<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.13 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc ipr="trust200902" docName="draft-fedorkow-rats-network-device-attestation-04" category="info">

  <front>
    <title abbrev="Network Device RIV">Network Device Remote Integrity Verification</title>

    <author initials="G.C." surname="Fedorkow" fullname="Guy Fedorkow" role="editor">
      <organization>Juniper Networks, Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>gfedorkow@juniper.net</email>
      </address>
    </author>
    <author initials="J." surname="Fitzgerald-McKay" fullname="Jessica Fitzgerald-McKay">
      <organization>National Security Agency</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>jmfitz2@nsa.gov</email>
      </address>
    </author>

    <date year="2020" month="March" day="05"/>

    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a workflow for remote attestation of integrity of network devices.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>There are many aspects to consider in fielding a trusted computing device,
from operating systems to applications.  A mechanism to prove that
a device installed at a customer’s site is authentic (i.e., not counterfeit) and has
been configured with authorized software, all as part of a trusted supply chain, is one
of those aspects that’s easily overlooked.</t>

<t>Attestation is defined here as the process of creating, conveying and appraising
assertions about Platform trustworthiness characteristics, including supply chain trust,
identity, platform provenance, software configuration, hardware configuration, platform
composition, compliance to test suites, functional and assurance evaluations,
etc.</t>

<t>The goal of attestation is simply to assure an administrator that the software
that was launched when the device was last started is the same as the software that
the device vendor initially shipped.</t>

<t>Within the Trusted Computing Group context, attestation is the process by
which an independent Verifier can obtain cryptographic proof as to the identity
of the device in question, evidence of the integrity of software loaded on
that device when it started up, and then verify that what’s there is what’s
supposed to be there.  For networking equipment, a verifier capability can
be embedded in a Network Management Station (NMS), a posture collection server,
or other network analytics tool (such as a software asset management solution,
or a threat detection and mitigation tool, etc.). While informally referred
to as attestation, this document focuses on a subset defined here as Remote
Integrity Verification (RIV).  RIV takes a network equipment centric perspective
that includes a set of protocols and procedures for determining whether a
particular device was launched with untampered software, starting from Roots
of Trust.  While there are many ways to accomplish attestation, RIV sets
out a specific set of protocols and tools that work in environments commonly
found in Networking Equipment.  RIV does not cover other platform characteristics
that could be attested, although it does provide evidence of a secure infrastructure
to increase the level of trust in other platform characteristics attested
by other means (e.g., by Entity Attestation Tokens <xref target="I-D.ietf-rats-eat"/>.</t>

<t>This profile outlines the RIV problem, and then identifies elements that
are necessary to get the complete attestation procedure working in a scalable
solution using commercial products, focusing primarily on software integrity
verification using the Trusted Platform Module (TPM) to ensure a trustworthy result.</t>

<section anchor="document-organization" title="Document Organization">

<t>The remainder of this document is organized into several sections:</t>

<t><list style="symbols">
  <t>The remainder of this section covers goals and requirements, plus a top-level overview</t>
  <t>The Solution Overview section outlines how RIV works</t>
  <t>The Standards Components section links components of RIV to normative standards.</t>
  <t>Supporting material is in an appendix at the end.</t>
</list></t>

</section>
<section anchor="requirements-language" title="Requirements Language">

<t>This document is non-normative; the document does not define protocols,
but rather identifies existing protocols that can be used together to achieve the
goals above, and in some cases, highlights gaps in existing protocols.</t>

</section>
<section anchor="goals" title="Goals">

<t>Network operators benefit from a trustworthy attestation mechanism that provides
assurance that their network comprises authentic equipment, and has loaded software
free of known vulnerabilities and unauthorized tampering.  In line with the overall goal of assuring integrity, attestation can be used for asset management, vulnerability and compliance
assessment, plus configuration management.</t>

<t>As a part of a trusted supply chain, the RIV attestation workflow outlined in this document is intended to meet the following high-level goals:</t>

<t><list style="symbols">
  <t>Provable Device Identity - The ability to identify a device using a cryptographic
identifier is a critical prerequisite to software inventory attestation.</t>
  <t>Software Inventory - A key goal is to identify the software release installed
on the device, and to provide evidence of its integrity.</t>
  <t>Verifiability - Verification of software and configuration of the device shows
that the software that’s supposed to be installed on there actually has
been launched.  Verification against reference
manifests signed by the supplier of the software provides assurance that the
software is free of unauthorized modification.</t>
</list></t>

<t>In addition, RIV is designed to operate in a centralized environment, such as with a central authority that manages and configures a number of network devices, or ‘peer-to-peer’, where network devices independently verify one another to establish a trust relationship.  (See Section XX below, and also <xref target="I-D.voit-rats-trusted-path-routing"/>)</t>

</section>
<section anchor="description-of-remote-integrity-verification-riv" title="Description of Remote Integrity Verification (RIV)">

<t>Attestation requires two interlocking services from the device to be verified:</t>

<t><list style="symbols">
  <t>Platform Identity, the mechanism providing trusted identity, can reassure network
managers that the specific devices they ordered from authorized manufacturers for
attachment to their network are those that were installed, and that they continue to
be present in their network. As part of the mechanism for Platform Identity,
cryptographic proof of the identity of the manufacturer is also provided.</t>
  <t>Software Measurement is the mechanism that reports the state of mutable software components
on the device, and can assure network managers that they have known, untampered
software configured to run in their network.</t>
</list></t>

<t>In this context, RIV is a procedure that assures a network operator that the equipment in
their network can be reliably identified, and that untampered software of
a known version is installed on each endpoint. Equipment in the network includes
devices that make up the network itself, such as routers, switches and firewalls,
but could also include conventional connected devices like servers and laptops.
(See Section XX, Scope)</t>

<t>RIV includes several major processes:</t>

<t><list style="numbers">
  <t>Creation of Evidence is the process whereby an endpoint generates cryptographic
proof (evidence) of claims about platform properties. In particular, the
platform identity and its software configuration are of critical importance</t>
  <t>Platform Identification refers to the mechanism assuring the
attestation relying party (typically a network administrator) of the identity of devices that make up their network,
and that their manufacturers are known.  Reliable identify is clearly a prerequisite to software attestation to prevent spoofing attacks (See XX Security Considerations).</t>
  <t>Software used to boot a platform can be described as a chain
of measurements, started by a Root of Trust for Measurement,
that normally ends when the system software is loaded.
A measurement signifies the identity, integrity and version of each
software component registered with the TPM, so that the
subsequent appraisal stage can determine if the software
installed is authentic, up-to-date, and free of tampering.</t>
  <t>Conveyance of Evidence is the process of reliably transporting evidence from
  the point in a connected device where a measurement is stored to an
  appraiser/verifier, e.g. a management station. The transport
  is typically carried out via a management network. The channel must provide
  integrity and authenticity, and, in some use cases, may also require confidentiality.</t>
  <t>Finally, Appraisal of Evidence is the process of verifying the evidence received by
  a verifier/appraiser from a device, and using verified evidence to inform
  decision making. In this context, verification means comparing the device
  measurements reported as evidence with the configuration expected by the
  system administrator. This step depends on a way to express
  what should be there, coded as Reference
  Integrity Measurements (aka Golden Measurements), representing the
  intended configured state of the
  connected device.</t>
</list></t>

<t>An implementation of RIV requires three technologies</t>

<t><list style="numbers">
  <t>Identity: Platform identity can be based on IEEE 802.1AR Device Identity <xref target="IEEE-802-1AR"/>,
coupled with careful supply-chain management by the manufacturer.  The
DevID certificate contains a statement by the manufacturer that establishes
the identity of the device as it left the factory.  Some applications with
a more-complex post-manufacture supply chain (e.g. Value Added Resellers),
or with different privacy concerns, may want to use an alternate mechanism for platform
authentication based on TCG Platform Certificates <xref target="Platform-Certificates"/>.
RIV currently relies on asymmetric keying for identity; alternate approaches
might use symmetric keys.</t>
  <t>Platform Attestation provides evidence of configuration of software elements
present in the device.  This form of attestation can be implemented
with TPM PCR, Quote and Log mechanisms, which provide an authenticated mechanism
to report what software was started on the device through the boot cycle.</t>
  <t>Reference Integrity Measurements must be conveyed from the software authority
(often the manufacturer for embedded systems) to the system in which verification
will take place</t>
</list></t>

</section>
<section anchor="solution-requirements" title="Solution Requirements">

<t>Remote Integrity Verification must address the “Lying Endpoint”
problem, in which malicious software on an endpoint may subvert the
intended function, and also prevent the endpoint from reporting its compromised
status.  (See Section XX for further Security Considerations)</t>

<t>The RIV attestation solution must meet a number of requirements to make it simple
to deploy at scale.</t>

<t><list style="numbers">
  <t>Easy to Use - RIV should work “out of the box” as far as possible,
that is, with the fewest possible steps needed at the end-user’s site.  Eliminate
complicated databases or provisioning steps that would have to be executed
by the owner of a new device. Network equipment is often required to “self-configure”,
to reliably reach out without manual intervention to prove its identity and
operating posture, then download its own configuration. See <xref target="RFC8572"/> for an
example of Secure Zero Touch Provisioning.</t>
  <t>Multi-Vendor - This solution identifies standards-based interfaces that
allow attestation to work with attestation-capable devices and verifiers
supplied by different vendors in one network.</t>
</list></t>

</section>
<section anchor="scope" title="Scope">

<t>Remote Attestation is a very general problem that could apply to most network-connected computing devices.  However, this document includes several assumptions that limit the scope to Network Equipment (e.g. routers, switches and firewalls):</t>

<t><list style="symbols">
  <t>This solution is for use in non-privacy-preserving applications (for example,
networking, Industrial IoT), avoiding the need for a Privacy Certificate
Authority for attestation keys <xref target="AIK-Enrollment"/> or TCG Platform
Certificates <xref target="Platform-Certificates"/></t>
  <t>This document assumes network protocols that are common in networking equipment,
but not generally used in other applications.  Other applications (such as Industrial
IoT) would replace YANG/Netconf with a protocol suite more commonly used in
that environment.  Similarly, the same information flow would be used in Network
Endpoint Assessment <xref target="RFC5209"/>, mapped to NEA protocols.</t>
  <t>The approach outlined in this document assumes the use of TPM 1.2 or TPM 2.0.  Other
roots of trust could be used with the same information flow, although different
data structures would likely be called for.</t>
</list></t>

<section anchor="out-of-scope" title="Out of Scope">

<t><list style="symbols">
  <t>Run-Time Attestation: Run-time attestation of Linux or other multi-threaded
operating system processes considerably expands the scope of the problem.
Many researchers are working on that problem, but this document defers the
run-time attestation problem.</t>
  <t>Multi-Vendor Embedded Systems: Additional coordination would be needed for
devices that themselves comprise hardware and software from multiple vendors,
integrated by the end user.  Although currently out of scope for RIV, Trusted
Computing Group specifications do
encompass attestation of multi-vendor endpoint computing devices.</t>
  <t>Processor Sleep Modes: Network equipment typically does not “sleep”, so
sleep and hibernate modes are not considered.  Although out of scope
for RIV, Trusted Computing Group specifications do encompass sleep and hibernate
states.</t>
  <t>Virtualization and Containerization:  These technologies are increasingly
used in Network equipment, but are not considered in this revision of the
document.</t>
</list></t>

</section>
</section>
</section>
<section anchor="solution-outline" title="Solution Outline">

<section anchor="riv-software-configuration-attestation-using-tpm" title="RIV Software Configuration Attestation using TPM">

<t>RIV Attestation is a process for determining the identity of software running
on a specifically-identified device.  Remote Attestation is broken into two
phases, shown in Figure 1:</t>

<t><list style="symbols">
  <t>During system startup, each distinct software object is “measured”.
Its identity, hash (i.e. cryptographic digest) and version information is recorded in a log.
Hashes are also extended, or cryptographically folded, into the TPM, in a way that can be used to validate the log entries.  The measurement process generally
follows the Chain of Trust model used in Measured Boot, where each stage
of the system measures the next one, and extends its measurement into the TPM,
before launching it.</t>
  <t>Once the device is running and has operational network connectivity, a separate,
trusted server (called a Verifier in this document) can interrogate the network
device to retrieve the logs and a copy of the digests collected by hashing
each software object, signed by an attestation private key known only to
the TPM.</t>
</list></t>

<t>The result is that the Verifier can verify the device’s identity by checking
the certificate containing the TPM’s attestation public key, and can
validate the software that was launched by comparing digests in the log with
known-good values, and verifying their correctness by comparing with the
signed digests from the TPM.</t>

<t>It should be noted that attestation and identity are inextricably linked;
signed evidence that a particular version of software was loaded is of little
value without cryptographic proof of the identity of the device producing
the evidence.</t>

<figure title="RIV Attestation Model" anchor="RIV-Attestation-Model"><artwork align="left"><![CDATA[
    +-------------------------------------------------------+
    | +--------+    +--------+   +--------+    +---------+  |
    | | BIOS   |--->| Loader |-->| Kernel |--->|Userland |  |
    | +--------+    +--------+   +--------+    +---------+  |
    |     |            |           |                        |
    |     |            |           |                        |
    |     +------------+-----------+-+                      |
    |                        Step 1  |                      |
    |                                V                      |
    |                            +--------+                 |
    |                            |  TPM   |                 |
    |                            +--------+                 |
    |   Router                       |                      |
    +--------------------------------|----------------------+
                                     |
                                     |  Step 2
                                     |    +-----------+
                                     +--->| Verifier  |
                                          +-----------+

    Reset---------------flow-of-time-during-boot--...------->
]]></artwork></figure>

<t>In Step 1, measurements are “extended” into the TPM as processes start. In
Step 2, signed PCR digests are retrieved from the TPM for off-box analysis
after the system is operational.</t>

<section anchor="what-does-riv-attest" title="What Does RIV Attest?">

<t>TPM attestation is strongly focused around Platform Configuration Registers (PCRs), but those registers are only vehicles for certifying attestation evidence.  The evidence itself is conveyed in log files (xref) which give the name and hash of each object to be attested.  These hashes are also extended into PCRs, where they can be retrieved in the form of a quote signed by a key known only to the TPM (xref).  The use of multiple PCRs serves only to provide some independence between different classes of object, so that one class of objects can be updated without changing the extended hash for other classes.  Although PCRs can be used for any purpose, this section outlines the objects that are conventionally attested with a TPM.</t>

<t>In general, PCRs are organized to independently attest three classes of object:</t>

<t><list style="symbols">
  <t>Code, i.e., instructions to be executed by a CPU.  To maintain a chain of trust, it’s important to measure every bit of code that’s run outside the root of trust.</t>
  <t>Configuration - Many devices offer numerous options controlled by non-volatile configuration variables which can impact the device’s security posture.  These settings may have vendor defaults, but often can be changed by administrators, who may want to verify via attestation that the settings they intend are still in place.</t>
  <t>Credentials - Administrators may wish to verify via attestation that keys (and other credentials) outside the Root of Trust have not be subject to unauthorized tampering.  (By definition, keys inside the root of trust can’t be verified independently)</t>
</list></t>

<t>The TCG PC Client Platform Firmware Profile Specification <xref target="PC-Client-BIOS-TPM-2.0"/> gives considerable detail on what is to be measured during the boot phase of a platform boot using a UEFI BOIS (www.uefi.org), but the goal is simply to measure every bit of code executed in the process of starting the device, along with any configuration information related to security posture.  Table XX summarizes the functions that are measured, and how they are allocated to PCRs.  It’s important to note that each PCR may contain results from dozens (or even thousands) of individual measurements.</t>

<figure title="Attested Objects" anchor="Attested-Objects"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|                                            |   Allocated PCR #   |
| Function                                   | Code | Configuration|
--------------------------------------------------------------------
| BIOS Static Root of Trust, plus embedded   |  0   |    1         |
| Option ROMs and drivers                    |      |              |
--------------------------------------------------------------------
| Pluggable Option ROMs to initialize and    |  2   |    3         |
| configure add-in devices                   |      |              |
--------------------------------------------------------------------
| Boot Manager code and configuration (UEFI  |  4   |    5         |
| uses a separate module to implement        |      |              |
| policies for selecting among a variety of  |      |              |
| potential boot devices).  This PCR records |      |              |
| boot attempts, and identifies what         |      |              |
| resources were used to boot the OS.        |      |              |
--------------------------------------------------------------------
| Vendor Specific Measurements               |  6   |    6         |
--------------------------------------------------------------------
| Secure Boot Policy.  This PCR records keys |      |    7         |
| and configuration used to validate the OS  |      |              |
| loader                                     |      |              |
--------------------------------------------------------------------
| OS Loader (e.g GRUB2 for Linux)            |  8   |    9         |
--------------------------------------------------------------------
| Reserved for OS (e.g. Linux IMA)           |  10  |    10        |
+------------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="riv-keying" title="RIV Keying">

<t>TPM 1.2 and TPM 2.0 have a variety of rules separating the functions of identity
and attestation, allowing for use-cases where software configuration must
be attested, but privacy must be maintained.</t>

<t>To accommodate these rules, enforced inside the TPM, in an environment where
device privacy is not
normally a requirement, the TCG Guidance for Securing Network Equipment
<xref target="NetEq"/> suggests using separate keys for Identity (i.e., DevID) and
Attestation (i.e., signing a quote of the contents of the PCRs), but
provisioning an Initial Attestation
Key (IAK) and x.509 certificate that parallels the IDevID, with the same
device ID information as the IDevID certificate (i.e., the same Subject Name
and Subject Alt Name, even though the key pairs are different).  This allows
a quote from the device, signed by the IAK, to be linked directly to the
device that provided it, by examining the corresponding IAK certificate.</t>

<t>Inclusion of an IAK by a vendor does not preclude a mechanism whereby an
Administrator can define Local Attestation Keys (LAKs) if desired.</t>

</section>
<section anchor="riv-information-flow" title="RIV Information Flow">

<t>RIV workflow for networking equipment is organized around a simple use-case,
where a network operator wishes to verify the integrity of software installed
in specific, fielded devices.  This use-case implies several components:</t>

<t><list style="numbers">
  <t>A Device (e.g. a router or other embedded device, also known as an Attester)
  somewhere and the network operator wants to examine its boot state.</t>
  <t>A Verifier (which might be a network management station) somewhere separate
  from the Device that will retrieve the information and analyze it to pass
  judgment on the security posture of the device.</t>
  <t>A Relying Party, which has access to the Verifier to request attestation
  and to act on results.  Interaction between the Relying Party and the
  Verifier is considered out of scope for RIV.</t>
  <t>Signed Reference Integrity Manifests (RIMs)
  (containing Reference Integrity Measurements, or “golden measurements”) can
  either be created by the device manufacturer
  and shipped along with the device as part of its software image, or alternatively,
  could be obtained a number of other ways (direct to the verifier from the
  manufacturer, from a third party, from the owner’s observation of what’s
  thought to be a “known good system”, etc.).  Retrieving RIMs from the device
  itself allows attestation to be done in systems which may not have access
  to the public internet, or by other devices that are not management stations
  per-se (e.g., a peer device).  If reference measurements are obtained from
  multiple sources, the Verifier may need to evaluate the relative level of
  trust to be placed in each source in case of a discrepancy.</t>
</list></t>

<t>These components are illustrated in Figure 2.</t>

<t>A more-detailed taxonomy of terms is given in <xref target="I-D.ietf-rats-architecture"/></t>

<figure title="RIV Reference Configuration for Network Equipment" anchor="RIV-Reference-Configuration"><artwork align="left"><![CDATA[
+---------------+        +-------------+        +---------+--------+
|               |        | Attester    | Step 1 | Verifier|        |
| Asserter      |        | (Device     |<-------| (Network| Relying|
| (Device       |        | under       |------->| Mngmt   | Party  |
| Manufacturer  |        | attestation)| Step 2 | Station)|        |
| or other      |        |             |        |         |        |
| authority)    |        |             |        |         |        |
+---------------+        +-------------+        +---------+--------+
       |                                             /\
       |                  Step 0                      |
       -----------------------------------------------

]]></artwork></figure>

<t>In Step 0, The Asserter (the device manufacturer) provides a Software Image
accompanied by one or more Reference Integrity Manifests (RIMs) to the Attester (the
device under attestation) signed by the asserter. In Step 1, the Verifier
(Network Management Station), on behalf of a Relying Party, requests Identity,
Measurement Values (and possibly RIMs) from the Attester. In Step 2, the
Attester responds to the request by providing a DevID, quotes (measured values),
and optionally RIMs, signed by the Attester.</t>

<t>See <xref target="I-D.birkholz-rats-reference-interaction-model"/> for more narrowly defined
terms related to Attestation</t>

</section>
<section anchor="riv-simplifying-assumptions" title="RIV Simplifying Assumptions">

<t>This document makes the following simplifying assumptions to reduce complexity:</t>

<t><list style="symbols">
  <t>The product to be attested is shipped with an IEEE 802.1AR DevID and an Initial
Attestation Key (IAK) with certificate.  The IAK cert contains the same identity
information as the DevID (specifically, the same Subject Name and Subject
Alt Name, signed by the manufacturer), but it’s a type of key that can be
used to sign a TPM Quote.  This convention is described in TCG Guidance for
Securing Network Equipment <xref target="NetEq"/>. For network equipment, which is generally non-privacy-sensitive, shipping
a device with both an IDevID and an IAK already provisioned substantially
simplifies initial startup. Privacy-sensitive applications may use the TCG
Platform Certificate and additional procedures to install identity credentials
on the platform after manufacture.  (See Section 2.3.1 below for the Platform
Certificate alternative)</t>
  <t>The product is equipped with a Root of Trust for Measurement, Root of Trust
for Storage and Root of Trust for Reporting (as defined in <xref target="GloPlaRoT"/>) that are
capable of conforming to the TCG Trusted Attestation Protocol (TAP) Information Model <xref target="TAP"/>.</t>
  <t>The vendor will ship Reference Integrity Measurements (i.e., known-good measurements)
in the form of signed CoSWID tags <xref target="I-D.ietf-sacm-coswid"/>, <xref target="SWID"/>,
as described in TCG Reference Integrity Measurement Manifest Information Model <xref target="RIM"/>.</t>
</list></t>

<section anchor="devid-alternatives" title="DevID Alternatives">

<t>Some situations may have privacy-sensitive requirements that preclude shipping
every device with an Initial Device ID installed.  In these cases, the IDevID
can be installed remotely using the TCG Platform Certificate <xref target="Platform-Certificates"/>.</t>

<t>Some administrators may want to install their own identity
credentials to certify device identity and attestation results.  IEEE 802.1AR
<xref target="IEEE-802-1AR"/> allows for both Initial Device Identity credentials, installed by the manufacturer, (analogous to a physical serial number plate),
or Local Device Identity credentials installed by the administrator of the
device (analogous to the physical Asset Tag used by many enterprises to identify their property).  TCG TPM 2.0 Keys documents <xref target="Platform-DevID-TPM-2.0"/> and
<xref target="PC-Client-BIOS-TPM-2.0"/> specifies parallel Initial and Local Attestation Keys (IAK and LAK), and
contains figures showing the relationship between IDevID, LDevID, IAK and
LAK keys.</t>

<t>Device administrators are free to use any number of criteria to judge authenticity
of a device before installing local identity keys, as part of an on-boarding
process.  The TCG TPM 2.0 Keys document <xref target="Platform-DevID-TPM-2.0"/> also outlines
procedures for creating Local Attestation Keys and Local Device
IDs (LDevIDs) rooted in the manufacturer’s IDevID as a check to reduce the
chances that counterfeit devices are installed in the network.</t>

<t>Note that many networking devices are expected to self-configure (aka Zero
Touch Provisioning).  Current standardized zero-touch mechanisms such as
<xref target="RFC8572"/> assume that identity keys are already in place before network on-boarding
can start, and as such, are compatible with IDevID and IAK keys installed by the
manufacturer, but not with LDevID and LAK keys, which would have to be installed
by the administrator.</t>

</section>
<section anchor="additional-attestation-of-platform-characteristics" title="Additional Attestation of Platform Characteristics">

<t>The Platform Attribute Credential <xref target="Platform-Certificates"/> can also be used to convey
additional information about a platform from the
manufacturer or other entities in the supply chain.  While outside the scope
of RIV, the Platform Attribute Credential can deliver information such as
lists of serial numbers for components embedded in a device or security assertions
related to the platform, signed by the manufacturer, system integrator or
value-added-reseller.</t>

</section>
<section anchor="root-of-trust-for-measurement" title="Root of Trust for Measurement">

<t>The measurements needed for attestation require that the device being attested
is equipped with a Root of Trust for Measurement, i.e., some trustworthy
mechanism that can compute the first measurement in the chain of trust required
to attest that each stage of system startup is verified, and a Root of Trust
for Reporting to report the results <xref target="TCGRoT"/>, <xref target="GloPlaRoT"/>.</t>

<t>While there are many complex aspects of a Root of Trust, two aspects that
are important in the case of attestation are:</t>

<t><list style="symbols">
  <t>The first measurement computed by the Root of Trust for Measurement, and stored
in the TPM’s Root of Trust for Storage, is presumed to be correct.</t>
  <t>There must not be a way to reset the RTS without re-entering the RTM code.</t>
</list></t>

<t>The first measurement must be computed by code that is implicitly trusted; if that
first measurement can be subverted, none of the remaining measurements can
be trusted. (See <xref target="NIST-SP-800-155"/>)</t>

</section>
<section anchor="reference-integrity-manifests-rims" title="Reference Integrity Manifests (RIMs)">

<t>Much of attestation focuses on collecting and transmitting evidence in
the form of PCR measurements and attestation logs.  But the critical part
of the process is enabling the verifier to decide whether the measurements
are “the right ones” or not.</t>

<t>While it must be up to network administrators to decide what they want on
their networks, the software supplier should supply the Reference Integrity
Measurements that
may be used by a verifier to determine if evidence shows known good, known
bad or unknown software configurations.</t>

<t>In general, there are two kinds of reference measurements:</t>

<t><list style="numbers">
  <t>Measurements of early system startup (e.g., BIOS, boot loader, OS kernel)
are essentially single threaded, and executed exactly once, in a known sequence,
before any results could be reported.  In this case, while the method for
computing the hash and extending relevant PCRs may be complicated, the net
result is that the software (more likely, firmware) vendor will have one
known good PCR value that “should” be present in the relevant PCRs after the box has
booted.  In this case, the signed reference measurement could simply list the
expected hashes for the given version.  However, a RIM that contains the
intermediate hashes can be useful in debugging cases where the expected final hash
is not the one reported.</t>
  <t>Measurements taken later in operation of the system, once an OS has started
(for example, Linux IMA<xref target="IMA"/>), may be more complex, with unpredictable “final”
PCR values.  In this case, the Verifier must have enough information to reconstruct
the expected PCR values from logs and signed reference measurements from
a trusted authority.</t>
</list></t>

<t>In both cases, the expected values can be expressed as signed SWID or CoSWID tags,
but the SWID structure in the second case is somewhat more complex, as reconstruction of the extended hash in a PCR may involve thousands of files and other objects.</t>

<t>The TCG has published an information model defining elements of reference integrity
manifests under the title TCG Reference Integrity Manifest Information Model <xref target="RIM"/>.  This information model outlines how SWID tags should be structured to allow attestation, and defines “bundles” of SWID tags that may be needed to describe a complete software release.  The RIM contains some metadata relating to the software release it belongs to, plus hashes for each individual file or other object that could be attested.</t>

<t>TCG has also published the PC Client Reference Integrity Measurement specification <xref target="PC-Client-RIM"/>, which focuses on a SWID-compatible format suitable for expressing expected measurement values in the specific case of a UEFI-compatible BIOS, where the SWID focus on files and file systems is not a direct fit.  While the PC Client RIM is not directly applicable to network equipment, many vendors do use a conventional UEFI BIOS to launch their network OS.</t>

</section>
<section anchor="attestation-logs" title="Attestation Logs">

<t>Quotes from a TPM can provide evidence of the state of a device up to the time
the evidence was recorded, but to make sense of the quote in most cases an
event log of what software modules contributed which values to the quote
during startup must also be provided.  The log must contain enough information
to demonstrate its integrity by allowing exact reconstruction of the digest
conveyed in the signed quote (e.g., PCR values).</t>

<t>TCG has defined several event log formats:</t>

<t><list style="symbols">
  <t>UEFI BIOS event log (TCG EFI Platform Specification for TPM Family 1.1 or
1.2, Section 7 <xref target="EFI-TPM"/>)</t>
  <t>Canonical Event Log <xref target="Canonical-Event-Log"/></t>
  <t>There is also a Legacy BIOS event log, although this document is less relevant as UEFI
has largely replaced the Legacy BIOS (TCG PC Client Specific Implementation Specification
for Conventional BIOS, Section 11.3<xref target="PC-Client-BIOS-TPM-1.2"/>)</t>
</list></t>

<t>It should be noted that a given device might use more than one event log
format (e.g., a UEFI log during initial boot, switching to Canonical Log
when the host OS launches).</t>

<t>The TCG SNMP Attestation MIB <xref target="SNMP-Attestation-MIB"/> will support any
record-oriented log format, including the three TCG-defined
formats, but it currently leaves figuring out which log(s) are in what format
up to the Verifier.</t>

</section>
</section>
</section>
<section anchor="standards-components" title="Standards Components">

<section anchor="reference-models" title="Reference Models">

<section anchor="ietf-reference-model-for-challenge-response-remote-attestation" title="IETF Reference Model for Challenge-Response Remote Attestation">

<t>Initial work at IETF defines remote attestation as follows:</t>

<t>The Reference Interaction Model for Challenge-Response-based Remote Attestation
is based on the standard roles defined in <xref target="I-D.ietf-rats-architecture"/>:</t>

<t><list style="symbols">
  <t>Attester: The role that designates the subject of the remote attestation.
A system entity that is the provider of evidence takes on the role of an
Attester.</t>
  <t>Verifier: The role that designates the system entity and that is the appraiser
of evidence provided by the Attester. A system entity that is the consumer
of evidence takes on the role of a Verifier.</t>
</list></t>

<t>The following diagram illustrates a common information flow between a Verifier
and an Attester, specified in <xref target="I-D.birkholz-rats-reference-interaction-model"/>:</t>

<figure title="IETF Attestation Information Flow" anchor="IETF-Attestation-Information-Flow"><artwork align="left"><![CDATA[
Attester                                                     Verifier
   |                                                               |
   | <------- requestAttestation(nonce, authSecID, claimSelection) |
   |                                                               |
collectAssertions(assertionsSelection)                             |
   | => assertions                                                 |
   |                                                               |
signAttestationEvidence(authSecID, assertions, nonce)              |
   | => signedAttestationEvidence                                  |
   |                                                               |
   | signedAttestationEvidence ----------------------------------> |
   |                                                               |
   | verifyAttestationEvidence(signedAttestatEvidence, refassertions)
   |                                          attestationResult <= |
   |                                                               |
]]></artwork></figure>

<t>The RIV approach outlined in this document aligns with the RATS reference
model.</t>

</section>
</section>
<section anchor="riv-workflow" title="RIV Workflow">

<t>The overall flow for an attestation session is shown in Figure 4.  In this
diagram:</t>

<t><list style="symbols">
  <t>Step 0, obtaining the signed reference measurements, may happen in two
ways:</t>
  <t>Step 0A below shows a verifier obtaining reference measurements directly
from a software configuration authority, whether it’s the vendor or another
authority chosen by the system administrator.  The reference measurements
are signed by the Asserter (i.e., the software configuration authority).</t>
  <t>- Or - Step 0B, the reference measurements, signed by the Asserter, may be
distributed as part of software installation, long before the attestation
session begins.  Software installation is usually vendor-dependent, so there
are no standards involved in this step.  However, the verifier can use the
same protocol to obtain the reference measurements from the device as it
would have used with an external reference authority</t>
  <t>In Step 1, the Verifier initiates an attestation session by opening a TLS
session, validated using the DevID to prove that the connection is attesting
the right box.</t>
  <t>In Step 2, measured values are retrieved from the Attester’s TPM using a
YANG <xref target="RFC8348"/> or SNMP <xref target="RFC3413"/> interface that implements the TCG TAP model (e.g. YANG Module
for Basic Challenge-Response-based Remote Attestation Procedures <xref target="I-D.ietf-rats-yang-tpm-charra"/>).</t>
  <t>In Step 3, the Attester also delivers a copy of the signed reference measurements,
using Software Inventory YANG module based on Software Identifiers <xref target="I-D.birkholz-yang-swid"/>.</t>
</list></t>

<t>These steps yield enough information for the Verifier to verify measurements against
reference values.  Of course, in all cases, the signatures protecting quotes and RIMs must be checked
before the contents are used.</t>

<figure title="RIV Protocol and Encoding Summary" anchor="RIV-Protocol-and-Encoding-Summary"><artwork align="left"><![CDATA[
+---------------+        +-------------+        +---------+
|               |        |             | Step 1 |         |
|               |        | Attester    |<------>| Verifier|
| Asserter      |        | (Device     |<------>| (Network|
|(Configuration |------->| under       | Step 2 | Mngmt   |
| Authority)    | Step 0A| attestation)|        | Station)|
|               |        |             |------->|         |
+---------------+        +-------------+ Step 3 +---------+
        |                                           /|\
        |                                            |
        ----------------------------------------------
                        Step 0B

]]></artwork></figure>

<t>Either CoSWID-encoded reference measurements are signed by a trusted authority
and retrieved directly prior to attestation (as shown in Step 0A), or CoSWID-encoded
reference measurements are signed by the device manufacturer, installed on
the device by a proprietary installer, and delivered during attestation (as
shown in Step 0B). In Step 1, the Verifier initiates a connection for attestation.
The Attester’s identity is validated using DevID with TLS. In Step 2, a
nonce, quotes (measured values) and measurement log are conveyed via TAP
with a protocol-specific binding (e.g. SNMP). Logs are sent in the Canonical
Log Format In Step 3, CoSWID-encoded reference measurements are retrieved
from the Attester using the YANG (<xref target="I-D.birkholz-yang-swid"/>.
.</t>

<t>The following components are used:</t>

<t><list style="numbers">
  <t>TPM Keys are configured according to <xref target="Platform-DevID-TPM-2.0"/>, <xref target="PC-Client-BIOS-TPM-1.2"/>, or <xref target="Platform-ID-TPM-1.2"/></t>
  <t>Measurements of firmware and bootable modules are taken according to TCG PC Client <xref target="PC-Client-BIOS-TPM-2.0"/> and Linux IMA <xref target="IMA"/></t>
  <t>Device Identity is managed by IEEE 802.1AR certificates <xref target="IEEE-802-1AR"/>, with keys protected by TPMs.</t>
  <t>Attestation logs are formatted according to the Canonical Event Log format <xref target="Canonical-Event-Log"/></t>
  <t>Quotes are retrieved according to TCG TAP Information Model <xref target="TAP"/>.  While the TAP IM gives a protocol-independent description of the data elements involved, it’s important to note that quotes from the TPM are signed inside the TPM, so must be retrieved in a way that does not invalidate the signature, as specified in <xref target="I-D.ietf-rats-yang-tpm-charra"/>, to preserve the trust model.  (See Security Considerations).</t>
  <t>Reference Integrity Measurements are encoded as CoSWID tags, as defined in
  the TCG RIM document <xref target="RIM"/>, compatible with NIST IR 8060 <xref target="NIST-IR-8060"/> and the IETF CoSWID draft <xref target="I-D.ietf-sacm-coswid"/>.  Reference measurements are signed by the device manufacturer.</t>
</list></t>

</section>
<section anchor="centralized-vs-peer-to-peer" title="Centralized vs Peer-to-Peer">

<t>Placeholder section for information flow between peer devices such as routers, to establish a known trust relationship.  Hint: it’s the same flow, but with devices at either end of a link issuing attestation challenges as to the peer device, and each responding to challenges as a device under attestation.  The devices need to carry their own signed reference measurements (RIMs) so that each device has everything needed for attestation, without having to resort to a central authority.</t>

</section>
<section anchor="layering-model-for-network-equipment-attester-and-verifier" title="Layering Model for Network Equipment Attester and Verifier">

<t>Retrieval of identity and attestation state uses one protocol stack, while
retrieval of Reference Measurements uses a different set of protocols.  Figure
5 shows the components involved.</t>

<figure title="RIV Protocol Stacks" anchor="RIV-Protocol-Stacks"><artwork align="left"><![CDATA[
+-----------------------+              +-------------------------+
|                       |              |                         |
|       Attester        |<-------------|        Verifier         |
|       (Device)        |------------->|   (Management Station)  |
|                       |      |       |                         |
+-----------------------+      |       +-------------------------+
                               |
           -------------------- --------------------
           |                                        |
---------------------------------- ---------------------------------
|Reference Integrity Measurements| |         Attestation           |
---------------------------------- ---------------------------------

********************************************************************
*         IETF Attestation Reference Interaction Diagram           *
********************************************************************

    .......................         .......................
    . Reference Integrity .         .  TAP (PTS2.0) Info  .
    .      Manifest       .         . Model and Canonical .
    .                     .         .     Log Format      .
    .......................         .......................

    *************************  .............. **********************
    * YANG SWID Module      *  . TCG        . * YANG Attestation   *
    * I-D.birkholz-yang-swid*  . Attestation. * Module             *
    *                       *  . MIB        . * I-D.ietf-rats-     *
    *                       *  .            . * yang-tpm-charra    *
    *************************  .............. **********************

    *************************  ************ ************************
    * XML, JSON, CBOR (etc) *  *    UDP   * * XML, JSON, CBOR (etc)*
    *************************  ************ ************************

    *************************               ************************
    *   RESTCONF/NETCONF    *               *   RESTCONF/NETCONF   *
    ************************               *************************

    *************************               ************************
    *       TLS, SSH        *               *       TLS, SSH       *
    *************************               ************************

]]></artwork></figure>

<t>IETF documents are captured in boxes surrounded by asterisks. TCG documents
are shown in boxes surrounded by dots. The IETF Attestation Reference Interaction
Diagram, Reference Integrity Manifest, TAP Information Model
and Canonical Log Format, and both YANG modules are works in progress. Information
Model layers describe abstract data objects that can be requested, and the
corresponding response SNMP is still widely used, but the industry is transitioning
to YANG, so in some cases, both will be required. TLS Authentication with
TPM has been shown to work; SSH authentication using TPM-protected keys is
not as easily done [as of 2019]</t>

</section>
</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>Networking Equipment such as routers, switches and firewalls has a key role to play in guarding the privacy of individuals using the network:
* Packets passing through the device must not be sent to unauthorized destinations.  For example
  * Routers often act as Policy Enforcement Points, where individual subscribers may be checked for
  authorization to access a network.  Subscriber login information must not be released to unauthorized parties.
  * Networking Equipment is often called upon to block access to protected resources, or from unauthorized users.
* Routing information, such as the identity of a router’s peers, must not be leaked to unauthorized neighbors.
* If configured, encryption and decryption of traffic must be carried out reliably, while protecting keys and credentials.
Functions that protect privacy are implemented as part of each layer of hardware and software that
makes up the networking device.
In light of these requirements for protecting the privacy of users of the network, the Network Equipment
must identify itself, and its boot configuration and measured device state (for example, PCR values),
to the Equipment’s Administrator, so there’s no uncertainty as to what function each device and
configuration is configured to carry out . This allows the administrator to ensure that the network
provides individual and peer privacy guarantees.</t>

<t>RIV specifically addresses the collection information from enterprise network devices by an enterprise
network.  As such, privacy is a fundamental concern for those deploying this solution, given EU
GDPR, California CCPA, and many other privacy regulations.  The enterprise should implement
and enforce their duty of care.</t>

<t>See <xref target="NetEq"/> for more context on privacy in networking devices</t>

</section>
<section anchor="Security" title="Security Considerations">

<t>Attestation results from the RIV procedure are subject to a number of attacks:</t>

<t><list style="symbols">
  <t>Keys may be compromised</t>
  <t>A counterfeit device may attempt to impersonate (spoof) a known authentic device</t>
  <t>Man-in-the-middle attacks may be used by a counterfeit device to attempt to deliver
responses that originate in an actual authentic device</t>
  <t>Replay attacks may be attempted by a compromised device</t>
</list></t>

<t>Trustworthiness of RIV attestation depends strongly on the validity of keys used for identity
and attestation reports.  RIV takes full advantage of TPM capabilities to ensure that results can be trusted.</t>

<t>Two sets of keys are relevant to RIV attestation</t>

<t><list style="symbols">
  <t>A DevID key is used to certify the identity of the device in which the TPM is installed.</t>
  <t>An Attestation Key (AK) key signs attestation reports, (called ‘quotes’ in TCG documents),
used to provide evidence for integrity of the software on the device.</t>
</list></t>

<t>TPM practices require that these keys be different, as a way of ensuring that a general-purpose
signing key cannot be used to spoof an attestation quote.</t>

<t>In each case, the private half of the key is known only to the TPM, and cannot be
retrieved externally, even by a trusted party.  To ensure that’s the case,
specification-compliant private/public key-pairs are generated inside the TPM, where they’re never
exposed, and cannot be extracted (See <xref target="Platform-DevID-TPM-2.0"/>).</t>

<t>Keeping keys safe is just part of attestation security; knowing which keys are bound
to the device in question is just as important.</t>

<t>While there are many ways to manage keys in a TPM (See <xref target="Platform-DevID-TPM-2.0"/>), RIV includes
support for “zero touch” provisioning (also known as zero-touch onboarding) of fielded
devices (e.g. Secure ZTP, <xref target="RFC8572"/>}), where keys which have predictable trust properties are
provisioned by the device vendor.</t>

<t>Device identity in RIV is based on IEEE 802.1AR DevID. This specification provides several elements</t>

<t><list style="symbols">
  <t>A DevID requires a unique key pair for each device, accompanied by an x.509 certificate</t>
  <t>The private portion of the DevID key is to be stored in the device, in a manner that provides confidentiality (Section 6.2.5 <xref target="IEEE-802-1AR"/>)</t>
</list></t>

<t>The x.509 certificate contains several components</t>

<t><list style="symbols">
  <t>The public part of the unique DevID key assigned to that device</t>
  <t>An identifying string that’s unique to the manufacturer of the device.  This is normally the
serial number of the unit, which might also be printed on label on the device.</t>
  <t>The certificate must be signed by a key traceable to the manufacturer’s root key.</t>
</list></t>

<t>With these elements, the device’s manufacturer and serial number can be identified by analyzing the
DevID certificate plus the chain of intermediate certs leading back to the manufacturer’s root
certificate.  As is conventional in TLS connections, a nonce must be signed by the device
in response to a challenge,
proving possession of its DevID private key.</t>

<t>RIV uses the DevID to validate a TLS connection to the device as the attestation session begins.  Security of
this process derives from TLS security, with the DevID providing proof that the TLS session terminates on
the intended device. <xref target="RFC8446"/>.</t>

<t>Evidence of software integrity is delivered in the form of a quote signed by the TPM
itself.  Because the contents of the quote are signed inside the TPM, any external
modification (including reformatting to a different data format) will be detected
as tampering.</t>

<t>A critical feature of the YANG model described in <xref target="I-D.ietf-rats-yang-tpm-charra"/> is the ability to carry TPM data structures in their native format, without requiring any changes to the structures as they were signed and delivered by the TPM.  While alternate methods of conveying TPM quotes could add an additional layer of signing using external keys, the important part is to preserve the TPM signing, so that tampering anywhere in the path between the TPM itself and the Verifier can be detected.</t>

<t>Prevention of spoofing attacks against attestation systems is also important.  There are two cases to consider:
* The entire device could be spoofed, that is, when the Verifier goes to verify a specific device, it might be redirected to a different device.  Use of the 802.1AR identity in the TPM ensures that the Verifier’s TLS session is in fact terminating on the right device.
* A compromised device could respond with a spoofed attestation result, that is, a compromised OS could return a fabricated quote.</t>

<t>Protection against spoofed quotes from a device with valid identity is a bit more complex.
An identity key must be available to sign any kind of nonce or hash offered by the verifier,
and consequently, could be used to sign a fabricated quote.  To block spoofed attestation
result, the quote generated inside the TPM must by signed by
a key that’s different from the DevID, called an Attestation Key (AK).</t>

<t>Given separate Attestation and DevID keys, the
binding between the AK and the same device must also be proven to
prevent a man-in-the-middle attack (e.g. the ‘Asokan Attack’ <xref target="RFC6813"/>).</t>

<t>This is accomplished in RIV through use of an AK certificate with the same elements as the DevID
(i.e., same manufacturer’s serial number, signed by the same manufacturer’s key), but containing
the device’s unique AK public key instead of the DevID public key.
[this will require an OID that says the key is known by the CA to be an Attestation key]</t>

<t>These two keys and certificates are used together:</t>

<t><list style="symbols">
  <t>The DevID is used to validate a TLS connection terminating on the device with a known serial number.</t>
  <t>The AK is used to sign attestation quotes, providing proof that the attestation
evidence comes from the same device.</t>
</list></t>

<t>Replay attacks, where results of a previous attestation are submitted in response to subsequent requests,
are usually prevented by inclusion of a nonce in the request to the TPM
for a quote.  Each request from the Verifier includes a new random number (a nonce). The resulting
quote signed by the TPM contains the same nonce, allowing the verifier to determine
freshness, i.e., that the resulting quote was generated in response to the verifier’s specific request.
Time-Based Uni-directional Attestation <xref target="I-D.birkholz-rats-tuda"/> provides an alternate mechanism
to verify freshness without requiring a request/response cycle.</t>

<t>Requiring results of attestation of the operating software to be signed by a key known only to the TPM also
removes the need to trust the device’s operating software (beyond the first measurement; see below); any
changes to the quote, generated and signed by the TPM itself, made by malicious device software, or in
the path back to the verifier, will invalidate the signature on the quote.</t>

<t>Although RIV recommends that device manufacturers pre-provision devices with easily-verified DevID and AK certs,
use of those credentials is not mandatory.  IEEE 802.1AR incorporates the idea of an Initial Device ID
(IDevID), provisioned by the manufacturer, and a Local Device ID (LDevID) provisioned by the owner of
the device.  RIV extends that concept by defining an Initial Attestation Key (IAK) and Local Attestation
Key (LAK) with the same properties.</t>

<t>Device owners can use any method to provision the Local credentials.</t>

<t><list style="symbols">
  <t>TCG doc <xref target="Platform-DevID-TPM-2.0"/> shows how the initial Attestation
keys can be used to certify LDevID and LAK keys.  Use of the LDevID and LAK allows the device owner
to use a uniform identity structure across device types from multiple manufacturers (in the same way
that an “Asset Tag” is used by many enterprises use to identify devices they own).  TCG doc
<xref target="Provisioning-TPM-2.0"/> also contains guidance on provisioning identity keys in TPM 2.0.</t>
  <t>But device owners can use any other mechanism they want to assure themselves that Local identity
certificates are inserted into the intended device, including physical inspection and programming
in a secure location, if they prefer to avoid placing trust in the manufacturer-provided keys.</t>
</list></t>

<t>Clearly, Local keys can’t be used for secure Zero Touch provisioning; installation of the Local keys
can only be done by some process that runs before the device is configured for network operation.</t>

<t>On the other end of the device life cycle, provision should be made to wipe Local keys when a device
is decommissioned, to indicate that the device is no longer owned by the enterprise.  The manufacturer’s
Initial identity keys must be preserved, as they contain no information that’s not already printed on
the device’s serial number plate.</t>

<t>In addition to trustworthy provisioning of keys, RIV depends on other trust anchors.  (See <xref target="GloPlaRoT"/> for definitions of Roots of Trust.)</t>

<t><list style="symbols">
  <t>Secure identity depends on mechanisms to prevent per-device secret keys from being compromised.  The TPM
provides this capability as a Root of Trust for Storage</t>
  <t>Attestation depends on an unbroken chain of measurements, starting from the very first measurement.
That first measurement is made by code called the Root of Trust for Measurement, typically done by trusted
firmware stored in boot flash.  Mechanisms for maintaining the trustworthiness of the RTM are out of
scope for RIV, but could include immutable firmware, signed updates, or a vendor-specific hardware
verification technique.</t>
  <t>RIV assumes some level of physical defense for the device.  If a TPM that has already been programmed
with an authentic DevID is stolen and inserted into a counterfeit device, attestation of that counterfeit
device may become indistinguishable from an authentic device.</t>
</list></t>

<t>RIV also depends on reliable reference measurements, as expressed by the RIM <xref target="RIM"/>.  The definition of
trust procedures for RIMs is out of scope for RIV, and the device owner is free to use any policy to validate
a set of reference measurements.  RIMs may be conveyed out-of-band or in-band, as part of the attestation
process (see Section 3.2).  But for embedded devices, where software is usually shipped as a self-contained
package, RIMs signed by the manufacturer and delivered in-band may be more convenient for the device owner.</t>

</section>
<section anchor="conclusion" title="Conclusion">

<t>TCG technologies can play an important part in the implementation of Remote
Integrity Verification.  Standards for many of the components needed for
implementation of RIV already exist:</t>

<t><list style="symbols">
  <t>Platform identity can be based on IEEE 802.1AR Device identity, coupled with
careful supply-chain management by the manufacturer.</t>
  <t>Complex supply chains can be certified using TCG Platform Certificates <xref target="Platform-Certificates"/></t>
  <t>The TCG TAP mechanism can be used to retrieve attestation evidence.  Work
is needed on a YANG model for this protocol.</t>
  <t>Reference Measurements must be conveyed from the software authority (e.g.,
the manufacturer) to the system in which verification will take place.  IETF
CoSWID work forms the basis for this, but new work is needed to create an
information model and YANG implementation.</t>
</list></t>

</section>
<section anchor="appendix" title="Appendix">

<section anchor="network-device-attestation-challenges" title="Network Device Attestation Challenges">

<t>There have been demonstrations of attestation using TPMs for years, accompanied
by compelling security reasons for adopting attestation. Despite this, the
technology has not been widely adopted, in part, due to the difficulties
in deploying TPM-based attestation. Some of those difficulties are:</t>

<t><list style="symbols">
  <t>Standardizing device identity. Creating and using unique device identifiers
is difficult, especially in a privacy-sensitive environment.  But attestation
is of limited value if the operator is unable to determine which devices
pass attestation validation tests, and which fail. This problem is substantially
simplified for infrastructure devices like network equipment, where identity
can be explicitly coded using IEEE 802.1AR, but doing so relies on adoption
of 802.1AR <xref target="IEEE-802-1AR"/> by manufacturers and hardware system integrators.</t>
  <t>Standardizing attestation representations and conveyance. Interoperable remote
attestation has a fundamental dependence on vendors agreeing to a limited
set of network protocols commonly used in existing network equipment for
communicating attestation data. Network device
vendors will be slow to adopt the changes necessary to implement remote
attestation without a fully-realized plan for deployment.</t>
  <t>Interoperability. Networking equipment operates in a fundamentally multi-vendor
environment, putting additional emphasis on the need for standardized procedures
and protocols.</t>
  <t>Attestation evidence is complex. Operating systems used in larger embedded
devices are often multi-threaded, so the order of completion for individual
processes is non-deterministic.  While the hash of a specific component is
stable, once extended into a PCR, the resulting values are dependent on the
(non-deterministic) ordering of events, so there will never be a single known-good
value for some PCRs.  Careful analysis of event logs can provide proof that
the expected modules loaded, but it’s much more complicated than simply comparing
reported and expected digests, as collected in TPM Platform Configuration
Registers (PCRs).</t>
  <t>Software configurations can have seemingly infinite variability.  This problem
is nearly intractable on PC and Server equipment, where end users have unending
needs for customization and new applications.  However, embedded systems,
like networking equipment, are often simpler, in that there are fewer variations
and releases, with vendors typically offering fewer options for mixing and
matching.</t>
  <t>Standards-based mechanisms to encode and distribute Reference Integrity
Measurements, (i.e., expected values) are still in development.</t>
  <t>Software updates can be complex.  Even the most organized network operator
may have many different releases in their network at any given time, with
the result that there’s never a single digest or fingerprint that indicates
the software is “correct”; digests formed by hashing software modules on
a device can only show the correct combination of versions for a specific
device at a specific time.</t>
</list></t>

<t>None of these issues are insurmountable, but together, they’ve made deployment
of attestation a major challenge.  The intent of this document is to outline
an attestation profile that’s simple enough to deploy, while yielding enough
security to be useful.</t>

<section anchor="why-is-os-attestation-different" title="Why is OS Attestation Different?">

<t>Even in embedded systems, adding Attestation at the OS level (e.g. Linux
IMA, Integrity Measurement Architecture <xref target="IMA"/>) increases the number of objects to
be attested by one or two orders of
magnitude, involves software that’s updated and changed frequently, and introduces
processes that begin in unpredictable order.</t>

<t>TCG and others (including the Linux community) are working on methods and
procedures for attesting the operating system and application software, but
standardization is still in process.</t>

</section>
</section>
<section anchor="implementation-notes" title="Implementation Notes">

<t>Table 1 summarizes many of the actions needed to complete an Attestation
system, with links to relevant documents.  While documents are controlled
by several standards organizations, the implied actions required for
implementation are all the responsibility of the manufacturer of the device,
unless otherwise noted.</t>

<figure title="Component Status" anchor="Component-Status"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|             Component                           |  Controlling   |
|                                                 | Specification  |
--------------------------------------------------------------------
| Make a Secure execution environment             |   TCG RoT      |
|   o Attestation depends on a secure root of     |   UEFI.org     |
|     trust for measurement outside the TPM, as   |                |
|     well as roots for storage amd reporting     |                |
|     inside the TPM.                             |                |
|   o  Refer to TCG Root of Trust for Measurement.|                |
|   o  NIST SP 800-193 also provides guidelines   |                |
|      on Roots of Trust                          |                |
--------------------------------------------------------------------
| Provision the TPM as described in               | TCG TPM DevID  |
|   TCG documents.                                | TCG Platform   |
|                                                 |   Certificate  |
--------------------------------------------------------------------
| Put a DevID or Platform Cert in the TPM         | TCG TPM DevID  |
|    o Install an Initial Attestation Key at the  | TCG Platform   |
|      same time so that Attestation can work out |   Certificate  |
|      of the box                                 |-----------------
|    o Equipment suppliers and owners may want to | IEEE 802.1AR   |
|      implement Local Device ID as well as       |                |
|      Initial Device ID                          |                |
--------------------------------------------------------------------
| Connect the TPM to the TLS stack                | Vendor TLS     |
|    o  Use the DevID in the TPM to authenticate  | stack (This    |
|       TAP connections, identifying the device   | action is      |
|                                                 | simply         |
|                                                 | configuring TLS|
|                                                 | to use the     |
|                                                 | DevID as its   |
|                                                 | trust anchor.) |
--------------------------------------------------------------------
| Make CoSWID tags for BIOS/LoaderLKernel objects | IETF CoSWID    |
|    o  Add reference measurements into SWID tags | ISO/IEC 19770-2|
|    o  Manufacturer should sign the SWID tags    | NIST IR 8060   |
|    o  The TCG RIM-IM identifies further         |                |
|       procedures to create signed RIM           |                |
|       documents that provide the necessary      |                |
|       reference information                     |                |
--------------------------------------------------------------------
|  Package the SWID tags with a vendor software   | Retrieve tags  |
|  release                                        | with           |
|    o  A tag-generator plugin such      | {{I-D.birkholz-yang-swid}}|
|     as https://github.com/Labs64/swid-maven-plugin               |
|     can be used                                 |----------------|
|                                                 | TCG PC Client  |
|                                                 | RIM            |
--------------------------------------------------------------------
|  Use PC Client measurement definitions          | TCG PC Client  |
|  to define the use of PCRs                      | BIOS           |
|  (although Windows  OS is rare on Networking    |                |
|  Equipment, UEFI BIOS is not)                   |                |
--------------------------------------------------------------------
|  Use TAP to retrieve measurements               |                |
|    o  Map TAP to SNMP                           | TCG SNMP MIB   |
|    o  Map to YANG                               | YANG Module for|
|  Use Canonical Log Format                       |   Basic        |
|                                                 |   Attestation  |
|                                                 | TCG Canonical  |
|                                                 |   Log Format   |
--------------------------------------------------------------------
| Posture Collection Server (as described in IETF |                |
|  SACMs ECP) should request the                  |                |
|  attestation and analyze the result             |                |
| The Management application might be broken down |                |
|  to several more components:                    |                |
|    o  A Posture Manager Server                  |                |
|       which collects reports and stores them in |                |
|       a database                                |                |
|    o  One or more Analyzers that can look at the|                |
|       results and figure out what it means.     |                |
--------------------------------------------------------------------
]]></artwork></figure>

</section>
<section anchor="comparison-with-tcg-pts-ietf-nea" title="Comparison with TCG PTS / IETF NEA">

<t>Some components of an Attestation system have been implemented for end-user
machines such as PCs and laptops. Figure 7 shows the corresponding protocol
stacks.</t>

<figure title="Attestation for End User Computers" anchor="Attestation-for-End-User-Computers"><artwork align="left"><![CDATA[
+-----------------------+              +-------------------------+
|                       |              |                         |
|       Attester        |<-------------|        Verifier         |
|       (Device)        |------------->|   (Management Station)  |
|                       |      |       |                         |
+-----------------------+      |       +-------------------------+
                               |
           -------------------- --------------------
           |                                        |
---------------------------------- ---------------------------------
|Reference Integrity Measurements| |         Attestation           |
---------------------------------- ---------------------------------

--------------------------------------------------------------------
|         IETF Attestation Reference Interaction Diagram           |
-------------------------------------------------------------------

    .......................         --------------------------------
    . No Existing         .         |  TAPS (PTS2.0) Info Model and|
    . Reference Integrity .         |  Canonical Log Format        |
    . Manifest            .         |                              |
    . Protocols Exist     .         --------------------------------
    .                     .
    .                     .        ---------------------- ----------
    .                     .        | YANG Attestation   | |IETF NEA|
    .                     .        | Module             | | Msg and|
    .                     .        | I-D.ietf-rats-     | | Attrib.|
    .                     .        | yang-tpm-charra    | | for PA-|
    .                     .        |                    | | TNC    |
    .                     .        ---------------------- ----------
    .                     .        ---------------------- ----------
    .                     .        | XML, JSON, CBOR    | | PT-TLS |
    .                     .        ---------------------- | (for   |
    .                     .        ---------------------- |endpoint|
    .                     .        | NETCONF, RESTCONF, | |mcahines|
    .                     .        | COAP               | |        |
    .......................        ---------------------- ----------
    ----------------------------------------------------------------
    |                       TLS, SSH                               |
    ----------------------------------------------------------------
]]></artwork></figure>

</section>
</section>
<section anchor="IANA" title="IANA Considerations">

<t>This memo includes no request to IANA.</t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC8348" target='https://www.rfc-editor.org/info/rfc8348'>
<front>
<title>A YANG Data Model for Hardware Management</title>
<author initials='A.' surname='Bierman' fullname='A. Bierman'><organization /></author>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund'><organization /></author>
<author initials='J.' surname='Dong' fullname='J. Dong'><organization /></author>
<author initials='D.' surname='Romascanu' fullname='D. Romascanu'><organization /></author>
<date year='2018' month='March' />
<abstract><t>This document defines a YANG data model for the management of hardware on a single server.</t></abstract>
</front>
<seriesInfo name='RFC' value='8348'/>
<seriesInfo name='DOI' value='10.17487/RFC8348'/>
</reference>



<reference  anchor="RFC3413" target='https://www.rfc-editor.org/info/rfc3413'>
<front>
<title>Simple Network Management Protocol (SNMP) Applications</title>
<author initials='D.' surname='Levi' fullname='D. Levi'><organization /></author>
<author initials='P.' surname='Meyer' fullname='P. Meyer'><organization /></author>
<author initials='B.' surname='Stewart' fullname='B. Stewart'><organization /></author>
<date year='2002' month='December' />
<abstract><t>This document describes five types of Simple Network Management Protocol (SNMP) applications which make use of an SNMP engine as described in STD 62, RFC 3411.  The types of application described are Command Generators, Command Responders, Notification Originators, Notification Receivers, and Proxy Forwarders. This document also defines Management Information Base (MIB) modules for specifying targets of management operations, for notification filtering, and for proxy forwarding.  This document obsoletes RFC 2573.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='62'/>
<seriesInfo name='RFC' value='3413'/>
<seriesInfo name='DOI' value='10.17487/RFC3413'/>
</reference>



<reference  anchor="RFC5209" target='https://www.rfc-editor.org/info/rfc5209'>
<front>
<title>Network Endpoint Assessment (NEA): Overview and Requirements</title>
<author initials='P.' surname='Sangster' fullname='P. Sangster'><organization /></author>
<author initials='H.' surname='Khosravi' fullname='H. Khosravi'><organization /></author>
<author initials='M.' surname='Mani' fullname='M. Mani'><organization /></author>
<author initials='K.' surname='Narayan' fullname='K. Narayan'><organization /></author>
<author initials='J.' surname='Tardo' fullname='J. Tardo'><organization /></author>
<date year='2008' month='June' />
<abstract><t>This document defines the problem statement, scope, and protocol requirements between the components of the NEA (Network Endpoint Assessment) reference model.  NEA provides owners of networks (e.g., an enterprise offering remote access) a mechanism to evaluate the posture of a system.  This may take place during the request for network access and/or subsequently at any time while connected to the network.  The learned posture information can then be applied to a variety of compliance-oriented decisions.  The posture information is frequently useful for detecting systems that are lacking or have out-of-date security protection mechanisms such as: anti-virus and host-based firewall software.  In order to provide context for the requirements, a reference model and terminology are introduced.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5209'/>
<seriesInfo name='DOI' value='10.17487/RFC5209'/>
</reference>



<reference  anchor="RFC8572" target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author initials='K.' surname='Watsen' fullname='K. Watsen'><organization /></author>
<author initials='I.' surname='Farrer' fullname='I. Farrer'><organization /></author>
<author initials='M.' surname='Abrahamsson' fullname='M. Abrahamsson'><organization /></author>
<date year='2019' month='April' />
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference  anchor="RFC6813" target='https://www.rfc-editor.org/info/rfc6813'>
<front>
<title>The Network Endpoint Assessment (NEA) Asokan Attack Analysis</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='S.' surname='Hanna' fullname='S. Hanna'><organization /></author>
<date year='2012' month='December' />
<abstract><t>The Network Endpoint Assessment (NEA) protocols are subject to a subtle forwarding attack that has become known as the NEA Asokan Attack. This document describes the attack and countermeasures that may be mounted.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6813'/>
<seriesInfo name='DOI' value='10.17487/RFC6813'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor="I-D.ietf-rats-yang-tpm-charra">
<front>
<title>A YANG Data Model for Challenge-Response-based Remote Attestation Procedures using TPMs</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Eckel' fullname='Michael Eckel'>
    <organization />
</author>

<author initials='S' surname='Bhandari' fullname='Shwetha Bhandari'>
    <organization />
</author>

<author initials='B' surname='Sulzen' fullname='Bill Sulzen'>
    <organization />
</author>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<author initials='L' surname='Xia' fullname='Liang Xia'>
    <organization />
</author>

<author initials='T' surname='Laffey' fullname='Tom Laffey'>
    <organization />
</author>

<author initials='G' surname='Fedorkow' fullname='Guy Fedorkow'>
    <organization />
</author>

<date month='January' day='7' year='2020' />

<abstract><t>This document defines a YANG RPC and a minimal datastore tree required to retrieve attestation evidence about integrity measurements from a composite device with one or more roots of trust for reporting.  Complementary measurement logs are also provided by the YANG RPC originating from one or more roots of trust of measurement.  The module defined requires at least one TPM 1.2 or TPM 2.0 and corresponding Trusted Software Stack included in the device components of the composite device the YANG server is running on.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-yang-tpm-charra-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-yang-tpm-charra-00.txt' />
</reference>



<reference anchor="I-D.ietf-rats-architecture">
<front>
<title>Remote Attestation Procedures Architecture</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='N' surname='Smith' fullname='Ned Smith'>
    <organization />
</author>

<date month='February' day='4' year='2020' />

<abstract><t>In network protocol exchanges, it is often the case that one entity (a Relying Party) requires evidence about a remote peer to assess the peer's trustworthiness, and a way to appraise such evidence.  The evidence is typically a set of claims about its software and hardware platform.  This document describes an architecture for such remote attestation procedures (RATS).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-architecture-01.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-reference-interaction-model">
<front>
<title>Reference Interaction Models for Remote Attestation Procedures</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Eckel' fullname='Michael Eckel'>
    <organization />
</author>

<date month='January' day='7' year='2020' />

<abstract><t>This document defines interaction models for basic remote attestation procedures.  Different methods of conveying attestation evidence securely are defined and illustrated.  Analogously, the required information elements used by conveyance protocols are defined and illustrated.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-reference-interaction-model-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-reference-interaction-model-02.txt' />
</reference>



<reference anchor="I-D.birkholz-yang-swid">
<front>
<title>Software Inventory YANG module based on Software Identifiers</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<date month='October' day='23' year='2018' />

<abstract><t>This document provides a YANG module definition that enables a computing context to provide detailed information about installed software components.  The structure of the module is based on the Concise Software Identifier draft and therefore also strongly related to the ISO 19770-2:2015 Software Identifiers standard.  Both standards provide no interface to transport the SWID tag information between system entities and this document leverages the wide adoption of YANG based management interfaces.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-yang-swid-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-yang-swid-02.txt' />
</reference>



<reference anchor="I-D.ietf-sacm-coswid">
<front>
<title>Concise Software Identification Tags</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='J' surname='Fitzgerald-McKay' fullname='Jessica Fitzgerald-McKay'>
    <organization />
</author>

<author initials='C' surname='Schmidt' fullname='Charles Schmidt'>
    <organization />
</author>

<author initials='D' surname='Waltermire' fullname='David Waltermire'>
    <organization />
</author>

<date month='November' day='17' year='2019' />

<abstract><t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles.  SWID tag representations can be too large for devices with network and storage constraints.  This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags.  CoSWID supports the same features as SWID tags, as well as additional semantics that allow CoSWIDs to describe additional types of information, all in a more memory efficient format.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-13' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-sacm-coswid-13.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-tuda">
<front>
<title>Time-Based Uni-Directional Attestation</title>

<author initials='A' surname='Fuchs' fullname='Andreas Fuchs'>
    <organization />
</author>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='I' surname='McDonald' fullname='Ira McDonald'>
    <organization />
</author>

<author initials='C' surname='Bormann' fullname='Carsten Bormann'>
    <organization />
</author>

<date month='September' day='11' year='2019' />

<abstract><t>This documents defines the method and bindings used to conduct Time- based Uni-Directional Attestation (TUDA) between two RATS (Remote ATtestation procedureS) Principals over the Internet.  TUDA does not require a challenge-response handshake and thereby does not rely on the conveyance of a nonce to prove freshness of remote attestation Evidence.  Conversely, TUDA enables the creation of Secure Audit Logs that can constitute Evidence about current and past operational states of an Attester.  As a prerequisite for TUDA, every RATS Principal requires access to a trusted and synchronized time-source. Per default, in TUDA this is a Time Stamp Authority (TSA) issuing signed Time Stamp Tokens (TST).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-tuda-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-tuda-01.txt' />
</reference>



<reference anchor="I-D.voit-rats-trusted-path-routing">
<front>
<title>Trusted Path Routing using Remote Attestation</title>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<date month='February' day='27' year='2020' />

<abstract><t>There are end-users who believe encryption technologies like IPSec alone are insufficient to protect the confidentiality of their highly sensitive traffic flows.  This specification describes two alternatives for protecting these sensitive flows as they transit a network.  In both alternatives, protection is accomplished by forwarding sensitive flows across network devices currently appraised as trustworthy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-voit-rats-trusted-path-routing-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-voit-rats-trusted-path-routing-00.txt' />
</reference>



<reference anchor="I-D.ietf-rats-eat">
<front>
<title>The Entity Attestation Token (EAT)</title>

<author initials='G' surname='Mandyam' fullname='Giridhar Mandyam'>
    <organization />
</author>

<author initials='L' surname='Lundblade' fullname='Laurence Lundblade'>
    <organization />
</author>

<author initials='M' surname='Ballesteros' fullname='Miguel Ballesteros'>
    <organization />
</author>

<author initials='J' surname='O&apos;Donoghue' fullname='Jeremy O&apos;Donoghue'>
    <organization />
</author>

<date month='February' day='20' year='2020' />

<abstract><t>An Entity Attestation Token (EAT) provides a signed (attested) set of claims that describe state and characteristics of an entity, typically a device like a phone or an IoT device.  These claims are used by a relying party to determine how much it wishes to trust the entity.  An EAT is either a CWT or JWT with some attestation-oriented claims. To a large degree, all this document does is extend CWT and JWT.  Contributing  TBD</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-03.txt' />
<format type='PDF'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-03.pdf' />
</reference>


<reference anchor="TAP" >
  <front>
    <title>DRAFT: TCG Trusted Attestation Protocol (TAP) Information Model for TPM Families 1.2 and 2.0 and DICE Family 1.0, Version 1.0, Revision 0.29</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="NIST-SP-800-155" target="https://csrc.nist.gov/csrc/media/publications/sp/800-155/draft/documents/draft-sp800-155_dec2011.pdf">
  <front>
    <title>BIOS Integrity Measurement Guidelines (Draft)</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2011" month="December"/>
  </front>
</reference>
<reference anchor="SNMP-Attestation-MIB" >
  <front>
    <title>DRAFT: SNMP MIB for TPM-Based Attestation, Specification Version 0.8, Revision 0.02</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>
<reference anchor="Canonical-Event-Log" >
  <front>
    <title>DRAFT Canonical Event Log Format Version: 1.0, Revision: .12</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-2.0" target="https://trustedcomputinggroup.org/pc-client-specific-platform-firmware-profile-specification">
  <front>
    <title>PC Client Specific Platform Firmware Profile Specification Family "2.0", Level 00 Revision 1.04</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-1.2" target="https://www.trustedcomputinggroup.org/wp-content/uploads/TCG_PCClientImplementation_1-21_1_00.pdf">
  <front>
    <title>TCG PC Client Specific Implementation Specification for Conventional BIOS, Specification Version 1.21 Errata, Revision 1.00</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2012" month="February"/>
  </front>
</reference>
<reference anchor="EFI-TPM" target="https://trustedcomputinggroup.org/wp-content/uploads/EFI-Protocol-Specification-rev13-160330final.pdf">
  <front>
    <title>TCG EFI Platform Specification for TPM Family 1.1 or 1.2, Specification Version 1.22, Revision 15</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2014" month="January"/>
  </front>
</reference>
<reference anchor="RIM" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_RIM_Model_v1-r13_2feb20.pdf">
  <front>
    <title>DRAFT: TCG Reference Integrity Manifest Information Model</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-RIM" target="https://trustedcomputinggroup.org/xx">
  <front>
    <title>DRAFT: TCG PC Client Reference Integrity Manifest Specification, v.09</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="December"/>
  </front>
</reference>
<reference anchor="Platform-DevID-TPM-2.0" >
  <front>
    <title>DRAFT: TPM Keys for Platform DevID for TPM2, Specification Version 0.7, Revision 0</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="Platform-Certificates" >
  <front>
    <title>DRAFT: TCG Platform Attribute Credential Profile, Specification Version 1.0, Revision 15, 07 December 2017</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2017" month="December"/>
  </front>
</reference>
<reference anchor="Platform-ID-TPM-1.2" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf">
  <front>
    <title>TPM Keys for Platform Identity for TPM 1.2, Specification Version 1.0, Revision 3</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
</reference>
<reference anchor="Provisioning-TPM-2.0" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-TPM-v2.0-Provisioning-Guidance-Published-v1r1.pdf">
  <front>
    <title>TCG TPM v2.0 Provisioning Guidance</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="March"/>
  </front>
</reference>
<reference anchor="IEEE-802-1AR" >
  <front>
    <title>802.1AR-2018 - IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity, IEEE Computer Society</title>
    <author initials="M." surname="Seaman">
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2018" month="August"/>
  </front>
</reference>
<reference anchor="IMA" target="https://sourceforge.net/p/linux-ima/wiki/Home/">
  <front>
    <title>Integrity Measurement Architecture</title>
    <author surname="dsafford">
      <organization></organization>
    </author>
    <author surname="kds_etu">
      <organization></organization>
    </author>
    <author surname="mzohar">
      <organization></organization>
    </author>
    <author surname="reinersailer">
      <organization></organization>
    </author>
    <author surname="serge_hallyn">
      <organization></organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="TCGRoT" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_Roots_of_Trust_Specification_v0p20_PUBLIC_REVIEW.pdf">
  <front>
    <title>TCG Roots of Trust Specification</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="GloPlaRoT" target="https://globalplatform.org/specs-library/globalplatform-root-of-trust-definitions-and-requirements/">
  <front>
    <title>Root of Trust Definitions and Requirements Version 1.1</title>
    <author >
      <organization>GlobalPlatform Technology</organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="NetEq" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_Guidance_for_Securing_NetEq_1_0r29.pdf">
  <front>
    <title>TCG Guidance for Securing Network Equipment</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="January"/>
  </front>
</reference>
<reference anchor="NIST-IR-8060" target="https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8060.pdf">
  <front>
    <title>Guidelines for the Creation of Interoperable Software Identification (SWID) Tags</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2016" month="April"/>
  </front>
</reference>
<reference anchor="SWID" target="https://www.iso.org/standard/65666.html">
  <front>
    <title>Information Technology Software Asset Management Part 2: Software Identification Tag, ISO/IEC 19770-2</title>
    <author >
      <organization>The International Organization for Standardization/International Electrotechnical Commission</organization>
    </author>
    <date year="2015" month="October"/>
  </front>
</reference>
<reference anchor="AIK-Enrollment" target="https://trustedcomputinggroup.org/wp-content/uploads/IWG_CMC_Profile_Cert_Enrollment_v1_r7.pdf">
  <front>
    <title>TCG Infrastructure Working GroupA CMC Profile for AIK Certificate Enrollment Version 1.0, Revision 7</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2011" month="March"/>
  </front>
</reference>


    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

