<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.8 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>
<?rfc toc_levels="4"?>

<rfc ipr="trust200902" docName="draft-birkholz-rats-suit-claims-01" category="std">

  <front>
    <title abbrev="SUIT TV">Trustworthiness Vectors for the Software Updates of Internet of Things (SUIT) Workflow Model</title>

    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>Brendan.Moran@arm.com</email>
      </address>
    </author>

    <date year="2021" month="January" day="13"/>

    <area>Security</area>
    <workgroup>RATS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The IETF Remote Attestation Procedures (RATS) architecture defines Conceptual Messages as input and output of the appraisal process that assesses the trustworthiness of remote peers: Evidence and Attestation Results.
Based on the Trustworthiness Vectors defined in Trusted Path Routing, this document defines a core set of Claims to be used in Evidence and Attestation Results for the Software Update for the Internet of Things (SUIT) Workflow Model.
Consecutively, this document is in support of the Trusted Execution Environment Provisioning (TEEP) architecture, which defines the assessment of remote peers via RATS and uses SUIT for evidence generation as well as a remediation measure to improve trustworthiness of given remote peers.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Attestation Results are an essential output of Verifiers as defined in the Remote ATtestation procedureS (RATS) architecture <xref target="I-D.ietf-rats-architecture"/>.
They are consumed by Relying Parties: the entities that intend to build future decisions on trustworthiness assessments of remote peers.
Attestation Results must be easily appraised by Relying Parties – in contrast to the rather complex or domain-specific Evidence appraised by Verifiers.</t>

<t>In order to create Attestation Results, a Verifier must consume Evidence generated by a given Attester (amongst other Conceptual Messages, such as Endorsements and Attestation Policies).
Both Evidence and Attestation Results are composed of Claims.
This document highlights and defines a set of Claims to be used in Evidence and Attestation Results that are based on the SUIT Workflow Model <xref target="I-D.ietf-suit-manifest"/>.
In the scope of this document, an Attester takes on the role of a SUIT Recipient: the system that receives a SUIT Manifest.</t>

<section anchor="suit-workflow-model-and-procedures" title="SUIT Workflow Model and Procedures">

<t>This document focuses on Evidence and Attestation Results that can be generated based on the output of SUIT Procedures.
The SUIT Workflow Model allows for two types of SUIT Procedures generating Reports on the Attester as defined in the SUIT Manifest specification <xref target="I-D.ietf-suit-manifest"/>:</t>

<t><list style="hanging">
  <t hangText='Update Procedures:'>
  A procedure that updates a device by fetching dependencies, software images, and installing them.</t>
  <t>An Update Procedure creates a Report about mutable software components that are installed or updated on hardware components.</t>
  <t hangText='Boot Procedures:'>
  A procedure that boots a device by checking dependencies and images, loading images, and invoking one or more image.</t>
  <t>A Boot Procedure creates a Report on measured boot events (e.g. during Secure Boot).</t>
</list></t>

<t>The Records contained in each type of Report can be used as Claims in Evidence generation on the Attester for Remote Attestation Procedures as described in this document.
Analogously, a corresponding Verifier appraising that Evidence can generate Attestation Results using the Claims defined in this document.</t>

<t>Both types of SUIT Procedures pass several stages (e.g. dependency-checking is one stage).
The type and sequence of stages are defined by the Command Sequences included in a SUIT Manifest.
For each stage in which a Command from the Command Sequence is executed a Record is created. All Records of a SUIT procedure contain binary results limited to “fail” or “pass”.
The aggregated sequence of all Records is composed into a Report.</t>

<t>This document specifies new Claims derived from Command Sequence Reports and highlights existing Claims as defined in Trusted Path Routing <xref target="I-D.voit-rats-trusted-path-routing"/> that are applicable to the operational state of installed and updated software.</t>

<t>The Claims defined in this document are in support of the Trusted Execution Environment Provisioning (TEEP) architecture.
During TEEP, the current operational state of an Attester is assessed via RATS. If the corresponding Attestation Results – as covered in this document – indicate insufficient Trustworthiness Levels with respect to installed software, the SUIT Workflow Model is used for remediation.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>This document uses the terms and concepts defined in <xref target="I-D.ietf-rats-architecture"/>, <xref target="I-D.ietf-suit-manifest"/>, and <xref target="I-D.ietf-teep-architecture"/>.</t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="trustworthiness-vectors" title="Trustworthiness Vectors">

<t>While there are usage scenarios where Attestation Results can be binary decisions, more often than not the assessment of trustworthiness is represented by a more fine-grained spectrum or based on multiple factors.
These shades of Attestation Results are captured by the definition of Trustworthiness Vectors in Trusted Path Routing <xref target="I-D.voit-rats-trusted-path-routing"/>.
Trustworthiness Vectors are sets of Claims representing appraisal outputs created by a Verifier. Each of these Claims is called a Trustworthiness Level.
Multiple Trustworthiness Levels are composed into a vector.</t>

<t>An Attester processing SUIT Manifests can create three types of Claims about its Target Environments.
This includes Claims about:</t>

<t><list style="symbols">
  <t>installed manifests including initial state (e.g. factory default),</t>
  <t>hardware component identifiers that represent the targets of updates, and</t>
  <t>SUIT Interpreter results (e.g. test-failed) created during updates.</t>
</list></t>

<t>Every SUIT Manifest maps to a certain intended state of a device.
Every intended device composition of software components associated with hardware components can therefore be expressed based on a SUIT Manifest.
The current operational state of a device can be represented in the same form, including the initial state.</t>

<t>As a result, the Claims defined in this document are bundled by the scope of the information represented in SUIT Manifests, i.e., dedicated blobs of software that are the payload of a SUIT Manifest.
All Claims associated with an identifiable SUIT Manifest must always be bundled together in a Claims set that is limited to the Claims defined in this document.</t>

</section>
<section anchor="suit-claims" title="SUIT Claims">

<t>The Claim description in this document uses CDDL as the formal modeling language for Claims.
This approach is derived from <xref target="I-D.ietf-rats-eat"/>.
All Claims are based on information elements as used in the SUIT Manifest specification <xref target="I-D.ietf-suit-manifest"/>.
For instance, a SUIT Vendor ID is represented as an UUID.
Analogously, the corresponding vendor-identifier Claim found below is based on a UUID. 
SUIT Claims are differentiated in:</t>

<t><list style="symbols">
  <t>software and hardware characteristics (System Properties), and</t>
  <t>reports about updates their SUIT Commands (SUIT Records).</t>
</list></t>

<t>Both types of Claims are always bundled in dedicated Claim Sets.
Implementations can encode this information in various different ways (data models), e.g., sets, sequences, or nested structures.
The following subsections define the SUIT Report Claims for RATS and are structured according to the following CDDL expression.</t>

<figure><artwork type="CDDL"><![CDATA[
suit-report = {
  suit-system-properties => [ + system-property-claims ],
  suit-records => [ + interpreter-record-claims ],
}

system-property-claims => { + $$system-property-claim }
interpreter-record-claims => { + $$interpreter-record-claim }
]]></artwork></figure>

<section anchor="system-properties-claims" title="System Properties Claims">

<t>System Properties Claims are composed of:</t>

<t><list style="symbols">
  <t>Hardware Component Claims and</t>
  <t>Software Component Claims.</t>
</list></t>

<t>Correspondingly, the Claim definitions below highlight if a Claim is generic or hw/sw-component specific.</t>

<section anchor="vendor-identifier" title="vendor-identifier">

<t>A RFC 4122 UUID representing the vendor of the Attester or one of its hardware and/or software components.</t>

<figure><artwork type="CDDL"><![CDATA[
$$system-property-claim //= ( vendor-identifier => RFC4122_UUID )
]]></artwork></figure>

</section>
<section anchor="class-identifier" title="class-identifier">

<t>A RFC 4122 UUID representing the class of the Attester or one of its hardware and/or software components.</t>

<figure><artwork type="CDDL"><![CDATA[
$$system-property-claim //= ( class-identifier => RFC4122_UUID )
]]></artwork></figure>

</section>
<section anchor="device-identifier" title="device-identifier">

<t>A RFC 4122 UUID representing the Attester.</t>

<figure><artwork type="CDDL"><![CDATA[
$$system-property-claim //= ( device-identifier => RFC4122_UUID )
]]></artwork></figure>

</section>
<section anchor="component-identifier" title="component-identifier">

<t>A sequence of binary identifiers that is intended to identify a software-component of an Attester uniquely. A binary identifier can represent a CoSWID <xref target="I-D.ietf-sacm-coswid"/> tag-id.</t>

<figure><artwork type="CDDL"><![CDATA[
$$system-property-claim //=  ( class-identifier => [ + identifier ] )
]]></artwork></figure>

</section>
<section anchor="image-digest" title="image-digest">

<t>A fingerprint computed over a software component image on the Attester.
This Claim is always bundled with a component-identifier or component-index.</t>

<figure><artwork type="CDDL"><![CDATA[
$$system-property-claim //= ( image-digest => digest )
]]></artwork></figure>

</section>
<section anchor="image-size" title="image-size">

<t>The size of a firmware image on the Attester.</t>

<figure><artwork type="CDDL"><![CDATA[
$$system-property-claim //= ( image-size => size )
]]></artwork></figure>

</section>
<section anchor="minimum-battery" title="minimum-battery">

<t>The configured minimum battery level of the Attester in mWh.</t>

<figure><artwork type="CDDL"><![CDATA[
$$system-property-claim //= ( minimum-battery => charge )
]]></artwork></figure>

</section>
<section anchor="version" title="version">

<t>The Version of a hardware or software component of the Attester.</t>

<figure><artwork type="CDDL"><![CDATA[
$$system-property-claim //= ( version => version-value )
]]></artwork></figure>

</section>
</section>
<section anchor="interpreter-record-claims" title="Interpreter Record Claims">

<t>This class of Claims represents the content of SUIT Records generated by Interpreters running on Recipients. They are always bundled into Claim Sets representing SUIT Reports and are intended to be included in Evidence generated by an Attester. The Interpreter Record Claims appraised by a Verifier can steer a corresponding a Firmware Appraisal procedures that consumes this Evidence. Analogously, these Claims can be re-used in generated Attestation Results as Trustworthiness Vectors <xref target="I-D.voit-rats-trusted-path-routing"/>.</t>

<section anchor="record-success" title="record-success">

<t>The result of a Command that was executed by the Interpreter on an Attester.</t>

<figure><artwork type="CDDL"><![CDATA[
$$interpreter-record-claim //= ( record-success => bool )
]]></artwork></figure>

</section>
<section anchor="component-index" title="component-index">

<t>A positive integer representing an entry in a flat list of indices mapped to software component identifiers to be updated.</t>

<figure><artwork type="CDDL"><![CDATA[
$$system-property-claim //= ( component-index => uint )
]]></artwork></figure>

</section>
<section anchor="dependency-index" title="dependency-index">

<t>A thumbprint of a software component that an update depends on.</t>

<figure><artwork type="CDDL"><![CDATA[
$$interpreter-record-claim //= ( dependency-index => digest )
]]></artwork></figure>

</section>
<section anchor="command-index" title="command-index">

<t>A positive integer representing an entry in a SUIT_Command_Sequence identifying a Command encoded as a SUIT Manifest Directive or SUIT Manifest Condition.</t>

<figure><artwork type="CDDL"><![CDATA[
$$interpreter-record-claim //= ( command-index => uint )
]]></artwork></figure>

</section>
<section anchor="nominal-parameters" title="nominal-parameters">

<t>A list of SUIT_Parameters associated with a specific Command encoded as a SUIT Manifest Directive.</t>

<figure><artwork type="CDDL"><![CDATA[
$$interpreter-record-claim //= ( nominal-parameters => parameter-list )
]]></artwork></figure>

</section>
<section anchor="nominal-parameters-1" title="nominal-parameters">

<t>A list of SUIT_Parameters associated with a specific Command that was executed by the Interpreter on an Attester.</t>

<figure><artwork type="CDDL"><![CDATA[
$$interpreter-record-claim //= ( actual-parameters => parameter-list )
]]></artwork></figure>

</section>
</section>
<section anchor="generic-record-conditions-tbd" title="Generic Record Conditions (TBD)">

<t><list style="symbols">
  <t>test-failed</t>
  <t>unsupported-command</t>
  <t>unsupported-parameter</t>
  <t>unsupported-component-id</t>
  <t>payload-unavailable</t>
  <t>dependency-unavailable</t>
  <t>critical-application-failure</t>
  <t>watchdog-timeout</t>
</list></t>

</section>
</section>
<section anchor="list-of-commands-tbd" title="List of Commands (TBD)">

<t><list style="symbols">
  <t>Check Vendor Identifier</t>
  <t>Check Class Identifier</t>
  <t>Verify Image</t>
  <t>Set Component Index</t>
  <t>Override Parameters</t>
  <t>Set Dependency Index</t>
  <t>Set Parameters</t>
  <t>Process Dependency</t>
  <t>Run</t>
  <t>Fetch</t>
  <t>Use Before</t>
  <t>Check Component Offset</t>
  <t>Check Device Identifier</t>
  <t>Check Image Not Match</t>
  <t>Check Minimum Battery</t>
  <t>Check Update Authorized</t>
  <t>Check Version</t>
  <t>Abort</t>
  <t>Try Each</t>
  <t>Copy</t>
  <t>Swap</t>
  <t>Wait For Event</t>
  <t>Run Sequence</t>
  <t>Run with Arguments</t>
</list></t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="I-D.ietf-rats-architecture">
<front>
<title>Remote Attestation Procedures Architecture</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='N' surname='Smith' fullname='Ned Smith'>
    <organization />
</author>

<author initials='W' surname='Pan' fullname='Wei Pan'>
    <organization />
</author>

<date month='December' day='8' year='2020' />

<abstract><t>In network protocol exchanges it is often the case that one entity requires believable evidence about the operational state of a remote peer.  Such evidence is typically conveyed as claims about the peer's software and hardware platform, and is subsequently appraised in order to assess the peer's trustworthiness.  The process of generating and appraising this kind of evidence is known as remote attestation.  This document describes an architecture for remote attestation procedures that generate, convey, and appraise evidence about a peer's operational state.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-08' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-architecture-08.txt' />
</reference>



<reference anchor="I-D.ietf-suit-manifest">
<front>
<title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>

<author initials='B' surname='Moran' fullname='Brendan Moran'>
    <organization />
</author>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='K' surname='Zandberg' fullname='Koen Zandberg'>
    <organization />
</author>

<date month='December' day='8' year='2020' />

<abstract><t>This specification describes the format of a manifest.  A manifest is a bundle of metadata about code/data obtained by a recipient (chiefly the firmware for an IoT device), where to find the that code/data, the devices to which it applies, and cryptographic information protecting the manifest.  Software updates and Trusted Invocation both tend to use sequences of common operations, so the manifest encodes those sequences of operations, rather than declaring the metadata.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-suit-manifest-11' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-suit-manifest-11.txt' />
</reference>



<reference anchor="I-D.ietf-teep-architecture">
<front>
<title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>

<author initials='M' surname='Pei' fullname='Mingliang Pei'>
    <organization />
</author>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='D' surname='Wheeler' fullname='David Wheeler'>
    <organization />
</author>

<date month='November' day='2' year='2020' />

<abstract><t>A Trusted Execution Environment (TEE) is an environment that enforces that any code within that environment cannot be tampered with, and that any data used by such code cannot be read or tampered with by any code outside that environment.  This architecture document motivates the design and standardization of a protocol for managing the lifecycle of trusted applications running inside such a TEE.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-teep-architecture-13' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-teep-architecture-13.txt' />
</reference>



<reference anchor="I-D.voit-rats-trusted-path-routing">
<front>
<title>Trusted Path Routing</title>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<date month='June' day='10' year='2020' />

<abstract><t>There are end-users who believe encryption technologies like IPSec alone are insufficient to protect the confidentiality of their highly sensitive traffic flows.  These end-users want their flows to traverse devices which have been freshly appraised and verified. This specification describes Trusted Path Routing.  Trusted Path Routing protects sensitive flows as they transit a network by forwarding traffic to/from sensitive subnets across network devices recently appraised as trustworthy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-voit-rats-trusted-path-routing-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-voit-rats-trusted-path-routing-02.txt' />
</reference>



<reference anchor="I-D.ietf-rats-eat">
<front>
<title>The Entity Attestation Token (EAT)</title>

<author initials='G' surname='Mandyam' fullname='Giridhar Mandyam'>
    <organization />
</author>

<author initials='L' surname='Lundblade' fullname='Laurence Lundblade'>
    <organization />
</author>

<author initials='M' surname='Ballesteros' fullname='Miguel Ballesteros'>
    <organization />
</author>

<author initials='J' surname='O&apos;Donoghue' fullname='Jeremy O&apos;Donoghue'>
    <organization />
</author>

<date month='December' day='2' year='2020' />

<abstract><t>An Entity Attestation Token (EAT) provides a signed (attested) set of claims that describe state and characteristics of an entity, typically a device like a phone or an IoT device.  These claims are used by a relying party to determine how much it wishes to trust the entity.  An EAT is either a CWT or JWT with some attestation-oriented claims. To a large degree, all this document does is extend CWT and JWT.  Contributing  TBD</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-06.txt' />
<format type='PDF'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-06.pdf' />
</reference>



<reference anchor="I-D.ietf-sacm-coswid">
<front>
<title>Concise Software Identification Tags</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='J' surname='Fitzgerald-McKay' fullname='Jessica Fitzgerald-McKay'>
    <organization />
</author>

<author initials='C' surname='Schmidt' fullname='Charles Schmidt'>
    <organization />
</author>

<author initials='D' surname='Waltermire' fullname='David Waltermire'>
    <organization />
</author>

<date month='November' day='2' year='2020' />

<abstract><t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles.  SWID tag representations can be too large for devices with network and storage constraints.  This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags.  CoSWID supports a similar set of semantics and features as SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory efficient format.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-16' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-sacm-coswid-16.txt' />
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

