<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-rats-composite-attesters-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="composites">Taxonomy of Composite Attesters</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-rats-composite-attesters-01"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>Arm</organization>
      <address>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="11"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 46?>

<t>This document further refines different kinds of RFC 9334 Composite Attesters.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-richardson-rats-composite-attesters/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richardson/rats-composite-attesters"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document clarifies and extends the meaning of Composite Attester from <xref section="3.3" sectionFormat="comma" target="RFC9334"/>.</t>
      <section anchor="caveats-of-current-definition">
        <name>Caveats of Current Definition</name>
        <t><xref section="3.3" sectionFormat="comma" target="RFC9334"/> says:</t>
        <t>```
   A composite device is an entity composed of multiple sub-entities
   such that its trustworthiness has to be determined by the appraisal
   of all these sub-entities.</t>
        <t>Each sub-entity has at least one Attesting Environment collecting the
   Claims from at least one Target Environment.  Then, this sub-entity
   generates Evidence about its trustworthiness; therefore, each sub-
   entity can be called an "Attester".  Among all the Attesters, there
   may be only some that have the ability to communicate with the
   Verifier while others do not.
```</t>
        <t>In this description, it was left vague as to whether or not each Attesting Environment signs the Evidence that it generates, and whether or not the Evidence is evaluated by a Verifier operated by the Lead Attester, or if it's passed by the Lead Attester along with the Evidence from the Lead Target Environment.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <dl>
          <dt>Lead Attester:</dt>
          <dd>
            <t>This term is from RFC9334, and includes the (Lead) Attesting Environment, and the (Lead) Target Environment.</t>
          </dd>
          <dt>Target Environment:</dt>
          <dd>
            <t>This term is from RFC9334, this refers to the environment for which Evidence is gathered.</t>
          </dd>
          <dt>Attesting Environment:</dt>
          <dd>
            <t>This term is from RFC9334, this refers to the thing which gathers the Evidence.</t>
          </dd>
          <dt>Component:</dt>
          <dd>
            <t>This is the pieces which are attached to the Lead Attester.  There are one to many of these, typically each with their own application specific processor.</t>
          </dd>
          <dt>Component Attesting Environment:</dt>
          <dd>
            <t>This term is new, and refers to an Attesting Environment residing inside a component of the whole.</t>
          </dd>
          <dt>Component Target Environment:</dt>
          <dd>
            <t>This term is new, and refers to an environment for which Evidence is collected.</t>
          </dd>
        </dl>
      </section>
      <section anchor="class-0-composite-attester">
        <name>Class 0 Composite Attester</name>
        <t>In this first, somewhat degenerate scenario, the Lead Attester has access to the entire memory/environment of all of the components.
Examples of situations like this include classic PCI-buses, ISA-buses, VME, S100/IEEE 696-1983.
In these situations, secondary components might not boot on their own.
(It might even be that the lead environment (the chassis) will place code into RAM for these systems, with no ROM at all)
In this case, it is possible for the Lead Attesting Environment to collect Evidence about each of the components without the components having to have their own Attesting Environment.</t>
        <t>At this Class, all of these components can be considered part of the same system.
In the classic PCI or ISA environment, the components are hard drive interfaces,
video interfaces, and network interfaces.
For many such systems considering the system to be a composite is unncessary additional complexity.</t>
        <t>The benefit of applying the composite mechanism in this case is that it is no longer necessary to consider the exhaustive combinatorics of all possible components being attached to the lead attester: it is already the case the reference values for a target environment may change depending upon how much memory is installed.</t>
        <t>In this Class 0 Composite Attester, the Evidence gathered about the components would be included in the Lead Attester's signed Evidence (such as an EAT), as sub-components
in UCCS form <xref target="RFC9781"/>.
The signature from the Lead Attester applies to all the Evidence, but the Verifier can evaluate each component separately.</t>
        <t>More modern buses like PCIe, InfiniBand, Thunderbolt, DisplayPort, USB, Firewire and others do not provided direct electrical access to target component system memory.
They are serialized versions of the old I/O buses, using a protocol akin to a network.
They require non-trivial deserialization at eacn end, requiring configuration via firmware that itself might not be trustworthy.
A system with such an interface would be a Class 1.</t>
      </section>
      <section anchor="class-1-composite-attester">
        <name>Class 1 Composite Attester</name>
        <t>In this Class, each component or slot has its own Attesting Environment and hence produces its own signed Evidence.</t>
        <t>RFC 9334 gives the following example:</t>
        <t><tt>
   For example, a carrier-grade router consists of a chassis and
   multiple slots.  The trustworthiness of the router depends on all its
   slots' trustworthiness.  Each slot has an Attesting Environment, such
   as a TEE, collecting the Claims of its boot process, after which it
   generates Evidence from the Claims.
</tt></t>
        <t>The Lead Attester simply relays the Evidence along with its own:</t>
        <t><tt>
   Among these slots, only a "main" slot can communicate with the
   Verifier while other slots cannot.  However, other slots can
   communicate with the main slot by the links between them inside the
   router.  The main slot collects the Evidence of other slots, produces
   the final Evidence of the whole router, and conveys the final
   Evidence to the Verifier.  Therefore, the router is a composite
   device, each slot is an Attester, and the main slot is the lead
   Attester.
</tt></t>
        <t>Note that the Lead Attester does <em>not</em> evaluate the Evidence, and does not run its own
Verifier.</t>
      </section>
      <section anchor="class-2-compositehybrid-attester">
        <name>Class 2 Composite/Hybrid Attester</name>
        <t>In this scenario, the Components relay their Evidence to the Lead Attester.
The Lead Attester operates a Verifier itself.
It evaluates the Components' Evidence against Reference Values, Endorsements, etc. producing <em>Attestation Results</em>
These Attestation Results (or their selectively disclosed version: SD-CWT/SD-JWT)
are then included as part of the Lead Attester's Evidence to it's Verifier.</t>
        <t>The Verifier's signing credentials may be part of the same Attesting Environment as the Evidence signing credential used by the Lead Attesting environment.
Or they could be in a different environment, such as in a different TEE.</t>
      </section>
      <section anchor="class-3b-composite-background-check-attester">
        <name>Class 3B Composite Background-Check Attester</name>
        <t>In this scenario, the Components relay their Evidence to the Lead Attester.
The Lead Attester does <em>not</em> operates a Verifier itself.</t>
        <t>Instead, the Lead Attester, conveys the Evidence to the Lead Verifier along with it's own Evidence.
The Component Evidence is not placed within the Lead Attester's Evidence (DEBATE).
The Lead Attester needs to communicate how each component is attached, and that would be within its Evidence.</t>
        <t>The Lead Verifier, acting a Relying Party, connects to Verifiers capable of evaluating the Component Evidence, retrieving Attestation Results from those Verifiers as part of evaluating the Lead Attester.</t>
        <t>This case is similar to Class 1, however the integration of the component attestation results in Class 1 is not included in the Evidence, while in this case, it is.</t>
      </section>
      <section anchor="class-3p-composite-passport-model-attester">
        <name>Class 3P Composite Passport-Model Attester</name>
        <t>In this scenario, the Components relay their Evidence to the Lead Attester.
The Lead Attester does <em>not</em> operates a Verifier itself.
Instead, the Lead Attester, acting as a Presenter (term To-Be-Defined), connects to an appropriate Verifier, in passport mode.
It retrieves an Attestation Result from the Verifier, which it then includes within the  Evidence that the Lead Attester produces.</t>
        <t>The Lead Attester's Verifier considers that the Component during it's assessment.
It needs to consider if the component has been assessed by a Verifier it trusts, if the component is appropriately connected to the Lead Attester, and if there are an appropriate number of such components.</t>
        <t>For instance, when accessing a vehicle such as a car, where each tire is it's own component, then a car with three wheels is not trusthworthy.  Most cars should have four wheels.  A car with five wheels might be acceptable, if at least one wheel is installed into the "spare" holder. (And, it may be of concern if the spare is flat, but the car can still be operated)</t>
        <t>A more typical digital use case would involve a main CPU with a number of attached specialized intelligent components that contain their own firmware, such as Graphical Processors (GPU), Network Processors (NPU).</t>
      </section>
      <section anchor="level-4-composite-attester">
        <name>Level 4 Composite Attester</name>
        <t>In certain systems, it is possible to have two independent Attesting Environments in an Attester to collect claims about a single Target Environment. In such cases, one of the Attesting Environment, acts as a Primary, while the other acts as a Secondary Attesting Environment.</t>
        <t>The two Attesting Environments will have a fixed and collaborative structure where each can be responsible for a subset of Evidence. Because of the collaborative structure it may be arranged that either of the Attesting Environment can present Evidence collected by the other (but this is deployment specific).</t>
        <t>Example of one such system is a CPU system of a desktop from a Vendor X, which has its built in Attesting Environment, integrated into a product Y which requires a mandatory TPM support.
In such situations one can anchor the Roots of Trust of Vendor X's CPU Attestation using a secondary Attesting Environment with the TPM Attestation.
Alternatively, generate a TPM Quote and anchor it to Root of Trust of CPU Attestation based of Vendor X's Attesting Environment.</t>
        <t>A Verifier/RP may decide to direct the Attestation Request to an AE of choice to reflect the relevant subset of Evidence required for trust asssessment.</t>
      </section>
    </section>
    <section anchor="attestation-results-as-evidence">
      <name>Attestation Results as Evidence</name>
      <t>In cases 2, 3B and 3P Attestation Results are included as Evidence.
This results in a Verifier that must evaluate these results.
It must be able to validate the signatures on the Evidence.</t>
      <t>This creates <em>stacked</em> Remote Attestation.
This is very much different and <em>distinct</em> from <xref section="3.2" sectionFormat="comma" target="RFC9334"/> Layered Attestation.</t>
      <t>Layered Attestion produces a <em>single</em> set of Evidence, with claims about different layers.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>YYY</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ZZZ</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Hello.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9781" target="https://www.rfc-editor.org/info/rfc9781" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9781.xml">
          <front>
            <title>A Concise Binary Object Representation (CBOR) Tag for Unprotected CBOR Web Token Claims Sets (UCCS)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document defines the Unprotected CWT Claims Set (UCCS), a data format for representing a CBOR Web Token (CWT) Claims Set without protecting it by a signature, Message Authentication Code (MAC), or encryption. UCCS enables the use of CWT claims in environments where protection is provided by other means, such as secure communication channels or trusted execution environments. This specification defines a CBOR tag for UCCS and describes the UCCS format, its encoding, and its processing considerations. It also discusses security implications of using unprotected claims sets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9781"/>
          <seriesInfo name="DOI" value="10.17487/RFC9781"/>
        </reference>
      </references>
    </references>
    <?line 230?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
