<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xia-rats-key-negotiation-integration-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="RATS Key Negotiation Integration">Integration of Remote Attestation with Key Negotiation and Distribution</title>
    <seriesInfo name="Internet-Draft" value="draft-xia-rats-key-negotiation-integration-00"/>
    <author initials="L." surname="Xia" fullname="Liang Xia">
      <organization>Huawei Technologies</organization>
      <address>
        <email>frank.xialiang@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Jiang" fullname="Weiyu Jiang">
      <organization>Huawei Technologies</organization>
      <address>
        <email>jiangweiyu1@huawei.com</email>
      </address>
    </author>
    <author initials="M. U." surname="Sardar" fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="J." surname="Zhang" fullname="Jun Zhang">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <email>junzhang1@huawei.com</email>
      </address>
    </author>
    <author initials="H." surname="Labiod" fullname="Houda Labiod">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <email>houda.labiod@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>RATS</keyword>
    <keyword>attestation</keyword>
    <keyword>key negotiation</keyword>
    <abstract>
      <?line 57?>

<t>This draft proposes a lightweight security enhancement scheme based on remote attestation—key negotiation integrated into remote attestation. Organically integrating the main steps of end-to-end key negotiation into the remote attestation process may provide more security and flexibility.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-xia-rats-key-negotiation-integration/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-xia-rats-key-negotiation-integration"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Remote attestation is a security mechanism based on trusted hardware (e.g., TPM, TEE), allowing remote verifiers to cryptographically verify the integrity of the target device's software configuration, hardware state, and runtime environment.
Hence, remote attestation can effectively prove the overall security state of the endpoint.
Secure channel protocols (e.g., TLS, QUIC, IPSec, SSH) establish end-to-end (E2E) secure channels based on the authentication of the endpoint's legitimate identity and secure key negotiation, ensuring the security of network communication.
By organically combining remote attestation protocols with secure channel protocols and establishing cryptographic binding between them, it is possible to achieve a logical binding of endpoint security and network security, ensuring dual verification and protection of the identity and state of the endpoint in secure connections. Attested TLS <xref target="I-D.fossati-tls-attestation"/> <xref target="I-D.fossati-tls-exported-attestation"/> is currently an important related work in the industry, and other similar works include binding remote attestation with credential issuance (e.g., certificates <xref target="I-D.ietf-lamps-csr-attestation"/>, OAuth tokens, etc.) to achieve security enhancement.</t>
      <t>However, in some scenarios, the above binding may not be possible.
For example:</t>
      <ul spacing="normal">
        <li>
          <t>Scenario 1: When tenants in a public cloud/compute cluster deploy workloads, they need to first verify their runtime environment's security through remote attestation before requesting Key Management Service (KMS) to assign application-layer data keys to the Virtual Machine (VM)/compute node where the workload resides.
At this point, these keys are used for application-layer data encryption, such as file encryption or disk encryption, and are not used for any secure channel protocols.
For example, to protect model parameters from leakage and tampering, model weights and other parameters need to be encrypted before model loading and transmitted to a Trusted Execution Environment (TEE). At this time, it is necessary to ensure that only the TEE has the key and decrypts it.</t>
        </li>
        <li>
          <t>Scenario 2: The end user/client accesses the online TEE computing environment, submits his data for business processing or large model inference, and needs to ensure the security of the entire computing environment through remote attestation before establishing a secure connection.
At this point, there are multiple options for the secure channel protocol that can be established, such as TLS, IPSec, QUIC, OHTTP, etc.
The user may only need to complete E2E key negotiation based on remote attestation.
As for which secure protocol or application layer encryption the negotiated key is used for, and how it is used, there can be various implementation methods.</t>
        </li>
      </ul>
      <t>In summary, considering the diversity of remote attestation application scenarios and the limitations or complexity of combining with security protocols, this draft proposes a lightweight security enhancement scheme based on remote attestation—key negotiation integrated into remote attestation. By organically integrating the key steps of E2E key negotiation into the remote attestation process, the following can be achieved:</t>
      <ul spacing="normal">
        <li>
          <t>The key distribution of KMS or E2E key negotiation can be automatically completed based on remote attestation, improving the security of key negotiation;</t>
        </li>
        <li>
          <t>The keys negotiated automatically can be flexibly applied in various ways, whether for secure protocols or application layer encryption;</t>
        </li>
        <li>
          <t>Compared to the complete and systematic implementation of Attested TLS, a more lightweight implementation can be provided.</t>
        </li>
      </ul>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="integration-scheme">
      <name>Integration Scheme</name>
      <t>The current specification is based on passport model of RATS. Future versions of specification will include the background-check model. We present two integration schemes:</t>
      <section anchor="key-distribution-based-on-kms-integrated-with-remote-attestation">
        <name>Key Distribution Based on KMS Integrated with Remote Attestation</name>
        <t>The KMS mechanism on public cloud networks includes the root of trust, secure channels between Attester and KMS, full lifecycle management of keys (including key generation, storage, rotation, and destruction), hierarchical encryption architecture (such as Envelope Encryption), and access control mechanisms.
There are two cases here:</t>
        <ul spacing="normal">
          <li>
            <t>Attester generates keys to be distributed to other applications via KMS.</t>
          </li>
          <li>
            <t>Attester obtains keys from the KMS.</t>
          </li>
        </ul>
        <t>So KMS enables applications to generate/obtain their own application-layer encryption symmetric/asymmetric keys and distribute these keys between the required applications.
Furthermore, the method of integrating key distribution into the remote attestation interaction process is shown in the following diagram:</t>
        <figure anchor="fig-rats-key-negotiation-integration-kms">
          <name>Key Distribution Based on KMS Integrated with Remote Attestation</name>
          <artwork><![CDATA[
        .------------.
        |            | 2. Compare Evidence
        |  Verifier  | against appraisal policy
        |            |
        '--------+---'
            ^    |
1. Evidence |    | 3. Attestation
            |    | Result
            |    v
        .---+--------.                .-------------.
        |            +--------------->|   Relying   | 5. Compare Attestation
        |  Attester  |4. Attestation  |    Party    | Result against
        |            |   Result       |    & KMS    | appraisal policy
        '------------' + SK/ASK/ESK   '-------------' + Distribute Keys

SK：Symmetric Key
ASK：Asymmetric Key
ESK：Encrypted Symmetric Key
]]></artwork>
        </figure>
        <t>In the standard remote attestation process described above, the Attester can generate and provide/request the Attester's application layer SK/ASK/ESK keys in the result returned to the KMS. SK <bcp14>MUST</bcp14> be conveyed over a secure channel.
The KMS can generate or distribute these keys accordingly. During key rotation, the KMS can proactively trigger the above process to complete the update and rotation of the new and old keys.</t>
      </section>
      <section anchor="integrating-e2e-key-negotiation-into-remote-attestation">
        <name>Integrating E2E Key Negotiation Into Remote Attestation</name>
        <t>The current main implementation mechanism for E2E key negotiation is DHE and ECDHE. Taking ECDHE as an example, the method of integrating it into remote attestation is shown in the following figure:</t>
        <figure anchor="fig-rats-key-negotiation-integration-e2e">
          <name>Integrating E2E Key Negotiation Into Remote Attestation</name>
          <artwork><![CDATA[
       .------------.
       |            | 4. Compare Evidence
       |  Verifier  | against appraisal policy
       |            |
       '--------+---'
           ^    |
3 Evidence |    | 5. Attestation
           |    | Result
           |    v     1. Attestation
      .---+--------. Request + pubC.-------------.
      |  Attester  <-------------->|   Relying   | 7. Compare Attestation
      |  & Server  | 6.Attestation |    Party    | Result against
      |            | Result        |    & Client | appraisal policy
      '------------' + pubS        '-------------' + SK = privC * pubS
    2. SK = privS * pubC

SK：Symmetric Key
(privC,pubC): Client's ECDHE key pair
(privS,pubS): Server's ECDHE key pair
]]></artwork>
        </figure>
        <t>In the standard remote attestation process described above, the Client includes the public key pubC from its dynamically generated ECDHE key pair (privC, pubC) in the remote attestation request message, while retaining its private key privC.
Upon receiving pubC, the Server can compute the symmetric key SK using its private key privS from its dynamically generated ECDHE key pair (privS, pubS).
After completing the remote attestation with the Verifier, the Server includes its pubS in the Attestation Result returned to the Client.
Once the Client verifies the Attestation Result, it can compute the symmetric key SK using pubS and its own private key privC, thereby completing both the remote attestation and ECDHE key agreement.</t>
      </section>
    </section>
    <section anchor="use-of-negotiated-keys-in-different-security-protocols">
      <name>Use of Negotiated Keys in Different Security Protocols</name>
      <t>Through the above process, key negotiation/distribution is completed during the remote attestation process, and is synchronized based on the results of the remote attestation.
If the negotiated key is used for application layer encryption, its specific usage is strongly related to the application and can be very flexible.
When the key is used for the security protocols, such as TLS, IPSec, etc., there are at least the following binding methods:</t>
      <ul spacing="normal">
        <li>
          <t>TLS: The negotiated key can be used as a pre-shared key for subsequent TLS handshakes; the key can also be used as an externally imported shared key to participate in TLS Hybrid key exchange <xref target="I-D.ietf-tls-hybrid-design"/>;</t>
        </li>
        <li>
          <t>IPSec: The negotiated key can be used as a pre-shared key for subsequent IKEv2 handshakes; or the key can be directly used as a session key for data plane encryption and integrity protection in IPSec ESP; or the key can also be used as Post-quantum Preshared Keys (PPKs) <xref target="RFC8784"/> to achieve binding with the IPSec protocol.</t>
        </li>
      </ul>
    </section>
    <section anchor="remote-attestation-protocol-and-message-extensions">
      <name>Remote Attestation Protocol and Message Extensions</name>
      <t>This section describes how to extend RATS protocol and message to incorporate key negotiation into the remote attestation process.</t>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Risk of relay attacks needs to be evaluated in the design.</t>
      <t>TBD</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8784">
          <front>
            <title>Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security</title>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The possibility of quantum computers poses a serious challenge to cryptographic algorithms deployed widely today. The Internet Key Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a quantum computer is available. It is anticipated that IKEv2 will be extended to support quantum-secure key exchange algorithms; however, that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a quantum computer by using preshared keys.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8784"/>
          <seriesInfo name="DOI" value="10.17487/RFC8784"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.fossati-tls-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="30" month="April" year="2025"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-09"/>
        </reference>
        <reference anchor="I-D.fossati-tls-exported-attestation">
          <front>
            <title>Remote Attestation with Exported Authenticators</title>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Muhammad Usama Sardar" initials="M. U." surname="Sardar">
              <organization>TU Dresden</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <date day="3" month="July" year="2025"/>
            <abstract>
              <t>   This specification defines a method for two parties in a
   communication interaction to exchange Evidence and Attestation
   Results using exported authenticators, as defined in RFC 9261.
   Additionally, it introduces the cmw_attestation extension, which
   allows attestation credentials to be included directly in the
   Certificate message sent during the Exported Authenticator-based
   post-handshake authentication.  The approach supports both the
   passport and background check models from the RATS architecture while
   ensuring that attestation remains bound to the underlying
   communication channel.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-exported-attestation-02"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="25" month="May" year="2025"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of Evidence and Attestation Results in Certificate
   Signing Requests (CSRs), such as PKCS#10 or Certificate Request
   Message Format (CRMF) payloads.  This provides an elegant and
   automatable mechanism for transporting Evidence to a Certification
   Authority.

   Including Evidence and Attestation Results along with a CSR can help
   to improve the assessment of the security posture for the private
   key, and can help the Certification Authority to assess whether it
   satisfies the requested certificate profile.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-19"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="17" month="June" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-13"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
