<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ounsworth-lamps-x509-ar-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="X.509 Cert Extensions for ARs">X.509 Certificate Extensions for Attestation Results</title>
    <seriesInfo name="Internet-Draft" value="draft-ounsworth-lamps-x509-ar-00"/>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization>Beyond Identity</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@beyondidentity.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization>Intel Corporation</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ned.smith@intel.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="26"/>
    <area>Security</area>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 77?>

<t>This document defines extensions for X.509 certificates to include attestation results as part of the certificate's content. The primary use case for these extensions is in the context of Certificate Signing Request (CSR) attestation, where claims about the trustworthiness of an Attester are conveyed to the Certification Authority (CA) as part of the CSR process. These extensions enable the CA to appraise the submitted evidence and embed attestation results into the issued certificate. This allows Relying Parties to evaluate the Attester's trustworthiness consistently and efficiently, supporting scalable policies for verification in environments with diverse attestation technologies.</t>
    </abstract>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attestation mechanisms are increasingly used to verify the trustworthiness of devices and cryptographic keys. These mechanisms provide evidence that a device or key meets specific security criteria before being relied upon by an application. However, relying parties need a standardized way to access and validate these attestation results.</t>
      <t>This document introduces the Evidence Claims Certificate Extension, which enables Certification Authorities (CAs) to embed attestation results into issued X.509 certificates. By incorporating attestation results directly into certificates, Relying Parties can assess trustworthiness without requiring additional protocol interactions with external verifiers.</t>
      <t>This extension is particularly useful in environments where:</t>
      <ul spacing="compact">
        <li>
          <t>Devices generate key pairs and request certificates while providing evidence of their security characteristics, such as key storage protection and tamper resistance.</t>
        </li>
        <li>
          <t>Certification Authorities evaluate and verify attestation claims before issuing a certificate.</t>
        </li>
        <li>
          <t>Relying Parties need a standardized way to verify the security characteristics of a key or the platform managing it, as stated in the certificate, without requiring real-time attestation checks, since these characteristics are relatively static.</t>
        </li>
      </ul>
      <t>While PKIX Key Attestation <xref target="I-D.ietf-rats-pkix-key-attestation"/> defines a mechanism for carrying attestation evidence within a CSR, this document extends that concept to X.509 certificates by defining a Certificate Evidence Claims extension. This extension allows attestation evidence to be embedded directly into an issued certificate, enabling Relying Parties to verify the security characteristics of a key or its platform without requiring access to the original CSR or real-time attestation. Additionally, this document defines the ASN.1 syntax for the Evidence Claims Certificate Extension and specifies how it should be included in X.509 certificates.</t>
      <figure anchor="fig-arch">
        <name>Example Data Flow demonstrating Attested CSR with Background Check Model.</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="416" width="552" viewBox="0 0 552 416" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,176 L 8,256" fill="none" stroke="black"/>
              <path d="M 40,264 L 40,384" fill="none" stroke="black"/>
              <path d="M 88,264 L 88,304" fill="none" stroke="black"/>
              <path d="M 112,176 L 112,256" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,96" fill="none" stroke="black"/>
              <path d="M 216,176 L 216,256" fill="none" stroke="black"/>
              <path d="M 216,336 L 216,400" fill="none" stroke="black"/>
              <path d="M 256,104 L 256,192" fill="none" stroke="black"/>
              <path d="M 320,96 L 320,192" fill="none" stroke="black"/>
              <path d="M 360,32 L 360,96" fill="none" stroke="black"/>
              <path d="M 360,176 L 360,256" fill="none" stroke="black"/>
              <path d="M 360,336 L 360,400" fill="none" stroke="black"/>
              <path d="M 496,176 L 496,256" fill="none" stroke="black"/>
              <path d="M 520,264 L 520,304" fill="none" stroke="black"/>
              <path d="M 544,176 L 544,256" fill="none" stroke="black"/>
              <path d="M 216,32 L 360,32" fill="none" stroke="black"/>
              <path d="M 216,96 L 360,96" fill="none" stroke="black"/>
              <path d="M 8,176 L 112,176" fill="none" stroke="black"/>
              <path d="M 216,176 L 248,176" fill="none" stroke="black"/>
              <path d="M 264,176 L 312,176" fill="none" stroke="black"/>
              <path d="M 328,176 L 360,176" fill="none" stroke="black"/>
              <path d="M 496,176 L 544,176" fill="none" stroke="black"/>
              <path d="M 112,192 L 208,192" fill="none" stroke="black"/>
              <path d="M 224,192 L 256,192" fill="none" stroke="black"/>
              <path d="M 320,192 L 352,192" fill="none" stroke="black"/>
              <path d="M 368,192 L 488,192" fill="none" stroke="black"/>
              <path d="M 8,256 L 112,256" fill="none" stroke="black"/>
              <path d="M 216,256 L 360,256" fill="none" stroke="black"/>
              <path d="M 496,256 L 544,256" fill="none" stroke="black"/>
              <path d="M 88,304 L 520,304" fill="none" stroke="black"/>
              <path d="M 216,336 L 360,336" fill="none" stroke="black"/>
              <path d="M 40,384 L 208,384" fill="none" stroke="black"/>
              <path d="M 216,400 L 360,400" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="496,192 484,186.4 484,197.6" fill="black" transform="rotate(0,488,192)"/>
              <polygon class="arrowhead" points="360,192 348,186.4 348,197.6" fill="black" transform="rotate(0,352,192)"/>
              <polygon class="arrowhead" points="328,168 316,162.4 316,173.6" fill="black" transform="rotate(90,320,168)"/>
              <polygon class="arrowhead" points="264,104 252,98.4 252,109.6" fill="black" transform="rotate(270,256,104)"/>
              <polygon class="arrowhead" points="216,384 204,378.4 204,389.6" fill="black" transform="rotate(0,208,384)"/>
              <polygon class="arrowhead" points="216,192 204,186.4 204,197.6" fill="black" transform="rotate(0,208,192)"/>
              <polygon class="arrowhead" points="96,264 84,258.4 84,269.6" fill="black" transform="rotate(270,88,264)"/>
              <polygon class="arrowhead" points="48,264 36,258.4 36,269.6" fill="black" transform="rotate(270,40,264)"/>
              <g class="text">
                <text x="400" y="52">Compare</text>
                <text x="468" y="52">Evidence</text>
                <text x="292" y="68">Verifier</text>
                <text x="400" y="68">against</text>
                <text x="472" y="68">Appraisal</text>
                <text x="396" y="84">Policy</text>
                <text x="212" y="132">Evidence</text>
                <text x="376" y="132">Attestation</text>
                <text x="208" y="148">(2)</text>
                <text x="356" y="148">Result</text>
                <text x="400" y="148">(3)</text>
                <text x="32" y="212">HSM</text>
                <text x="156" y="212">Evidence</text>
                <text x="276" y="212">Registration</text>
                <text x="384" y="212">CSR</text>
                <text x="420" y="212">with</text>
                <text x="516" y="212">CA</text>
                <text x="60" y="228">(Attester)</text>
                <text x="132" y="228">in</text>
                <text x="160" y="228">CSR</text>
                <text x="192" y="228">(1)</text>
                <text x="264" y="228">Authority</text>
                <text x="416" y="228">Attestation</text>
                <text x="260" y="244">(Relying</text>
                <text x="324" y="244">Party)</text>
                <text x="396" y="244">Result</text>
                <text x="440" y="244">(4)</text>
                <text x="144" y="292">X.509</text>
                <text x="216" y="292">Certificate</text>
                <text x="284" y="292">with</text>
                <text x="352" y="292">Attestation</text>
                <text x="428" y="292">Result</text>
                <text x="472" y="292">(5)</text>
                <text x="112" y="356">TLS</text>
                <text x="72" y="372">(with</text>
                <text x="124" y="372">mutual</text>
                <text x="180" y="372">auth.)</text>
                <text x="256" y="372">Relying</text>
                <text x="312" y="372">Party</text>
                <text x="120" y="404">(6)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
                          .-----------------.
                          |                 | Compare Evidence
                          |     Verifier    | against Appraisal
                          |                 | Policy
                          '------------+----'
                               ^       |
                      Evidence |       | Attestation
                        (2)    |       | Result (3)
                               |       v
.------------.            .----|-------|----.                .-----.
|            +----------->|----'       '--->|--------------->|     |
| HSM        | Evidence   | Registration    | CSR with       | CA  |
| (Attester) | in CSR (1) | Authority       | Attestation    |     |
|            |            | (Relying Party) | Result (4)     |     |
'------------'            '-----------------'                '-----'
    ^     ^                                                     |
    |     |    X.509 Certificate with Attestation Result (5)    |
    |     +-----------------------------------------------------+
    |
    |                     .-----------------.
    |       TLS           |                 |
    | (with mutual auth.) | Relying Party   |
    +-------------------->|                 |
             (6)          '-----------------'
]]></artwork>
        </artset>
      </figure>
      <t>Steps 1 to 4, covering the generation of evidence in a CSR, its verification by a Registration Authority, and the issuance of a CSR with an attestation result, are already specified in <xref target="I-D.ietf-rats-pkix-key-attestation"/>.</t>
      <ul spacing="compact">
        <li>
          <t>Step 5: The CA issues an X.509 certificate embedding the attestation result within the Evidence Claims Certificate Extension.</t>
        </li>
        <li>
          <t>Step 6: The Relying Party uses TLS with mutual authentication to verify the certificate and its Evidence Claims, authenticating the Attester.</t>
        </li>
      </ul>
      <t>This ensures that the security characteristics of the key or platform are verifiable without requiring real-time attestation checks.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="cert-extension">
      <name>Certificate Extensions</name>
      <t>This section specifies the syntax and semantics of the Attestation Result Claims certificate extension, which provides a list of claims associated with the certificate subject appraised by the CA.</t>
      <t>The Attestation Result Claims certificate extension <bcp14>MAY</bcp14> be included in public key certificates <xref target="RFC5280"/>. The Attestation Result Claims certificate extension <bcp14>MUST</bcp14> be identified by the following object identifier:</t>
      <sourcecode type="asn.1"><![CDATA[
id-pe-ar-claims OBJECT IDENTIFIER ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-pe(1) 34
}
]]></sourcecode>
      <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
      <t>The Attestation Result Claims extension <bcp14>MUST</bcp14> have the following syntax:</t>
      <sourcecode type="asn.1"><![CDATA[
AR-Claims ::= SEQUENCE SIZE (1..MAX) OF ReportedEntity
]]></sourcecode>
      <t>The AR-Claims field represents a sequence of attestation result claims (ReportedEntity) included by the CA in the certificate. It <bcp14>MUST</bcp14> contain at least one claim. For privacy reasons, the CA <bcp14>MAY</bcp14> choose to include only a subset of the claims from the Attestation Result it received from a Verifier. The CA may include in their certificate profile a list of verified evidence claims (identified by OID) that <bcp14>MAY</bcp14> be copied from the CSR to the certificate, while any other claims <bcp14>MUST NOT</bcp14> be copied. By removing the signature from the evidence, the CA is asserting that it has verified the Evidence to chain to a root that the CA trusts, but it is not required to disclose in the final certificate what that root is.</t>
      <t>See <xref target="sec-priv-cons"/> for a discussion of privacy concerns related to re-publishing Evidence into a certificate.</t>
      <t>The platform entity and key entity are relevant to the Evidence Claims Certificate Extension in the context of attesting to the security properties of a key or the platform that manages it.</t>
      <section anchor="id-pkix-attest-entity-platform-platform-attestation">
        <name>id-pkix-attest-entity-platform (Platform Attestation)</name>
        <ul spacing="compact">
          <li>
            <t>This attests that the platform hosting the key meets security requirements.</t>
          </li>
          <li>
            <t>Useful when the integrity of the system running cryptographic operations is important.</t>
          </li>
          <li>
            <t>Example: A certificate extension proving the FIPS level at which the attestor is currently operating in compliance with.</t>
          </li>
        </ul>
      </section>
      <section anchor="id-pkix-attest-entity-key-key-attestation">
        <name>id-pkix-attest-entity-key (Key Attestation)</name>
        <ul spacing="compact">
          <li>
            <t>This attests to the security properties of a specific cryptographic key, regardless of the platform.</t>
          </li>
          <li>
            <t>Ensures that the key is stored securely and follows cryptographic policies.</t>
          </li>
          <li>
            <t>Example: A certificate extension proving that the private key of the certificate is hardware-protected and cannot be exported to a software cryptographic module.</t>
          </li>
        </ul>
      </section>
      <section anchor="extclaims-asn">
        <name>ASN.1 Module</name>
        <t>This section provides an ASN.1 Module for the Evidence Claims certificate extension, and it follows the conventions established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <sourcecode type="asn.1"><![CDATA[
EvidenceClaimsCertExtn
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-evidenceclaims(TBD) }

DEFINITIONS IMPLICIT TAGS ::= BEGIN

IMPORTS
    EXTENSION
    FROM PKIX-CommonTypes-2009 -- RFC 5912
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-mod(0)
          id-mod-pkixCommon-02(57) };

-- Evidence Claims Certificate Extension OID
id-pe-ar-claims OBJECT IDENTIFIER ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-pe(1) 34
}

-- Evidence Claims Certificate Extension
ext-EvidenceClaims EXTENSION ::= {
    SYNTAX AR-Claims
    IDENTIFIED BY id-pe-ar-claims
}

-- Evidence Claims Syntax
AR-Claims ::= SEQUENCE SIZE (1..MAX) OF ReportedEntity

-- Alignment with PkixAttestation structure
ReportedEntity ::= SEQUENCE {
    entityType         OBJECT IDENTIFIER,
    reportedAttributes SEQUENCE SIZE (1..MAX) OF ReportedAttribute
}

ReportedAttribute ::= SEQUENCE {
    attributeType      OBJECT IDENTIFIER,
    value              AttributeValue
}

AttributeValue ::= CHOICE {
    bytes       [0] IMPLICIT OCTET STRING,
    utf8String  [1] IMPLICIT UTF8String,
    bool        [2] IMPLICIT BOOLEAN,
    time        [3] IMPLICIT GeneralizedTime,
    int         [4] IMPLICIT INTEGER,
    oid         [5] IMPLICIT OBJECT IDENTIFIER
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="sec-priv-cons">
      <name>Security Considerations</name>
      <t>The extension <bcp14>MUST NOT</bcp14> publish in the certificate any privacy-sensitive information that could compromise the end device. What counts as privacy-sensitive will vary by use case. For example:</t>
      <ol spacing="compact" type="1"><li>
          <t><strong>HSM Usage</strong>: For a hardware security module (HSM) backing a public code-signing service, the model and firmware patch level could be considered sensitive as it could give an attacker an advantage in exploiting known vulnerabilities.</t>
        </li>
        <li>
          <t><strong>Mobile Devices</strong>: For a certificate issued to an end-user mobile computing device, any unique identifier could be used for tracking.</t>
        </li>
        <li>
          <t><strong>IoT Devices</strong>: For small IoT devices, knowing hardware and firmware version information could help edge gateways deny access to devices with known vulnerabilities.</t>
        </li>
      </ol>
      <t>The CA <bcp14>MUST</bcp14> have a configurable mechanism to control which information is copied from the provided Evidence into the certificate, for example, via a certificate profile or Certificate Practice Statement (CPS). CA operators should err on the side of caution and exclude unnecessary claims. Avoiding unnecessary claims also mitigates the risk of targeted attacks, where an attacker could exploit knowledge
of hardware versions, models, etc.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>For the <tt>EvidenceClaims</tt> certificate extension in <xref target="extclaims-asn"/>, IANA is requested to assign an object identifier (OID) for the certificate extension. The OID for the certificate extension should be allocated in the "SMI Security for PKIX Certificate Extension" registry (1.3.6.1.5.5.7.1).</t>
      <t>For the ASN.1 Module in <xref target="extclaims-asn"/>, IANA is requested to assign an object identifier (OID) for the module identifier. The OID for the module should be allocated in the "SMI Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="I-D.ietf-rats-pkix-key-attestation">
          <front>
            <title>PKIX Key Attestation</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Jean-Pierre Fiset" initials="J." surname="Fiset">
              <organization>Crypto4A Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
              <organization>Beyond Identity</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document specifies a vendor-agnostic format for attesting to the
   protection properties of a symmetric or asymmetric cryptographic key
   within a hardware cryptographic module to support applications such
   as providing evidence to a Certification Authority that a key is
   being protected in accordance with the requested certificate profile,
   or that HSMs can perform key import and maintain the private key
   protection properties in a robust way even when migrating keys across
   HSM vendors.  This specification includes a format for requesting a
   key attestation containing certain attributes.  This specification is
   called "PKIX Attestation" because it is designed to be easy to
   implement on top of a code base that already supports X.509 and
   PKCS#11 data models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-pkix-key-attestation-00"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC9344">
          <front>
            <title>CCNinfo: Discovering Content and Network Information in Content-Centric Networks</title>
            <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
            <author fullname="A. Ooka" initials="A." surname="Ooka"/>
            <author fullname="X. Shao" initials="X." surname="Shao"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes a mechanism named "CCNinfo" that discovers information about the network topology and in-network cache in Content-Centric Networks (CCNs). CCNinfo investigates 1) the CCN routing path information per name prefix, 2) the Round-Trip Time (RTT) between the content forwarder and the consumer, and 3) the states of in-network cache per name prefix. CCNinfo is useful to understand and debug the behavior of testbed networks and other experimental deployments of CCN systems.</t>
              <t>This document is a product of the IRTF Information-Centric Networking Research Group (ICNRG). This document represents the consensus view of ICNRG and has been reviewed extensively by several members of the ICN community and the RG. The authors and RG chairs approve of the contents. The document is sponsored under the IRTF, is not issued by the IETF, and is not an IETF standard. This is an experimental protocol and the specification may change in the future.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9344"/>
          <seriesInfo name="DOI" value="10.17487/RFC9344"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
      </references>
    </references>
    <?line 269?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank ...</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
