Attestation Token (EAT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moriarty-rats-posture-assessment-01"/>
        </reference>
        <reference anchor="I-D.draft-bweeks-acme-device-attest-01">
          <front>
            <title>Automated Certificate Management Environment (ACME) Device Attestation Extension</title>
            <author fullname="Brandon Weeks" initials="B." surname="Weeks">
              <organization>Google</organization>
            </author>
            <date day="7" month="August" year="2022"/>
            <abstract>
              <t>   This document specifies new identifiers and a challenge for the
   Automated Certificate Management Environment (ACME) protocol which
   allows validating the identity of a device using attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bweeks-acme-device-attest-01"/>
        </reference>
      </references>
    </references>
    <?line 242?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
