<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rats-sardar-sec-cons-00" category="info" consensus="true" submissionType="IETF" updates="9334" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RATS Security Considerations">Guidelines for Security Considerations of RATS</title>
    <seriesInfo name="Internet-Draft" value="draft-rats-sardar-sec-cons-00"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <workgroup>RATS Working Group</workgroup>
    <keyword>security considerations</keyword>
    <keyword>remote attestation</keyword>
    <abstract>
      <?line 63?>

<t>This document aims to provide guidelines and best practices for writing
   security considerations for technical specifications for RATS
   targeting the needs of implementers, researchers, and protocol
   designers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/rats-sec-cons/draft-rats-sardar-sec-cons.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rats-sardar-sec-cons/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/rats-sec-cons"/>.</t>
    </note>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While <xref target="I-D.irtf-cfrg-cryptography-specification"/> provides excellent guidelines, remote attestation <xref target="RFC9334"/>
has several distinguishing features which necessitate a separate document.
One specific example of such feature is architectural complexity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="general-hierarchy-of-authentication">
      <name>General Hierarchy of Authentication</name>
      <t><xref target="Gen-Approach"/> proposes general hierarchy of one-way authentication, which can help precisely
state the intended level of authentication (in decreasing order):</t>
      <ul spacing="normal">
        <li>
          <t>One-way injective agreement</t>
        </li>
        <li>
          <t>One-way non-injective agreement</t>
        </li>
        <li>
          <t>Aliveness</t>
        </li>
      </ul>
      <t>Recentness can be added to each of these levels of authentication.</t>
    </section>
    <section anchor="attacks">
      <name>Attacks</name>
      <t>Security considerations in RATS specifications need to clarify how the following attacks are avoided or mitigated:</t>
      <ul spacing="normal">
        <li>
          <t>Diversion attacks <xref target="Meeting-122-TLS-Slides"/></t>
        </li>
        <li>
          <t>Relay attacks</t>
        </li>
        <li>
          <t>Replay attacks</t>
        </li>
      </ul>
    </section>
    <section anchor="examples-of-specifications-that-could-be-improved">
      <name>Examples of Specifications That Could Be Improved</name>
      <section anchor="rfc9334">
        <name>RFC9334</name>
        <section anchor="unprotected-evidence">
          <name>Unprotected Evidence</name>
          <t><xref section="7.4" sectionFormat="of" target="RFC9334"/> has:</t>
          <blockquote>
            <t>A conveyance protocol that provides authentication and integrity protection can be used to convey Evidence that is otherwise unprotected (e.g., not signed).</t>
          </blockquote>
          <t>Using a conveyance protocol that provides authentication and integrity protection, such as TLS 1.3 <xref target="RFC8446"/>,
to convey Evidence that is otherwise unprotected (e.g., not signed) undermines all security of remote attestation.
Essentially, this breaks the chain up to the trust anchor (such as hardware manufacturer) for remote attestation.
Hence, remote attestation effectively provides no protection in this case and the security guarantees are limited
to those of the conveyance protocol only. In order to benefit from remote attestation, Evidence <bcp14>MUST</bcp14> be protected
using dedicated keys chaining back to the trust anchor for remote attestation.</t>
        </section>
        <section anchor="missing-roles-and-conceptual-messages">
          <name>Missing Roles and Conceptual Messages</name>
          <ul spacing="normal">
            <li>
              <t>Identity Supplier and its corresponding conceptual message Identity are missing and need to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
            <li>
              <t>Attestation Challenge as conceptual message needs to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="examples-of-specifications-that-are-detrimental-for-security">
      <name>Examples of Specifications That Are Detrimental for Security</name>
      <t>We believe that the following drafts are detrimental for the RATS ecosystem:</t>
      <ul spacing="normal">
        <li>
          <t>Multi-Verifiers <xref target="I-D.deshpande-rats-multi-verifier"/>: the design of multi-verifiers not only increase security risks
in terms of increasing the Trusted Computing Base (TCB), but also increases the privacy risks, as potentially sensitive
information is sent to multiple verifiers.</t>
        </li>
        <li>
          <t>Aggregator-based design <xref target="I-D.ietf-rats-coserv"/>: Aggregator is an explicit trust anchor and the addition of new
trust anchor needs to have a strong justification.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>All of this document is about security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="Meeting-122-TLS-Slides" target="https://datatracker.ietf.org/meeting/122/materials/slides-122-tls-identity-crisis-00">
          <front>
            <title>Identity Crisis in Attested TLS for Confidential Computing</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="Tech-Concepts" target="https://www.researchgate.net/publication/396199290_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Technical_Concepts">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: Technical Concepts</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="Gen-Approach" target="https://www.researchgate.net/publication/396593308_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_General_Approach">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: General Approach</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.deshpande-rats-multi-verifier">
          <front>
            <title>Remote Attestation with Multiple Verifiers</title>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Ltd</organization>
            </author>
            <author fullname="zhang jun" initials="Z." surname="jun">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Houda Labiod" initials="H." surname="Labiod">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   IETF RATS Architecture, defines the key role of a Verifier.  In a
   complex system, this role needs to be performed by multiple Verfiers
   coordinating together to assess the full trustworthiness of an
   Attester.  This document focuses on various topological patterns for
   a multiple Verifier system.  It only covers the architectural aspects
   introduced by the Multi Verifier concept, which is neutral with
   regard to specific wire formats, encoding, transport mechanisms, or
   processing details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-deshpande-rats-multi-verifier-03"/>
        </reference>
        <reference anchor="I-D.ietf-rats-coserv">
          <front>
            <title>Concise Selector for Endorsements and Reference Values</title>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Shefali Kamal" initials="S." surname="Kamal">
              <organization>Fujitsu</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>AMD</organization>
            </author>
            <author fullname="Ding Ma" initials="D." surname="Ma">
              <organization>Alibaba Cloud</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   In the Remote Attestation Procedures (RATS) architecture, Verifiers
   require Endorsements and Reference Values to assess the
   trustworthiness of Attesters.  This document specifies the Concise
   Selector for Endorsements and Reference Values (CoSERV), a structured
   query/result format designed to facilitate the discovery and
   retrieval of these artifacts from various providers.  CoSERV defines
   a query language and corresponding result structure using CDDL, which
   can be serialized in CBOR format, enabling efficient interoperability
   across diverse systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-coserv-02"/>
        </reference>
      </references>
    </references>
    <?line 164?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author wishes to thank Ira McDonald for insightful discussion.
The author also gratefully acknowledges the authors of <xref target="I-D.irtf-cfrg-cryptography-specification"/>, which
serves as the inspiration of this work.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
