<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.2.2) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<?rfc toc_levels="4"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ounsworth-rats-x509-evidence-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="X.509-based Attestation Evidence">X.509-based Attestation Evidence</title>
    <seriesInfo name="Internet-Draft" value="draft-ounsworth-rats-x509-evidence-00"/>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Security</area>
    <workgroup>RATS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 72?>

<t>This document specifies Claims for use within X.509 certificates. These
X.509 certificates are produced by an Attester as part of the remote
attestation procedures and consitute Evidence.</t>
      <t>This document follows the Remote ATtestation procedureS (RATS)
architecture where Evidence is sent by an Attester and processed by
a Verifier.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://entrustcorporation.github.io/draft-x509-evidence/draft-ounsworth-rats-x509-evidence.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ounsworth-rats-x509-evidence/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/EntrustCorporation/draft-x509-evidence"/>.</t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Trusted execution environments, like secure elements and hardware security
modules, are now widely used, which provide a safe environment to place
security sensitive code, such as cryptography, secure boot, secure storage,
and other essential security functions.  These security functions are
typically exposed through a narrow and well-defined interface, and can be
used by operating system libraries and applications.</t>
      <t>When a Certificate Signing Request (CSR) library is requesting a certificate
from a Certification Authority (CA), a PKI end entity may wish to provide
Evidence of the security properties of the trusted execution environment
in which the private key is stored. This Evidence is to be verified by a
Relying Party, such as the Registration Authority or the Certification
Authority as part of validating an incoming CSR against a given certificate
policy. <xref target="I-D.ietf-lamps-csr-attestation"/> defines how to carry Evidence in
either PKCS#10 <xref target="RFC2986"/> or Certificate Request Message Format (CRMF)
<xref target="RFC4211"/>.</t>
      <t><xref target="I-D.ietf-lamps-csr-attestation"/> is agnostic to the content and the encoding
of Evidence. To offer interoperability it is necessary to define a format
that is utilized in a specific deployment environment environment.
Hardware security modules and other trusted execution environments, which
have been using ASN.1-based encodings for a long time prefer the use of
the same format throughout their software ecosystem. For those use cases
this specification has been developed.</t>
      <t>This specification re-uses the claims defined in <xref target="I-D.ietf-rats-eat"/>,
and encodes them as an extension in an X.509 certificate <xref target="RFC5280"/>.
While the encoding of the claims is different to what is defined in
<xref target="I-D.ietf-rats-eat"/>, the semantics of the claims is retained. This
specification is not an EAP profile, as defined in Section 6 of
<xref target="I-D.ietf-rats-eat"/></t>
      <t>This specification was designed to meet the requirements published by the
CA Browser Forum to convey properties about hardware security models, such
as non-exportability, which must be enabled for storing publicly-trusted
code-signing keys. Hence, this specification is supposed to be used with
the attestation extension for Certificate Signing Requests (CSRs), see
<xref target="I-D.ietf-lamps-csr-attestation"/>, but Evidence encoded as X.509 certificates
may also be used in other context.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document re-uses the terms defined in <xref target="RFC9334"/> related to remote
attestation. Readers of this document are assumed to be familiar with
the following terms: Evidence, Claim, Attestation Result, Attester,
Verifier, and Relying Party.</t>
    </section>
    <section anchor="claims">
      <name>Claims</name>
      <section anchor="nonce">
        <name>Nonce</name>
        <t>The "nonce" claim is used to provide freshness.</t>
        <t>The Nonce claim is used to carry the challenge provided by the caller to
demonstrate freshness of the generated token. The following constraints
apply to the nonce-type:</t>
        <ul spacing="normal">
          <li>
            <t>The length <bcp14>MUST</bcp14> be either 32, 48, or 64 bytes.</t>
          </li>
          <li>
            <t>Only a single nonce value is conveyed.</t>
          </li>
        </ul>
        <t>The nonce claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-nonce OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_nonce }

   claim_nonce ::= OCTET STRING
]]></artwork>
        <t>See Section 4.1 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>
      </section>
      <section anchor="ueid-universal-entity-id-claim">
        <name>ueid (Universal Entity ID) Claim</name>
        <t>The "ueid" claim conveys a UEID, which identifies an individual manufactured
entity. This identifier is a globally unique and permanent identifier. See
Section 4.2.1 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim. Three
types of UEIDs are defined, which are distinguished via a type field.</t>
        <t>The ueid claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-ueid OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_ueid }

   claim_ueid ::= SEQUENCE {
       type    INTEGER ( RAND(1), EUI(2), IMEI(3),...),
       value   OCTET STRING
   }
]]></artwork>
      </section>
      <section anchor="sueids-semi-permanent-ueids-claim-sueids">
        <name>sueids (Semi-permanent UEIDs) Claim (SUEIDs)</name>
        <t>The "sueids" claim conveys one or more semi-permanent UEIDs (SUEIDs).
An SUEID has the same format, characteristics and requirements as a
UEID, but <bcp14>MAY</bcp14> change to a different value on entity life-cycle
events while the ueid claim is permanent. An entity <bcp14>MAY</bcp14> have both
a UEID and SUEIDs, neither, one or the other.</t>
        <t>There <bcp14>MAY</bcp14> be multiple SUEIDs and each has a text string label the
purpose of which is to distinguish it from others.</t>
        <t>See Section 4.2.2 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>
        <t>The sueids claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-sueids OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_sueids }

   claim_sueids ::= SEQUENCE {
       label   OCTET STRING,
       type    INTEGER ( RAND(1), EUI(2), IMEI(3),...),
       value   OCTET STRING
   }
]]></artwork>
      </section>
      <section anchor="oemid-hardware-oem-identification-claim">
        <name>oemid (Hardware OEM Identification) Claim</name>
        <t>The "oemid" claim identifies the Original Equipment Manufacturer (OEM) of
the hardware.</t>
        <t>See Section 4.2.3 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>
        <t>The value of this claim depends on the type of OEMID and three types of IDs
are defined:</t>
        <ul spacing="normal">
          <li>
            <t>OEMIDs using a 128-bit random number.
Section 4.2.3.1 of  <xref target="I-D.ietf-rats-eat"/> defines this type.</t>
          </li>
          <li>
            <t>an IEEE based OEMID using a global registry for MAC addresses and company IDs.
Section 4.2.3.1 of  <xref target="I-D.ietf-rats-eat"/> defines this type.</t>
          </li>
          <li>
            <t>OEMIDs using Private Enterprise Numbers maintained by IANA.
Section 4.2.3.3 of  <xref target="I-D.ietf-rats-eat"/> defines this type.</t>
          </li>
        </ul>
        <t>The oemid claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-oemid OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_oemid }

   claim_oemid ::= SEQUENCE {
       type    INTEGER ( PEN(1), IEEE(2), RANDOM(3),...),
       value   OCTET STRING
   }
]]></artwork>
        <t>[Editor's Note: The value for the PEN is numeric. For the other
two types it is a binary string.]</t>
      </section>
      <section anchor="hwmodel-hardware-model-claim">
        <name>hwmodel (Hardware Model) Claim</name>
        <t>The "hwmodel" claim differentiates hardware models, products and variants
manufactured by a particular OEM, the one identified by OEM ID.
It <bcp14>MUST</bcp14> be unique within a given OEM ID.  The concatenation of the OEM ID
and "hwmodel" give a global identifier of a particular product.
The "hwmodel" claim <bcp14>MUST</bcp14> only be present if an "oemid" claim is present.</t>
        <t>See Section 4.2.4 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>
        <t>The hwmodel claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-hwmodel OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_hwmodel }

   claim_hwmodel ::= OCTET STRING
]]></artwork>
      </section>
      <section anchor="hwversion-hardware-version-claim">
        <name>hwversion (Hardware Version) Claim</name>
        <t>The "hwversion" claim is a text string the format of which is set by each
manufacturer. A "hwversion" claim <bcp14>MUST</bcp14> only be present if a "hwmodel" claim
is present.</t>
        <t>See Section 4.2.5 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>
        <t>The hwversion claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-hwversion OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_hwwversion }

   hwversion ::= OCTET STRING
]]></artwork>
      </section>
      <section anchor="swversion-software-version-claim">
        <name>swversion (Software Version) Claim</name>
        <t>The "swversion" claim makes use of the CoSWID version-scheme defined
in Section 4.1 of <xref target="RFC9393"/> to give a simple version for the software.
A "swversion" claim <bcp14>MUST</bcp14> only be present if a "swname" claim is present.</t>
        <t>See Section 4.2.5 of <xref target="I-D.ietf-rats-eat"/> for a description of this claim.</t>
        <t>The swversion claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-swversion OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_swversion }

   swversion ::= PrintableString
]]></artwork>
      </section>
      <section anchor="dbgstat-debug-status-claim">
        <name>dbgstat (Debug Status) Claim</name>
        <t>The "dbgstat" claim applies to entity-wide or submodule-wide debug
facilities and diagnostic hardware built into chips. It applies to
any software debug facilities related to privileged software that
allows system-wide memory inspection, tracing or modification of
non-system software like user mode applications.</t>
        <t>See Section 4.2.9 of <xref target="I-D.ietf-rats-eat"/> for a description of this
claim and the semantic of the values in the enumerated list.</t>
        <t>The dbgstat claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-dbgstat OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_dbgstat }

   dbgstat ::= ENUMERATED {
      dsEnabled                   (0),
      disabled                    (1),
      disabledSinceBoot           (2),
      disabledPermanently         (3),
      disabledFullyAndPermanently (4)
   }
]]></artwork>
      </section>
      <section anchor="software-component-claim">
        <name>software-component Claim</name>
        <t>The Software Components claim is a list of software components that includes
all the software (both code and configuration) loaded by the root of trust.</t>
        <t>Each entry in the Software Components list describes one software component
using the attributes described below:</t>
        <ul spacing="normal">
          <li>
            <t>The Measurement Type attribute is short string representing the role of this
software component. Examples include the bootloader code, the bootloader
configuration, and firmware running in the Trusted Execution Environment.</t>
          </li>
          <li>
            <t>The Measurement Value attribute represents a hash of the invariant software
component in memory at startup time. The value <bcp14>MUST</bcp14> be a cryptographic hash
of 256 bits or stronger. For interoperability, SHA-256 is assumed to be the default.</t>
          </li>
          <li>
            <t>The Signer ID attribute is the hash of a signing authority public key for
the software component. This can be used by a Verifier to ensure the
components were signed by an expected trusted source.</t>
          </li>
          <li>
            <t>The Measurement Description contains the OID identifying the hash algorithm
used to compute the corresponding Measurement Value. For interoperability,
SHA-256 is the default. If the default algorithm is used, then this field
can be omitted. The values for identifying the hash algorithms <bcp14>MUST</bcp14> be taken
from <xref target="IANA-Hash"/>.</t>
          </li>
        </ul>
        <t>The description of the software-component claims is taken from Section 4.4.1
of <xref target="I-D.tschofenig-rats-psa-token"/></t>
        <t>The software-component claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-softwarecomponent OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_softwarecomponent }

   softwarecomponent ::= SEQUENCE {
       measurement-type    PrintableString,
       measurement-value   OCTET STRING,
       signer-id           OCTET STRING,
       measurement-desc    OBJECT IDENTIFIER
   }

   softwarecomponents  ::=  SEQUENCE SIZE (1..MAX)
                            OF softwarecomponent
]]></artwork>
      </section>
      <section anchor="fipsconf-federal-information-processing-standards-conformance-claim">
        <name>fips_conf (Federal Information Processing Standards Conformance) Claim</name>
        <t>The "fips_conf" claim applies to entity-wide or submodule-wide cryptographic modules and attests whether the cryptographic module is running in FIPS mode. A cryptographic module cannot, in general, know whether it has a valid FIPS certification, but it does know whether it is running in FIPS mode.</t>
        <t>The FIPS conformance claim is defined as follows:</t>
        <artwork><![CDATA[
   id-ce-evidence-fips_conf OBJECT IDENTIFIER ::=
         { id-ce TBD_evidence TBD_fips_conf }

   fipsconf ::= SEQUENCE {
       fipsconf    BOOLEAN
   }
]]></artwork>
        <t>TBD: Perhaps there is more data that needs to be here? Such as, the device may need to attest the Security Policy under which it is currently operating since for example a FIPS 140-2 Level 2 security policy might be different from a 140-3 Level 4. This sounds like we would need either a vendor-defined string known to the verifier, or an ENUMERATED list of "FIPS 140-{2,3} Level {1,2,3,4}" which will be an evolving list. Neither sounds clean. Needs more discussion.</t>
        <t>TBD: Tomas to review and add to this text.</t>
      </section>
      <section anchor="ccconf-common-criteria-conformance-claim">
        <name>cc_conf (Common Criteria Conformance) Claim</name>
        <t>TBD: Is there a CC equivalent of the fips_conf claim? There might not be any value to having this claim. Need review by people more expert in CC than me.</t>
      </section>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>This specification re-uses the claims from the EAT specification but
relies on the security protection offered by X.509 certificate and
particularly the digital signature covering the certificate. This
digital signature is computed with the Attestation Key available
on the device, see Section 12.1 of <xref target="RFC9334"/> for considerations
regarding the generation, the use and the protection of these
Attestation Keys. Although the encoding of an X.509 certificate
has been selected for conveying Claims from an Attester to a
Relying Party, this document uses a model that is very different
from Web PKI deployment where CAs verify whether an applicant
for a certificate legitimately represents the domain name(s) in the
certificate. Since the Attester located at the end entity creates
the X.509 certificate with claims defined in this document, it
conceptually acts like a CA. This document inherits the remote
attestation architecture described in <xref target="RFC9334"/>. With the re-use
of the claims from <xref target="I-D.ietf-rats-eat"/> the security and privacy
considerations apply also to this document even though the encoding
in this specification is different from the encoding of claims
discussed by <xref target="I-D.ietf-rats-eat"/>.</t>
      <t>Evidence contains information that may be unique to a device
and may therefore allow to single out an individual device for
tracking purposes.  Deployments that have privacy requirements must
take appropriate measures to ensure that claim values can only
identify a group of devices and that the Attestation Keys are used
across a number of devices as well.</t>
      <t>To verify the Evidence, the primary need is to check the signature and
the correct encoding of the claims. To produce the Attestation Result,
the Verifier will use Endorsements, Reference Values, and Appraisal
Policies. The policies may require that certain claims must be present
and that their values match registered reference values.  All claims
may be worthy of additional appraisal.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD: OIDs for all the claims listed in this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="14" month="October" year="2023"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-22"/>
        </reference>
        <reference anchor="RFC9393">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   The Platform Security Architecture (PSA) is a family of hardware and
   firmware security specifications, as well as open-source reference
   implementations, to help device makers and chip manufacturers build
   best-practice security into products.  Devices that are PSA compliant
   are able to produce attestation tokens as described in this memo,
   which are the basis for a number of different protocols, including
   secure provisioning and network access control.  This document
   specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profiled Entity Attestation Token
   (EAT).

   This specification describes what claims are used in an attestation
   token generated by PSA compliant systems, how these claims get
   serialized to the wire, and how they are cryptographically protected.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-14"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certificate Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="9" month="October" year="2023"/>
            <abstract>
              <t>   A client requesting a certificate from a Certification Authority (CA)
   may wish to offer believable claims about the protections afforded to
   the corresponding private key, such as whether the private key
   resides on a hardware security module or the protection capabilities
   provided by the hardware.

   This document describes how to encode Evidence produced by an
   Attester for inclusion in Certificate Signing Requests (CSRs), and
   any certificates necessary for validating it.

   Including Evidence along with a CSR can help to improve the
   assessment of the security posture for the private key, and the
   trustworthiness properties of the submitted key to the requested
   certificate profile.  These Evidence Claims can include information
   about the hardware component's manufacturer, the version of installed
   or running firmware, the version of software installed or running in
   layers above the firmware, or the presence of hardware components
   providing specific protection capabilities or shielded locations
   (e.g., to protect keys).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-02"/>
        </reference>
        <reference anchor="IANA-Hash" target="https://www.iana.org/assignments/hash-function-text-names">
          <front>
            <title>Hash Function Textual Names</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 444?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This specification is the work of a design team created by the chairs
of the LAMPS working group. This specification has been developed
based on discussions in that design team.</t>
      <t>The following persons, in no specific order, contributed to the work:
Richard Kettlewell, Chris Trufan, Bruno Couillard, Jean-Pierre Fiset,
Sander Temme, Jethro Beekman, Zsolt Rózsahegyi, Ferenc Pető, Mike Agrenius
Kushner, Tomas Gustavsson, Dieter Bong, Christopher Meyer, Michael StJohns,
Carl Wallace, Michael Ricardson, Tomofumi Okubo, Olivier Couillard, John
Gray, Eric Amador, Johnson Darren, Herman Slatman, Tiru Reddy, Thomas
Fossati, Corey Bonnel, Argenius Kushner, James Hagborg.</t>
    </section>
    <section anchor="full-asn1">
      <name>Full ASN.1</name>
      <t>TBD: Full ASN.1 goes in here.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
