<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.12 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-birkholz-rats-architecture-03" category="std">

  <front>
    <title abbrev="RATS Arch &amp; Terms">Remote Attestation Procedures Architecture</title>

    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization abbrev="GE Global Research">GE Global Research</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@ge.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="ARM Ltd.">ARM Ltd.</organization>
      <address>
        <postal>
          <street>110 Fulbourn Rd</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization abbrev="Intel">Intel Corporation</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country>USA</country>
        </postal>
        <email>ned.smith@intel.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>Canada</country>
        </postal>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>

    <date year="2019" month="November" day="04"/>

    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>An entity (a relying party) requires a source of truth and evidence about a remote peer to assess the peer’s trustworthiness. The evidence is typically a believable set of claims about its host, software or hardware platform. This document describes an architecture for such remote attestation procedures (RATS).</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Remote Attestation provides a way for an entity (the Relying Party) to determine the health and provenance of an endpoint/host (the Attester).
Knowledge of the health of the endpoint allows for a determination of trustworthiness of the endpoint.</t>

<section anchor="motivation" title="Motivation">

<t>The IETF has long spent it’s time focusing on threats to the communication channel (see <xref target="RFC3552"/> and <xref target="DOLEV-YAO"/>), assuming that endpoints could be trusted and were under the observation of trusted, well-trained professionals.
This assumption has not been true since the days of the campus mini-computer.
For some time after the desktop PC became ubiquitous, the threat to the endpoints has been dealt with as an internal matter, with generally poor results.
Enterprises have done some deployment of Network Endpoint Assessment (<xref target="RFC5209"/>) to assess the security posture about an endpoint, but it has not been ubiquitous.</t>

<t>The movement towards personal mobile devices (“smartphones”) and the continuing threat from unmanaged residential desktops has resulted in a renewed interest in standardizing internet-scale endpoint remote attestation.
Additionally, the rise of the Internet of Things (IoT) has made this issue even more critical: some skeptics have even renamed it to the Internet of Threats <xref target="iothreats"/> :-)  IoT devices have poor or non-existent user interfaces, as such as there are not even good ways to assess the health of the devices manually: a need to determine the health via remote attestation is now critical.</t>

<t>In addition to the health of the device, knowledge of its provenance helps to determine the level of trust, and prevents attacks to the supply chain.
<!--
[NED TO SUPPLY REFERENCES]
--></t>

</section>
<section anchor="opportunities" title="Opportunities">

<t>The Trusted Platform Module (TPM) is now a commonly available peripheral on many commodity compute platforms,  both servers and desktops.
Smartphones commonly have either an actual TPM, or have the ability to emulate one in software running in a Trusted Execution Environment <xref target="I-D.ietf-teep-architecture"/>.  There are now few barriers to creating a standards-based system for remote attestation procedures.</t>

<t>A number of niche solutions have emerged that provide for use-case specific remote attestation, but none have the generality needed to be used across the Internet.</t>

</section>
<section anchor="overview-of-document" title=" Overview of Document">

<t>The architecture described in this document (along with the accompanying solution and reference documents) enables the use of common formats for communicating Claims about an Attester to a Relying Party. [FIXME Attester? Flows? To what end?]</t>

<t>Existing transports were not designed to carry attestation Claims.  It is therefore necessary to design serializations of Claims that fit into a variety of transports, for instance: X.509 certificates, TLS negotiations, YANG modules or EtherNet/IP.  There are also new, greenfield uses for remote attestation. Transport and serialization of these can be done without retrofitting.
This is (will be) described in [INSERT reference to adopted document on transport].</t>

<t>While it is not anticipated that the existing niche solutions described in the use cases section <xref target="referenceusecases"/> will exchange claims directly, the use of a common format enables common code.
As some of the code needs to be in intentionally hard to modify trusted modules, the use of a common formats and transfer protocols significantly reduces the cost of adoption to all parties.
This commonality also significantly reduces the incidence of critical bugs.</t>

<t>In some environments the collection of Evidence by the Attester to be provided to the Verifier is part of an existing protocol: this document does not change that, rather embraces those legacy mechanisms as part of the specification.  This is an evolutionary path forward, not revolutionary.
Yet in other greenfield environments, there is a desire to have a standard for Evidence as well as for Attestation Results, and this architecture outlines how that is done.</t>

<t>This introduction gives an overview of the message flows and roles involved.
Following this, is a terminology section that is referenced normatively by other documents and is a key part of this document.
There is then a section on use cases and how they leverage the roles and workflows described.</t>

<t>In this document, terms defined within this document are consistently Capitalized [work in progress. please raise issues, if there are Blatant inconsistencies].</t>

<t>Current verticals that use remote attestation include:</t>

<t><list style="symbols">
  <t>The Trusted Computing Group “Network Device Attestation Workflow” <xref target="I-D.fedorkow-rats-network-device-attestation"/></t>
  <t>Android Keystore <xref target="keystore"/></t>
  <t>Fast Identity Online (FIDO) Alliance attestation <xref target="fido"/></t>
  <t>A number of Intel SGX niche systems based upon OTRP.</t>
</list></t>

<!--
Things to be mentioned (XXX):
* Device Identifier Composition Engine (DICE)
* Time-based Uni-Directional Attestation (TUDA)
* TPM discussion
* Roots of Trust
-->

</section>
<section anchor="rats-in-a-nutshell" title="RATS in a Nutshell">

<t><list style="numbers">
  <t>Remote Attestation message flows typically convey Claims that contain the trustworthiness properties associated with an Attested Environment (Evidence).</t>
  <t>A corresponding provisioning message flows conveys Reference trustworthiness claims that can be compared with attestation Evidence. Reference Values typically consist of firmware or software digests and details about what makes the attesting module a trusted source of Evidence.</t>
  <t>Relying Parties are performing tasks such as managing a resource, controlling access, and/or managing risk. Attestation Results helps Relying Parties determine levels of trust.</t>
</list></t>

</section>
<section anchor="remote-attestation-workflow" title="Remote Attestation Workflow">

<t>The logical information flow is from Attester to Verifier to Relying Party.
There are variations presented below on how this integrates into actual protocols.</t>

<figure title="RATS Workflow" anchor="wholeflow"><artwork type="WHOLEFLOW" align="center"><![CDATA[


                            ************
                            * Asserter *
                            ************
                                  |
                                  |
                                  |Known-Good-Values
                                  |Endorsements     
                                  |
                                  v
                          .---------------.
                          |   Verifier    |
               .--------->|               |----------.
               |          |               |          |
               |          '---------------'          |
               |                                     |
               |Evidence                             |Attestation Results
               |                                     |(Claims)           
               |                                     |
               |                                     v
       .---------------.                     .---------------.
       |   Attester    |                     | Relying Party |
       |               |                     |               |
       |               |                     |               |
       '---------------'                     '---------------'
]]></artwork></figure>

<t>In the architecture shown above, specific content items (payload conveyed in message flows) are identified:</t>

<t><list style="symbols">
  <t>Evidence is as set of believable Claims about distinguishable Environments made by an Attester.</t>
  <t>Known-Good-Values are reference Claims used to appraise Evidence by an Verifier.</t>
  <t>Endorsements are reference Claims about the type of protection that enables an Attester to create believable Evidence. Endorsements enable trust relationships towards system components or environments Evidence cannot be created for by an Attester.</t>
  <t>Attestation Results are the output from the appraisal of Evidence, Known-Good-Values and Endorsements and are consumed by Relying Parties.</t>
</list></t>

<t>Attestation Results are the output of RATS.</t>

<t>Assessment of Attestation Results is be multi-faceted and out-of-scope for the  architecture.</t>

<t>If appropriate Endorsements about the Attester are available, Known-Good-Values about the Attester are available, and if the Attester is capable of creating believable Evidence - then the Verifier is able to create Attestation Results that enable Relying Parties to establish a level of confidence in the trustworthiness of the Attester.</t>

<t>The Asserter role and the format for Known-Good-Values and Endorsements are not subject to standardization at this time.  The current verticals already include provisions for encoding and/or distributing these objects.</t>

</section>
<section anchor="messageflows" title="Message Flows">

<t>Two distinct flows have been identified for passage of Evidence and production of Attestation Results.  It is possible that there are additional situations which are not captured by these two flows.</t>

<section anchor="passport" title="Passport Model">

<t>In the Passport Model message flow the Attester provides it’s Evidence directly to the Verifier.  The Verifier will evaluate the Evidence and then sign an Attestation Result.  This Attestation Result is returned to the Attester, and it is up to the Attester to communicate the Attestation Result (potentially including the Evidence, if disclosable) to the Relying Party.</t>

<figure title="RATS Passport Flow" anchor="passport_diag"><artwork type="PASSPORT"><![CDATA[



         ************
         * Asserter *
         ************
               |Known-Good-Values
               |Endorsements     
               |
               v
       .---------------.
       |   Verifier    |
       |               |
       |               |
       '------------|--'
           ^        |
           |        |Attestation Results
  Evidence |        |(Claims)           
           |        |
           |        |
           |        v
       .---|-----------.                     .---------------.
       |   Attester    |                     | Relying Party |
       |               ---------------------->               |
       |               | Attestation Results |               |
       '---------------' (Claims)            '---------------'
]]></artwork></figure>

<t>This flow is named in this way because of the resemblance of how Nations issue Passports to their citizens. The nature of the Evidence that an individual needs to provide to it’s local authority is specific to the country involved.  The citizen retains control of the resulting document and presents it to other entities when it needs to assert a citizenship or identity claim.</t>

</section>
<section anchor="background" title="Background Check">

<t>In the Background-Check message flow the Attester provides it’s Evidence to the Relying Party.
The Relying Party sends this evidence to a Verifier of its choice.  The Verifier will evaluate the Evidence and then sign an Attestation Result.  This Attestation Result is returned to the Relying Party, which processes it directly.</t>

<figure title="RATS Background Check Flow" anchor="background_diag"><artwork type="BACKGROUND"><![CDATA[




                                               ************
                                               * Asserter *
                                               ************
                                                     |Known-Good-Values
                                                     |Endorsements     
                                                     |
                                                     v
                                             .---------------.
                                             |   Verifier    |
                                             |               |
                                             |               |
                                             '--^---------|--'
                                                |         |
                                                |         |Attestation Results
                                       Evidence |         |(Claims)           
                                                |         |
                                                |         v
       .---------------.                     .--|------------.
       |   Attester    |      Evidence       | Relying Party |
       |               ---------------------->               |
       |               |                     |               |
       '---------------'                     '---------------'
]]></artwork></figure>

<t>This flow is named in this way because of the resemblance of how employers and volunteer organizations
perform background checks.  When a prospective employee provides claims about education or previous experience, the employer will contact the respective institutions or former employers to validate the claim.  Volunteer organizations often perform police background checks on volunteers in order to determine the volunteer’s trustworthiness.</t>

</section>
</section>
</section>
<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t><list style="hanging">
  <t hangText='Appraisal:'>
  A Verifier process that compares Evidence to Reference values while taking into account Endorsements and produces Attestation Results.</t>
  <t hangText='Asserter:'>
  See <xref target="asserter"/>.</t>
  <t hangText='Attester:'>
  See <xref target="attester"/>.</t>
  <t hangText='Attested Environment:'>
  A target environment that is observed or controlled by an Attesting Environment.</t>
  <t hangText='Attesting Environment:'>
  An environment capable of making trustworthiness Claims about an Attested Environment.</t>
  <t hangText='Background-Check Message Flow:'>
  An attestation workflow where the Attester provides Evidence to a Relying Party, who consults one or more Verifiers who supply Attestation Results to the Relying Party. See <xref target="background"/>.</t>
  <t hangText='Claim:'>
  A statement about the construction, composition, validation or behavior of an Entity that affects trustworthiness. Evidence, Reference Values and Attestation Results are expressions that consists of one or more Claims.
<!--
Statements about trustworthiness characteristics of an Attested Environment. The veracity of a Claim is determined by the reputation of the entity making the Claim. Reputation may involve identifying, authenticating and tracking transactions associated with an entity. RATS may be used to establish entity reputation, but not exclusively. Other reputation mechanisms are out-of-scope.
--></t>
  <t hangText='Conveyance:'>
  The process of transferring Evidence, Reference Values and Attestation Results between Entities participating in attestation workflow.</t>
  <t hangText='Entity:'>
  A device, component (see System Component <xref target="RFC4949"/>), or environment that implements one or more Roles.</t>
  <t hangText='Evidence:'>
  See <xref target="evidence"/>.</t>
  <t hangText='Passport Message Flow:'>
  An attestation workflow where the Attester provides Evidence to a Verifier who returns Attestation Results that are then forwarded to one or more Relying Parties. See <xref target="passport"/>.</t>
  <t hangText='Reference Values:'>
  See <xref target="reference"/>. Also referred to as Known-Good-Values.</t>
  <t hangText='Relying Party:'>
  See <xref target="relyingparty"/>.</t>
  <t hangText='Attestation Results:'>
  See <xref target="results"/>.</t>
  <t hangText='Role:'>
  A function or process in an attestation workflow, typically described by: Attester, Verifier, Relying Party and Asserter.</t>
  <t hangText='Verifier:'>
  See <xref target="verifier"/>.</t>
</list></t>

</section>
<section anchor="referenceusecases" title="Reference use cases">

<t>This section provides an overview of a number of distinct use cases that benefit from a standardized claim format.
In addition to outlining the user, the specific message flow is identified from among the flows detailed in <xref target="messageflows"/>.</t>

<section anchor="netattest" title="Device Capabilities/Firmware Attestation">

<t>This is a large category of claims that includes a number of subcategories,
not detailed here.</t>

<t><list style="hanging">
  <t hangText='Use case name:'>
  Device Identity</t>
  <t hangText='Who will use it:'>
  Network Operators, larger enterprises</t>
  <t hangText='Attester:'>
  varies</t>
  <t hangText='Message Flow:'>
  sometimes passport and sometimes background check</t>
  <t hangText='Relying Party:'>
  varies</t>
  <t hangText='Description:'>
  Network operators want a trustworth report of identity and version of
information of the hardware and software on the machines attached to their
network.
The process starts with some kind of Root of Trust that provides device
identity and protected storage for measurements. The mechanism performs a
series of measurements, and expresses this
with an attestation as to the hardware and firmware/software which is
running.</t>
</list></t>

<t>This is a general description for which there are many specific use cases,
including <xref target="I-D.fedorkow-rats-network-device-attestation"/> section 1.2,
“Software Inventory”</t>

</section>
<section anchor="ietf-teep-wg-use-case" title="IETF TEEP WG Use-Case">

<t><list style="hanging">
  <t hangText='Use case name:'>
  TAM validation</t>
  <t hangText='Who will use it:'>
  The TAM server</t>
  <t hangText='Message Flow:'>
  background check</t>
  <t hangText='Attester:'>
  Trusted Execution Environment (TEE)</t>
  <t hangText='Relying Party:'>
  end-application</t>
  <t hangText='Description:'>
  The “Trusted Application Manager (TAM)” server wants to verify the state of a
TEE, or applications in the TEE, of a device.  The TEE attests to the TAM,
which can then decide whether to install sensitive data in the TEE, or
whether the TEE is out of compliance and the TAM needs to install updated
code in the TEE to bring it back into compliance with the TAM’s policy.</t>
</list></t>

</section>
<section anchor="safety-critical-systems" title="Safety Critical Systems">

<t><list style="hanging">
  <t hangText='Use case name:'>
  Safety Critical Systems</t>
  <t hangText='Who will use it:'>
  Power plants and other systems that need to assert their current state, but which can not accept any inputs from the outside.  The corollary system is
a black-box (such as in an aircraft), which needs to log the state of a system,
but which can never initiate a handshake.</t>
  <t hangText='Message Flow:'>
  background check</t>
  <t hangText='Attester:'>
  web services and other sources of status/sensor information</t>
  <t hangText='Relying Party:'>
  open</t>
  <t hangText='Claims used as Evidence:'>
  the beginning and ending time as endorsed by a Time Stamp Authority,
represented by a time stamp token.  The real time clock of the system
itself.  A Root of Trust for time; the TPM has a relative time from
startup.</t>
  <t hangText='Description:'>
  These requirements motivate the creation of the Time-Base Unidirectional Attestation (TUDA) <xref target="I-D.birkholz-rats-tuda"/>, the output of TUDA is typically a secure audit log, where freshness is determined by synchronization to a trusted source of external time.</t>
  <t>The freshness is preserved in the Evidence by the use of a Time Stamp Authority (TSA) which provides Time Stamp Tokens (TST).</t>
</list></t>

</section>
<section anchor="virtualized-multi-tenant-hosts" title="Virtualized Multi-Tenant Hosts">

<t><list style="hanging">
  <t hangText='Use case name:'>
  Multi-Tenant Hosts</t>
  <t hangText='Who will use it:'>
  Virtual machine systems</t>
  <t hangText='Message Flow:'>
  passport</t>
  <t hangText='Attester:'>
  virtual machine hypervisor</t>
  <t hangText='Relying Party:'>
  network operators</t>
  <t hangText='Description:'>
  The host system will do verification as per <xref target="netattest"/></t>
  <t>The tenant virtual machines will do verification as per <xref target="netattest"/>.</t>
  <t>The network operator wants to know if the system <spanx style="emph">as a whole</spanx> is free of
malware, but the network operator is not allowed to know who the tenants are.</t>
  <t>This is contrasted to the Chassis + Line Cards case (To Be Defined: TBD).</t>
  <t>Multiple Line Cards, but a small attestation system on the main card can
combine things together.
This is a kind of proxy.</t>
</list></t>

</section>
<section anchor="cryptattest" title="Cryptographic Key Attestation">

<t>Cryptographic Attestion includes subcategories such as Device Type
Attestation (the FIDO use case), and Key storage Attestation (the Android
Keystore use case), and End-User Authorization.</t>

<t><list style="hanging">
  <t hangText='Use case name:'>
  Key Attestation</t>
  <t hangText='Who will use it:'>
  network authentication systems</t>
  <t hangText='Message Flow:'>
  passport</t>
  <t hangText='Attester:'>
  device platform</t>
  <t hangText='Relying Party:'>
  internet peers</t>
  <t hangText='Description:'>
  The relying party wants to know how secure a private key that identifies an entity is.
Unlike the network attestation, the relying party is not part of the network infrastructure, nor do they necessarily have a business relationship (such as ownership) over the end device.</t>
  <t>The Device Type Attestation is provided by a Firmware TPM performing the Verifier function, creating Attestation Results that indicate a particular model/type of device.  In TCG terms, this is called Implicit Attestation, in this case the Attested Environment is the (smartphone) Rich Execution Environment (REE) (<xref target="I-D.ietf-teep-architecture"/> section 2), and the Attesting Environment is within the TEE.</t>
</list></t>

</section>
<section anchor="geographic-evidence" title="Geographic Evidence">

<t><list style="hanging">
  <t hangText='Use case name:'>
  Location Evidence</t>
  <t hangText='Who will use it:'>
  geo-fenced systems</t>
  <t hangText='Message Flow:'>
  passport (probably)</t>
  <t hangText='Attester:'>
  secure GPS system(s)</t>
  <t hangText='Relying Party:'>
  internet peers</t>
  <t hangText='Description:'>
  The relying party wants to know the physical location (on the planet earth, using a geodetic system) of the device.
This may be provided directly by a GPS/GLONASS/BeiDou/Galileo module that is incorporated into a TPM.
This may also be provided by collecting other proximity messages from other device that the relying party can form a trust relationship with.</t>
</list></t>

</section>
<section anchor="device-provenance-attestation" title="Device Provenance Attestation">

<t><list style="hanging">
  <t hangText='Use case name:'>
  RIV - Device Provenance</t>
  <t hangText='Who will use it:'>
  Industrial IoT devices</t>
  <t hangText='Message Flow:'>
  passport</t>
  <t hangText='Attester:'>
  network management station</t>
  <t hangText='Relying Party:'>
  a network entity</t>
  <t hangText='Description:'>
  A newly manufactured device needs to be onboarded into a network where many
if not all device management duties are performed by the network owner.
The device owner wants to verify the device originated from a legitimate vendor.
A cryptographic device identity such as an IEEE802.1AR is embedded during manufacturing and a certificate identifying the device is delivered to the owner  onboarding agent.
The device authenticates using its 802.1AR IDevID to prove it originated from the expected vendor.</t>
</list></t>

<t>The device chain of custody from the original device manufacturer to the new owner may also be verified as part of device provenance attestation.
The chain of custody history may be collected by a cloud service or similar capability that the supply chain and owner agree to use.</t>

<t><xref target="I-D.fedorkow-rats-network-device-attestation"/> section 1.2 refers to this as “Provable Device Identity”, and section 2.3 details the parties.</t>

</section>
</section>
<section anchor="conceptual-overview" title="Conceptual Overview">

<t>In network protocol exchanges, it is often the case that one entity (a Relying Party) requires an assessment of the trustworthiness of a remote entity (an Attester or specific system components <xref target="RFC4949"/> thereof).
Remote ATtestation procedureS (RATS) enable Relying Parties to establish a level of confidence in the trustworthiness of Attesters through the</t>

<t><list style="symbols">
  <t>Creation,</t>
  <t>Conveyance, and</t>
  <t>Appraisal</t>
</list></t>

<t>of attestation Evidence.</t>

<t><list style="hanging">
  <t hangText='Qualities of Evidence:'>
  Evidence is composed of Claims about trustworthiness (the set of Claims is unbounded). The system characteristics of Attesters – the Environments they are composed-of, and their continuous development – have an impact on the veracity of trustworthiness Claims included in valid Evidence.</t>
  <t>Valid Evidence about the intactness of an Attester must be impossible to create by an untrustworthy or compromised Environment of an Attester.</t>
  <t hangText='Qualities of Environments:'>
  The resilience of Environments that are part of an Attester can vary widely - ranging from those highly resistant to attacks to those having little or no resistance to attacks.
Configuration options, if set poorly, can result in a highly resistant environment being operationally less resistant.
When a trustworthy Environment changes, it is possible that it transitions from
being trustworthy to being untrustworthy.</t>
  <t>An untrustworthy or compromised Environment must never be able to create valid Evidence expressing the intactness of an Attester.</t>
</list></t>

<t>The architecture provides a framework for anticipating when a relevant change with respect to a trustworthiness attribute occurs, what exactly changed and how relevant it is. The architecture also creates a context for enabling an appropriate response by applications, system software and protocol endpoints when changes to trustworthiness attributes do occur.</t>

<t>Detailed protocol specifications for message flows are defined in separate documents.</t>

<section anchor="two-types-of-environments" title="Two Types of Environments">

<t>An Attester produces Evidence about its own integrity, which means “it measures itself”. To disambiguate this recursive or circular looking relationships, two types of Environments inside an Attester are distinguished:</t>

<t>The attest-ED Environments and the attest-ING Environments.</t>

<t>Attested Environments are measured. They provide the raw values and the information to be represented in Claims and ultimately expressed as Evidence.</t>

<t>Attesting Environments conduct the measuring. They collect the Claims, format them appropriately, and typically use key material and cryptographic functions, such as signing or cipher algorithms, to create Evidence.</t>

<t>Attesting Environments use system components that have to be trusted. As a result, Evidence includes Claims about the Attested and the Attesting Environments. Claims about the Attested Environments are appraised using Reference Values and Claims about the Attesting Environments are appraised using Endorsements. It is not mandated that both Environments have to be separate, but it is highly encouraged. Examples of separated Environments that can be used as Attesting Environments include: Trusted Execution Environments (TEE), embedded Secure Elements (eSE), or Hardware Security Modules (HSM).</t>

<t>In summary, the majority of the creation of evidence can take place in an Attested Environments. Exemplary duties include the collection and formatting of Claim values, or the trigger for creating Evidence. A trusted sub-set of the creation of evidence can take place in an Attesting Environment, that provide special protection with respect to key material, identity documents, or primitive functions to create the Evidence itself.</t>

</section>
<section anchor="evidence-creation-prerequisites" title="Evidence Creation Prerequisites">

<t>One or more Environments that are part of an Attester must be able to conduct the following duties in order to create Evidence:</t>

<t><list style="symbols">
  <t>monitoring trustworthiness attributes of other Environments,</t>
  <t>collecting trustworthiness attributes and create Claims about them,</t>
  <t>serialize Claims using interoperable representations,</t>
  <t>provide integrity protection for the sets of Claims, and</t>
  <t>add appropriate attestation provenance attributes about the sets of Claims.</t>
</list></t>

</section>
<section anchor="trustworthiness" title="Trustworthiness">

<t>The trustworthiness of an Attester and therefore the believability of the Evidence it creates relies on the protection methods in place to shield and restrict the use of key material and the duties conducted by the Attesting Environment.
In order to assess trustworthiness effectively, it is mandatory to understand the trustworthiness properties of the environments of an Attester. The corresponding appraisal of Evidence that leads to such an assessment of trustworthiness is the duty of a Verifier.</t>

<t>Trusting the assessment of a Verifier might com frome trusting the Verifier’s key material (direct trust), or trusting an Entity that the Verifier is associated with via a certification path (indirect trust).</t>

<t>The trustworthiness of corresponding Attestation Results also relies on trust towards manufacturers and those manufacturer’s hardware in order to assess the integrity and resilience of that manufacturer’s devices.</t>

<t>A stronger level of security comes when information can be vouched for by hardware or by (unchangeable) firmware, especially if such hardware is physically resistant to hardware tampering.
The component that is implicitly trusted is often referred to as a Root of Trust.</t>

</section>
<section anchor="workflow" title="Workflow">

<t>The basic function of RATS is creation, conveyance and appraisal of attestation Evidence.
An Attester creates attestation Evidence that are conveyed to a Verifier for appraisal.
The appraisals compare Evidence with expected Known-Good-Values obtained from Asserters (e.g. Principals that are Supply Chain Entities).
There can be multiple forms of appraisal (e.g., software integrity verification, device composition and configuration verification, device identity and provenance verification).
Attestation Results are the output of appraisals. Attestation Results are signed and conveyed to Relying Parties. Attestation Results provide the basis by which the Relying Party may determine a level of confidence to place in the application data or operations that follow.</t>

<t>The architecture defines attestation Roles: Attester, Verifier, Asserter and Relying Party.
Roles exchange messages, but their structure is not defined in this document.
The detailed definition of the messages is in an appropriate document, such as <xref target="I-D.ietf-rats-eat"/> or other protocols to be defined.
Roles can be combined in various ways into Principals, depending upon the needs of the use case.
Information Model representations are realized as data structure and conveyance protocol specifications.</t>

</section>
<section anchor="interoperability-between-rats" title="Interoperability between RATS">

<t>The RATS architecture anticipates use of information modeling techniques that describe computing structures – their components/computational elements and corresponding capabilities – so that verification operations may rely on the information model as an interoperable way to navigate the structural complexity.</t>

</section>
</section>
<section anchor="rats-architecture" title="RATS Architecture">

<section anchor="goals" title="Goals">

<t>RATS architecture has the following goals:</t>

<t><list style="symbols">
  <t>Enable semantic interoperability of attestation semantics through information models about computing environments and trustworthiness.</t>
  <t>Enable data structure interoperability related to claims, endpoint composition / structure, and end-to-end integrity and confidentiality protection mechanisms.</t>
  <t>Enable programmatic assessment of trustworthiness. (Note: Mechanisms that manage risk, justify a level of confidence, or determine a consequence of an attestation result are out of scope).</t>
  <t>Provide the building blocks, including Roles and Principals that enable the composition of service-chains/hierarchies and workflows that can create and appraise evidence about the trustworthiness of devices and services.</t>
  <t>Use-case driven architecture and design (see <xref target="I-D.richardson-rats-usecases"/> and <xref target="referenceusecases"/>)</t>
  <t>Terminology conventions that are consistently applied across RATS specifications.</t>
  <t>Reinforce trusted computing principles that include attestation.</t>
</list></t>

</section>
<section anchor="attestation-principles" title="Attestation Principles">

<t>Specifications developed by the RATS working group apply the following principles:</t>

<t><list style="symbols">
  <t>Freshness - replay of previously asserted Claims about an Attested Environment can be detected.</t>
  <t>Identity - the Attesting Environment is identifiable (non-anonymous).</t>
  <t>Context - the Attested Environment is well-defined (unambiguous).</t>
  <t>Provenance - the origin of Claims with respect to the Attested and Attesting Environments are known.</t>
  <t>Validity - the expected lifetime of Claims about an Attested Environment is known.</t>
  <t>Veracity - the believability (level of confidence) of Claims is based on verifiable proofs.</t>
</list></t>

</section>
<section anchor="attestation-workflow" title="Attestation Workflow">

<t>Attestation workflow helps a Relying Party make better decisions by providing insight about the trustworthiness of endpoints participating in a distributed system. The workflow consists primarily of four roles; Relying Party, Verifier, Attester and Asserter. Attestation messages contain information useful for appraising the trustworthiness of an Attester endpoint and informing the Relying Party of the appraisal result.</t>

<!--
The RATS Roles (roles) are performed by RATS Principals.

The RATS Architecture provides the building blocks to compose various RATS roles by leveraging existing and new protocols. It defines architecture for composing RATS roles with principals and models their interactions.
-->
<t>This section details the primary roles of an attestation workflow and the messages they exchange.</t>

<section anchor="roles" title="Roles">

<t>An endpoint system (a.k.a., Entity) may implement one or more attestation Roles to accommodate a variety of possible message flows. Exemplary message flows are described in <xref target="passport"/> and <xref target="background"/>. Role messages are secured by the Entity that generated it. Entities possess credentials (e.g., cryptographic keys) that authenticate, integrity protect and optionally confidentiality protect attestation messages.</t>

<section anchor="attester" title="Attester">

<t>The Attester consists of both an Attesting Environment and an Attested Environment. In some implementations these environments may be combined. Other implementations may have multiples of Attesting and Attested environments. Although endpoint environments can be complex, and that complexity is security relevant, the basic function of an Attester is to create Evidence that captures operational conditions affecting trustworthiness.</t>

<!--
...by collecting, formatting and protecting (e.g., signing) Claims.
It presents Evidence to a Verifier using a conveyance mechanism or protocol.

The creator of Evidence. The Role that designates an Entity to be assessed with respect to its trustworthiness properties in the scope of a specific Profile.
-->

</section>
<section anchor="asserter" title="Asserter">

<t>The Asserter role is out of scope.
The mechanism by which an Asserter communicates Known-Good-Values to a Verifier is also not subject to standardization.
Users of the RATS architecture are assumed to have pre-existing mechanisms.</t>

</section>
<section anchor="verifier" title="Verifier">

<t>The Verifier workflow function accepts Evidence from an Attester and accepts Reference Values from one or more Asserters. Reference values may be supplied a priori, cached or used to created policies. The Verifier performs an appraisal by matching Claims found in Evidence with Claims found in Reference Values and policies. If an attested Claim value differs from an expected Claim value, the Verifier flags this as a change possibly impacting trust level.</t>

<t>Endorsements may not have corresponding Claims in Evidence (because of their intrinsic nature). Consequently, the Verifier need only authenticate the endpoint and verify the Endorsements match the endpoint identity.</t>

<t>The result of appraisals and Endorsements, informed by owner policies, produces a new set of Claims that a Relying Party is suited to consume.
<!--
An Attestation Function that accepts Evidence from an Attester using a conveyance mechanism or protocol.
It also accepts Known-Good-Values and Endorsements from an Asserter using a conveyance mechanism or protocol.
It verifies the protection mechanisms, parses and appraises Evidence according to good-known valid (or known-invalid) Claims and Endorsements.
It produces Attestation Results that are formatted and protected (e.g., signed).
It presents Attestation Results to a Relying Party using a conveyance mechanism or protocol.
-->
<!--
The consumer of Evidence for appraisal. The Role that designates an Entity to create Attestation Results based on Evidence, Known-Good-Values, and Endorsements.
--></t>

</section>
<section anchor="relyingparty" title="Relying Party">

<t>A Role in an attestation workflow that accepts Attestation Results from a Verifier that may be used by the Relying Party to inform application specific decision making. How Attestation Results are used to inform decision making is out-of-scope for this architecture.</t>

<!--
It assesses Attestation Results protections, parses and assesses Attestation Results according to an assessent context (Note: definition of the assessment context is out-of-scope).

The consumer or proxy of Attestation Results. The Role that designates an Entity that requires reliable and believable statements about the Trustworthiness of an Attester Role.
-->

</section>
</section>
<section anchor="messages" title="Role Messages">

<section anchor="evidence" title="Evidence">

<t>Claims that are formatted and protected by an Attester.</t>

<t>Evidence SHOULD satisfy Verifier expectations for freshness, identity, context, provenance, validity, and veracity.
<!--
 A Message type created and conveyed by the Attester Role. Attestation Evidence can be consumed and relayed by other Roles, primarily the Verifier Role to appraise the Evidence.
 --></t>

</section>
<section anchor="reference" title="Reference Values">

<t>Reference-values are Claims that a manufacturer, vendor or other supply chain entity makes that affects the trustworthiness of an Attester endpoint.</t>

<t>Claims may be persistent properties of the endpoint due to the physical nature of how it was manufactured or may reflect the processes that were followed as part of moving the endpoint through a supply-chain; e.g., validation or compliance testing. This class of Reference-values is known as Endorsements.</t>

<t>Another class of Reference-values identifies the firmware and software that could be installed in the endpoint after its manufacture.
A digest of the the firmware or software can be an effective identifier for keeping track of the images produced by vendors and installed on an endpoint.
This class of Reference-value is referred to as Known-Good-Value (KGV).</t>

<!--
NMS What about calling them "Reference Digests"? This is more to the point of what it is.
-->

<t><list style="hanging">
  <t hangText='Known-Good-Values:'>
  Claims about the Attested Environment. Typically, Known-Good-Value (KGV) Claims are message digests of firmware, software or configuration data supplied by various vendors.
If an Attesting Environment implements cryptography, they include Claims about key material.</t>
  <t>Like Claims, Known-Good-Values SHOULD satisfy a Verifier’s expectations for freshness, identity, context, provenance, validity, relevance and veracity.
Known-Good-Values are reference Claims that are - like Evidence - well formatted and protected (e.g. signed).
<!--
A Message type created and distributed by the Asserter Role and consumed by the Verifier Role. Known-Good-Values are reference Claims that are used to appraise the believability and veracity of attestation Evidence.
--></t>
  <t hangText='Endorsements:'>
  Claims about immutable and implicit characteristics of the Attesting Environment. Typically, endorsement Claims are created by manufacturing or supply chain entities.</t>
  <t>Endorsements are intended to increase the level of confidence with respect to Evidence created by an Attester.
<!--
A Message type created and distributed by the Asserter Role and consumed by the Verifier Role. Endorsements provide Claims about Components of an Attester that an Attesting Environment cannot create Evidence about.
--></t>
</list></t>

</section>
<section anchor="results" title="Attestation Results">

<t>Statements about the output of an appraisal of Evidence that are created, formatted and protected by a Verifier.</t>

<t>Attestation Results provide the basis for a Relying Party to establish a level of confidence in the trustworthiness of an Attester.
Attestation Results SHOULD satisfy Relying Party expectations for freshness, identity, context, provenance, validity, relevance and veracity.
<!--
A Message type created by the Verifier Role and ultimately consumed by Relying Parties.
--></t>

</section>
</section>
</section>
<section anchor="principals-entities-containers-for-the-roles" title="Principals (Entities?) – Containers for the Roles">

<t>[The authors are unhappy with the term Principal, and have been looking for something else.  JOSE/JWT uses the term Principal]</t>

<t>Principals are Containers for the Roles.</t>

<t>Principals are users, organizations, devices and computing environments (e.g., devices, platforms, services, peripherals).</t>

<t>Principals may implement one or more Roles. Massage flows occurring within the same Principal are out-of-scope.</t>

<t>The methods whereby Principals may be identified, discovered, authenticated, connected and trusted, though important, are out-of-scope.</t>

<t>Principal operations that apply resiliency, scaling, load balancing or replication are generally believed to be out-of-scope.</t>

<figure title="Principals-Role Composition" anchor="Principals"><artwork type="RATS" align="center"><![CDATA[
+------------------+   +------------------+
|  Principal 1     |   |  Principal 2     |
|  +------------+  |   |  +------------+  |
|  |            |  |   |  |            |  |
|  |    Role A  |<-|---|->|    Role D  |  |
|  |            |  |   |  |            |  |
|  +------------+  |   |  +------------+  |
|                  |   |                  |
|  +-----+------+  |   |  +-----+------+  |
|  |            |  |   |  |            |  |
|  |    Role B  |<-|---|->|    Role E  |  |
|  |            |  |   |  |            |  |
|  +------------+  |   |  +------------+  |
|                  |   |                  |
+------------------+   +------------------+
]]></artwork></figure>

<t>Principals have the following properties:</t>

<t><list style="symbols">
  <t>Multiplicity - Multiple instances of Principals that possess the same Roles can exist.</t>
  <t>Composition - Principals possessing different Roles can be combined into a singleton Principal possessing the union of Roles. Message flows between combined Principals is uninteresting.</t>
  <t>Decomposition -  A singleton Principal possessing multiple Roles can be divided into multiple Principals.</t>
</list></t>

</section>
</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>The conveyance of Evidence and the resulting Attestation Results reveal a great deal of information about the internal state of a device.
In many cases the whole point of the Attestation process is to provided reliable evidence about the type of the device and the firmware that the device is running.
This information is particularly interesting to many attackers: knowing that a device is running a weak version of a the firmware provides a way to aim attacks better.</t>

<t>Just knowing the existence of a device is itself a disclosure.</t>

<t>Conveyance protocols must detail what kinds of information is disclosed, and to whom it is exposed.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>Evidence, Verifiable Assertions and Attestation Results SHOULD use formats that support end-to-end integrity protection and MAY support end-to-end confidentiality protection.</t>

<t>Replay attacks are a concern that protocol implementations MUST deal with.
This is typically done via a Nonce Claim, but the details belong to the protocol.</t>

<t>All other attacks involving RATS structures are not explicitly addressed by the architecture.</t>

<t>Additional security protections MAY be required of conveyance mechanisms.
For example, additional means of authentication, confidentiality, integrity, replay, denial of service and privacy protection of RATS payloads and Principals may be needed.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Dave Thaler created the concepts of “Passport” and “Background Check”.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="I-D.ietf-teep-architecture">
<front>
<title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>

<author initials='M' surname='Pei' fullname='Mingliang Pei'>
    <organization />
</author>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='D' surname='Wheeler' fullname='David Wheeler'>
    <organization />
</author>

<author initials='A' surname='Atyeo' fullname='Andrew Atyeo'>
    <organization />
</author>

<author initials='D' surname='Liu' fullname='Dapeng Liu'>
    <organization />
</author>

<date month='July' day='8' year='2019' />

<abstract><t>A Trusted Execution Environment (TEE) is designed to provide a hardware-isolation mechanism to separate a regular operating system from security-sensitive application components.  This architecture document motivates the design and standardization of a protocol for managing the lifecycle of trusted applications running inside a TEE.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-teep-architecture-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-teep-architecture-03.txt' />
</reference>

<reference anchor="DOLEV-YAO" >
  <front>
    <title>On the security of public key protocols</title>
    <author initials="D." surname="Dolev" fullname="D. Dolev">
      <organization></organization>
    </author>
    <author initials="A." surname="Yao" fullname="A. Yao">
      <organization></organization>
    </author>
    <date year="1983" month="March"/>
  </front>
  <seriesInfo name="IEEE Transactions on Information Theory" value="Vol. 29, pp. 198-208"/>
  <seriesInfo name="DOI" value="10.1109/tit.1983.1056650"/>
</reference>


<reference anchor="ABLP" >
  <front>
    <title>A Calculus for Access Control in Distributed Systems</title>
    <author initials="M." surname="Abadi" fullname="Martin Abadi">
      <organization></organization>
    </author>
    <author initials="M." surname="Burrows" fullname="Michael Burrows">
      <organization></organization>
    </author>
    <author initials="B." surname="Lampson" fullname="Butler Lampson">
      <organization></organization>
    </author>
    <author initials="G." surname="Plotkin" fullname="Gordon Plotkin">
      <organization></organization>
    </author>
    <date year="1991"/>
  </front>
  <seriesInfo name="Springer" value="Annual International Cryptology Conference"/>
  <seriesInfo name="page" value="1-23"/>
  <seriesInfo name="DOI" value="10.1.1.36.691"/>
</reference>
<reference anchor="Lampson2007" >
  <front>
    <title>Practical Principles for Computer Security</title>
    <author initials="B." surname="Lampson" fullname="Butler Lampson">
      <organization></organization>
    </author>
    <date year="2007"/>
  </front>
  <seriesInfo name="IOSPress" value="Proceedings of Software System Reliability and Security"/>
  <seriesInfo name="page" value="151-195"/>
  <seriesInfo name="DOI" value="10.1.1.63.5360"/>
</reference>
<reference anchor="iothreats" target="https://gcn.com/articles/2016/05/03/internet-of-threats.aspx">
  <front>
    <title>The Internet of Things or the Internet of threats?</title>
    <author initials="." surname="GDN" fullname="STEVE SARNECKI">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>




<reference  anchor="RFC5209" target='https://www.rfc-editor.org/info/rfc5209'>
<front>
<title>Network Endpoint Assessment (NEA): Overview and Requirements</title>
<author initials='P.' surname='Sangster' fullname='P. Sangster'><organization /></author>
<author initials='H.' surname='Khosravi' fullname='H. Khosravi'><organization /></author>
<author initials='M.' surname='Mani' fullname='M. Mani'><organization /></author>
<author initials='K.' surname='Narayan' fullname='K. Narayan'><organization /></author>
<author initials='J.' surname='Tardo' fullname='J. Tardo'><organization /></author>
<date year='2008' month='June' />
<abstract><t>This document defines the problem statement, scope, and protocol requirements between the components of the NEA (Network Endpoint Assessment) reference model.  NEA provides owners of networks (e.g., an enterprise offering remote access) a mechanism to evaluate the posture of a system.  This may take place during the request for network access and/or subsequently at any time while connected to the network.  The learned posture information can then be applied to a variety of compliance-oriented decisions.  The posture information is frequently useful for detecting systems that are lacking or have out-of-date security protection mechanisms such as: anti-virus and host-based firewall software.  In order to provide context for the requirements, a reference model and terminology are introduced.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5209'/>
<seriesInfo name='DOI' value='10.17487/RFC5209'/>
</reference>



<reference  anchor="RFC3552" target='https://www.rfc-editor.org/info/rfc3552'>
<front>
<title>Guidelines for Writing RFC Text on Security Considerations</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='B.' surname='Korver' fullname='B. Korver'><organization /></author>
<date year='2003' month='July' />
<abstract><t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='72'/>
<seriesInfo name='RFC' value='3552'/>
<seriesInfo name='DOI' value='10.17487/RFC3552'/>
</reference>



<reference  anchor="RFC4949" target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>



<reference anchor="I-D.richardson-rats-usecases">
<front>
<title>Use cases for Remote Attestation common encodings</title>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='C' surname='Wallace' fullname='Carl Wallace'>
    <organization />
</author>

<author initials='W' surname='Pan' fullname='Wei Pan'>
    <organization />
</author>

<date month='October' day='6' year='2019' />

<abstract><t>This document details mechanisms created for performing Remote Attestation that have been used in a number of industries.  The document initially focuses on existing industry verticals, mapping terminology used in those specifications to the more abstract terminology used by the IETF RATS Working Group.  The document aspires to describe possible future use cases that would be enabled by common formats.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-richardson-rats-usecases-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-richardson-rats-usecases-05.txt' />
</reference>



<reference anchor="I-D.fedorkow-rats-network-device-attestation">
<front>
<title>Network Device Attestation Workflow</title>

<author initials='G' surname='Fedorkow' fullname='Guy Fedorkow'>
    <organization />
</author>

<author initials='J' surname='Fitzgerald-McKay' fullname='Jessica Fitzgerald-McKay'>
    <organization />
</author>

<date month='July' day='3' year='2019' />

<abstract><t>This document describes a workflow for network device attestation.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-fedorkow-rats-network-device-attestation-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-fedorkow-rats-network-device-attestation-00.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-tuda">
<front>
<title>Time-Based Uni-Directional Attestation</title>

<author initials='A' surname='Fuchs' fullname='Andreas Fuchs'>
    <organization />
</author>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='I' surname='McDonald' fullname='Ira McDonald'>
    <organization />
</author>

<author initials='C' surname='Bormann' fullname='Carsten Bormann'>
    <organization />
</author>

<date month='September' day='11' year='2019' />

<abstract><t>This documents defines the method and bindings used to conduct Time- based Uni-Directional Attestation (TUDA) between two RATS (Remote ATtestation procedureS) Principals over the Internet.  TUDA does not require a challenge-response handshake and thereby does not rely on the conveyance of a nonce to prove freshness of remote attestation Evidence.  Conversely, TUDA enables the creation of Secure Audit Logs that can constitute Evidence about current and past operational states of an Attester.  As a prerequisite for TUDA, every RATS Principal requires access to a trusted and synchronized time-source. Per default, in TUDA this is a Time Stamp Authority (TSA) issuing signed Time Stamp Tokens (TST).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-tuda-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-tuda-01.txt' />
</reference>



<reference anchor="I-D.ietf-rats-eat">
<front>
<title>The Entity Attestation Token (EAT)</title>

<author initials='G' surname='Mandyam' fullname='Giridhar Mandyam'>
    <organization />
</author>

<author initials='L' surname='Lundblade' fullname='Laurence Lundblade'>
    <organization />
</author>

<author initials='M' surname='Ballesteros' fullname='Miguel Ballesteros'>
    <organization />
</author>

<author initials='J' surname='O&apos;Donoghue' fullname='Jeremy O&apos;Donoghue'>
    <organization />
</author>

<date month='July' day='4' year='2019' />

<abstract><t>An Entity Attestation Token (EAT) provides a signed (attested) set of claims that describe state and characteristics of an entity, typically a device like a phone or an IoT device.  These claims are used by a relying party to determine how much it wishes to trust the entity.  An EAT is either a CWT or JWT with some attestation-oriented claims. To a large degree, all this document does is extend CWT and JWT.  Contributing  TBD</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-01.txt' />
<format type='PDF'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-01.pdf' />
</reference>


<reference anchor="keystore" target="https://developer.android.com/training/articles/keystore">
  <front>
    <title>Android Keystore System</title>
    <author initials="." surname="Google" fullname="Google">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="fido" target="https://fidoalliance.org/specifications/">
  <front>
    <title>FIDO Specification Overview</title>
    <author initials="." surname="FIDO Alliance" fullname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

