<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-liu-nasr-architecture-02" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="NASR-Architecture">Network Attestation for Secured foRwarding (NASR) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-nasr-architecture-02"/>
    <author fullname="Chunchi Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <author fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr@sandelman.ca</email>
      </address>
    </author>
    <author fullname="Diego Lopez">
      <organization>Telefonica</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>SEC</area>
    <workgroup>NASR</workgroup>
    <keyword>NASR</keyword>
    <keyword>Secured Forwarding</keyword>
    <abstract>
      <?line 49?>

<t>This document provides an architecture overview of NASR entities, interactive procedures and messages.</t>
    </abstract>
  </front>
  <middle>
    <?line 53?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the current network deployments, communicating entities implicitly rely on peer entities and use paths as determined by the control plane. These available path(s) are implicitly trusted. Communicating entities have very little information about the entities in the paths over which their traffic is carried, and have no available means to audit the entities and paths, beyond basic properties like latency, throughput, and congestion. However, increased demand in network security, privacy, and robustness makes tools for enabling visibility of the entities' security characteristics a necessity.</t>
      <t>Path-agnostic traffic signing and encryption has been the primary method to ensure data confidentiality, integrity and authenticity today. However, with the increasing amount of attacks, and vulnerabilities, new emerging threats are imposing requirements that go beyond the data security currently provided. Vulnerable factors include:</t>
      <ul spacing="normal">
        <li>
          <t>Unauthorized data duplication, caused by
          </t>
          <ul spacing="normal">
            <li>
              <t>Routing/forwarding detour to unintended devices or areas</t>
            </li>
            <li>
              <t>Insecure network devices or unauthorized root access</t>
            </li>
            <li>
              <t>Middlebox decryption/inspection</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Capture-now-decrypt-later attacks, caused by
          </t>
          <ul spacing="normal">
            <li>
              <t>Exploitation of vulnerable cryptographic engineering</t>
            </li>
            <li>
              <t>Post-Quantum attacks</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Pattern or behavioral analysis, etc.</t>
        </li>
      </ul>
      <t>With these additional security and privacy requirements, there is a need to provide enhanced or added services beyond the pure encryption-based data security; requiring better visibility of the security characteristics of the underlying network elements. Specifically, to satisfy the visibility of the network elements' security state, proof that data is traversed through network elements (devices, links and services) that satisfy security posture claims to avoid exposure of unqualified elements is needed.</t>
      <t>The RATS (Remote ATtestation procedureS) working group has provided a framework and approaches to assess and establish the trustworthiness of a single device, hence offering an initial building block. However, a comprehensive framework that attests to a network -- meaning network-level elements' trustworthiness proofs and verification methods are lacking.</t>
      <t>The Network Attestation for Secured foRwarding (NASR) working group is chartered to address the challenges associated with proving state and characteristics of a network path are compliant to a set of claims, so as to achieve predictable and verifiable forwarding behavior. The work will build as much as possible on existing standards and implementations, focusing on combining them in a clear and coherent manner to address secured forwarding use cases such as those identified and described in the NASR use cases and requirements document.</t>
      <t>This document introduces the architecture, entities, interactive procedures, and messages sent between the entities, so to achieve the NASR objective.</t>
    </section>
    <section anchor="usecases">
      <name>Use Cases</name>
      <t>Please refer to the use cases identified in <xref target="I-D.liu-nasr-requirements-01"/></t>
    </section>
    <section anchor="term">
      <name>Terminology</name>
      <t>Please refer to the terminologies identified in <xref target="I-D.richardson-nasr-terminology-01"/>. Terminology from RATS Architecture document <xref target="RFC9344"/> also applies.</t>
      <t>NASR will leverage RATS implementations and specifications, including but not limited to <xref target="I-D.ietf-rats-ar4si-06"/><xref target="I-D.ietf-rats-corim-04"/>.</t>
    </section>
    <section anchor="architectural-overview">
      <name>Architectural Overview</name>
      <section anchor="single-client-single-operator-an-oversimplification">
        <name>Single client - single operator (An Oversimplification)</name>
        <artwork><![CDATA[
     +---------------+
     |               |
     | Relying Party |
     |               |
     +-+---------^---+
Path   |         |
Request|         | Report
       |         |
     +-v---------+--+                          +-----------+
     |              |      Path Attestation    |           |
     | Orchestrator |       Result (PAR)       | Verifier  |
     |              <--------------------------+           |
     +-+------------+                          +------^----+
       |                                              |
       | Path                                         |  Path
       | Evidence                                     |  Evidence
       | (PE)                                         |  (PE)
     +-v------------+      +-------------+     +------+----+
     |              |      |             |     |           |
     |   Attester   +------>  Attester...+-----> Attester  |
     |              |      |             |     |           |
     +--------------+      +-------------+     +-----------+
                   Update with          Update with
              individual evidence    individual evidence
                  (AR/RE/PoT)           (AR/RE/PoT)
]]></artwork>
        <t>Figure 1. NASR Architecture-- Oversimplified (a data plane/BGP-LS example)</t>
        <t>Fig. 1 is an oversimplification to ease understanding of the concept. In a single client - single operator scenario, a client (Relying Party) sends a Path Request containing his security or trustworthiness requirements of a connectivity service. The Orchestrator, run by the operator, would choose qualifying devices (Attesters) and send out an empty Path Evidence inquiry (using data plane protocol like BGP-LS). The Attesters update the Path Evidence with its own Raw Evidence or Attestation Results one-by-one. The Verifier verifies the filled Path Evidence, produce a Path Attestation Result (PAR), and sends it back to the Relying Party. The Relying Party now have confidence over the trustworthiness of received network. After the end-to-end service is delivered, during service, Proof-of-Transits are also created by each Attester, being sent in-band accumulatively or out-of-band, to detect unexpected forwarding deviation.</t>
        <t>Alternatively, the Path Evidence can be collected through management protocols like NETCONF/YANG. The orchestrator aggregates individual evidences of each attester device on the candidate path, then send the Path Evidence to the Path Verifier, who then produces a Path Attestation Result back to the Relying Party. When the attester devices are made by different vendors, multiple verifiers may be needed.</t>
        <artwork><![CDATA[
 +---------------+
 |               |
 | Relying Party |<------+
 |               |       | Path Attestation
 +---------------+       |  Result (PAR)
                 +-------+--------+
                 |                |
                 | Path Verifer   |
                 |                |
                 +-------^--------+
                         | Path Evidence (PE)
                 +-------+--------+
                 |                |
                 | Orchestrator   |
                 |                |
                 +-----^-^-^------+
        +--------------+ | +--------------+
        |                |                |
        | Individual     | Individual     | Individual
        | Evidence 1     | Evidence 2     | Evidence 3
        |                |                |
  +-----+-----+    +-----|-----+    +-----+-----+
  |           |    |           |    |           |
--+ Attester 1+----+ Attester 2+----+ Attester 3+---
  |           |    |           |    |           |
  +-----------+    +-----------+    +-----------+
]]></artwork>
        <t>Figure 1.1. NASR Architecture-- Oversimplified (a management plane/YANG example)</t>
      </section>
      <section anchor="multi-client-multi-operator">
        <name>Multi Client - Multi Operator</name>
        <artwork><![CDATA[
+------------------------------------+
|                                    |
| Client X                           |
|             Path    +-----------+  |
| +----------+Evidence| Relying   |  |
| | Attester |<-------+ Party     |  |
| +--+-------+        +---^--+----+  |
+----+--------------------+--+-------+          +-------------+
     | Update       Answer|  | Path             |             |
     | Path         Report|  | Request          |             |
     | Evidence           |  |                  |  Vendors    |
+----+--------------------+--+-----------+      |             |
|    |                    |  |           |      |             |
|    |                    |  | Operator 1|      |             |
|    |                    |  |           |      |             |
| +--v--------+  RE   +---+--v--------+  |  RE  |+-----------+|
| |           +------->               +--+------>| Verifier  ||
| | Attester  |       | Orchestrator  |  |      || Vendor A  ||
| | Vendor A  <-------+               <--+------++           ||
| +--+--------+  AR   +------+--------+  |  AR  |+-----------+|
+----+-----------------------+-----------+      |             |
     | Update                | Intra            |             |
     | Path                  | ISP              |             |
     | Evidence              | API              |             |
+----+-----------------------+-----------+      |             |
|    |                       |           |      |             |
|    |                       | Operator 2|      |             |
|    |                       |           |      |             |
| +--v--------+  RE   +------v--------+  |  RE  |+-----------+|
| |           +------->               +--+------>| Verifier  ||
| | Attester  |       | Orchestrator  |  |      || Vendor B  ||
| | Vendor B  <-------+               <--+------++           ||
| +--+--------+  AR   +---^-----------+  |  AR  |+-----------+|
+----+--------------------+--------------+      |             |
     | Update             |   Path              |             |
     | Path               |   Attestation       |  ...        |
     | Evidence           |   Result (PAR)      |             |
+----+--------------------+----------+          |             |
|    |        Path        |          |          +-------------+
| +--v-------+Evidence+---+-------+  |
| | Attester +--------> Relying   |  |
| +----------+        | Party     |  |
|                     +-----------+  |
|  Client Y                          |
+------------------------------------+
]]></artwork>
        <t>Figure 2. NASR Architecture</t>
        <t>In a more generalized scenario, due to geographic distances, a single operator cannot span across a long distance to deliver an end-to-end service-- multiple operators collaborate to deliver it. The Customer A would send the Path Request to the Operator nearest to him (Operator 1). Operator 1 pass down the Path Request to the collaborating operators, through an intra-ISP API. Operators of different domains choose qualifying devices to altogether orchestrate the path.</t>
        <t>Relying Party (customer) then sends the Path Evidence inquiry to check and attest to this path. Following the same procedure, the client of other side would return the Path Attestation Result back, through the operators. The Operator 1 would send back a comprehensive answer/report to the Client.</t>
        <t>Also, the operators may have heterogeneous network devices from different vendors. Since vendors provide Verifier software/hardware and Reference Values, Verifiers can be deployed either outside the operators (Fig 2) or inside of the operators (Fig 3).</t>
        <artwork><![CDATA[
+---------------------------------+
|                                 |
| Client X                        |
|             Path +-----------+  |
| +----------+Evid.| Relying   |  |
| | Attester |<----+ Party     |  |
| +--+-------+     +---^--+----+  |
+----+-----------------+--+-------+
     | Update    Answer|  | Path
     | Path      Report|  | Request               +-------------+
     | Evidence        |  |                       |  Vendors    |
+----+-----------------+--+-------------------+   |             |
|    |                 |  |                   |   |             |
|    |                 |  |   Operator 1      |   |             |
|    |                 |  |        +--------+ |   |             |
| +--v--------+ RE +---+--v---+ RE |Verifier| |   |+-----------+|
| |           +---->          +----> of     | |   || Verifier  ||
| | Attester  |    | Orches-  |    |Vendor  <-+---++ Owner     ||
| | Vendor A  <----+  trator  <----| A      | |   || Vendor A  ||
| +--+--------+ AR +------+---+ AR +--------+ |   |+-----------+|
+----+--------------------+-------------------+   |             |
     | Update             | Intra         Verifier              |
     | Path               | ISP           Software/Hardware     |
     | Evidence           | API           Reference Value       |
+----+--------------------+-------------------+   |             |
|    |                    |                   |   |             |
|    |                    |   Operator 2      |   |             |
|    |                    |        +--------+ |   |             |
| +--v--------+ RE +------v---+ RE |Verifier| |   |+-----------+|
| |           +---->          +----> of     | |   || Verifier  ||
| | Attester  |    | Orches-  |    |Vendor  <-+---++ Owner     ||
| | Vendor B  <----+  trator  <----| B      | |   || Vendor B  ||
| +--+--------+ AR +---^------+ AR +--------+ |   |+-----------+|
+----+-----------------+----------------------+   |             |
     | Update          |  Path                    | ...         |
     | Path            |  Attestation             +-------------+
     | Evidence        |  Result (PAR)
+----+-----------------+----------+
|    |        Path     |          |
| +--v-------+Evid.+---+-------+  |
| | Attester +-----> Relying   |  |
| +----------+     | Party     |  |
|                  +-----------+  |
|  Client Y                       |
+---------------------------------+
]]></artwork>
        <t>Figure 3. Verifier deployed in operators</t>
      </section>
    </section>
    <section anchor="roles">
      <name>Roles</name>
      <t>The existing roles from RATS Architecture document <xref target="RFC9344"/> applies.</t>
      <ul spacing="normal">
        <li>
          <t>Attester: The definition in <xref target="RFC9344"/> applies. Additionally, it can be performed by either a physical device or a virtual function. The Attester can update Path Evidence with his Attestation Result/Raw Evidence/Proof of Transit.  </t>
          <ul spacing="normal">
            <li>
              <t>Produces: (updated) Path Evidence</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Relying Party: The definition in <xref target="RFC9344"/> applies. Additionally, it creates Path Request to the Orchestrator, and receive Reports from Orchestrator as an auditable result, comparing the actually received network service versus the requested PR attributes.  </t>
          <ul spacing="normal">
            <li>
              <t>Produces: Path Request</t>
            </li>
            <li>
              <t>Consumes: Report</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>In the case where an Attester is deployed in the customer premises, the Relying Party could also start the unfilled Path Evidence inquiry at his side.</t>
      <t>New role(s) are defined below.</t>
      <ul spacing="normal">
        <li>
          <t>Orchestrator: A role performed by an entity (typically a controller or a special device) that performs two functions: path orchestration and path attestation. The input and output of different functions are different.  </t>
          <ul spacing="normal">
            <li>
              <t>Path Orchestration: The Orchestrator receives a Path Request from the Relying Party. After path computation/orchestration, he creates configurations to be distributed to the Attesters/devices.      </t>
              <ul spacing="normal">
                <li>
                  <t>Consumes: Path Request</t>
                </li>
                <li>
                  <t>Produces: Configurations</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Path Attestation: The Orchestrator receives a Path Request from the Relying Party, send unfilled Path Evidence (PE) inquiry to Attesters, collects Path Attestation Result (PAR) from the Verifier, and send PAR back to the Relying Party.      </t>
              <ul spacing="normal">
                <li>
                  <t>Consumes: Path Request, Path Attestation Result</t>
                </li>
                <li>
                  <t>Produces: (unfilled) Path Evidence</t>
                </li>
              </ul>
            </li>
          </ul>
        </li>
        <li>
          <t>Verifier: A role performed by an entity that appraises the validity of filled Path Evidence about a set of Attesters and produces Path Attestation Results to be used by an Orchestrator.  </t>
          <ul spacing="normal">
            <li>
              <t>Consumes: (filled) Path Evidence</t>
            </li>
            <li>
              <t>Produces: Path Attestation Results</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="messages">
      <name>Conceptual Messages</name>
      <t>The existing artifacts from RATS Architecture document <xref target="RFC9344"/> applies. New conceptual message(s) are defined here.</t>
      <ul spacing="normal">
        <li>
          <t>Path Request: A set of claims, describing the properties of a network path that a Relying Party requested.  </t>
          <ul spacing="normal">
            <li>
              <t>Consumed By: Orchestrator</t>
            </li>
            <li>
              <t>Produced By: Relying Party</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Path Attestation Result: The output generated by a Verifier, including information about a set of Attesters, where the Verifier vouches for the validity of the results.  </t>
          <ul spacing="normal">
            <li>
              <t>Consumed By: Relying Party</t>
            </li>
            <li>
              <t>Produced By: Verifier</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Path Evidence: The output generated by the Orchestrator and a set of Attesters, to be appraised by a Verifier. Path Evidence may include each Attester's raw Evidence <xref target="RFC9344"/>, Attestation Results, Proof-of-Transit, or other proof suggesting correctness of functioning of each Attester.  </t>
          <ul spacing="normal">
            <li>
              <t>Consumed By: Verifier</t>
            </li>
            <li>
              <t>Created By: Orchestrator</t>
            </li>
            <li>
              <t>Updated By: Attester(s)</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Report: An auditable result that compares the actually received network service versus the requested PR attributes.  </t>
          <ul spacing="normal">
            <li>
              <t>Created By: Orchestrator</t>
            </li>
            <li>
              <t>Consumed By: Relying Party</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="orchestration">
      <name>Orchestration</name>
      <t>The orchestration process collects client's path requests and output configurations. The Orchestrator/Controller then distribute them to the attester/device using NETCONF/YANG or other control plane protocols. In the first case, a new YANG module needs to be defined.</t>
      <artwork><![CDATA[
               +------------------------+
               |                        |
Path Request   |Orchestrator/Controller |
-------------->|                        |
               +----------+-------------+
                          |
                          |Path and Security Configuration
                          |(YANG/NETCONF)
                          |
                    +-----v------------+
                    | Attester/Device  |
                    +------------------+

]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC9344">
        <front>
          <title>CCNinfo: Discovering Content and Network Information in Content-Centric Networks</title>
          <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
          <author fullname="A. Ooka" initials="A." surname="Ooka"/>
          <author fullname="X. Shao" initials="X." surname="Shao"/>
          <date month="February" year="2023"/>
          <abstract>
            <t>This document describes a mechanism named "CCNinfo" that discovers information about the network topology and in-network cache in Content-Centric Networks (CCNs). CCNinfo investigates 1) the CCN routing path information per name prefix, 2) the Round-Trip Time (RTT) between the content forwarder and the consumer, and 3) the states of in-network cache per name prefix. CCNinfo is useful to understand and debug the behavior of testbed networks and other experimental deployments of CCN systems.</t>
            <t>This document is a product of the IRTF Information-Centric Networking Research Group (ICNRG). This document represents the consensus view of ICNRG and has been reviewed extensively by several members of the ICN community and the RG. The authors and RG chairs approve of the contents. The document is sponsored under the IRTF, is not issued by the IETF, and is not an IETF standard. This is an experimental protocol and the specification may change in the future.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9344"/>
        <seriesInfo name="DOI" value="10.17487/RFC9344"/>
      </reference>
      <reference anchor="I-D.liu-nasr-requirements-01">
        <front>
          <title>NASR Use Case and Requirements</title>
          <author fullname="Peter Chunchi Liu" initials="P. C." surname="Liu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Luigi Iannone" initials="L." surname="Iannone">
            <organization>Huawei</organization>
          </author>
          <author fullname="Diego Lopez" initials="D." surname="Lopez">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Antonio Pastor" initials="A." surname="Pastor">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Meiling Chen" initials="M." surname="Chen">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Li Su" initials="L." surname="Su">
            <organization>China Mobile</organization>
          </author>
          <date day="3" month="March" year="2024"/>
          <abstract>
            <t>   This document describes the use cases and requirements that guide the
   specification of a Network Attestation for Secure Routing framework
   (NASR).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-nasr-requirements-01"/>
      </reference>
      <reference anchor="I-D.richardson-nasr-terminology-01">
        <front>
          <title>Terminology and Use cases for Secured Routing Infrastructure</title>
          <author fullname="Michael Richardson" initials="M." surname="Richardson">
            <organization>Sandelman Software Works</organization>
          </author>
          <author fullname="Peter Chunchi Liu" initials="P. C." surname="Liu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="20" month="May" year="2024"/>
          <abstract>
            <t>   This document collects terminology and use cases for Secured Routing.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-richardson-nasr-terminology-01"/>
      </reference>
      <reference anchor="I-D.ietf-rats-ar4si-06">
        <front>
          <title>Attestation Results for Secure Interactions</title>
          <author fullname="Eric Voit" initials="E." surname="Voit">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
            <organization>MIT</organization>
          </author>
          <author fullname="Thomas Fossati" initials="T." surname="Fossati">
            <organization>Linaro</organization>
          </author>
          <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
            <organization>Intel</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-06"/>
      </reference>
      <reference anchor="I-D.ietf-rats-corim-04">
        <front>
          <title>Concise Reference Integrity Manifest</title>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <author fullname="Thomas Fossati" initials="T." surname="Fossati">
            <organization>arm</organization>
          </author>
          <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
            <organization>arm</organization>
          </author>
          <author fullname="Ned Smith" initials="N." surname="Smith">
            <organization>Intel</organization>
          </author>
          <author fullname="Wei Pan" initials="W." surname="Pan">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies the information elements for representing Endorsements and
   Reference Values in CBOR format.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-04"/>
      </reference>
    </references>
    <?line 359?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We sincerely thank contribution from NASR mailing list.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9VcW3Mbt5J+V5X+A8p+iFTkUL7VVh1t1hVZsU9cFVs6lOLs
efEWOAOSWA8HPJgZMYqp/PbtCzDAXChRTrZql04sEQM0Go3uxtc9DSdJcnhQ
VrLI/kvmplCnorK1OjxIZaUWxt6eCl3MDXSpZytdltoU17dr6PX+7fW7wwO9
tjSgrF48e/a3Zy8OD3JZLE6FKg4PDg8qXeXQ9aOqNsZ+EWdVpWCmCmiIubHi
SqW1VRn8Pt1Im+liIY4+nl1Nj8WZTZe6UmkFzw8P5Gxm1Q3QgWdJ+1Fm0kKu
YI7MynmV5LpOClnaREa9EmQLqFglT8XV2/PDA+RmYU29ZprAKC3pzcU77Phl
c3p4IBL3CH7xfL4z1vFJ9OpqaSx1hf/hM6/znJl5cr6sC2BA/KzrJ/zQ2IUs
9O+0+FPxUy03SvMTtZI6hzHAe8rDfljS40lqVk8GyX9QOkdpnS9VMUj/fKkL
KT6Ymc5Ve5YUhqx4+A8p9lpRp3vm0ulSqlxM8afNSjM84xUokMpXshBXZl6B
mJT4FaRctmdfpfaH0vecpHJ4yh81aJ742azV74NzXatczU2hU9mmnuG4iZ3k
OPKHqunlFod/CmNXQOVGneI31OzwXYjpu/O/vXz1in5/n/w4adTJqn/V2qqV
Kqoyefac1Wb69h++o22Ew/0rZVe6MLlZ3Dbdr99OP/j+WlXzxEogJu2rUifP
/u1UnE1fXb3vd0iN1avk2SvY1Ivp+w+8jCRJhJyVlZVphd+vl7oUYAs1cijW
1tzoTJUCdiM2BGFulL3RaiPMnFgCMwUT1aocg5EDz0ANRIHjU5XBAKSQiZUq
S7lQ5cTPvNJZhnp1ePBUvC8qa7I6xZ3BlveFqJZKgMFYZKVwpp+pdW5uSX5j
AduxqnFjKlRiz4PQq3WuU3AZt8Iq+Au8xFopGzogM3UJ/MlqCd9gxYoFDbY5
u+V5DfKTizW4ITUR10sF/eUN6Iec5TzyqDwWqJ7RdOTAVDYR58OcLSVIBWR3
K3JdgUsTjeIAj3Jm6oomDythITCfKHSxWYKGYKO2MJucz3UqYMtSaa1W2ZiW
RrMUJmJ3pWRRigqa6kx35sARNMFYzNStgW8zWQJV2Ly1stQl11+UyMGPF+nt
GEaDx1ss13XF04GoYFNxCRPxk9koYBPVIAU3WYJAM7Aq6AVL8XtYohvUFZBa
W30jkSb2sGYG0itAScRKflHIr8lLcvCqgGWgJG90qcHNwGBUvXgd3zVkBZoQ
aKCyGrhKYYUwcwpk4Rmp3iWsNpGLwuDjRoqlXhQ4BbICC7W3a9qVJajHTCm3
EWBCEnZvpcBlZyhQVZRoEJmsJApiDuYCDMmcloe2sCCWkCj6eXyYYkNlMnkb
yWujK9pWLzjiZGVqUH1YqKwqmX4pWU43dV6AiZEYyOQKMERwKXaBg2B3FJi7
10xDlGK3Az1kJcAvut3GSYn9ID+2OdBn5wBAoT+5SUGZ5iBbY1E507zO2AEm
4peCzzH9O+450stqtAvSbTBVWZdkXeiYEjEFVQfGTubNSYg2aGqLMgXDAcGB
c0fludGwdeC3cUGy5NHvC+JVRV6h6VbHfFhjKiFT3Hwe+YE8zsz8BkP8Fp/o
olwr53gScS7XdNgXZpO4Tgnqvg270FnM29/AJ2mHR2C3boKsaLhZWLkGuwVl
gS0CT0QHP468BBVM/lHLoqpXnjzyABoKExa4npkCc9bGyhw2X+a3pQYGVJWS
Jv/qtAZ9UwaWDQxAv2YjybTZxFoqgDasUD/YNhRpsttrYHIpC3DbJPMMN6FE
Z4/ijTRmjeIPZpLM2NZjPfp3Nydu7kzhggbMd6fRuuc1qIHNb5GG32w4jmkV
E3EF26bBdmWeo18yooQ9KOfswftzdQlELgPRpEJ/ZKgvGAgtBQQE7gEMFBfn
/F6PjDhy6jcGR1l8YY/qZXbM1DxjzYRgmHSSprnUK3bNN0aD5/kNntARO4e1
/6sGTzIHxx4mA5Zwx8Am+bxWYnp2fSWOpmplKiXOrgM0bo7fq2OBHKMQCa2S
U/O2DSowt4CXaE3kp9bwSAK+Y7bKEj0yeUUgDG64ZEdFZx0MqgD8YQ90UwK9
Dag9C2QswN+luJQ56TzCCF1odI9iVuuczH6Wm/RL5AjRja7WVsHQEjFE4I0E
KQn6M2fNTiCUgBMuUpIkB2p5tNNdbmmneVkwLSkRyYw9O7vPHMwRaDaCfnz4
0ZY6ntOg5aDjbHFgXRZ5IbyxBCVWeJCixE2qQR8zPhVoo4AI6SifuH1bCcLA
s5zYRznmGnwLC6tUdJSwwo1FiVtLTwDXKQJrKtNpRW4riIU9fvDS3h0RJKL1
AZO520+kuILgA3+CGoP9wWAQkvoNGeUlFBniW5oBgRPtD4kSeJoD8KTzCsYA
9zNd8ImmVggfQDNyJa3DHOjAYGmALcDXxtIsm91omEasl4KDgoeOO9hkaOPD
muwLiQLSTa2eqczjLoK2YTCBlPgk9UB50ofO2sFZxdsbo+fxg2h53ILLsCIg
CB5042FIGA+7GG1hw7OZ/bciohMG17/AGs5pDV+fwnpoOXcEhXIEabCqOQuR
XG6z4Eg+IJGvXxMXrdzdMdnrEJ0AYYTQO4mGQEbvIoxxzd3dpEV1bs2KHVwc
rgcxf/3qQq27OyFz1Ok16LwLMUgUpJ3oDSzIkkl19I79tT9KnCoyuCGNB1Be
AIzI9UpXbLjAMAVZd3fwG0VTwDeLJGITvNyFi5Po2VNxxd4xBQ6B98R7S8TZ
EiCVODoraEhJIYXn5vjw4I8//uAIVYyS9mfk2rei/dk27VPFx+cleJ7bqH24
/ygJM3xm+giXWyOg7xTMAHxg1AbzrMG9OjKd7o70TWAb/hM7P6OHF+i+Em+x
P+70DMu9sHiiVSxo32WqyjqvxNHlGThrT/gTOT5Q3V3C+j7Z+YkXNSTSZJ91
f47X3d+qBz7baKDbuj0Hsjij4W8RIOAJvudw3z8icXT59vjeYR0S2H9AX4Lc
2gYwittGD+vLdqBxWF+EUyvUAz/B69A4mUxGri3026Evj5y7Y+IPr7tlJ+3P
L+sMQQPhiKHG7iBdZBo2EWCnUNHmDzQPTXd0Nj2Zvj25NNfHw63Ok73TC/Ti
zyd8WsWuHaBc7AHB3x5JxuKUiTl58/fL5OcrQBQSnfgxOlagNhHPKZgpKEnS
dp8UpeN5RKEEIRCCGHOf50nVuppATBng604HXaaqkFYbgqnc6ajlX4/xsEZ4
w6bn3CRlkySjGUQJTRRgbA+YtgAGATsYXNBpToEKxxUMv2KfNha2Lnz2yjM8
BoRW5wgYDeIdDiduOdrmkO7Iay8msyhugb8wDwWyVKs1zEgLaTyBLpC9W3HE
QC3sDMKXyqQm52wR79Mx89nMIWpWPeSxTZc0VOOSN4WYyk14AjKKHTy7bOhX
qGR2mxiXnQtem3Grw11zOP1Bh1pzUZiH0MzvUp88nwjjRiKAWACBQTjg4Uxr
05mB9jlbmA3n4XxSKOWs6a7QyapUAV7LPIyfiLN55boDA0llEhXCSlT2TOUw
wGLSD0AjoWt+OBaXGNwk8N+1lRBFuWwQ4SNMLlWc5lQAG5utweQf0yDwCvE8
RoIpwKw6p7x2TtoKmoF08SkF3Jg4TSswLYhb4Zc27EYdI6kSNjrLMaXhaI0H
VCAFlZuhwGDLiJQPuAHjA3bzGWlSMpeT/Pj2+vzi47uTf559/DvvgomPeblY
WLWA9ZZDHozkTkKQ3oOzVWD4Qb4BXQXpK8ZUxHLBBtJn3ukFNXpVBOtbGh61
9sHAbpW7R71+XTrg32GU93UlM4X7mWmMs1FKN8CjsYBiYfMqDX7SG4XF1Oot
SjnKITC4HAKWQyCxByi/v6d/87O76KEJw6DYCAfOGT9yFPPa/fRQ03awU9gw
OuiHO+1ByfPy+f7zuDVtozwR6PnfWmcL/v7pdX6mP12eesBl22sKnfuz3TP9
Fo7nxn4fbIjHNTJ+3m140W14+WjmRtH2jIIEtt2GUVj8tkv0/gZ8TzYKCPM5
Q9zQ8KLb8BIbvmmiDpwM3O9q6IK5veFc7M8J1KH7bkE6ipY/oPMS5x6L8dcL
h2zc5F0nMvgBTveKobbYz833nw/1iz8+zOrIi/pFbSOvasGH0i5Qv23YQ+9S
gQb7WBH1GwV/0ESS2PDZxz/UbxTUriuMgfG96KKJY1yowJ+zotwoux0MLDvB
TUOg1ZFTBFvOFjAyfpDAQAy6HYyJoekTn3uOwF4yiOTQ46BnJbs4GA7wHiTg
dVk8/0YC+3AAC72JFjp9K3i3O+1bfrRtycUpZvj4p6873ASBvm7lT7qaHSGC
9oEUlrPdum0UZ4FAaAmm0f5833AwauVgujaDA8+mop0zCDLARz0Z7FakZD9F
cq0tY4q2DksfZGdzBwkMp3OAwNVlt2mYwHBCBzbo8v0DBP60DHarcqf98bYg
Wsb04hsJ7MPBLmNK/s8b05ueMb35i42pQb7JNxrTcN7rEcaEXfsm8ghjClm/
JpnMrZPJpE9g+GQayCk/wphGvfUPEmircrySqGv0a+94b6lyg0tGEQcev0QK
11B5PYBfhjjfDuCXoc8QbvJA7J+DI1qSfOjTQaovBnCqqzgDbGqgx0Jh/UZO
JSQh5ZfVFOYvVFPPkWlMJ9Kbf9nLFaaywNdG5RqL51Jr8CW6yA3mRdwwTqBQ
FofSbb00D77X9hG8p1tSgkTOjKVEWqCgK86AnNdlZVYKT0tO/rUzFh54uUxD
4zYLJa1rX+qVOArg5HgSIRWxliW+5twUO0kG/ijP6vluCse4DACcVYLnFhw9
gT6lZEIeIzMrqYvynvQlvvzMK7NQWNASJX9UUzdHKY52yuIodSI6DimdciCn
43OdMAnQTV11BFkDr1WXPIV4B0s2G/eyWpRyFb3N5VSXyxbD8gyxWmKpDe+P
VaCBkTh35IaC/OIMb+kywWGDok2nlFK3oEISij+xhMX9nrGxuTxdacbtOShp
RNnMJRZKGrQPU5e98it6W9tLQ03wvWeq/Nem0Kg52kpX6HuCpa9U8YuCnioi
AwM/ybxGG/vUJLFcqpCLQbE6RvP+1xXJtc38Edi9eHGM6UtQJnzucv+dLi+P
QzrsYb+yV1C5V0Q5HE7uE0tO9gok94oi9w4h45EDh3EnRhw4be8LAnunQTxJ
97wdDgP9o71iwdHwMTwS+8PHHVxsH08isuFvJUGfCJ3tINGGsQBVo4CQvm+9
qTFi3QfIvu59Bytj1ojEHlDW49jEf3dIFfAoMTgSF5uC0rQ7I0PYOY+C6fsW
n3S4aAeXbTgLkDUKDOPvjTi/GdDuVi3H4SCkbQeHQYbDJAZBbTs89NcqTn7y
3rZNYhDWtgPEjmsOXPwFsrg35THY9kgSIVD8ZhL0+UYzS/4/m9mbnWb2RnS5
aIedg2b2ufM9FueeZrbjoH6MmW2Hokb/KIr87jGz7VDc2FET5uu+06z92uvh
BY92BoJxFDgU7E32ivT2CvP2ivG+JcDbK7rrhHYvJ0H9G3Coi4D0uEhvanIq
hbT4886X9zZVqtT8uNLDqOowacR4StA8U3MqejYF1zr2R4mzpnYf34zryuNb
4BqvB7nX9YxxpVgvb0useW/eVmPjjbYVvgub10XKV3Hiwgsi6GovBuouMJDp
Rx0ncRnGCdUUoLNxNQW0VtynBMsN6OX2qTjiObLj9iwsllYQ9idkQxUM5XA0
2yqI4XpdqqtwqNPtaitdJvl6G16MomJnS4uny2VraX1MJ1MUL90oaxdqNCUZ
+Jqr5jDSMldYeDLFgNHqWV059eiKLF5GeH5uihLUDJ77sspwIw5rmTZ0fwP4
bnaYKkKCxvPdOZcJgOhvpUvF9z467+9TChepNgS231bu1sVQ4UwTEMuKy5ig
mQtt1YaMxt+Io21FrVUQFTujiGV+CvAL+7cVnFIgFRY5HVW3a77VweVPeBMv
p/ge8yxYqdtov7tf4QiB+DemsQGQHhXDh7QAXbNz991cJC+DtehiTYVPVACF
v7aSEQ1VXqJvd5uasKgu4qlOe0VaXnt6BWKklgOVH1wEROyiPtbM7klrRXjN
orEKKjcCX+hKmytDcTI4NtbBzFtKU5J14oL3yZDyDStnUN7z1mwtSUT+5E/L
YczpjB1aSSWmUa6mWdrY1xKV99d5hVlD5U5TCwcd7inNeUho410zD3tPt8BB
9+l5e8h4+JrMem0lmjxfhZK5ztxFqEER8tXT5o5IqNfjG2SudmnHUryWuTtx
yEq814MyOtq50EH/ODApn+TnXL6JJ98Hf13i61N/c6J/tMOmaby/+G3Hu0BH
l4Yp3Txdt4e+2Xm9WBdw4zqXcNyNE3/IRFdu+1d6eF873rs5afpSzsQbOGXj
neiJl7u0KEZs94XOhuycIyfJXS2hjEwnXJ3o327uq9jYnWWx+YkbU9P9M7xd
1VVgPmBJB3YtureigVX7uaIFezXcvcwuxuCM8MCa2CK8FXZENOlYH2ZX3WXa
dlHmd6WwcSlspJPjIZvoV36OqWiTgCPfbSzrBV3WBumkxoIbrnwFqj/fXHF0
i5Fdgo6F6B67+tLdusfhF/fw9MGCPEZEtAMP+oiMDYBRmb9V9deCsod5v1/L
nraPf+982vCD3guUZTia+M3Ad/wqwXNZxjCkfab3S79PzgNEohca4bzny3Pu
6PLVo+7IF1zCHdfQBm1p/fsHoeyW6uS5sNpiXTtg0TE5qo2g8SuwsJyrSxvw
wV7R59b/8NLcGSMPhMtRVLgjWsRwsYUkoGWXjKiqLv68vo/qbl6HQ/s96cQP
iXHc8Ct/MaAFrO4de4RyP3GbOFRF+hAPvIqbPZYSEgQnP7IG3U+zK56w/09b
K8U4IoKQ1xc/XjTPXTWgeH/28Wyob+vSJV5rLgz3lQzWJ+HfOUEU5y7ppV8K
swH8saBrFocHX0+LejXDYvr/eDKHWEg9Iejwq8K3uqmif0UE3E/xhe0CTYsu
/yKGoHfJ+A/HoDHlYHkw5f8A7PIDEQxJAAA=

-->

</rfc>
