<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sardar-rats-sec-cons-00" category="info" consensus="true" submissionType="IETF" updates="9334" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RATS Security Considerations">Guidelines for Security Considerations of RATS</title>
    <seriesInfo name="Internet-Draft" value="draft-sardar-rats-sec-cons-00"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2025" month="November" day="27"/>
    <workgroup>RATS Working Group</workgroup>
    <keyword>security considerations</keyword>
    <keyword>remote attestation</keyword>
    <abstract>
      <?line 114?>

<t>This document aims to provide guidelines and best practices for writing
   security considerations for technical specifications for RATS
   targeting the needs of implementers, researchers, and protocol
   designers. The current version presents an outline of the topics that future versions
   will cover in more detail.</t>
      <ul spacing="normal">
        <li>
          <t>Corrections in published RATS RFCs</t>
        </li>
        <li>
          <t>Security concerns in two RATS drafts</t>
        </li>
        <li>
          <t>General security guidelines, baseline or template for RATS</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/rats-sec-cons/draft-sardar-rats-sec-cons.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sardar-rats-sec-cons/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/rats-sec-cons"/>.</t>
    </note>
  </front>
  <middle>
    <?line 126?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While excellent guidelines such as <xref target="I-D.irtf-cfrg-cryptography-specification"/> exist, remote attestation <xref target="RFC9334"/>
has several distinguishing features which necessitate a separate document.
One specific example of such a feature is architectural complexity.</t>
      <t>The draft presents an outline of three topics that future versions will cover in more detail:</t>
      <ul spacing="normal">
        <li>
          <t>Corrections in published RATS RFCs <xref target="RFC9334"/>, <xref target="RFC9781"/>, <xref target="RFC9783"/> and <xref target="RFC9711"/></t>
        </li>
        <li>
          <t>Security concerns in one currently adopted RATS draft <xref target="I-D.ietf-rats-coserv"/> and one proposed for
adoption RATS draft <xref target="I-D.deshpande-rats-multi-verifier"/></t>
        </li>
        <li>
          <t>General security guidelines, baseline or template that other drafts can simply point to</t>
        </li>
      </ul>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="general-hierarchy-of-authentication">
      <name>General Hierarchy of Authentication</name>
      <t><xref target="Gen-Approach"/> proposes general hierarchy of one-way authentication, which can help precisely
state the intended level of authentication (in decreasing order):</t>
      <ul spacing="normal">
        <li>
          <t>One-way injective agreement</t>
        </li>
        <li>
          <t>One-way non-injective agreement</t>
        </li>
        <li>
          <t>Aliveness</t>
        </li>
      </ul>
      <t>Recentness can be added to each of these levels of authentication.
Details will be added in future versions.</t>
    </section>
    <section anchor="threat-modeling">
      <name>Threat Modeling</name>
      <t>This section describes "What can go wrong?" TODO.</t>
      <section anchor="system-model">
        <name>System Model</name>
        <t>TODO.</t>
      </section>
      <section anchor="actors">
        <name>Actors</name>
        <t>TODO.</t>
        <section anchor="legal-perspective">
          <name>Legal perspective</name>
          <ul spacing="normal">
            <li>
              <t>Data subject is an identifiable natural person (as defined in Article 4 (1) of GDPR <xref target="GDPR"/>).</t>
            </li>
            <li>
              <t>(Data) Controller (as defined in Article 4 (7) of GDPR <xref target="GDPR"/>) manages and controls what happens with personal data of data subject.</t>
            </li>
            <li>
              <t>(Data) Processor (as defined in Article 4 (8) of GDPR <xref target="GDPR"/>) performs data processing on behalf of the data controller.</t>
            </li>
          </ul>
          <t>TODO.</t>
        </section>
        <section anchor="technical-perspective">
          <name>Technical perspective</name>
          <ul spacing="normal">
            <li>
              <t>Infrastucture Provider is a role which refers to the Processor in GDPR. An example of this role is a cloud service provider (CSP).</t>
            </li>
          </ul>
          <t>TODO.</t>
        </section>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>TODO.</t>
      </section>
      <section anchor="typical-security-goals">
        <name>Typical Security Goals</name>
        <t>TODO.</t>
      </section>
    </section>
    <section anchor="attacks">
      <name>Attacks</name>
      <t>Security considerations in RATS specifications need to clarify how the following attacks are avoided or mitigated:</t>
      <section anchor="replay-attacks">
        <name>Replay attacks</name>
        <t>See <xref target="Meeting-124-RATS-Slides"/>. TODO.</t>
      </section>
      <section anchor="relay-attacks">
        <name>Relay attacks</name>
        <t>See <xref target="Meeting-124-RATS-Slides"/>. TODO.</t>
      </section>
      <section anchor="diversion-attacks">
        <name>Diversion attacks</name>
        <t>In this attack, a network adversary -- with Dolev-Yao capabilities <xref target="Dolev-Yao"/> and access (e.g., via
Foreshadow <xref target="Foreshadow"/>) to attestation key of any machine in the world -- can redirect a connection intended
for a specific Infrastructure Provider to the compromised machine, potentially resulting in exposure of
confidential data <xref target="Meeting-122-TLS-Slides"/>. TODO.</t>
      </section>
    </section>
    <section anchor="potential-mitigations">
      <name>Potential Mitigations</name>
      <t>This section will describe the countermeasures and their evaluation. See <xref target="Meeting-124-RATS-Slides"/>. TODO.</t>
    </section>
    <section anchor="examples-of-specifications-that-could-be-improved">
      <name>Examples of Specifications That Could Be Improved</name>
      <section anchor="rfc9334">
        <name>RFC9334</name>
        <section anchor="unprotected-evidence">
          <name>Unprotected Evidence</name>
          <t><xref section="7.4" sectionFormat="of" target="RFC9334"/> has:</t>
          <blockquote>
            <t>A conveyance protocol that provides authentication and integrity protection can be used to convey Evidence that is otherwise unprotected (e.g., not signed).</t>
          </blockquote>
          <t>Using a conveyance protocol that provides authentication and integrity protection, such as TLS 1.3 <xref target="RFC8446"/>,
to convey Evidence that is otherwise unprotected (e.g., not signed) undermines all security of remote attestation.
Essentially, this breaks the chain up to the trust anchor (such as hardware manufacturer) for remote attestation.
Hence, remote attestation effectively provides no protection in this case and the security guarantees are limited
to those of the conveyance protocol only. In order to benefit from remote attestation, Evidence <bcp14>MUST</bcp14> be protected
using dedicated keys chaining back to the trust anchor for remote attestation.</t>
        </section>
        <section anchor="missing-definitions">
          <name>Missing definitions</name>
          <t><xref target="RFC9334"/> uses the term Conceptual Messages in capitalization without proper definition.</t>
        </section>
        <section anchor="missing-roles-and-conceptual-messages">
          <name>Missing Roles and Conceptual Messages</name>
          <ul spacing="normal">
            <li>
              <t>Identity Supplier and its corresponding conceptual message Identity are missing and need to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
            <li>
              <t>Attestation Challenge as conceptual message needs to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="rfc9781">
        <name>RFC9781</name>
        <t>As argued above for RFC9334, security considerations in <xref target="RFC9781"/> are essentially insufficient.</t>
      </section>
      <section anchor="rfc9783">
        <name>RFC9783</name>
        <t><xref target="RFC9783"/> uses:</t>
        <ul spacing="normal">
          <li>
            <t>3x epoch handle (with reference to <xref section="10.2" sectionFormat="of" target="RFC9334"/> and
<xref section="10.3" sectionFormat="of" target="RFC9334"/>) whereas RFC9334 never uses epoch handle at all!</t>
          </li>
          <li>
            <t>1x epoch ID with no reference and no explanation of how it is
  different from epoch handle</t>
          </li>
        </ul>
      </section>
      <section anchor="rfc9711">
        <name>RFC9711</name>
        <section anchor="inaccurate-opinion">
          <name>Inaccurate opinion</name>
          <t><xref section="7.4" sectionFormat="of" target="RFC9711"/> has:</t>
          <blockquote>
            <t>For attestation, the keys are associated with specific devices and are configured by device manufacturers.</t>
          </blockquote>
          <t>The quoted text is inaccurate and just an opinion of the editors.
It should preferably be removed from the RFC.
For example, in SGX, the keys are not configured by the manufacturer alone.
The platform owner can provide a random value called OWNER_EPOCH.</t>
          <t>For technical details and proposed text, see <xref target="Clarifications-EAT"/>.</t>
        </section>
        <section anchor="inaccurate-privacy-considerations">
          <name>Inaccurate Privacy Considerations</name>
          <t><xref section="8.4" sectionFormat="of" target="RFC9711"/> has:</t>
          <blockquote>
            <t>The nonce claim is based on a value usually derived remotely (outside of the entity).</t>
          </blockquote>
          <t>Attester-generated nonce does not provide any replay protection since the Attester can pre-generate an Evidence
that might not reflect the actual system state, but a past one.</t>
          <t>See the attack trace for Attester-generated nonce at <xref target="Sec-Cons-RATS"/>.</t>
          <t>For replay protection, nonce should <em>always</em> be derived remotely (for example, by the Relying Party).</t>
        </section>
      </section>
    </section>
    <section anchor="examples-of-parts-of-specifications-that-are-detrimental-for-security">
      <name>Examples of Parts of Specifications That are Detrimental for Security</name>
      <t>We believe that the following parts of designs are detrimental for the RATS ecosystem:</t>
      <section anchor="multi-verifiers">
        <name>Multi-Verifiers</name>
        <t>The design of multi-verifiers <xref target="I-D.deshpande-rats-multi-verifier"/> not only increases security risks
in terms of increasing the Trusted Computing Base (TCB), but also increases the privacy risks, as potentially sensitive
information is sent to multiple verifiers.</t>
        <t>Besides, the rationale presented by the authors -- appraisal policy being the intellectual property of the vendors -- breaks the
open-source nature of RATS ecosystem. This requires blindly trusting the vendors and increases the attack surface.</t>
      </section>
      <section anchor="aggregator-based-design">
        <name>Aggregator-based design</name>
        <t>Aggregator in <xref target="I-D.ietf-rats-coserv"/> is an explicit trust anchor and the addition of new trust anchor needs to have a strong justification.
Having a malicious Aggregator in the design trivially breaks all the guarantees.
It should be clarified how trust is established between Aggregator and Verifier in the context of Confidential Computing threat model.</t>
        <t>The fact that Aggregator has collective information of Reference Values Provider and Endorsers
makes it a special target of attack, and thus a single point of failure. It increases security
risks because Aggregator can be compromised independent of the Reference Values Provider and
Endorsers. That is, even if Reference Values Provider and Endorsers are secure, the compromise
of Aggregator breaks the security of the system.
Moreover, if Aggregator is not running inside a TEE, it is relatively easy to compromise the secrets.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>All of this document is about security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9781">
          <front>
            <title>A Concise Binary Object Representation (CBOR) Tag for Unprotected CBOR Web Token Claims Sets (UCCS)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document defines the Unprotected CWT Claims Set (UCCS), a data format for representing a CBOR Web Token (CWT) Claims Set without protecting it by a signature, Message Authentication Code (MAC), or encryption. UCCS enables the use of CWT claims in environments where protection is provided by other means, such as secure communication channels or trusted execution environments. This specification defines a CBOR tag for UCCS and describes the UCCS format, its encoding, and its processing considerations. It also discusses security implications of using unprotected claims sets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9781"/>
          <seriesInfo name="DOI" value="10.17487/RFC9781"/>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="RFC9783">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="S. Frost" initials="S." surname="Frost"/>
            <author fullname="M. Brossard" initials="M." surname="Brossard"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Arm's Platform Security Architecture (PSA) is a family of hardware and firmware security specifications, along with open-source reference implementations, aimed at helping device makers and chip manufacturers integrate best-practice security into their products. Devices that comply with PSA can generate attestation tokens as described in this document, which serve as the foundation for various protocols, including secure provisioning and network access control. This document specifies the structure and semantics of the PSA attestation token.</t>
              <t>The PSA attestation token is a profile of the Entity Attestation Token (EAT). This specification describes the claims used in an attestation token generated by PSA-compliant systems, how these claims are serialized for transmission, and how they are cryptographically protected.</t>
              <t>This Informational document is published as an Independent Submission to improve interoperability with Arm's architecture. It is not a standard nor a product of the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9783"/>
          <seriesInfo name="DOI" value="10.17487/RFC9783"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="Meeting-122-TLS-Slides" target="https://datatracker.ietf.org/meeting/122/materials/slides-122-tls-identity-crisis-00">
          <front>
            <title>Identity Crisis in Attested TLS for Confidential Computing</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="Meeting-124-RATS-Slides" target="https://datatracker.ietf.org/meeting/124/materials/slides-124-rats-sessb-guideline-for-security-consideration-of-rats-00">
          <front>
            <title>Guidelines for Security Considerations of RATS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="Tech-Concepts" target="https://www.researchgate.net/publication/396199290_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Technical_Concepts">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: Technical Concepts</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="Gen-Approach" target="https://www.researchgate.net/publication/396593308_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_General_Approach">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: General Approach</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="GDPR" target="https://eur-lex.europa.eu/eli/reg/2016/679/oj">
          <front>
            <title>Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the pro- cessing of personal data and on the free movement of such data, and repealing Direc- tive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance)</title>
            <author initials="" surname="European Commission">
              <organization/>
            </author>
            <date year="2016" month="May"/>
          </front>
        </reference>
        <reference anchor="Dolev-Yao">
          <front>
            <title>On the security of public key protocols</title>
            <author initials="D." surname="Dolev">
              <organization/>
            </author>
            <author initials="A." surname="Yao">
              <organization/>
            </author>
            <date year="1983" month="March"/>
          </front>
        </reference>
        <reference anchor="Foreshadow" target="https://foreshadowattack.eu/">
          <front>
            <title>Foreshadow</title>
            <author initials="" surname="Jo Van Bulck">
              <organization/>
            </author>
            <author initials="" surname="Marina Minkin">
              <organization/>
            </author>
            <author initials="" surname="Ofir Weisse">
              <organization/>
            </author>
            <author initials="" surname="Daniel Genkin">
              <organization/>
            </author>
            <author initials="" surname="Baris Kasikci">
              <organization/>
            </author>
            <author initials="" surname="Frank Piessens">
              <organization/>
            </author>
            <author initials="" surname="Mark Silberstein">
              <organization/>
            </author>
            <author initials="" surname="Thomas F Wenisch">
              <organization/>
            </author>
            <author initials="" surname="Yuval Yarom">
              <organization/>
            </author>
            <author initials="" surname="Raoul Strackx">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.deshpande-rats-multi-verifier">
          <front>
            <title>Remote Attestation with Multiple Verifiers</title>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Ltd</organization>
            </author>
            <author fullname="zhang jun" initials="Z." surname="jun">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Houda Labiod" initials="H." surname="Labiod">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   IETF RATS Architecture, defines the key role of a Verifier.  In a
   complex system, this role needs to be performed by multiple Verfiers
   coordinating together to assess the full trustworthiness of an
   Attester.  This document focuses on various topological patterns for
   a multiple Verifier system.  It only covers the architectural aspects
   introduced by the Multi Verifier concept, which is neutral with
   regard to specific wire formats, encoding, transport mechanisms, or
   processing details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-deshpande-rats-multi-verifier-03"/>
        </reference>
        <reference anchor="I-D.ietf-rats-coserv">
          <front>
            <title>Concise Selector for Endorsements and Reference Values</title>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Shefali Kamal" initials="S." surname="Kamal">
              <organization>Fujitsu</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>AMD</organization>
            </author>
            <author fullname="Ding Ma" initials="D." surname="Ma">
              <organization>Alibaba Cloud</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   In the Remote Attestation Procedures (RATS) architecture, Verifiers
   require Endorsements and Reference Values to assess the
   trustworthiness of Attesters.  This document specifies the Concise
   Selector for Endorsements and Reference Values (CoSERV), a structured
   query/result format designed to facilitate the discovery and
   retrieval of these artifacts from various providers.  CoSERV defines
   a query language and corresponding result structure using CDDL, which
   can be serialized in CBOR format, enabling efficient interoperability
   across diverse systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-coserv-02"/>
        </reference>
        <reference anchor="Clarifications-EAT" target="https://mailarchive.ietf.org/arch/msg/rats/4V2zZHhk5IuxwcUMNWpPBpnzpaM/">
          <front>
            <title>Clarifications in draft-ietf-rats-eat</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="April"/>
          </front>
        </reference>
        <reference anchor="Sec-Cons-RATS" target="https://mailarchive.ietf.org/arch/msg/rats/jcAv9FKbYSIVtUNQ8ggEHL8lrmM/">
          <front>
            <title>Security considerations of remote attestation (RFC9334)</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 327?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author wishes to thank Ira McDonald and Ivan Gudymenko for insightful discussions.
The author also wishes to thank the authors of <xref target="I-D.ietf-rats-coserv"/> (in particular Thomas
Fossati and Paul Howard) for several discussions, which unfortunately could not resolve the
above concerns, and hence led to this draft.
The author also gratefully acknowledges the authors of <xref target="I-D.irtf-cfrg-cryptography-specification"/>, which
serves as the inspiration of this work.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
