<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-liu-acme-rats-02" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="acme-rats">Automated Certificate Management Environment (ACME) rats Identifier and Challenge Type</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-acme-rats-02"/>
    <author fullname="Chunchi Peter Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <author fullname="Mike Ounsworth">
      <organization>Entrust Limited</organization>
      <address>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author fullname="Michael Richardson">
      <organization>Sandelman Software Works Inc</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="September" day="24"/>
    <area>Security</area>
    <workgroup>Automated Certificate Management Environment</workgroup>
    <keyword>ACME</keyword>
    <keyword>RATS</keyword>
    <keyword>Zero Trust</keyword>
    <abstract>
      <?line 60?>

<t>This document describes an approach where an ACME Server can challenge an ACME Client to provide a Remote Attestation Evidence or Remote Attestation Result in any format supported by the Conceptual Message Wrapper.</t>
      <t>The ACME Server can optionally challenge the Client for specific claims that it wishes attestation for.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://liuchunchi.github.io/draft-liu-acme-rats/draft-liu-acme-rats.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-liu-acme-rats/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Automated Certificate Management Environment Working Group mailing list (<eref target="mailto:acme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/acme/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/acme/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/liuchunchi/draft-liu-acme-rats"/>.</t>
    </note>
  </front>
  <middle>
    <?line 66?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>ACME <xref target="RFC8555"/> is a standard protocol for issuing and renewing certificates automatically.
When an ACME client needs a certificate, it connects to the ACME server, providing a proof of control of a desired identity. Upon success, it then receives a certificate with that identity in it.</t>
      <t>These identities become part of the certificate, usually a Fully Qualified Domain Name (FQDN) that goes into the Subject Alt Name (SAN) for a certificate.
Prior to ACME, the authorization process of obtaining a certificate from an operator of a (public) certification authority was non-standard and ad-hoc.
It ranged from sending faxes on company letterhead to answering an email sent to a well-known email address like <tt>hostmaster@example.com</tt>, evolving into a process where some randomized nonce could be placed in a particular place on the target web server.
The point of this process is to prove that the given DNS FQDN was controlled by the client system.</t>
      <t>ACME standardized the process, allowing for automation for certificate issuance.
It has been a massive success: increasing HTTPS usage from 27% in 2013 to over 80% in 2019 <xref target="letsencrypt"/>.</t>
      <t>While the process supports many kinds of identifiers: email addresses, DTN node IDs, and can create certificates for client use.
However, these combinations have not yet become as popular, in part because these types of certificates are usually located on much more general purpose systems such as laptops and computers used by people.</t>
      <t>The concern that Enterprises have with the use of client side certificates has been the trustworthiness of the client system itself.
Such systems have many more configurations, and are often considered harder to secure as a result.
While well managed mutual TLS (client and server authentication via PKIX certificate) has significant advantages over the more common login via username/passowrd,  if the private key associated with a client certificates is disclosed or lost, then the impact can be more significant.</t>
      <t>The use case envisioned here is that of an enterprise.  A Network Operations Center (NOC)
(which may be internal or an external contracted entity) will issue (client) certificates to devices that can prove via remote attestation that they are running an up-to-date operating system as well as the enterprise-required endpoint security software.</t>
      <t>This is a place where Remote Attestation can offer additional assurance <xref target="RFC9334"/>.
If the software on the client is properly designed, and is up to date, then it is easier to assure that the private key will be safe.</t>
      <t>This can be extended to Bring Your Own Device (BYOD) by having those devices provide an equivalent Attestation Result.</t>
      <t>In this document, we propose an approach where ACME Server MAY challenge the ACME Client to produce an Attestation Evidence or Attestation Result in any format that is supported by the RATS Conceptual Message Wrapper <xref target="I-D.ietf-rats-msg-wrap"/>, for instance, an EAT (entity attestation token).
The ACME Server then verifies the attestation result against an appraisal policy as required by by the requested certificate profile.</t>
      <t>ACME can presently offer certificates with multiple identities.
Typically, in a server certificate situation, each identity represents a unique FQDN that would be placed into the certificate as distinct Subject Alt Names (SAN).
For instance each of the names: example.com, www.example.com, www.example.net and marketing.example.com might be placed in a single certificate for a server that provides web content under those four names.</t>
      <t>This document defines a new identity type, <tt>trustworthy</tt> that the ACME client can ask for.
A new <tt>attestation-result-01</tt> challenge is defined as a new method that can be used to authorize this identity using a RATS Passport model.
The <tt>encrypted-evidence-02</tt> challenge is also defined, enabling a background check mechanism.</t>
      <t>In this way, the Certification Authority (CA) or Registration Authority (RA) issues certificates only to devices that can provide an appropriate attestation result, indicating that the device from which the ACME request originates has passed the required security checks.</t>
      <t>Attested ACME requests can form an essential building block towards the continuous monitoring/validation requirement of Zero-Trust principle when coupled with other operational measures, such as issuing only short-lived certificates.</t>
      <t>For ease of denotion, we omit the "ACME" adjective from now on, where Server means ACME Server and Client means ACME Client.</t>
      <section anchor="attestation-results-only">
        <name>Attestation Results only</name>
        <t>This document currently only defines the a mechanism to carry Attestation Results from the ACME client to the ACME server.
It limits itself to the Passport model defined in <xref target="RFC9334"/>.</t>
        <t>This is done to simplify the combinations, but also because it is likely that the Evidence required to make a reasonable assessment includes potentially privacy violating claims.
This is particularly true when a device is a personal (BYOD) device; in that case the Verifier might not even be owned by the Enterprise,  but rather the device manufacturer.</t>
        <t>In order to make use of the background check that Evidence would need to be encrypted from the Attesting Environment to the Verifier, via the ACME Server -- the Relying Party.
Secondly, in order for the ACME Server to be able to securely communicate with an Enterprise located Verifier with that Evidence, then more complex trust relationships would need to be established.
Thirdly, the Enterprise Verifier system would then have to expose itself to the ACME Server, which may be located outside of the Enterprise.
The ACME Server, for resiliency and loading reasons may be a numerous and dynamic cluster of systems, and providing appropriate network access controls to enable this communication may be difficult.</t>
        <t>Instead, the use of the Passport model allows all Evidence to remain within an Enterprise,
and for Verifier operations to be more self-contained.</t>
      </section>
      <section anchor="related-work">
        <name>Related work</name>
        <t><xref target="CSRATT"/> define trustworthy claims about the physical storage location of a key pair's private key.
This mechanism only relates to how the private key is kept.
It does not provide any claim about the rest of the mechanisms around access to the key.
A key could well be stored in the most secure way imaginable, but in order to use the key some command mechanism must exist to invoke it.</t>
        <t>The mechanism created in this document allows certification authority to access the trustworthiness of the entire system.
That accessment goes well beyond how and where the private key is stored.
ACME uses Certificate Signing Requests, so there is no reason that <xref target="CSRATT"/> could not be combined with the mechanism described in this document.</t>
        <t><xref target="RATSPA"/> defines a summary of a local assessment of posture for managed systems and across various  layers.
The claims and mechanisms defined in <xref target="RATSPA"/> are a good basis for the assessment that will need to be done in order to satisfy the trustworthiness challenge detailed in this document.</t>
      </section>
    </section>
    <section anchor="extensions-trustworthy-identifier">
      <name>Extensions -- trustworthy identifier</name>
      <t>This is a new identifier type.</t>
      <dl>
        <dt>type (required, string):</dt>
        <dd>
          <t>The string "trusthworthy".</t>
        </dd>
        <dt>value (required, string):</dt>
        <dd>
          <t>The constant string "trustworthy"</t>
        </dd>
      </dl>
      <t>The following sections detail the changes.</t>
      <section anchor="step-1-neworder-request-object">
        <name>Step 1: newOrder Request Object</name>
        <t>During the certificate order creation step, the Client sends a /newOrder JWS request (Section 7.4 of <xref target="RFC8555"/>) whose payload contains an array of identifiers.</t>
        <t>The client adds the <tt>trustworthy</tt> identifier to the array.</t>
        <t>This MUST NOT be the only identifier in the array, as this identity type does not, on its own, provide enough authorization to issue a certificate.
In this example, a <tt>dns</tt> identity is chosen for the domain name <tt>client01.finance.example</tt>.</t>
        <t>An example extended newOrder JWS request:</t>
        <artwork><![CDATA[
  POST /acme/new-order HTTP/1.1
  Content-Type: application/json
  {
    "protected": base64url({
      "alg": "ES256",
    }),
    "payload": base64url({
      "identifiers": [
        { "type": "truthworthy", "value": "trustworthy" },
        { "type": "dns", "value": "client01.finance.example" },
      ],
    }),
    "signature": "H6ZXtGjTZyUnPeKn...wEA4TklBdh3e454g"
  }
]]></artwork>
      </section>
      <section anchor="step-2-order-object">
        <name>Step 2: Order Object</name>
        <t>As explained in <xref section="7.1.3" sectionFormat="comma" target="RFC8555"/>, the server returns an Order Object.</t>
        <t>An example extended Order Object that includes</t>
        <artwork><![CDATA[
  POST /acme/new-order HTTP/1.1
  ...

  HTTP/1.1 200 OK
  Content-Type: application/json
  {
    "status": "pending",

    "identifiers": [
      { "type": "trustworthy", "value": "trustworthy" },
      { "type": "dns",         "value": "0123456789abcdef" },
    ],

    "authorizations": [
      "https://example.com/acme/authz/PAniVnsZcis",
      "https://example.com/acme/authz/C1uq5Dr+x8GSEJTSKW5B",
    ],

    "finalize": "https://example.com/acme/order/T..fgo/finalize",
  }
]]></artwork>
        <t>Note that the URLs listed in the <tt>authorizations</tt> array are arbitrary URLs created by the ACME server.
The last component is a randomly created string created by the server.
For simplicity, the first URL is identical to the example given in <xref target="RFC8555"/>.</t>
      </section>
      <section anchor="step-3-authorization-object">
        <name>Step 3: Authorization Object</name>
        <t>The Server has created an Authorization Object for the trustworthy and dns identifiers.</t>
        <t>The client accesses each authorization object from the URLs given in the Order Object.
In this example, the <tt>PAniVnsZcis</tt> authorization relates to the <tt>dns</tt> identifier, and
it is not changed from <xref section="8" sectionFormat="comma" target="RFC8555"/>.</t>
        <t>The <tt>C1uq5Dr+x8GSEJTSKW5B</tt> authorization is a new authorization type, <tt>trustworthy</tt>, it is detailed in <xref target="trustworthyauthorization"/> and <xref target="evidenceauthorization"/>.</t>
        <t>Here is an example:</t>
        <artwork><![CDATA[
   GET https://example.com/acme/authz/C1uq5Dr+x8GSEJTSKW5B HTTP/1.1
   ..

   HTTP/1.1 200 OK
   Content-Type: application/json
   {
     "status": "pending",
     "expires": "2025-09-30T14:09:07.99Z",

     "identifier": {
       "type": "trustworthy",
       "value": "trustworthy"
     },

     "challenges": [
       {
         "type": "trustworthy",
         "status": "pending",
         "token": "yoW1RL2zPBzYEHBQ06Jy",
         "url": "https://example.com/acme/chall/prV_8235AD9d",
       }
     ],
   }
]]></artwork>
      </section>
      <section anchor="step-4-obtain-attestation-result">
        <name>Step 4: Obtain Attestation Result</name>
        <t>The client now uses the token <tt>yoW1RL2zPBzYEHBQ06Jy</tt> as a fresh nonce.
It produces fresh Evidence, and provides this to the Verifier.</t>
        <t>The details of this step are not in scope for this document.
As an example, it might use TPM-CHARRA <xref target="RFC9684"/>, or X, or Y (XXX: insert more options)</t>
        <t>The format result is described in <xref target="attestation-response"/> and <xref target="evidence-response"/>.
(An example from <xref target="I-D.ietf-rats-ar4si"/> would be good here)</t>
        <t>This result is sent as a POST to <tt>https://example.com/acme/chall/prV_8235AD9d</tt></t>
        <artwork><![CDATA[
   POST https://example.com/acme/chall/prV_8235AD9d HTTP/1.1
   ..

   HTTP/1.1 200 OK
   Content-Type: application/cmw+cbor

   yePAuQj5xXAnz87/7ItOkDTk5Y4syoW1RL2zPBzYEHBQ06JyUvZDYPYjeTqwlPszb9Grbxw0UAEFx5DxObV1
]]></artwork>
        <t>(EDIT: change to cwm+jws example)</t>
        <t>The Server decodes the provided CMW <xref target="I-D.ietf-rats-msg-wrap"/>.
The Attestation Results found within will be digitally signed by the Verifier.</t>
        <t>The Server MUST verify the signature.
The signature MUST be from a Verifier that the ACME Server has a trust anchor for.
The list of trust anchors that a Server will trust is an attribute of the ACME Account in use.
The details of how these trust anchors are configured is not in scope for this document.</t>
        <t>At this point, if the client were to retrieve the authorization object from step 3, it would observe (if everything was accepted, verified) that the status for this challenge would now be marked as valid.</t>
      </section>
      <section anchor="step-5-perform-other-challenges">
        <name>Step 5: Perform other challenges</name>
        <t>The client SHOULD now perform any other challenges that were listed in the Order Object from step 2.
ACME provides no ordering constraint on the challenges, so they could well have occured concurrently.</t>
      </section>
      <section anchor="step-6-finalize-order-retrieve-certificate">
        <name>Step 6: Finalize Order, retrieve certificate</name>
        <t>At this point, the process continues as described in <xref section="7.4" sectionFormat="comma" target="RFC8555"/>.
This means that the finalize action is used, which includes a CSR.
If all is well, it will result in a certificate being issued.</t>
      </section>
    </section>
    <section anchor="trustworthyauthorization">
      <name>ACME Extensions -- attestation-result-01 challenge type</name>
      <t>A <tt>attestation-result-01</tt> challenge type asks the Client to prove provide a fresh Attestation Result.
This section describes the challenge/response extensions and procedures to use them.</t>
      <section anchor="attestation-result-01-challenge">
        <name>attestation-result-01 Challenge</name>
        <t>The <tt>attestation-result-01</tt> Challenge works with Passport Model of RATS.</t>
        <t>The corresponding Challenge Object is:</t>
        <dl>
          <dt>type (required, string):</dt>
          <dd>
            <t>The string "attestation-result-01".</t>
          </dd>
          <dt>token (required, string):</dt>
          <dd>
            <t>A randomly created nonce provided by the server which MUST be included in the Attestation Results to provide freshness.</t>
          </dd>
          <dt>attestClaimsHint (optional, list of string)</dt>
          <dd>
            <t>If the Server requires attestation of specific claims or properties in order to issue the requested certificate profile, then it MAY list one or more types of claims from the newly-defined ACME Attest Claims Hints registry defined in <xref target="claimshints"/>.</t>
          </dd>
        </dl>
        <t>Once fresh Attestation Results have been obtained from an appropriate RATS Verifier, then this result is posted to the URL provided in the <tt>url</tt> attribute.</t>
      </section>
      <section anchor="attestation-response">
        <name>attestion-result-01 Response</name>
        <t>The data sent SHOULD be Attestation Results in the form of of a CMW <xref section="5.2" sectionFormat="comma" target="I-D.ietf-rats-msg-wrap"/> tagged JSON encoded Attestation Results for Secure Interactions (AR4SI) <xref target="I-D.ietf-rats-ar4si"/>.
The CM-type MUST include attestation-results, and MUST NOT include any other wrapped values.
Other formats are permitted by prior arrangement, however, they MUST use the CMW format so that they can be distinguished.</t>
      </section>
    </section>
    <section anchor="evidenceauthorization">
      <name>ACME Extensions -- attestation-evidence-01 challenge type</name>
      <t>A <tt>attestation-evidence-01</tt> challenge type asks the Client to send fresh Evidence to the Server.
The Server will use the RATS background model to connect to a Verifier, obtaining Attestation Results.</t>
      <section anchor="attestation-evidence-01-challenge">
        <name>attestation-evidence-01 Challenge</name>
        <t>The <tt>attestation-evidence-01</tt> Challenge works with Background Model of RATS.</t>
        <t>The corresponding Challenge Object is:</t>
        <dl>
          <dt>type (required, string):</dt>
          <dd>
            <t>The string "attestation-evidence-01".</t>
          </dd>
          <dt>token (required, string):</dt>
          <dd>
            <t>A randomly created nonce provided by the server which MUST be included in the Evidence to provide freshness.</t>
          </dd>
          <dt>verifierEncryptionCredential (optional, base64 encoded)</dt>
          <dd>
            <t>This mode is for cases where the evidence of a device contains specific identifiers that could be linkable to a person and therefore qualify as Personally Identifiable Information. In these cases, the Server MAY opt to pass the evidence encrypted to the Verifier so that it never needs to handle to decrypted PII. The verifierENcryptionCredential can be of any type that is compatible with JWE encryption.</t>
          </dd>
        </dl>
      </section>
      <section anchor="evidence-response">
        <name>attestion-evidence-01 Response</name>
        <t>Once fresh Evidence has been collected, then it is posted to the URL provided in the <tt>url</tt> attribute.</t>
        <t>The data sent SHOULD be Evidence in the form of of a CMW <xref section="5.2" sectionFormat="comma" target="I-D.ietf-rats-msg-wrap"/> tagged JSON encoded Evidence.
The CMW-type MUST include Evidence, and MUST NOT include any other wrapped values.
Other formats are permitted by prior arrangement, however, they MUST use the CMW format so that they can be distinguished.</t>
        <t>If a verifierEncryptionCredential was provided by the Server, then the Client MUST encrypt the evidence by placing the entire CMW as the payload of a JWE encrypted for the verifierEncryptionCredential.</t>
      </section>
    </section>
    <section anchor="claimshints">
      <name>ACME Attest Claims Hint Registry</name>
      <t>(EDIT: unclear if this is still important)</t>
      <t>In order to facilitate the Server requesting attestation of specific types claims or properties, we define a new registry of ACME Claims Hints. In order to preserve flexibility, the Claim Hints are intended to be generic in nature, allowing for the client to reply with any type of attestation result that contains the requested information.
As such, these values are not intended to map one-to-one with any specific remote attestation evidence or attestation result format, but instead they are to serve as a hint to the ACME Client about what type of attestation it needs to collect from the device. Ultimately, the CA's certificate policies will be the authority on what evidence or attestation results it will accept.</t>
      <t>The ACME Attest Claims Hint Registry is intended to help clients to collect evidence or attestation results that are most likely to be acceptable to the Server, but are not a guaranteed replacement for performing interoperability testing between a given attesting device and a given CA. Similarly, an ACME attestation hint may not map one-to-one with attestation functionality exposed by the underlying attesting device, so ACME clients might need to act as intermediaries mapping ACME hints to vendor-specific functionality on a per-hardware-vendor basis.</t>
      <t>See <xref target="iana-claimshints"/> for the initial contents of this new registry.</t>
    </section>
    <section anchor="example-use-cases">
      <name>Example use cases</name>
      <section anchor="conflicting-duties">
        <name>Conflicting duties</name>
        <t>(EDIT: This text might be stale)</t>
        <ol spacing="normal" type="1"><li>
            <t>Integration/compatibility difficulty: Integrating SOC and NOC requires plenty of customized, case-by-case developing work. Especially considering different system vendors, system versions, different data models and formats due to different client needs... Let alone possible updates.</t>
          </li>
          <li>
            <t>Conflict of duties: NOC people do not want SOC people to interfere with their daily work, and so do SOC people. Also, NOC people may have limited security knowledge, and SOC people vice versa. Where to draw the line and what is the best tool to help them collaborate is a question.</t>
          </li>
        </ol>
      </section>
      <section anchor="enterprise-wifi-access">
        <name>Enterprise WiFi Access</name>
        <t>In enterprise access cases, security administrators wish to check the security status of an accessing end device before it connects to the internal network.
Endpoint Detection and Response (EDR) softwares can check the security/trustworthiness statuses of the device and produce an Attestation Result (AR) if the check passes. ACME-RATS procedures can then be used to redeem a certificate using the AR.</t>
        <t>With that being said, a more specific use case is as follows: an enterprise employee visits multiple campuses, and connects to each one's WiFi. For example, an inspector visits many (tens of) power substations a day, connects to the local WiFi, download log data, proceed to the next and repeat the process.</t>
        <t>Current access solution include: 1. The inspector remembers the password for each WiFi, and conduct the 802.1X EAP password-based (PAP/CHAP/MS-CHAPv2) authentication. or 2. an enterprise MDM receives the passwords and usernames over application layer connection from the MDM server, and enter them on user's behalf. While Solution 1 obviously suffer from management burdens induced by massive number of password pairs, and password rotation requirements, the drawback of Solution 2 is more obsecure, which include:</t>
        <t>a. Bring Your Own Device (BYOD) situation and MDM is not available.
b. Password could risk leakage due to APP compromise, or during Internet transmission. Anyone with leaked password can access, without binding of trusted/usual devices.
c. The RADIUS Client/Access Point/Switch is not aware of the identity of the accessing device, therefore cannot enforce more fine-grained access policies.</t>
        <t>An ideal user story is:
1. When the inspector is at base (or whenever the Remote Attestation-based check is available), he get his device inspected and redeem a certificate using ACME-RATS.
2. When at substation, the inspector authenticate to the WiFi using EAP-TLS, where all the substations have the company root CA installed.
2*. Alternatively, the Step 2 can use EAP-repeater mode, where the RADIUS Client redirects the request back to the RADIUS Server for more advanced checks.</t>
      </section>
      <section anchor="byod-devices">
        <name>BYOD devices</name>
        <t>Another example is issuing S/MIME certificates to BYOD devices only if they can prove via attestation that they are registered to a corporate MDM and the user they are registered to matches the user for which a certificate has been requested.</t>
        <t>In this case, the Server might challenge the client to prove that it is properly-registered to the enterprise to the same user as the subject of the requested S/MIME certificate, and that the device is running the corporate-approved security agents.</t>
      </section>
      <section anchor="private-key-in-hardware">
        <name>Private key in hardware</name>
        <t>In some scenarios the CA might require that the private key corresponding to the certificate request is stored in cryptographic hardware and non-extractable. For example, the certificate profile for some types of administrative credentials may be required to be stored in a token or smartcard. Or the CA might be required to enforce that the private key is stored in a FIPS-certified HSM running in a configuration compliant with its FIPS certificate -- this is the case, for example, with CA/Browser Forum Code Signing certificates <xref target="CABF-CSBRs"/> which can be attested for example via <xref target="RATSKA"/>.</t>
        <t>It could also be possible that the requested certificate profile does not require the requested key to be hardware-backed, but that the CA will issue the certificate with extra assurance, for example an extra policy OID or a longer expiry period, if attestation of hardware can be provided.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The attestation-result-01 challenge (the Passport Model) is the mandatory to implement.
The encrypted-evidence-01 challenge (the background-check model) is optional.</t>
      <t>In all cases the Server has to be able to verify Attestation Results from the Verifier.
To do that it requires appropriate trust anchors.</t>
      <t>In the Passport model, Evidence -- which may contain personally identifiable information (PII)) -- is never seen by the ACME Server.
Additionally, there is no need for the Verifier to accept connections from ACME Server(s).
The Attester/Verifier relationship used in the Passport Model leverages a pre-existing relationship.
For instance if the Verifier is operated by the manufacturer of the Attester (or their designate), then this is the same relationship that would be used to obtain updated software/firmware.
In this case, the trust anchors may also be publically available, but the Server does not need any further relationship with the Verifier.</t>
      <t>In the background-check model, Evidence is sent from the Attester to the ACME Server.
The ACME Server then relays this Evidence to a Verifier.
The Evidence is encrypted so that the Server it never able to see any PII which might be included.
The choice of Verifier is more complex in the background-check model.
Not only does ACME Server have to have the correct trust anchors to verify the resulting Attestation Results, but the ACME Server will need some kind of business relationship with the Verifier in order for the Verifier to be willing to appraise Evidence.</t>
      <t>The <tt>trustworthy</tt> identifier and challenge/response is not an actual identifier.
It does not result in any specific contents to the certificate Subject or SubjectAltName.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="iana-claimshints">
        <name>ACME Attest Claims Hint Registry</name>
        <t>IANA is requested to open a new registry, XXXXXXXX</t>
        <t>Type: designated expert</t>
        <t>The registry has the following columns:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Hint: the string value to be placed within an ACME device-attest-02 or device-attest-03 challenge.</t>
          </li>
          <li>
            <t>Descryption: a descryption of the general type of attestation evidence or attestation result that the client is expected to produce.</t>
          </li>
        </ul>
        <t>The initial registry contents is shown in the table below.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim Hint</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">FIPS_mode</td>
              <td align="left">Attestation that the device is currently booted in FIPS mode.</td>
            </tr>
            <tr>
              <td align="left">OS_patch_level</td>
              <td align="left">Attestation to the version or patch level of the device's operating system.</td>
            </tr>
            <tr>
              <td align="left">sw_manifest</td>
              <td align="left">A manifest list of all software currently running on the device.</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Independent</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="12" month="August" year="2025"/>
            <abstract>
              <t>   The Remote Attestation Procedures architecture (RFC 9334) defines
   several types of conceptual messages, such as Evidence, Attestation
   Results, Endorsements, and Reference Values.  These messages can
   appear in different formats and be transported via various protocols.

   This document introduces the Conceptual Message Wrapper (CMW) that
   provides a common structure to encapsulate these messages.  It
   defines a dedicated CBOR tag, corresponding JSON Web Token (JWT) and
   CBOR Web Token (CWT) claims, and an X.509 extension.

   This allows CMWs to be used in CBOR-based protocols, web APIs using
   JWTs and CWTs, and PKIX artifacts like X.509 certificates.
   Additionally, the draft defines a media type and a CoAP content
   format to transport CMWs over protocols like HTTP, MIME, and CoAP.

   The goal is to improve the interoperability and flexibility of remote
   attestation protocols.  By introducing a shared message format like
   the CMW, we can consistently support different attestation message
   types, evolve message serialization formats without breaking
   compatibility, and avoid having to redefine how messages are handled
   in each protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-17"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="15" month="August" year="2025"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-09"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CSRATT">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of Evidence and Attestation Results in Certificate
   Signing Requests (CSRs), such as PKCS#10 or Certificate Request
   Message Format (CRMF) payloads.  This provides an elegant and
   automatable mechanism for transporting Evidence to a Certification
   Authority.

   Including Evidence and Attestation Results along with a CSR can help
   to improve the assessment of the security posture for the private
   key, and can help the Certification Authority to assess whether it
   satisfies the requested certificate profile.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-20"/>
        </reference>
        <reference anchor="RATSPA">
          <front>
            <title>Remote Posture Assessment for Systems, Containers, and Applications at Scale</title>
            <author fullname="Kathleen Moriarty" initials="K." surname="Moriarty">
              <organization>Transforming Information Security LLC</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
              <organization>Beyond Identity</organization>
            </author>
            <author fullname="A.J. Stein" initials="A. J." surname="Stein">
         </author>
            <author fullname="Chandra Nelogal" initials="C." surname="Nelogal">
              <organization>Dell Technologies</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document establishes an architectural pattern whereby a remote
   attestation could be issued for a complete set of benchmarks or
   controls that are defined and grouped by an external entity,
   eliminating the need to send over individual attestations for each
   item within a benchmark or control framework.  This document
   establishes a pattern to list sets of benchmarks and controls within
   CWT and JWT formats for use as an Entity Attestation Token (EAT).
   While the discussion below pertains mostly to TPM, other Roots of
   Trust such as TCG DICE, and non-TCG defined components will also be
   included.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-posture-assessment-03"/>
        </reference>
        <reference anchor="RATSKA">
          <front>
            <title>PKIX Evidence for Remote Attestation of Hardware Security Modules</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Jean-Pierre Fiset" initials="J." surname="Fiset">
              <organization>Crypto4A Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document specifies a vendor-agnostic format for evidence
   produced and verified within a PKIX context.  The evidence produced
   this way includes claims collected about a cryptographic module and
   elements found within it such as cryptographic keys.

   One scenario envisaged is that the state information about the
   cryptographic module can be securely presented to a remote operator
   or auditor in a vendor-agnostic verifiable format.  A more complex
   scenario would be to submit this evidence to a Certification
   Authority to aid in determining whether the storage properties of
   this key meet the requirements of a given certificate profile.

   This specification also offers a format for requesting a
   cryptographic module to produce evidence tailored for expected use.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-pkix-key-attestation-01"/>
        </reference>
        <reference anchor="I-D.draft-bweeks-acme-device-attest-01">
          <front>
            <title>Automated Certificate Management Environment (ACME) Device Attestation Extension</title>
            <author fullname="Brandon Weeks" initials="B." surname="Weeks">
              <organization>Google</organization>
            </author>
            <date day="7" month="August" year="2022"/>
            <abstract>
              <t>   This document specifies new identifiers and a challenge for the
   Automated Certificate Management Environment (ACME) protocol which
   allows validating the identity of a device using attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bweeks-acme-device-attest-01"/>
        </reference>
        <reference anchor="letsencrypt" target="https://www.eff.org/deeplinks/2023/08/celebrating-ten-years-encrypting-web-lets-encrypt">
          <front>
            <title>Celebrating Ten Years of Encrypting the Web with Let’s Encrypt</title>
            <author>
              <organization>Electronic Frontier Foundation</organization>
            </author>
            <date year="2025" month="August" day="20"/>
          </front>
        </reference>
        <reference anchor="CABF-CSBRs" target="https://cabforum.org/working-groups/code-signing/documents/">
          <front>
            <title>Baseline Requirements for Code-Signing Certificates</title>
            <author>
              <organization>CA/BROWSER FORUM</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC9684">
          <front>
            <title>A YANG Data Model for Challenge-Response-Based Remote Attestation (CHARRA) Procedures Using Trusted Platform Modules (TPMs)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="M. Eckel" initials="M." surname="Eckel"/>
            <author fullname="S. Bhandari" initials="S." surname="Bhandari"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="B. Sulzen" initials="B." surname="Sulzen"/>
            <author fullname="L. Xia" initials="L." surname="Xia"/>
            <author fullname="T. Laffey" initials="T." surname="Laffey"/>
            <author fullname="G. C. Fedorkow" initials="G. C." surname="Fedorkow"/>
            <date month="December" year="2024"/>
            <abstract>
              <t>This document defines the YANG Remote Procedure Calls (RPCs) and configuration nodes that are required to retrieve attestation evidence about integrity measurements from a device, following the operational context defined in RFC 9683 "TPM-based Network Device Remote Integrity Verification". Complementary measurement logs originating from one or more Roots of Trust for Measurement (RTMs) are also provided by the YANG RPCs. The defined module requires the inclusion of the following in the device components of the composite device on which the YANG server is running: at least one Trusted Platform Module (TPM) of either version 1.2 or 2.0 as well as a corresponding TPM Software Stack (TSS), or an equivalent hardware implementation that includes the protected capabilities as provided by TPMs as well as a corresponding software stack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9684"/>
          <seriesInfo name="DOI" value="10.17487/RFC9684"/>
        </reference>
      </references>
    </references>
    <?line 458?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
