<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sardar-rats-sec-cons-01" category="info" consensus="true" submissionType="IETF" updates="9334" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RATS Security Considerations">Guidelines for Security Considerations of RATS</title>
    <seriesInfo name="Internet-Draft" value="draft-sardar-rats-sec-cons-01"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="February" day="04"/>
    <workgroup>RATS Working Group</workgroup>
    <keyword>security considerations</keyword>
    <keyword>remote attestation</keyword>
    <abstract>
      <?line 114?>

<t>This document aims to provide guidelines and best practices for writing
   security considerations for technical specifications for RATS
   targeting the needs of implementers, researchers, and protocol
   designers. The current version presents an outline of the topics that future versions
   will cover in more detail.</t>
      <ul spacing="normal">
        <li>
          <t>Corrections in published RATS RFCs</t>
        </li>
        <li>
          <t>Security concerns in two RATS drafts</t>
        </li>
        <li>
          <t>General security guidelines, baseline or template for RATS</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/rats-sec-cons/draft-sardar-rats-sec-cons.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sardar-rats-sec-cons/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/rats-sec-cons"/>.</t>
    </note>
  </front>
  <middle>
    <?line 126?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While excellent guidelines such as <xref target="I-D.irtf-cfrg-cryptography-specification"/> exist, remote attestation <xref target="RFC9334"/>
has several distinguishing features which necessitate a separate document.
One specific example of such a feature is architectural complexity.</t>
      <t>The draft presents an outline of three topics that future versions will cover in more detail:</t>
      <ul spacing="normal">
        <li>
          <t>Corrections in published RATS RFCs <xref target="RFC9334"/>, <xref target="RFC9781"/>, <xref target="RFC9783"/> and <xref target="RFC9711"/></t>
        </li>
        <li>
          <t>Security concerns in one currently adopted RATS draft <xref target="I-D.ietf-rats-coserv"/> and one proposed for
adoption RATS draft <xref target="I-D.deshpande-rats-multi-verifier"/></t>
        </li>
        <li>
          <t>General security guidelines, baseline or template that other drafts can simply point to</t>
        </li>
      </ul>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="general-hierarchy-of-authentication">
      <name>General Hierarchy of Authentication</name>
      <t><xref target="Gen-Approach"/> proposes general hierarchy of one-way authentication, which can help precisely
state the intended level of authentication (in decreasing order):</t>
      <ul spacing="normal">
        <li>
          <t>One-way injective agreement</t>
        </li>
        <li>
          <t>One-way non-injective agreement</t>
        </li>
        <li>
          <t>Aliveness</t>
        </li>
      </ul>
      <t>Recentness can be added to each of these levels of authentication.
Details will be added in future versions.</t>
    </section>
    <section anchor="threat-modeling">
      <name>Threat Modeling</name>
      <t>This section describes "What can go wrong?" TODO.</t>
      <section anchor="system-model">
        <name>System Model</name>
        <t>TODO.</t>
      </section>
      <section anchor="actors">
        <name>Actors</name>
        <t>TODO.</t>
        <section anchor="legal-perspective">
          <name>Legal perspective</name>
          <ul spacing="normal">
            <li>
              <t>Data subject is an identifiable natural person (as defined in Article 4 (1) of GDPR <xref target="GDPR"/>).</t>
            </li>
            <li>
              <t>(Data) Controller (as defined in Article 4 (7) of GDPR <xref target="GDPR"/>) manages and controls what happens with personal data of data subject.</t>
            </li>
            <li>
              <t>(Data) Processor (as defined in Article 4 (8) of GDPR <xref target="GDPR"/>) performs data processing on behalf of the data controller.</t>
            </li>
          </ul>
          <t>TODO.</t>
        </section>
        <section anchor="technical-perspective">
          <name>Technical perspective</name>
          <ul spacing="normal">
            <li>
              <t>Infrastucture Provider is a role which refers to the Processor in GDPR. An example of this role is a cloud service provider (CSP).</t>
            </li>
          </ul>
          <t>TODO.</t>
        </section>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>TODO.</t>
      </section>
      <section anchor="typical-security-goals">
        <name>Typical Security Goals</name>
        <t>TODO.</t>
      </section>
    </section>
    <section anchor="attacks">
      <name>Attacks</name>
      <t>Security considerations in RATS specifications need to clarify how the following attacks are avoided or mitigated:</t>
      <section anchor="replay-attacks">
        <name>Replay attacks</name>
        <t>See <xref target="Meeting-124-RATS-Slides"/>. TODO.</t>
      </section>
      <section anchor="relay-attacks">
        <name>Relay attacks</name>
        <t>See <xref target="Meeting-124-RATS-Slides"/>. TODO.</t>
      </section>
      <section anchor="diversion-attacks">
        <name>Diversion attacks</name>
        <t>In this attack, a network adversary -- with Dolev-Yao capabilities <xref target="Dolev-Yao"/> and access (e.g., via
Foreshadow <xref target="Foreshadow"/>) to attestation key of any machine in the world -- can redirect a connection intended
for a specific Infrastructure Provider to the compromised machine, potentially resulting in exposure of
confidential data <xref target="Meeting-122-TLS-Slides"/>. TODO.</t>
      </section>
    </section>
    <section anchor="potential-mitigations">
      <name>Potential Mitigations</name>
      <t>This section will describe the countermeasures and their evaluation. See <xref target="Meeting-124-RATS-Slides"/>. TODO.</t>
    </section>
    <section anchor="examples-of-specifications-that-could-be-improved">
      <name>Examples of Specifications That Could Be Improved</name>
      <section anchor="rfc9334">
        <name>RFC9334</name>
        <section anchor="unprotected-evidence">
          <name>Unprotected Evidence</name>
          <t><xref section="7.4" sectionFormat="of" target="RFC9334"/> has:</t>
          <blockquote>
            <t>A conveyance protocol that provides authentication and integrity protection can be used to convey Evidence that is otherwise unprotected (e.g., not signed).</t>
          </blockquote>
          <t>Using a conveyance protocol that provides authentication and integrity protection, such as TLS 1.3 <xref target="RFC8446"/>,
to convey Evidence that is otherwise unprotected (e.g., not signed) undermines all security of remote attestation.
Essentially, this breaks the chain up to the trust anchor (such as hardware manufacturer) for remote attestation.
Hence, remote attestation effectively provides no protection in this case and the security guarantees are limited
to those of the conveyance protocol only. In order to benefit from remote attestation, Evidence <bcp14>MUST</bcp14> be protected
using dedicated keys chaining back to the trust anchor for remote attestation.</t>
        </section>
        <section anchor="missing-definitions">
          <name>Missing definitions</name>
          <t><xref target="RFC9334"/> uses the term Conceptual Messages in capitalization without proper definition.</t>
        </section>
        <section anchor="missing-roles-and-conceptual-messages">
          <name>Missing Roles and Conceptual Messages</name>
          <ul spacing="normal">
            <li>
              <t>Identity Supplier and its corresponding conceptual message Identity are missing and need to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
            <li>
              <t>Attestation Challenge as conceptual message needs to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="rfc9781">
        <name>RFC9781</name>
        <t>As argued above for RFC9334, security considerations in <xref target="RFC9781"/> are essentially insufficient.</t>
      </section>
      <section anchor="rfc9783">
        <name>RFC9783</name>
        <t><xref target="RFC9783"/> uses:</t>
        <ul spacing="normal">
          <li>
            <t>3x epoch handle (with reference to <xref section="10.2" sectionFormat="of" target="RFC9334"/> and
<xref section="10.3" sectionFormat="of" target="RFC9334"/>) whereas RFC9334 never uses epoch handle at all!</t>
          </li>
          <li>
            <t>1x epoch ID with no reference and no explanation of how it is
  different from epoch handle</t>
          </li>
        </ul>
      </section>
      <section anchor="rfc9711">
        <name>RFC9711</name>
        <section anchor="inaccurate-opinion">
          <name>Inaccurate opinion</name>
          <t><xref section="7.4" sectionFormat="of" target="RFC9711"/> has:</t>
          <blockquote>
            <t>For attestation, the keys are associated with specific devices and are configured by device manufacturers.</t>
          </blockquote>
          <t>The quoted text is inaccurate and just an opinion of the editors.
It should preferably be removed from the RFC.
For example, in SGX, the keys are not configured by the manufacturer alone.
The platform owner can provide a random value called OWNER_EPOCH.</t>
          <t>For technical details and proposed text, see <xref target="Clarifications-EAT"/>.</t>
        </section>
        <section anchor="inaccurate-privacy-considerations">
          <name>Inaccurate Privacy Considerations</name>
          <t><xref section="8.4" sectionFormat="of" target="RFC9711"/> has:</t>
          <blockquote>
            <t>The nonce claim is based on a value usually derived remotely (outside of the entity).</t>
          </blockquote>
          <t>Attester-generated nonce does not provide any replay protection since the Attester can pre-generate an Evidence
that might not reflect the actual system state, but a past one.</t>
          <t>See the attack trace for Attester-generated nonce at <xref target="Sec-Cons-RATS"/>.</t>
          <t>For replay protection, nonce should <em>always</em> be derived remotely (for example, by the Relying Party).</t>
        </section>
      </section>
    </section>
    <section anchor="examples-of-parts-of-specifications-that-are-detrimental-for-security">
      <name>Examples of Parts of Specifications That are Detrimental for Security</name>
      <t>We believe that the following parts of designs are detrimental for the RATS ecosystem:</t>
      <section anchor="multi-verifiers">
        <name>Multi-Verifiers</name>
        <section anchor="security-considerations">
          <name>Security Considerations</name>
          <t>We believe the security considerations of multi-verifiers <xref target="I-D.deshpande-rats-multi-verifier"/> must say:</t>
          <t>Compared to a single verifier, the use of multi-verifiers increases security risks in terms of increasing the Trusted Computing Base (TCB).</t>
        </section>
        <section anchor="privacy-considerations">
          <name>Privacy Considerations</name>
          <t>We believe the privacy considerations of multi-verifiers <xref target="I-D.deshpande-rats-multi-verifier"/> should say:</t>
          <t>Compared to a single verifier, the use of multi-verifiers may increase the privacy risks, as potentially sensitive information may be sent to multiple verifiers.</t>
        </section>
        <section anchor="open-source">
          <name>Open-source</name>
          <t>Besides, the rationale presented by the authors -- appraisal policy being the intellectual property of the vendors -- breaks the
open-source nature of RATS ecosystem. This requires blindly trusting the vendors and increases the attack surface.</t>
        </section>
      </section>
      <section anchor="aggregator-based-design">
        <name>Aggregator-based design</name>
        <t>Aggregator in <xref target="I-D.ietf-rats-coserv"/> is an explicit trust anchor and the addition of new trust anchor needs to have a strong justification.
Having a malicious Aggregator in the design trivially breaks all the guarantees.
It should be clarified how trust is established between Aggregator and Verifier in the context of Confidential Computing threat model.</t>
        <t>The fact that Aggregator has collective information of Reference Values Providers and Endorsers
makes it a special target of attack, and thus a single point of failure. It increases security
risks because Aggregator can be compromised independent of the Reference Values Providers and
Endorsers. That is, even if Reference Values Providers and Endorsers are secure, the compromise
of Aggregator breaks the security of the system.
Moreover, if Aggregator is not running inside a TEE, it is relatively easy to compromise the secrets.</t>
      </section>
    </section>
    <section anchor="security-considerations-1">
      <name>Security Considerations</name>
      <t>All of this document is about security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9781">
          <front>
            <title>A Concise Binary Object Representation (CBOR) Tag for Unprotected CBOR Web Token Claims Sets (UCCS)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document defines the Unprotected CWT Claims Set (UCCS), a data format for representing a CBOR Web Token (CWT) Claims Set without protecting it by a signature, Message Authentication Code (MAC), or encryption. UCCS enables the use of CWT claims in environments where protection is provided by other means, such as secure communication channels or trusted execution environments. This specification defines a CBOR tag for UCCS and describes the UCCS format, its encoding, and its processing considerations. It also discusses security implications of using unprotected claims sets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9781"/>
          <seriesInfo name="DOI" value="10.17487/RFC9781"/>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="RFC9783">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="S. Frost" initials="S." surname="Frost"/>
            <author fullname="M. Brossard" initials="M." surname="Brossard"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Arm's Platform Security Architecture (PSA) is a family of hardware and firmware security specifications, along with open-source reference implementations, aimed at helping device makers and chip manufacturers integrate best-practice security into their products. Devices that comply with PSA can generate attestation tokens as described in this document, which serve as the foundation for various protocols, including secure provisioning and network access control. This document specifies the structure and semantics of the PSA attestation token.</t>
              <t>The PSA attestation token is a profile of the Entity Attestation Token (EAT). This specification describes the claims used in an attestation token generated by PSA-compliant systems, how these claims are serialized for transmission, and how they are cryptographically protected.</t>
              <t>This Informational document is published as an Independent Submission to improve interoperability with Arm's architecture. It is not a standard nor a product of the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9783"/>
          <seriesInfo name="DOI" value="10.17487/RFC9783"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="Meeting-122-TLS-Slides" target="https://datatracker.ietf.org/meeting/122/materials/slides-122-tls-identity-crisis-00">
          <front>
            <title>Identity Crisis in Attested TLS for Confidential Computing</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="Meeting-124-RATS-Slides" target="https://datatracker.ietf.org/meeting/124/materials/slides-124-rats-sessb-guideline-for-security-consideration-of-rats-00">
          <front>
            <title>Guidelines for Security Considerations of RATS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="Tech-Concepts" target="https://www.researchgate.net/publication/396199290_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Technical_Concepts">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: Technical Concepts</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="Gen-Approach" target="https://www.researchgate.net/publication/396593308_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_General_Approach">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: General Approach</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="GDPR" target="https://eur-lex.europa.eu/eli/reg/2016/679/oj">
          <front>
            <title>Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the pro- cessing of personal data and on the free movement of such data, and repealing Direc- tive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance)</title>
            <author initials="" surname="European Commission">
              <organization/>
            </author>
            <date year="2016" month="May"/>
          </front>
        </reference>
        <reference anchor="Dolev-Yao">
          <front>
            <title>On the security of public key protocols</title>
            <author initials="D." surname="Dolev">
              <organization/>
            </author>
            <author initials="A." surname="Yao">
              <organization/>
            </author>
            <date year="1983" month="March"/>
          </front>
        </reference>
        <reference anchor="Foreshadow" target="https://foreshadowattack.eu/">
          <front>
            <title>Foreshadow</title>
            <author initials="" surname="Jo Van Bulck">
              <organization/>
            </author>
            <author initials="" surname="Marina Minkin">
              <organization/>
            </author>
            <author initials="" surname="Ofir Weisse">
              <organization/>
            </author>
            <author initials="" surname="Daniel Genkin">
              <organization/>
            </author>
            <author initials="" surname="Baris Kasikci">
              <organization/>
            </author>
            <author initials="" surname="Frank Piessens">
              <organization/>
            </author>
            <author initials="" surname="Mark Silberstein">
              <organization/>
            </author>
            <author initials="" surname="Thomas F Wenisch">
              <organization/>
            </author>
            <author initials="" surname="Yuval Yarom">
              <organization/>
            </author>
            <author initials="" surname="Raoul Strackx">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.deshpande-rats-multi-verifier">
          <front>
            <title>Remote Attestation with Multiple Verifiers</title>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Ltd</organization>
            </author>
            <author fullname="zhang jun" initials="Z." surname="jun">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Houda Labiod" initials="H." surname="Labiod">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   IETF RATS Architecture, defines the key role of a Verifier.  In a
   complex system, this role needs to be performed by multiple Verfiers
   coordinating together to assess the full trustworthiness of an
   Attester.  This document focuses on various topological patterns for
   a multiple Verifier system.  It only covers the architectural aspects
   introduced by the Multi Verifier concept, which is neutral with
   regard to specific wire formats, encoding, transport mechanisms, or
   processing details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-deshpande-rats-multi-verifier-03"/>
        </reference>
        <reference anchor="I-D.ietf-rats-coserv">
          <front>
            <title>Concise Selector for Endorsements and Reference Values</title>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Shefali Kamal" initials="S." surname="Kamal">
              <organization>Fujitsu</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>AMD</organization>
            </author>
            <author fullname="Ding Ma" initials="D." surname="Ma">
              <organization>Alibaba Cloud</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   In the Remote Attestation Procedures (RATS) architecture, Verifiers
   require Endorsements and Reference Values to assess the
   trustworthiness of Attesters.  This document specifies the Concise
   Selector for Endorsements and Reference Values (CoSERV), a structured
   query/result format designed to facilitate the discovery and
   retrieval of these artifacts from various providers.  CoSERV defines
   a query language and corresponding result structure using CDDL, which
   can be serialized in CBOR format, enabling efficient interoperability
   across diverse systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-coserv-02"/>
        </reference>
        <reference anchor="Clarifications-EAT" target="https://mailarchive.ietf.org/arch/msg/rats/4V2zZHhk5IuxwcUMNWpPBpnzpaM/">
          <front>
            <title>Clarifications in draft-ietf-rats-eat</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="April"/>
          </front>
        </reference>
        <reference anchor="Sec-Cons-RATS" target="https://mailarchive.ietf.org/arch/msg/rats/jcAv9FKbYSIVtUNQ8ggEHL8lrmM/">
          <front>
            <title>Security considerations of remote attestation (RFC9334)</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 335?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author wishes to thank Ira McDonald and Ivan Gudymenko for insightful discussions.
The author also wishes to thank the authors of <xref target="I-D.ietf-rats-coserv"/> (in particular Thomas
Fossati and Paul Howard) for several discussions, which unfortunately could not resolve the
above concerns, and hence led to this draft.
The author also gratefully acknowledges the authors of <xref target="I-D.irtf-cfrg-cryptography-specification"/>, which
serves as the inspiration of this work.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
