<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.15 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wallace-lamps-key-attestation-ext-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.1 -->
  <front>
    <title abbrev="Key Attestation Extension">Key Attestation Extension for Certificate Management Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-wallace-lamps-key-attestation-ext-01"/>
    <author initials="C." surname="Wallace" fullname="Carl Wallace">
      <organization abbrev="Red Hound">Red Hound Software</organization>
      <address>
        <email>carl@redhoundsoftware.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization abbrev="sn3rd">sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2022" month="August" day="10"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Certification Authorities (CAs) issue certificates for public keys conveyed to the CA via a certificate management message or protocol. In some cases, a CA may wish to tailor certificate contents based on whether the corresponding private key is secured by hardware in non-exportable form. This document describes extensions that may be included in any of several widely used certificate management protocols to convey attestations about the private key to the CA to support this determination.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wallace-lamps-key-attestation-ext/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        spasm Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Many different certificate management protocols exist, including:</t>
      <ul spacing="normal">
        <li>PKCS #10 <xref target="RFC2986"/></li>
        <li>Simple Certificate Enrolment Protocol (SCEP) <xref target="RFC8894"/></li>
        <li>Certificate Management over CMS (CMC) <xref target="RFC5272"/></li>
        <li>Certificate Management Protocol (CMP) <xref target="RFC4210"/></li>
        <li>Certificate Request Management Format (CRMF) <xref target="RFC4211"/></li>
        <li>Enrollment over Secure Transport (EST) <xref target="RFC7030"/></li>
        <li>Automatic Certificate Management Environment (ACME) <xref target="RFC8555"/></li>
      </ul>
      <t>Each of these specifications defines extensibility mechanisms to customize requests sent to a Certification Authority (CA), Registration Authority (RA), or certificate management server. This document addresses the first six specifications in the above list, as all can be customized using attributes or extensions. <xref target="RFC8555"/> is somewhat different and is addressed by <xref target="I-D.draft-bweeks-acme-device-attest"/>.</t>
      <t>Many operating system and device vendors offer functionality enabling a device to generate a cryptographic attestation that can be used to establish the provenance of a key:</t>
      <ul spacing="normal">
        <li>
          <eref target="https://source.android.com/security/keystore/attestation">Android Key Attestation</eref></li>
        <li>
          <eref target="https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/component-updates/tpm-key-attestation">Trusted Platform Module</eref></li>
        <li>
          <eref target="https://developer.apple.com/documentation/devicecheck/dcappattestservice/3573911-attestkey">Apple Key Attestation</eref></li>
        <li>
          <eref target="https://developers.yubico.com/PIV/Introduction/PIV_attestation.html">Yubico PIV Attestation</eref></li>
      </ul>
      <t><xref target="WebAuthn"/> defines an "API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users." In support of this goal, it defines a model and corresponding formats to support attestation functionality. Section 6.5 of <xref target="WebAuthn"/> describes the general attestation structure and section 8 defines some specific attestation formats. Similar to <xref target="I-D.draft-bweeks-acme-device-attest"/>, this specification uses the attestation object definition from <xref target="WebAuthn"/> as a means of supporting a variety of attestation formats, which are defined in the IANA registry that was established by <xref target="RFC8809"/>; see <xref target="WebAuthnReg"/>.</t>
      <t>This document defines a structure, KeyAttestation, that can be used to convey a <xref target="WebAuthn"/> attestation statement as an attribute or extension when using the protocols listed above.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="key-attestation-attribute-or-extension">
      <name>Key Attestation Attribute or Extension</name>
      <t>A key attestation attribute or extension <bcp14>MAY</bcp14> be included in certificate request messages to convey an attestation statement for the private key corresponding to the public key contained in the request.  The attribute definition and the certificate extension definition are exactly the same, and they are identified by the same object identifier.</t>
      <artwork><![CDATA[
ext-keyAttestation EXTENSION ::= {
  SYNTAX KeyAttestation IDENTIFIED BY id-pe-keyAttestation }

attr-keyAttestation ATTRIBUTE ::= {
  SYNTAX KeyAttestation IDENTIFIED BY id-pe-keyAttestation }

id-pe-keyAttestation OBJECT IDENTIFIER ::=  { id-pe TBD }

KeyAttestation ::= OCTET STRING
]]></artwork>
      <t>The KeyAttestation conveys an attestation statement as defined in <xref target="WebAuthn"/> encoded as an OCTET STRING.</t>
      <t>While the format of an attestation statement varies, all attestation statement formats conveyed via a keyAttestation extension <bcp14>MUST</bcp14> include the public key that is the subject of the corresponding certificate management request. Certificate request messages that contain a key attestation that does not include a public key or that contain a public key that does not match the public key in the certificate request <bcp14>SHOULD</bcp14> be rejected with no certificate issued, however, a CA  <bcp14>MAY</bcp14> elect to issue a certificate as if the request did not contain a key attestation per local policy.</t>
      <t>Some attestation statement formats support the use of challenge password or nonce values. While the means of conveying challenge password value or a nonce value to certificate request clients is outside the scope of this document, each of SCEP <xref target="RFC8894"/>, CMC <xref target="RFC5272"/>, CMP <xref target="RFC4210"/> and EST <xref target="RFC7030"/> define means for conveying nonce values to certificate request clients. In some cases, challenge password or nonce values may be conveyed outside of a certificate management protocol.  For example, SCEP payloads in Apple's Over-the-Air Profile Delivery and Configuration specification <xref target="OTA"/> deliver challenge passwords in an XML-formatted set of instructions.</t>
      <t>Similarly, use and verification of a nonce value relative to an attestation statement is outside the scope of this document. Verification procedures for currently defined attestation statement formats can be found in Section 8 of <xref target="WebAuthn"/>. Certificate request messages that contain a key attestation that cannot be validated, including processing any nonce or challenge password values, <bcp14>SHOULD</bcp14> be rejected with no certificate issued, however, a CA  <bcp14>MAY</bcp14> elect to issue a certificate as if the request did not contain a key attestation per local policy.</t>
      <section anchor="usage-in-pkcs-10-requests">
        <name>Usage in PKCS #10 requests</name>
        <t>The PKCS #10 structure may be used directly or in SCEP, CMC, CMP or EST contexts. Where PKCS #10 is used, the public key in the attestation statement <bcp14>MUST</bcp14> match the public key in the CertificationRequestInfo.subjectPKInfo field and the keyAttestation attribute <bcp14>MUST</bcp14> appear in the CertificationRequestInfo.attributes field.</t>
      </section>
      <section anchor="usage-in-crmf-requests">
        <name>Usage in CRMF requests</name>
        <t>The CRMF structure may be used in CMC, CMP or EST. Where CRMF is used, the public key in the attestation statement <bcp14>MUST</bcp14> match the public key in the CertTemplate.publicKey field and the keyAttestation extension <bcp14>MUST</bcp14> appear in the CertTemplate.extensions field.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See Section 13 of <xref target="WebAuthn"/> for additional security considerations related to attestation statement formats, including certificate revocation.</t>
      <t>CAs, RAs and certificate management servers will need a set of trust anchors to validate attestation statements that may originate from any number of sources. Where possible, a dedicated trust anchor and issuing CA should be used when verifying a given type of attestation statement. Where a trust anchor or issuing CA are shared for mulitple sources of attestation statements, including constraints in attestation signer certificates or attestation certificates is recommended. <xref target="COTS"/> and <xref target="fido-metadata"/> define structures for conveying trust anchors that may be used for verifying attestations such that constraints are implied or are explicitly stated. Expression and validation of constraints imposed on trust anchors, CAs or attestation signers is beyond the scope of this specification.</t>
      <t>Key attestation statements may include a variety of information in addition to the public key being attested. While not described in this document, CAs, RAs and certificate management servers are free to use any policy when evaluating this information. This evaluation can result in rejection of a certificate request that features a verifiable key attestation for the public key contained in the request. For example, an attestation statement may indicate use of an unacceptable firmware version.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="key-attestation-extension-object-identifier">
        <name>Key attestation extension object identifier</name>
        <t>An object identifier from the id-pe arc defined in <xref target="RFC7299"/> should be assigned for id-pe-keyAttestation.</t>
      </section>
      <section anchor="key-attestation-extension-asn1-module-object-identifier">
        <name>Key attestation extension ASN.1 module object identifier</name>
        <t>An object identifier from the id-mod arc defined in <xref target="RFC7299"/> should be assigned for id-mod-keyAttestation.</t>
      </section>
      <section anchor="attestation-statement-formats">
        <name>Attestation statement formats</name>
        <t><xref section="2.1" sectionFormat="of" target="RFC8809"/> describes registration of new attestation statement format types used when authenticating users via <xref target="WebAuthn"/>. This specification reuses the same format, but, because the context for use is different, a different registry is required. This section defines IANA registries for W3C Web Authentication (WebAuthn) attestation statement format identifiers and extension identifiers used in the context of a certificate request. This specification establishes two registries:</t>
        <ul spacing="normal">
          <li>the "WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols" registry</li>
          <li>the "WebAuthn Extension Identifiers for Certificate Request Protocols" registry</li>
        </ul>
        <t>Any additional processes established by the expert(s) after the publication of this document will be recorded on the registry web page at the discretion of the expert(s), who may differ from the experts associated with the registry established by <xref target="RFC8809"/>.</t>
        <t>NOTE: these two registries are shared with <xref target="I-D.draft-bweeks-acme-device-attest"/>, which features similar registry establishment language. The registries need be created only one time. Delete these sections if registry is already in place.</t>
        <section anchor="webauthn-attestation-statement-format-identifiers-for-certificate-request-protocols">
          <name>WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols</name>
          <t>WebAuthn attestation statement format identifiers are strings whose semantic, syntactic, and string-matching criteria are specified in the "Attestation Statement Format Identifiers" (https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-attstn-fmt-ids) section of <xref target="WebAuthn"/>, along with the concepts of attestation and attestation statement formats.</t>
          <t>Registered attestation statement format identifiers are those that have been added to the registry by following the procedure in <xref target="registering-attestation-statement-format-identifiers"/>.</t>
          <t>Each attestation statement format identifier added to this registry <bcp14>MUST</bcp14> be unique amongst the set of registered attestation statement format identifiers.</t>
          <t>Registered attestation statement format identifiers <bcp14>MUST</bcp14> be a maximum of 32 octets in length and <bcp14>MUST</bcp14> consist only of printable ASCII [RFC20] characters, excluding backslash and double quote, i.e., VCHAR as defined in [RFC5234] but without %x22 and %x5c.  Attestation statement format identifiers are case sensitive and may not match other registered identifiers in a case-insensitive manner unless the designated experts determine that there is a compelling reason to allow an exception.</t>
          <section anchor="registering-attestation-statement-format-identifiers">
            <name>Registering Attestation Statement Format Identifiers</name>
            <t>WebAuthn attestation statement format identifiers are registered using the Specification Required policy (see Section 4.6 of [RFC8126]).</t>
            <t>The "WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols" registry is located at <eref target="https://www.iana.org/assignments/webauthn_for_certreq">https://www.iana.org/assignments/webauthn_for_certreq</eref>.  Registration requests can be made by following the instructions located there or by sending an email to the webauthn-for-certreq-reg-review@ietf.org mailing list.</t>
            <t>Registration requests consist of at least the following information:</t>
            <ul spacing="normal">
              <li>
                <t>WebAuthn Attestation Statement Format Identifier:
                </t>
                <ul spacing="normal">
                  <li>An identifier meeting the requirements given in <xref target="webauthn-attestation-statement-format-identifiers-for-certificate-request-protocols"/>.</li>
                </ul>
              </li>
              <li>
                <t>Description:
                </t>
                <ul spacing="normal">
                  <li>A relatively short description of the attestation format.</li>
                </ul>
              </li>
              <li>
                <t>Specification Document(s):
                </t>
                <ul spacing="normal">
                  <li>Reference to the document or documents that specify the attestation statement format.</li>
                </ul>
              </li>
              <li>
                <t>Change Controller:
                </t>
                <ul spacing="normal">
                  <li>For Standards Track RFCs, list "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</li>
                </ul>
              </li>
              <li>
                <t>Notes:
                </t>
                <ul spacing="normal">
                  <li>[optional]</li>
                </ul>
              </li>
            </ul>
            <t>Registrations <bcp14>MUST</bcp14> reference a freely available, stable specification, e.g., as described in Section 4.6 of [RFC8126].  This specification <bcp14>MUST</bcp14> include security and privacy considerations relevant to the attestation statement format.</t>
            <t>Note that WebAuthn attestation statement format identifiers can be registered by third parties (including the expert(s) themselves), if the expert(s) determines that an unregistered attestation statement format is widely deployed and not likely to be registered in a timely manner otherwise.  Such registrations still are subject to the requirements defined, including the need to reference a specification.</t>
          </section>
          <section anchor="registration-request-processing">
            <name>Registration Request Processing</name>
            <t>As noted in <xref target="registering-attestation-statement-format-identifiers"/>, WebAuthn attestation statement format identifiers are registered using the Specification Required policy.</t>
            <t>The expert(s) will clearly identify any issues that cause a registration to be refused, such as an incompletely specified attestation format.</t>
            <t>When a request is approved, the expert(s) will inform IANA, and the registration will be processed.  The IESG is the arbiter of any objection.</t>
          </section>
          <section anchor="initial-values-in-the-webauthn-attestation-statement-format-identifiers-for-certificate-request-protocols-registry">
            <name>Initial Values in the WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols Registry</name>
            <t>The initial values for the "WebAuthn Attestation Statement Format Identifiers for Certificate Request Protocols" registry have been populated with the values listed in the "WebAuthn Attestation Statement Format Identifier Registrations" (https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-att-fmt-reg) section of <xref target="WebAuthn"/>.  Also, the Change Controller entry for each of those registrations is:</t>
            <ul spacing="normal">
              <li>
                <t>Change Controller:
                </t>
                <ul spacing="normal">
                  <li>W3C Web Authentication Working Group (public-webauthn@w3.org)</li>
                </ul>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="webauthn-extension-identifiers-for-certificate-request-protocols">
          <name>WebAuthn Extension Identifiers for Certificate Request Protocols</name>
          <t>WebAuthn extension identifiers are strings whose semantic, syntactic, and string-matching criteria are specified in the "Extension Identifiers" (https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-extension-id) section of <xref target="WebAuthn"/>.</t>
          <t>Registered extension identifiers are those that have been added to the registry by following the procedure in <xref target="registering-extension-identifiers"/>.</t>
          <t>Each extension identifier added to this registry <bcp14>MUST</bcp14> be unique amongst the set of registered extension identifiers.</t>
          <t>Registered extension identifiers <bcp14>MUST</bcp14> be a maximum of 32 octets in length and <bcp14>MUST</bcp14> consist only of printable ASCII characters, excluding backslash and double quote, i.e., VCHAR as defined in [RFC5234] but without %x22 and %x5c.  Extension identifiers are case sensitive and may not match other registered identifiers in a case-insensitive manner unless the designated experts determine that there is a compelling reason to allow an exception.</t>
          <section anchor="registering-extension-identifiers">
            <name>Registering Extension Identifiers</name>
            <t>WebAuthn extension identifiers are registered using the Specification Required policy (see Section 4.6 of [RFC8126]).</t>
            <t>The "WebAuthn Extension Identifiers" registry is located at <eref target="https://www.iana.org/assignments/webauthn">https://www.iana.org/assignments/webauthn</eref>.  Registration requests can be made by following the instructions located there or by sending an email to the webauthn-for-certreq-reg-review@ietf.org mailing list.</t>
            <t>Registration requests consist of at least the following information:</t>
            <ul spacing="normal">
              <li>
                <t>WebAuthn Extension Identifier:
                </t>
                <ul spacing="normal">
                  <li>An identifier meeting the requirements given in <xref target="webauthn-extension-identifiers-for-certificate-request-protocols"/>.</li>
                </ul>
              </li>
              <li>
                <t>Description:
                </t>
                <ul spacing="normal">
                  <li>A relatively short description of the extension.</li>
                </ul>
              </li>
              <li>
                <t>Specification Document(s):
                </t>
                <ul spacing="normal">
                  <li>Reference to the document or documents that specify the extension.</li>
                </ul>
              </li>
              <li>
                <t>Change Controller:
                </t>
                <ul spacing="normal">
                  <li>For Standards Track RFCs, list "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</li>
                </ul>
              </li>
              <li>
                <t>Notes:
                </t>
                <ul spacing="normal">
                  <li>[optional]</li>
                </ul>
              </li>
            </ul>
            <t>Registrations <bcp14>MUST</bcp14> reference a freely available, stable specification, e.g., as described in Section 4.6 of [RFC8126].  This specification <bcp14>MUST</bcp14> include security and privacy considerations relevant to the extension.</t>
            <t>Note that WebAuthn extensions can be registered by third parties (including the expert(s) themselves), if the expert(s) determines that an unregistered extension is widely deployed and not likely to be registered in a timely manner otherwise.  Such registrations still are subject to the requirements defined, including the need to reference a specification.</t>
          </section>
          <section anchor="registration-request-processing-1">
            <name>Registration Request Processing</name>
            <t>As noted in <xref target="registering-extension-identifiers"/>, WebAuthn extension identifiers are registered using the Specification Required policy.</t>
            <t>The expert(s) will clearly identify any issues that cause a registration to be refused, such as an incompletely specified extension.</t>
            <t>When a request is approved, the expert(s) will inform IANA, and the registration will be processed.  The IESG is the arbiter of any objection.</t>
          </section>
          <section anchor="initial-values-in-the-webauthn-extension-identifiers-registry">
            <name>Initial Values in the WebAuthn Extension Identifiers Registry</name>
            <t>The initial values for the "WebAuthn Extension Identifiers" registry have been populated with the values listed in the "WebAuthn Extension Identifier Registrations" <eref target="https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-extensions-reg">https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-extensions-reg</eref> section of <xref target="WebAuthn"/>.  Also, the Change Controller entry for each of those registrations is:</t>
            <ul spacing="normal">
              <li>
                <t>Change Controller:
                </t>
                <ul spacing="normal">
                  <li>W3C Web Authentication Working Group (public-webauthn@w3.org)</li>
                </ul>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <t>The following ASN.1 module makes use of the conventions from <xref target="RFC5912"/>.</t>
      <artwork><![CDATA[
KeyAttestationExtn-2022
  { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-keyAttestation(TBD2) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS

  id-pe
  FROM PKIX1Explicit-2009 -- from [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-explicit-02(51) }

  EXTENSION, ATTRIBUTE
  FROM PKIX-CommonTypes-2009 -- from [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57) }
  ;

-- EXPORT ALL --

ext-keyAttestation EXTENSION ::= {
  SYNTAX KeyAttestation IDENTIFIED BY id-pe-keyAttestation }

attr-keyAttestation ATTRIBUTE ::= {
  TYPE KeyAttestation IDENTIFIED BY id-pe-keyAttestation }

id-pe-keyAttestation OBJECT IDENTIFIER ::=  { id-pe TBD }

KeyAttestation ::= OCTET STRING

END
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom">
              <organization/>
            </author>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski">
              <organization/>
            </author>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC8894">
          <front>
            <title>Simple Certificate Enrolment Protocol</title>
            <author fullname="P. Gutmann" initials="P." surname="Gutmann">
              <organization/>
            </author>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies the Simple Certificate Enrolment Protocol (SCEP), a PKI protocol that leverages existing technology by using Cryptographic Message Syntax (CMS, formerly known as PKCS #7) and PKCS #10 over HTTP.  SCEP is the evolution of the enrolment protocol sponsored by Cisco Systems, which enjoys wide support in both client and server implementations, as well as being relied upon by numerous other industry standards that work with certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8894"/>
          <seriesInfo name="DOI" value="10.17487/RFC8894"/>
        </reference>
        <reference anchor="RFC5272">
          <front>
            <title>Certificate Management over CMS (CMC)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="M. Myers" initials="M." surname="Myers">
              <organization/>
            </author>
            <date month="June" year="2008"/>
            <abstract>
              <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
              <t>1.  The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
              <t>2.  The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
              <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5272"/>
          <seriesInfo name="DOI" value="10.17487/RFC5272"/>
        </reference>
        <reference anchor="RFC4210">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="T. Kause" initials="T." surname="Kause">
              <organization/>
            </author>
            <author fullname="T. Mononen" initials="T." surname="Mononen">
              <organization/>
            </author>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP).  Protocol messages are defined for X.509v3 certificate creation and management.  CMP provides on-line interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4210"/>
          <seriesInfo name="DOI" value="10.17487/RFC4210"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics.  This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production.  The request will typically include a public key and the associated registration information.  This document does not define a certificate request protocol.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin">
              <organization/>
            </author>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee">
              <organization/>
            </author>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group.  This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8809">
          <front>
            <title>Registries for Web Authentication (WebAuthn)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam">
              <organization/>
            </author>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <date month="August" year="2020"/>
            <abstract>
              <t>This specification defines IANA registries for W3C Web Authentication (WebAuthn) attestation statement format identifiers and extension identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8809"/>
          <seriesInfo name="DOI" value="10.17487/RFC8809"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="WebAuthn" target="https://www.w3.org/TR/webauthn-2/">
          <front>
            <title>Web Authentication: An API for accessing Public Key Credentials Level 2</title>
            <author fullname="Jeff Hodges">
              <organization>Google</organization>
            </author>
            <author fullname="J.C. Jones">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Michael B. Jones">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Akshay Kumar">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Emil Lundberg">
              <organization>Yubico</organization>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews">
              <organization/>
            </author>
            <author fullname="D. McCarney" initials="D." surname="McCarney">
              <organization/>
            </author>
            <author fullname="J. Kasten" initials="J." surname="Kasten">
              <organization/>
            </author>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  As of this writing, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.draft-bweeks-acme-device-attest">
          <front>
            <title>Automated Certificate Management Environment (ACME) Device Attestation Extension</title>
            <author fullname="Brandon Weeks">
              <organization>Google</organization>
            </author>
            <date day="7" month="August" year="2022"/>
            <abstract>
              <t>   This document specifies new identifiers and a challenge for the
   Automated Certificate Management Environment (ACME) protocol which
   allows validating the identity of a device using attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bweeks-acme-device-attest-01"/>
        </reference>
        <reference anchor="WebAuthnReg" target="https://www.iana.org/assignments/webauthn/webauthn.xhtml">
          <front>
            <title>WebAuthn Attestation Statement Format Identifiers</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COTS">
          <front>
            <title>Concise TA Stores (CoTS)</title>
            <author fullname="Carl Wallace">
              <organization>Red Hound Software</organization>
            </author>
            <author fullname="Russ Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="OTA" target="https://developer.apple.com/library/archive/documentation/NetworkingInternet/Conceptual/iPhoneOTAConfiguration/Introduction/Introduction.html">
          <front>
            <title>Over-the-Air Profile Delivery and Configuration</title>
            <author>
              <organization>Apple</organization>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="fido-metadata" target="https://fidoalliance.org/specs/mds/fido-metadata-statement-v3.0-ps-20210518.html">
          <front>
            <title>FIDO Metadata Statement</title>
            <author>
              <organization>FIDO Alliance</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
