<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.13 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc ipr="trust200902" docName="draft-fedorkow-rats-network-device-attestation-05" category="info">

  <front>
    <title abbrev="Network Device RIV">TPM-based Network Device Remote Integrity Verification</title>

    <author initials="G.C." surname="Fedorkow" fullname="Guy Fedorkow" role="editor">
      <organization>Juniper Networks, Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>gfedorkow@juniper.net</email>
      </address>
    </author>
    <author initials="E." surname="Voit" fullname="Eric Voit">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>evoit@cisco.com</email>
      </address>
    </author>
    <author initials="J." surname="Fitzgerald-McKay" fullname="Jessica Fitzgerald-McKay">
      <organization>National Security Agency</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>jmfitz2@nsa.gov</email>
      </address>
    </author>

    <date year="2020" month="April" day="16"/>

    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a workflow for remote attestation of integrity of network devices.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>There are many aspects to consider in fielding a trusted computing device,
from operating systems to applications.  Mechanisms to prove that
a device installed at a customer’s site is authentic (i.e., not counterfeit) and has
been configured with authorized software, all as part of a trusted supply chain, are just a few of the many aspects which need to be considered concurrently to have confidence that a device is truly trustworthy.</t>

<t>A generic architecture for remote attestation has been defined in <xref target="I-D.ietf-rats-architecture"></xref>.  Additionally, the use case for remotely attesting networking devices is within Section 6 of <xref target="I-D.richardson-rats-usecases"></xref>.  However, two these documents do not provide sufficient guidance for equipment vendors and network operators and to design, build, and deploy interoperable platforms.</t>

<t>The intent of this document is to provide such guidance. It does this by outlining the Remote Integrity Verification (RIV) problem, and then identifies elements that are necessary to get the complete, scalable attestation procedure working with commercial networking products such as Routers and Switches.   An underlying assumption will be the availability within the device of a Trusted Platform Module (TPM) compliant cryptoprocessor to enable the remote trustworthy assessment of the device’s software and hardware.</t>

<section anchor="terminology" title="Terminology">

<t>A number of terms are reused from <xref target="I-D.ietf-rats-architecture"></xref>.  These include: Appraisal Policy for Attestation Result, Attestation Result, Attester, Endorser, Evidence, Relying Party, Verifier, Verifier Owner.</t>

<t>Additionally, this document defines the following terms:</t>

<t>Attestation: the process of creating, conveying and appraising
assertions about Platform trustworthiness characteristics, including supply chain trust,
identity, platform provenance, software configuration, hardware configuration, platform
composition, compliance to test suites, functional and assurance evaluations,
etc.</t>

<t>The goal of attestation is simply to assure an administrator that the software
that was launched when the device was last started is the same as the software that
the device vendor initially shipped.</t>

<t>Within the Trusted Computing Group context, attestation is the process by
which an independent Verifier can obtain cryptographic proof as to the identity
of the device in question, evidence of the integrity of software loaded on
that device when it started up, and then verify that what’s there is what’s
supposed to be there.  For networking equipment, a verifier capability can
be embedded in a Network Management Station (NMS), a posture collection server,
or other network analytics tool (such as a software asset management solution,
or a threat detection and mitigation tool, etc.). While informally referred
to as attestation, this document focuses on a subset defined here as Remote
Integrity Verification (RIV).  RIV takes a network equipment centric perspective
that includes a set of protocols and procedures for determining whether a
particular device was launched with untampered software, starting from Roots
of Trust.  While there are many ways to accomplish attestation, RIV sets
out a specific set of protocols and tools that work in environments commonly
found in Networking Equipment.  RIV does not cover other platform characteristics
that could be attested, although it does provide evidence of a secure infrastructure
to increase the level of trust in other platform characteristics attested
by other means (e.g., by Entity Attestation Tokens <xref target="I-D.ietf-rats-eat"/>.</t>

</section>
<section anchor="document-organization" title="Document Organization">

<t>The remainder of this document is organized into several sections:</t>

<t><list style="symbols">
  <t>The remainder of this section covers goals and requirements, plus a top-level overview</t>
  <t>The Solution Overview section outlines how RIV works</t>
  <t>The Standards Components section links components of RIV to normative standards.</t>
  <t>Supporting material is in an appendix at the end.</t>
</list></t>

</section>
<section anchor="goals" title="Goals">

<t>Network operators benefit from a trustworthy attestation mechanism that provides
assurance that their network comprises authentic equipment, and has loaded software
free of known vulnerabilities and unauthorized tampering.  In line with the overall goal of assuring integrity, attestation can be used for asset management, vulnerability and compliance
assessment, plus configuration management.</t>

<t>As a part of a trusted supply chain, the RIV attestation workflow outlined in this document is intended to meet the following high-level goals:</t>

<t><list style="symbols">
  <t>Provable Device Identity - This specification requires that an attesting device includes
a cryptographic identifier unique to each device.  Effectively this means that the TPM or
equivalent cryptoprocessor must be so provisioned during the manufacturing cycle.</t>
  <t>Software Inventory - A key goal is to identify the software release installed
on the attesting device, and to provide evidence that the software stored within hasn’t
been altered</t>
  <t>Verifiability - Verification of software and configuration of the device shows
that the software that was authorized for installation by the administrator has actually has
been launched.</t>
</list></t>

<t>In addition, RIV is designed to operate in a centralized environment, such as with a central authority that manages and configures a number of network devices, or ‘peer-to-peer’, where network devices independently verify one another to establish a trust relationship.  (See <xref target="peer-to-peer"/> below, and also <xref target="I-D.voit-rats-trusted-path-routing"/>)</t>

</section>
<section anchor="description-of-remote-integrity-verification-riv" title="Description of Remote Integrity Verification (RIV)">

<t>Attestation requires two interlocking services between the Attester network device and the Verifier::</t>

<t><list style="symbols">
  <t>Platform Identity, the mechanism providing trusted identity, can reassure network
managers that the specific devices they ordered from authorized manufacturers for
attachment to their network are those that were installed, and that they continue to
be present in their network. As part of the mechanism for Platform Identity,
cryptographic proof of the identity of the manufacturer is also provided.</t>
  <t>Software Measurement is the mechanism that reports the state of mutable software components
on the device, and can assure network managers that they have known, untampered
software configured to run in their network.</t>
</list></t>

<t>Using these two interlocking services, RIV provides a procedure that assures a network operator that the equipment in
their network can be reliably identified, and that untampered software of
a known version is installed on each endpoint. Equipment in the network includes
devices that make up the network itself, such as routers, switches and firewalls.</t>

<t>RIV includes several major processes:</t>

<t><list style="numbers">
  <t>Creation of Evidence is the process whereby an Attester generates cryptographic
proof (Evidence) of claims about platform properties. In particular, the
platform identity and its software configuration are both of critical importance</t>
  <t>Platform Identification refers to the mechanism assuring the
Relying Party (ultimately, a network administrator) of the identity of devices that make up their network,
and that their manufacturers are known.</t>
  <t>Software used to boot a platform can be described as a chain
of measurements, started by a Root of Trust for Measurement,
that normally ends when the system software is loaded.
A measurement signifies the identity, integrity and version of each
software component registered with an attesting device’s TPM, so that the
subsequent appraisal stage can determine if the software
installed is authentic, up-to-date, and free of tampering.</t>
  <t>Conveyance of Evidence
reliably transports at least the minimum amount of Evidence from Attester to a Verifier to allow a management station to perform
a meaningful appraisal in Step 5. The transport
is typically carried out via a management network. The channel must provide
integrity and authenticity, and, in some use cases, may also require confidentiality.</t>
  <t>Finally, Appraisal of Evidence occurs.  As the Verifier and Relaying Party roles are
  often combined within RIV, this is the process of verifying the Evidence received by
  a Verifier from the Attesting device, and using an Appraisal Policy to develop an
  Attestation Result, used to inform decision making.  In practice, this means comparing
  the device measurements reported as Evidence with the Attester configuration expected
  by the Verifier.  Subsequently the Appraisal Policy for Attestation Results might
  match what was found against Reference Integrity Measurements (aka Golden
  Measurements) which representing the intended configured state
  of the connected device.</t>
</list></t>

<t>All implementations supporting this RIV specification require the support of the following three technologies :
1. Identity: Platform identity can be based on IEEE 802.1AR Device Identity <xref target="IEEE-802-1AR"/>,
   coupled with careful supply-chain management by the manufacturer.  The
   DevID certificate contains a statement by the manufacturer that establishes
   the identity of the device as it left the factory.  Some applications with
   a more-complex post-manufacture supply chain (e.g. Value Added Resellers),
   or with different privacy concerns, may want to use alternate mechanisms for platform
   authentication (for example, TCG Platform Certificates <xref target="Platform-Certificates"/>).</t>

<t><list style="numbers">
  <t>Platform Attestation provides evidence of configuration of software elements
present in the device.  This form of attestation can be implemented
with TPM PCR, Quote and Log mechanisms, which provide an authenticated mechanism
to report what software was started on the device through the boot cycle.  Successful attestation requires an unbroken chain from a boot-time root of trust through all layers of software needed to bring the device to an operational state.</t>
  <t>Reference Integrity Measurements must be conveyed from the Endorser (the entity accepted as the software authority,
often the manufacturer for embedded systems) to the system in which verification
will take place</t>
</list></t>

</section>
<section anchor="solution-requirements" title="Solution Requirements">

<t>Remote Integrity Verification must address the “Lying Endpoint”
problem, in which malicious software on an endpoint may subvert the
intended function, and also prevent the endpoint from reporting its compromised
status.  (See <xref target="security-cons"/> for further Security Considerations)</t>

<t>RIV attestation is designed to be simple
to deploy at scale. RIV should work “out of the box” as far as possible,
that is, with the fewest possible provisioning steps or configuration databases
needed at the end-user’s site, as network equipment is often required to “self-configure”,
to reliably reach out without manual intervention to prove its identity and
operating posture, then download its own configuration. See <xref target="RFC8572"/> for an
example of Secure Zero Touch Provisioning.</t>

</section>
<section anchor="scope" title="Scope">

<t>Remote Attestation is a very general problem that could apply to most network-connected computing devices.  However, this document includes several assumptions that limit the scope to Network Equipment (e.g. routers, switches and firewalls):</t>

<t><list style="symbols">
  <t>This solution is for use in non-privacy-preserving applications (for example,
networking, Industrial IoT), avoiding the need for a Privacy Certificate
Authority for attestation keys <xref target="AIK-Enrollment"/> or TCG Platform
Certificates <xref target="Platform-Certificates"/></t>
  <t>This document assumes network protocols that are common in networking equipment such as YANG <xref target="RFC7950"></xref> and NETCONF <xref target="RFC6241"></xref>,
but not generally used in other applications.</t>
  <t>The approach outlined in this document mandates the use of TPM 1.2 or TPM 2.0.  Other
roots of trust could be used with the same information flow, although different
data structures would likely be called for.</t>
</list></t>

<section anchor="out-of-scope" title="Out of Scope">

<t><list style="symbols">
  <t>Run-Time Attestation: Run-time attestation of Linux or other multi-threaded
operating system processes considerably expands the scope of the problem.
Many researchers are working on that problem, but this document defers the
run-time attestation problem.</t>
  <t>Multi-Vendor Embedded Systems: Additional coordination would be needed for
devices that themselves comprise hardware and software from multiple vendors,
integrated by the end user.</t>
  <t>Processor Sleep Modes: Network equipment typically does not “sleep”, so
sleep and hibernate modes are not considered.  Although out of scope
for RIV, Trusted Computing Group specifications do encompass sleep and hibernate
states.</t>
  <t>Virtualization and Containerization:  These technologies are increasingly
used in Network equipment, but are not considered in this revision of the
document.</t>
</list></t>

</section>
</section>
</section>
<section anchor="solution-outline" title="Solution Outline">

<section anchor="riv-software-configuration-attestation-using-tpm" title="RIV Software Configuration Attestation using TPM">

<t>RIV Attestation is a process which can be used to determine the identity of software running
on a specifically-identified device.  Remote Attestation is broken into two
phases, shown in Figure 1:</t>

<t><list style="symbols">
  <t>During system startup, each distinct software object is “measured”.
Its identity, hash (i.e. cryptographic digest) and version information is recorded in a log.
Hashes are also extended, or cryptographically folded, into the TPM, in a way that can be used to validate the log entries.  The measurement process generally
follows the Chain of Trust model used in Measured Boot, where each stage
of the system measures the next one, and extends its measurement into the TPM,
before launching it.</t>
  <t>Once the device is running and has operational network connectivity, a separate,
trusted Verifier will interrogate the network
device to retrieve the logs and a copy of the digests collected by hashing
each software object, signed by an attestation private key known only to
the TPM.</t>
</list></t>

<t>The result is that the Verifier can verify the device’s identity by checking
the certificate containing the TPM’s attestation public key, and can
validate the software that was launched by comparing digests in the log with
known-good values, and verifying their correctness by comparing with the
signed digests from the TPM.</t>

<t>It should be noted that attestation and identity are inextricably linked;
signed Evidence that a particular version of software was loaded is of little
value without cryptographic proof of the identity of the Attester producing
the Evidence.</t>

<figure title="RIV Attestation Model" anchor="RIV-Attestation-Model"><artwork align="left"><![CDATA[
    +-------------------------------------------------------+
    | +--------+    +--------+   +--------+    +---------+  |
    | | BIOS   |--->| Loader |-->| Kernel |--->|Userland |  |
    | +--------+    +--------+   +--------+    +---------+  |
    |     |            |           |                        |
    |     |            |           |                        |
    |     +------------+-----------+-+                      |
    |                        Step 1  |                      |
    |                                V                      |
    |                            +--------+                 |
    |                            |  TPM   |                 |
    |                            +--------+                 |
    |   Router                       |                      |
    +--------------------------------|----------------------+
                                     |
                                     |  Step 2
                                     |    +-----------+
                                     +--->| Verifier  |
                                          +-----------+

    Reset---------------flow-of-time-during-boot--...------->
]]></artwork></figure>

<t>In Step 1, measurements are “extended” into the TPM as processes start. In
Step 2, signed PCR digests are retrieved from the TPM for off-box analysis
after the system is operational.</t>

<section anchor="what-does-riv-attest" title="What Does RIV Attest?">

<t>TPM attestation is strongly focused around Platform Configuration Registers (PCRs), but those registers are only vehicles for certifying accompanying Evidence, conveyed in log entries.  It is the hashes in log entries are extended into PCRs, where they can be retrieved in the form of a Quote signed by a key known only to the TPM (xref).  The use of multiple PCRs serves only to provide some independence between different classes of object, so that one class of objects can be updated without changing the extended hash for other classes.  Although PCRs can be used for any purpose, this section outlines the objects within the scope of this document which may be extended into the TPM.</t>

<t>In general, PCRs are organized to independently attest three classes of object:</t>

<t><list style="symbols">
  <t>Code, i.e., instructions to be executed by a CPU.</t>
  <t>Configuration - Many devices offer numerous options controlled by non-volatile configuration variables which can impact the device’s security posture.  These settings may have vendor defaults, but often can be changed by administrators, who may want to verify via attestation that the settings they intend are still in place.</t>
  <t>Credentials - Administrators may wish to verify via attestation that keys (and other credentials) outside the Root of Trust have not be subject to unauthorized tampering.  (By definition, keys inside the root of trust can’t be verified independently)</t>
</list></t>

<t>The TCG PC Client Platform Firmware Profile Specification <xref target="PC-Client-BIOS-TPM-2.0"/> gives considerable detail on what is to be measured during the boot phase of a platform boot using a UEFI BOIS (www.uefi.org), but the goal is simply to measure every bit of code executed in the process of starting the device, along with any configuration information related to security posture.  Table XX summarizes the functions that are measured, and how this document recommends they be allocated to PCRs.  It’s important to note that each PCR may contain results from dozens (or even thousands) of individual measurements.</t>

<figure title="Attested Objects" anchor="Attested-Objects"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|                                            |   Allocated PCR #   |
| Function                                   | Code | Configuration|
--------------------------------------------------------------------
| BIOS Static Root of Trust, plus embedded   |  0   |    1         |
| Option ROMs and drivers                    |      |              |
--------------------------------------------------------------------
| Pluggable Option ROMs to initialize and    |  2   |    3         |
| configure add-in devices                   |      |              |
--------------------------------------------------------------------
| Boot Manager code and configuration (UEFI  |  4   |    5         |
| uses a separate module to implement        |      |              |
| policies for selecting among a variety of  |      |              |
| potential boot devices).  This PCR records |      |              |
| boot attempts, and identifies what         |      |              |
| resources were used to boot the OS.        |      |              |
--------------------------------------------------------------------
| Vendor Specific Measurements during boot   |  6   |    6         |
--------------------------------------------------------------------
| Secure Boot Policy.  This PCR records keys |      |    7         |
| and configuration used to validate the OS  |      |              |
| loader                                     |      |              |
--------------------------------------------------------------------
| OS Loader (e.g GRUB2 for Linux)            |  8   |    9         |
--------------------------------------------------------------------
| Reserved for OS (e.g. Linux IMA)           |  10  |    10        |
+------------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="riv-keying" title="RIV Keying">

<t>RIV attestation relies on two keys:</t>

<t><list style="symbols">
  <t>An identity key is required to certify the identity of the Attester itself.
RIV specifies the use of an IEEE 802.1AR DevID <xref target="IEEE-802-1AR"/>,
signed by the device manufacturer, containing the device serial number.</t>
  <t>An Attestation Key is required to sign the Quote generated by the TPM to report evidence
of software configuration.</t>
</list></t>

<t>In TPM application, the Attestation key must be protected by the TPM, and the DevID
should be as well.  Depending on other TPM configuration procedures,
the two keys may be different.  Some of the considerations are outlined in TCG
Guidance for Securing Network Equipment <xref target="NetEq"/>.</t>

<t>TCG Guidance for Securing Network Equipment specifies further conventions for these keys:</t>

<t><list style="symbols">
  <t>When separate Identity and Attestation keys are used, the Attestation
Key (AK) and its x.509 certificate should parallel the DevID, with the same
device ID information as the DevID certificate (i.e., the same Subject Name
and Subject Alt Name, even though the key pairs are different).  This allows
a quote from the device, signed by an AK, to be linked directly to the
device that provided it, by examining the corresponding AK certificate.</t>
  <t>Network devices that are expected to use secure zero touch provisioning as
specified in <xref target="RFC8572"/>)
must be shipped by the manufacturer with pre-provisioned keys (Initial DevID and AK,
called IDevID and IAK).  Inclusion of an DevID and IAK by a vendor does not
preclude a mechanism whereby an Administrator can define Local Identity and
Attestation Keys (LDevID and LAK) if desired.</t>
</list></t>

</section>
<section anchor="riv-information-flow" title="RIV Information Flow">

<t>RIV workflow for networking equipment is organized around a simple use-case,
where a network operator wishes to verify the integrity of software installed
in specific, fielded devices.  This use-case implies several components:</t>

<t><list style="numbers">
  <t>The Attesting Device, which the network operator wants to examine.</t>
  <t>A Verifier (which might be a network management station) somewhere separate
  from the Device that will retrieve the information and analyze it to pass
  judgment on the security posture of the device.</t>
  <t>A Relying Party, which can act on Attestation results.  Interaction between the Relying Party and the
  Verifier is considered out of scope for RIV.</t>
  <t>Signed Reference Integrity Manifests (RIMs),
containing Reference Integrity Measurements, can
  either be created by the device manufacturer
  and shipped along with the device as part of its software image, or alternatively,
  could be obtained several other ways (direct to the Verifier from the
  manufacturer, from a third party, from the owner’s observation of what’s
  thought to be a “known good system”, etc.).  Retrieving RIMs from the device
  itself allows attestation to be done in systems which may not have access
  to the public internet, or by other devices that are not management stations
  per-se (e.g., a peer device;   See <xref target="RIM-policy"/>).  If reference measurements are obtained from
  multiple sources, the Verifier may need to evaluate the relative level of
  trust to be placed in each source in case of a discrepancy.</t>
</list></t>

<t>These components are illustrated in Figure 2.</t>

<t>A more-detailed taxonomy of terms is given in <xref target="I-D.ietf-rats-architecture"/></t>

<figure title="RIV Reference Configuration for Network Equipment" anchor="RIV-Reference-Configuration"><artwork align="left"><![CDATA[
+---------------+        +-------------+        +---------+--------+
|               |        | Attester    | Step 1 | Verifier|        |
| Endorser      |        | (Device     |<-------| (Network| Relying|
| (Device       |        | under       |------->| Mngmt   | Party  |
| Manufacturer  |        | attestation)| Step 2 | Station)|        |
| or other      |        |             |        |         |        |
| authority)    |        |             |        |         |        |
+---------------+        +-------------+        +---------+--------+
       |                                             /\
       |                  Step 0                      |
       -----------------------------------------------

]]></artwork></figure>

<t>In Step 0, The Asserter (the device manufacturer) provides a Software Image
accompanied by one or more Reference Integrity Manifests (RIMs) to the Attester (the
device under attestation) signed by the asserter. In Step 1, the Verifier
(Network Management Station), on behalf of a Relying Party, requests Identity,
Measurement Values (and possibly RIMs) from the Attester. In Step 2, the
Attester responds to the request by providing a DevID, quotes (measured values),
and optionally RIMs, signed by the Attester.</t>

<t>The following standards components may be used:</t>

<t><list style="numbers">
  <t>TPM Keys are configured according to <xref target="Platform-DevID-TPM-2.0"/>, <xref target="PC-Client-BIOS-TPM-1.2"/>, or <xref target="Platform-ID-TPM-1.2"/></t>
  <t>Measurements of firmware and bootable modules may be taken according to TCG PC Client <xref target="PC-Client-BIOS-TPM-2.0"/> and Linux IMA <xref target="IMA"/></t>
  <t>Device Identity is managed by IEEE 802.1AR certificates <xref target="IEEE-802-1AR"/>, with keys protected by TPMs.</t>
  <t>Attestation logs may be formatted according to the Canonical Event Log format <xref target="Canonical-Event-Log"/>, although other specialized formats may be used.</t>
  <t>Quotes are retrieved from the TPM according to TCG TAP Information Model <xref target="TAP"/>.  While the TAP IM gives a protocol-independent description of the data elements involved, it’s important to note that quotes from the TPM are signed inside the TPM, so must be retrieved in a way that does not invalidate the signature, as specified in <xref target="I-D.ietf-rats-yang-tpm-charra"/>, to preserve the trust model.  (See <xref target="security-cons"/> Security Considerations).</t>
  <t>Reference Integrity Measurements may be encoded as CoSWID tags, as defined in
  the TCG RIM document <xref target="RIM"/>, compatible with NIST IR 8060 <xref target="NIST-IR-8060"/> and the IETF CoSWID draft <xref target="I-D.ietf-sacm-coswid"/>.  See <xref target="RIM-section"/>.</t>
</list></t>

</section>
<section anchor="riv-simplifying-assumptions" title="RIV Simplifying Assumptions">

<t>This document makes the following simplifying assumptions to reduce complexity:</t>

<t><list style="symbols">
  <t>The product to be attested is shipped with an IEEE 802.1AR DevID and an Initial
Attestation Key (IAK) with certificate.  The IAK cert contains the same identity
information as the DevID (specifically, the same Subject Name and Subject
Alt Name, signed by the manufacturer), but it’s a type of key that can be
used to sign a TPM Quote.  This convention is described in TCG Guidance for
Securing Network Equipment <xref target="NetEq"/>. For network equipment, which is generally non-privacy-sensitive, shipping
a device with both an IDevID and an IAK already provisioned substantially
simplifies initial startup. Privacy-sensitive applications may use the TCG
Platform Certificate and additional procedures to install identity credentials
on the platform after manufacture.</t>
  <t>The product is equipped with a Root of Trust for Measurement, Root of Trust
for Storage and Root of Trust for Reporting (as defined in <xref target="GloPlaRoT"/>) that are
capable of conforming to the TCG Trusted Attestation Protocol (TAP) Information Model <xref target="TAP"/>.</t>
  <t>The vendor will ship Reference Integrity Measurements (i.e., known-good measurements)
in the form of signed CoSWID tags <xref target="I-D.ietf-sacm-coswid"/>, <xref target="SWID"/>,
as described in TCG Reference Integrity Measurement Manifest Information Model <xref target="RIM"/>.</t>
</list></t>

<section anchor="RIM-section" title="Reference Integrity Manifests (RIMs)">

<t><xref target="I-D.ietf-rats-yang-tpm-charra"></xref> focuses on collecting and transmitting evidence in
the form of PCR measurements and attestation logs.  But the critical part
of the process is enabling the verifier to decide whether the measurements
are “the right ones” or not.</t>

<t>While it must be up to network administrators to decide what they want on
their networks, the software supplier should supply the Reference Integrity
Measurements that
may be used by a verifier to determine if evidence shows known good, known
bad or unknown software configurations.</t>

<t>In general, there are two kinds of reference measurements:</t>

<t><list style="numbers">
  <t>Measurements of early system startup (e.g., BIOS, boot loader, OS kernel)
are essentially single threaded, and executed exactly once, in a known sequence,
before any results could be reported.  In this case, while the method for
computing the hash and extending relevant PCRs may be complicated, the net
result is that the software (more likely, firmware) vendor will have one
known good PCR value that “should” be present in the relevant PCRs after the box has
booted.  In this case, the signed reference measurement could simply list the
expected hashes for the given version.  However, a RIM that contains the
intermediate hashes can be useful in debugging cases where the expected final hash
is not the one reported.</t>
  <t>Measurements taken later in operation of the system, once an OS has started
(for example, Linux IMA<xref target="IMA"/>), may be more complex, with unpredictable “final”
PCR values.  In this case, the Verifier must have enough information to reconstruct
the expected PCR values from logs and signed reference measurements from
a trusted authority.</t>
</list></t>

<t>In both cases, the expected values can be expressed as signed SWID or CoSWID tags,
but the SWID structure in the second case is somewhat more complex, as reconstruction of the extended hash in a PCR may involve thousands of files and other objects.</t>

<t>The TCG has published an information model defining elements of reference integrity
manifests under the title TCG Reference Integrity Manifest Information Model <xref target="RIM"/>.  This information model outlines how SWID tags should be structured to allow attestation, and defines “bundles” of SWID tags that may be needed to describe a complete software release.  The RIM contains some metadata relating to the software release it belongs to, plus hashes for each individual file or other object that could be attested.</t>

<t>TCG has also published the PC Client Reference Integrity Measurement specification <xref target="PC-Client-RIM"/>, which focuses on a SWID-compatible format suitable for expressing expected measurement values in the specific case of a UEFI-compatible BIOS, where the SWID focus on files and file systems is not a direct fit.  While the PC Client RIM is not directly applicable to network equipment, many vendors do use a conventional UEFI BIOS to launch their network OS.</t>

</section>
<section anchor="attestation-logs" title="Attestation Logs">

<t>Quotes from a TPM can provide evidence of the state of a device up to the time
the evidence was recorded, but to make sense of the quote in most cases an
event log that identifies which software modules contributed which values to the quote
during startup must also be provided.  The log must contain enough information
to demonstrate its integrity by allowing exact reconstruction of the digest
conveyed in the signed quote (i.e., PCR values).</t>

<t>There are multiple event log formats which may be supported as viable formats of Evidence between the Attester and Verifier:</t>

<t><list style="symbols">
  <t>Event log exports from <xref target="I-D.ietf-rats-yang-tpm-charra"/></t>
  <t>IMA Event log file exports <xref target="IMA"/></t>
  <t>TCG UEFI BIOS event log (TCG EFI Platform Specification for TPM Family 1.1 or
1.2, Section 7 <xref target="EFI-TPM"/>)</t>
  <t>TCG Canonical Event Log <xref target="Canonical-Event-Log"/></t>
  <t>Legacy BIOS event log, although this document is less relevant as UEFI
has largely replaced the Legacy BIOS (TCG PC Client Specific Implementation Specification
for Conventional BIOS, Section 11.3<xref target="PC-Client-BIOS-TPM-1.2"/>)</t>
</list></t>

</section>
</section>
</section>
<section anchor="standards-components" title="Standards Components">

<section anchor="prerequisites-for-riv" title="Prerequisites for RIV">

<t>The Reference Interaction Model for Challenge-Response-based Remote Attestation
is based on the standard roles defined in <xref target="I-D.ietf-rats-architecture"/>.  However additional prerequisites must be established to allow for interoperable RIV use case implementations.  These prerequisites are intended to provide sufficient context information so that the Verifier can acquire and evaluate Attester measurements.</t>

<section anchor="unique-device-identity" title="Unique Device Identity">

<t>A Secure device Identity (DevID) in the form of an IEEE 802.1AR certificate <xref target="IEEE-802-1AR"/> must be provisioned in the Attester’s TPMs.</t>

</section>
<section anchor="keys" title="Keys">

<t>The Attestation Identity Key (AIK) and certificate must also be provisioned on the Attester according to <xref target="Platform-DevID-TPM-2.0"/>, <xref target="PC-Client-BIOS-TPM-1.2"/>, or <xref target="Platform-ID-TPM-1.2"/>.</t>

<t>The Attester’s TPM Keys must be associated with the DevID on the Verifier (see <xref target="security-cons"/> Security Considerations).</t>

</section>
<section anchor="RIM-policy" title="Appraisal Policy for Evidence">

<t>The Verifier must obtain the Appraisal Policy for Evidence.  This policy may be in the form of reference measurements (e.g., Known Good Values, CoSWID tags <xref target="I-D.birkholz-yang-swid"/>). These reference measurements will eventually be compared to signed PCR Evidence acquired from an Attester’s TPM.</t>

<t>This document does not specify the format or contents for the Appraisal Policy for Evidence.  But acquiring this policy may happen in one of two ways:</t>

<t><list style="numbers">
  <t>a Verifier obtains reference measurements directly from a Verifier Owner / device configuration authority chosen by the network administrator.</t>
  <t>Signed reference measurements may be distributed by the Verifier Owner to the Attester.  From there, the reference measurement may be acquired by the Verifier.</t>
</list></t>

<figure title="Appraisal Policy for Evidence Prerequisites" anchor="Appraisal-Prerequisites"><artwork align="left"><![CDATA[
*************         .-------------.         .-----------.
* Verifier  *         | Attester    |         | Verifier/ |
* Owner     *         |             |         | Relying   |
*(Device    *----2--->| (Network    |----2--->| Party     |
* config    *         |  Device)    |         |(Ntwk Mgmt |
* Authority)*         |             |         |  Station) |
*************         '-------------'         '-----------'
        |                                           ^
        |                                           |
        '----------------1--------------------------'
]]></artwork></figure>

<t>In either case the Appraisal Policy for Evidence must be generated, acquired and delivered in a secure way.  This includes reference measurements of:</t>

<t><list style="symbols">
  <t>firmware and bootable modules taken according to TCG PC Client <xref target="PC-Client-BIOS-TPM-2.0"/> and Linux IMA <xref target="IMA"/></t>
  <t>encoded CoSWID tags signed by the device manufacturer, are as defined in the TCG RIM document <xref target="RIM"/>, compatible with NIST IR 8060 <xref target="NIST-IR-8060"/> and the IETF CoSWID draft <xref target="I-D.ietf-sacm-coswid"/>.</t>
</list></t>

</section>
</section>
<section anchor="reference-model-for-challenge-response" title="Reference Model for Challenge-Response">

<t>Once the prerequisites for RIV are met, a Verifier may acquire Evidence from an Attester.  The following diagram illustrates a RIV information flow between a Verifier and an Attester.  Event times shown correspond to the time types described within Appendix A of <xref target="I-D.ietf-rats-architecture"/>:</t>

<figure title="IETF Attestation Information Flow" anchor="IETF-Attestation-Information-Flow"><artwork align="left"><![CDATA[
.----------.                        .--------------------------.
| Attester |                        | Relying Party / Verifier |
'----------'                        '--------------------------'
   time(vg)                                              |
     |<-- requestAttestation(nonce,PcrSelection)-------time(ns)
     |                                                   |
   time(eg) LogEvidence(assertionsSelection)             |
     |      SignedPcrEvidence(PCR, nonce)                |
     |                                                   |
     |-----------LogEvidence,SignedPcrEvidence---------->|
     |                                                   |
     |                       verifyAttestationEvidence time(rg,ra)
     |                                                   ~
                                                       time(rx)
]]></artwork></figure>

<t><list style="symbols">
  <t>time(vg): One or more Attesting Network Device PCRs are extended with measurements.</t>
  <t>time(ns): The Verifier generates a nonce, and makes a request attestation data for one or more PCRs from an Attester.  This can be accomplished via a YANG <xref target="RFC7950"/> interface that implements the TCG TAP model (e.g. YANG Module for Basic Challenge-Response-based Remote Attestation Procedures <xref target="I-D.ietf-rats-yang-tpm-charra"/>).</t>
  <t>time(eg): On the Attester, measured values are retrieved from the Attester’s TPM. This requested PCR evidence is signed by the Attestation Identity Key (AIK) associated with the DevID.  Quotes are retrieved according to TCG TAP Information Model <xref target="TAP"/>.  While the TAP IM gives a protocol-independent description of the data elements involved, it’s important to note that quotes from the TPM are signed inside the TPM, so must be retrieved in a way that does not invalidate the signature, as specified in <xref target="I-D.ietf-rats-yang-tpm-charra"/>, to preserve the trust model.  (See <xref target="security-cons"/> Security Considerations).  <list style="symbols">
      <t>At the same time, for any PCRs where known good values might not be known by the Verifier, the Attester collects log evidence showing what values have been extended into that PCR.  Attestation logs are formatted according to the Canonical Event Log format <xref target="Canonical-Event-Log"/>.</t>
    </list></t>
  <t>Collected Evidence is passed from the Attester to the Verifier</t>
  <t>time(rg,ra): The Verifier reviews the Evidence and takes action as needed.  As the Relying Party and Verifier are assumed co-resident, this can happen in one step.  <list style="symbols">
      <t>If the signed PCR values do not match either KGVs, or the set of log entries which have extended a particular PCR, the device should not be trusted.</t>
      <t>If the set of log entries are not seen as acceptable by the Appraisal Policy for Evidence, the device should not be trusted.</t>
      <t>If the AIK signature is not correct, or freshness such as that provided by the nonce is not included in the response, the device should not be trusted.</t>
    </list></t>
  <t>time(rx): At some point after the verification of Evidence, the Attester can no longer be considered Attested as trustworthy.</t>
</list></t>

<section anchor="transport-and-encoding" title="Transport and Encoding">

<t>Network Management systems may retrieve signed PCR based Evidence as shown in <xref target="IETF-Attestation-Information-Flow"/>, and can be accomplished via:</t>

<t><list style="symbols">
  <t>XML, JSON, or CBOR encoded Evidence, using</t>
  <t>RESTCONF or NETCONF transport, over a</t>
  <t>TLS or SSH secure tunnel</t>
</list></t>

<t>Retrieval of Log Evidence will be via log interfaces on the network device.  (For example, see <xref target="I-D.ietf-rats-yang-tpm-charra"/>).</t>

</section>
</section>
<section anchor="peer-to-peer" title="Centralized vs Peer-to-Peer">

<t><xref target="IETF-Attestation-Information-Flow"/> above assumes that the Verifier is implicitly trusted, while the Attesting device is not.  In a Peer-to-Peer application such as two routers negotiating a trust relationship <xref target="I-D.voit-rats-trusted-path-routing"/>, the two peers can each ask the other to prove software integrity.  In this application, the information flow is the same, but each side plays a role both as an Attester and a Verifier.  Each device issues a challenge, and each device responds to the other’s challenge, as shown in <xref target="Peer-to-peer-Information-Flow"/>.  Peer-to-peer challenges, particularly if used to establish a trust relationship between routers, require devices to carry their own signed reference measurements (RIMs) so that each device has everything needed for attestation, without having to resort to a central authority.</t>

<figure title="Peer-to-Peer Attestation Information Flow" anchor="Peer-to-peer-Information-Flow"><artwork align="left"><![CDATA[
+---------------+                             +---------------+
|               |                             |               |
| Asserter A    |                             | Asserter B    |
| Firmware      |                             | Firmware      |
| Configuration |                             | Configuration |
| Authority     |                             | Authority     |
|               |                             |               |
+---------------+                             +---------------+
       |                                              |
       |       +-------------+        +------------+  |
       |       |             | Step 1 |            |  |   \
       |       | Attester    |<------>| Verifier   |  |   |
       |       |             |<------>|            |  |   |  Router B
       +------>|             | Step 2 |            |  |   |- Challenges
        Step 0A|             |        |            |  |   |  Router A
               |             |------->|            |  |   |
               |- Router A --| Step 3 |- Router B -|  |   /
               |             |        |            |  |
               |             |        |            |  |
               |             | Step 1 |            |  |   \
               | Verifier    |<------>| Attester   |<-+   |  Router A
               |             |<------>|            |      |- Challenges
               |             | Step 2 |            |      |  Router B
               |             |        |            |      |
               |             |<-------|            |      |
               +-------------+ Step 3 +------------+      /

]]></artwork></figure>

<t>In this application, each device may need to be equipped with signed RIMs to act as an Attester, and also a selection of trusted x.509 root certificates to allow the device to act as a Verifier.   An existing link layer protocol such as 802.1x <xref target="IEEE-802.1x"/> or 802.1AE <xref target="IEEE-802.1ae"/>, with Evidence being enclosed over a variant of EAP <xref target="RFC3748"/> or LLDP <xref target="LLDP"/> are suitable methods for such an exchange.</t>

</section>
</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>Networking Equipment such as routers, switches and firewalls has a key role to play in guarding the privacy of individuals using the network:</t>

<t><list style="symbols">
  <t>Packets passing through the device must not be sent to unauthorized destinations.  For example</t>
  <t>Routers often act as Policy Enforcement Points, where individual subscribers may be checked for
authorization to access a network.  Subscriber login information must not be released to unauthorized parties.</t>
  <t>Networking Equipment is often called upon to block access to protected resources from unauthorized users.</t>
  <t>Routing information, such as the identity of a router’s peers, must not be leaked to unauthorized neighbors.</t>
  <t>If configured, encryption and decryption of traffic must be carried out reliably, while protecting keys and credentials.</t>
</list></t>

<t>Functions that protect privacy are implemented as part of each layer of hardware and software that
makes up the networking device.
In light of these requirements for protecting the privacy of users of the network, the Network Equipment
must identify itself, and its boot configuration and measured device state (for example, PCR values),
to the Equipment’s Administrator, so there’s no uncertainty as to what function each device and
configuration is configured to carry out. This allows the administrator to ensure that the network
provides individual and peer privacy guarantees.</t>

<t>RIV specifically addresses the collection information from enterprise network devices by an enterprise
network.  As such, privacy is a fundamental concern for those deploying this solution, given EU
GDPR, California CCPA, and many other privacy regulations.  The enterprise should implement
and enforce their duty of care.</t>

<t>See <xref target="NetEq"/> for more context on privacy in networking devices</t>

</section>
<section anchor="security-cons" title="Security Considerations">

<t>Attestation results from the RIV procedure are subject to a number of attacks:</t>

<t><list style="symbols">
  <t>Keys may be compromised</t>
  <t>A counterfeit device may attempt to impersonate (spoof) a known authentic device</t>
  <t>Man-in-the-middle attacks may be used by a counterfeit device to attempt to deliver
responses that originate in an actual authentic device</t>
  <t>Replay attacks may be attempted by a compromised device</t>
</list></t>

<t>Trustworthiness of RIV attestation depends strongly on the validity of keys used for identity
and attestation reports.  RIV takes full advantage of TPM capabilities to ensure that results can be trusted.</t>

<t>Two sets of keys are relevant to RIV attestation</t>

<t><list style="symbols">
  <t>A DevID key is used to certify the identity of the device in which the TPM is installed.</t>
  <t>An Attestation Key (AK) key signs attestation reports, (called ‘quotes’ in TCG documents),
used to provide evidence for integrity of the software on the device.</t>
</list></t>

<t>TPM practices usually require that these keys be different, as a way of ensuring that a general-purpose
signing key cannot be used to spoof an attestation quote.</t>

<t>In each case, the private half of the key is known only to the TPM, and cannot be
retrieved externally, even by a trusted party.  To ensure that’s the case,
specification-compliant private/public key-pairs are generated inside the TPM, where they’re never
exposed, and cannot be extracted (See <xref target="Platform-DevID-TPM-2.0"/>).</t>

<t>Keeping keys safe is just part of attestation security; knowing which keys are bound
to the device in question is just as important.</t>

<t>While there are many ways to manage keys in a TPM (See <xref target="Platform-DevID-TPM-2.0"/>), RIV includes
support for “zero touch” provisioning (also known as zero-touch onboarding) of fielded
devices (e.g. Secure ZTP, <xref target="RFC8572"/>), where keys which have predictable trust properties are
provisioned by the device vendor.</t>

<t>Device identity in RIV is based on IEEE 802.1AR DevID. This specification provides several elements</t>

<t><list style="symbols">
  <t>A DevID requires a unique key pair for each device, accompanied by an x.509 certificate</t>
  <t>The private portion of the DevID key is to be stored in the device, in a manner that provides confidentiality (Section 6.2.5 <xref target="IEEE-802-1AR"/>)</t>
</list></t>

<t>The x.509 certificate contains several components</t>

<t><list style="symbols">
  <t>The public part of the unique DevID key assigned to that device</t>
  <t>An identifying string that’s unique to the manufacturer of the device.  This is normally the
serial number of the unit, which might also be printed on label on the device.</t>
  <t>The certificate must be signed by a key traceable to the manufacturer’s root key.</t>
</list></t>

<t>With these elements, the device’s manufacturer and serial number can be identified by analyzing the
DevID certificate plus the chain of intermediate certs leading back to the manufacturer’s root
certificate.  As is conventional in TLS connections, a nonce must be signed by the device
in response to a challenge,
proving possession of its DevID private key.</t>

<t>RIV uses the DevID to validate a TLS connection to the device as the attestation session begins.  Security of
this process derives from TLS security, with the DevID providing proof that the TLS session terminates on
the intended device. <xref target="RFC8446"/>.</t>

<t>Evidence of software integrity is delivered in the form of a quote signed by the TPM
itself.  Because the contents of the quote are signed inside the TPM, any external
modification (including reformatting to a different data format) will be detected
as tampering.</t>

<t>A critical feature of the YANG model described in <xref target="I-D.ietf-rats-yang-tpm-charra"/> is the ability to carry TPM data structures in their native format, without requiring any changes to the structures as they were signed and delivered by the TPM.  While alternate methods of conveying TPM quotes could compress out redundant information, or add an additional layer of signing using external keys, the important part is to preserve the TPM signing, so that tampering anywhere in the path between the TPM itself and the Verifier can be detected.</t>

<t>Prevention of spoofing attacks against attestation systems is also important.  There are two cases to consider:</t>

<t><list style="symbols">
  <t>The entire device could be spoofed, that is, when the Verifier goes to verify a specific device, it might be redirected to a different device.  Use of the 802.1AR identity in the TPM ensures that the Verifier’s TLS session is in fact terminating on the right device.</t>
  <t>A compromised device could respond with a spoofed attestation result, that is, a compromised OS could return a fabricated quote.</t>
</list></t>

<t>Protection against spoofed quotes from a device with valid identity is a bit more complex.
An identity key must be available to sign any kind of nonce or hash offered by the verifier,
and consequently, could be used to sign a fabricated quote.  To block spoofed attestation
result, the quote generated inside the TPM must by signed by
a key that’s different from the DevID, called an Attestation Key (AK).</t>

<t>Given separate Attestation and DevID keys, the
binding between the AK and the same device must also be proven to
prevent a man-in-the-middle attack (e.g. the ‘Asokan Attack’ <xref target="RFC6813"/>).</t>

<t>This is accomplished in RIV through use of an AK certificate with the same elements as the DevID
(i.e., same manufacturer’s serial number, signed by the same manufacturer’s key), but containing
the device’s unique AK public key instead of the DevID public key.
[this will require an OID that says the key is known by the CA to be an Attestation key]</t>

<t>These two keys and certificates are used together:</t>

<t><list style="symbols">
  <t>The DevID is used to validate a TLS connection terminating on the device with a known serial number.</t>
  <t>The AK is used to sign attestation quotes, providing proof that the attestation
evidence comes from the same device.</t>
</list></t>

<t>Replay attacks, where results of a previous attestation are submitted in response to subsequent requests,
are usually prevented by inclusion of a nonce in the request to the TPM
for a quote.  Each request from the Verifier includes a new random number (a nonce). The resulting
quote signed by the TPM contains the same nonce, allowing the verifier to determine
freshness, i.e., that the resulting quote was generated in response to the verifier’s specific request.
Time-Based Uni-directional Attestation <xref target="I-D.birkholz-rats-tuda"/> provides an alternate mechanism
to verify freshness without requiring a request/response cycle.</t>

<t>Requiring results of attestation of the operating software to be signed by a key known only to the TPM also
removes the need to trust the device’s operating software (beyond the first measurement; see below); any
changes to the quote, generated and signed by the TPM itself, made by malicious device software, or in
the path back to the verifier, will invalidate the signature on the quote.</t>

<t>Although RIV recommends that device manufacturers pre-provision devices with easily-verified DevID and AK certs,
use of those credentials is not mandatory.  IEEE 802.1AR incorporates the idea of an Initial Device ID
(IDevID), provisioned by the manufacturer, and a Local Device ID (LDevID) provisioned by the owner of
the device.  RIV extends that concept by defining an Initial Attestation Key (IAK) and Local Attestation
Key (LAK) with the same properties.</t>

<t>Device owners can use any method to provision the Local credentials.</t>

<t><list style="symbols">
  <t>TCG document <xref target="Platform-DevID-TPM-2.0"/> shows how the initial Attestation
keys can be used to certify LDevID and LAK keys.  Use of the LDevID and LAK allows the device owner
to use a uniform identity structure across device types from multiple manufacturers (in the same way
that an “Asset Tag” is used by many enterprises use to identify devices they own).  TCG doc
<xref target="Provisioning-TPM-2.0"/> also contains guidance on provisioning identity keys in TPM 2.0.</t>
  <t>But device owners can use any other mechanism they want to assure themselves that Local identity
certificates are inserted into the intended device, including physical inspection and programming
in a secure location, if they prefer to avoid placing trust in the manufacturer-provided keys.</t>
</list></t>

<t>Clearly, Local keys can’t be used for secure Zero Touch provisioning; installation of the Local keys
can only be done by some process that runs before the device is configured for network operation.</t>

<t>On the other end of the device life cycle, provision should be made to wipe Local keys when a device
is decommissioned, to indicate that the device is no longer owned by the enterprise.  The manufacturer’s
Initial identity keys must be preserved, as they contain no information that’s not already printed on
the device’s serial number plate.</t>

<t>In addition to trustworthy provisioning of keys, RIV depends on other trust anchors.  (See <xref target="GloPlaRoT"/> for definitions of Roots of Trust.)</t>

<t><list style="symbols">
  <t>Secure identity depends on mechanisms to prevent per-device secret keys from being compromised.  The TPM
provides this capability as a Root of Trust for Storage</t>
  <t>Attestation depends on an unbroken chain of measurements, starting from the very first measurement.
That first measurement is made by code called the Root of Trust for Measurement, typically done by trusted
firmware stored in boot flash.  Mechanisms for maintaining the trustworthiness of the RTM are out of
scope for RIV, but could include immutable firmware, signed updates, or a vendor-specific hardware
verification technique.</t>
  <t>RIV assumes some level of physical defense for the device.  If a TPM that has already been programmed
with an authentic DevID is stolen and inserted into a counterfeit device, attestation of that counterfeit
device may become indistinguishable from an authentic device.</t>
</list></t>

<t>RIV also depends on reliable reference measurements, as expressed by the RIM <xref target="RIM"/>.  The definition of
trust procedures for RIMs is out of scope for RIV, and the device owner is free to use any policy to validate
a set of reference measurements.  RIMs may be conveyed out-of-band or in-band, as part of the attestation
process (see <xref target="RIM-policy"/>).  But for embedded devices, where software is usually shipped as a self-contained
package, RIMs signed by the manufacturer and delivered in-band may be more convenient for the device owner.</t>

</section>
<section anchor="conclusion" title="Conclusion">

<t>TCG technologies can play an important part in the implementation of Remote
Integrity Verification.  Standards for many of the components needed for
implementation of RIV already exist:</t>

<t><list style="symbols">
  <t>Platform identity can be based on IEEE 802.1AR Device identity, coupled with
careful supply-chain management by the manufacturer.</t>
  <t>Complex supply chains can be certified using TCG Platform Certificates <xref target="Platform-Certificates"/></t>
  <t>The TCG TAP mechanism can be used to retrieve attestation evidence.  Work
is needed on a YANG model for this protocol.</t>
  <t>Reference Measurements must be conveyed from the software authority (e.g.,
the manufacturer) to the system in which verification will take place.  IETF
CoSWID work forms the basis for this, but new work is needed to create an
information model and YANG implementation.</t>
</list></t>

</section>
<section anchor="IANA" title="IANA Considerations">

<t>This memo includes no request to IANA.</t>

</section>
<section anchor="appendix" title="Appendix">

<section anchor="layering-model-for-network-equipment-attester-and-verifier" title="Layering Model for Network Equipment Attester and Verifier">

<t>Retrieval of identity and attestation state uses one protocol stack, while
retrieval of Reference Measurements uses a different set of protocols.  Figure
5 shows the components involved.</t>

<figure title="RIV Protocol Stacks" anchor="RIV-Protocol-Stacks"><artwork align="left"><![CDATA[
+-----------------------+              +-------------------------+
|                       |              |                         |
|       Attester        |<-------------|        Verifier         |
|       (Device)        |------------->|   (Management Station)  |
|                       |      |       |                         |
+-----------------------+      |       +-------------------------+
                               |
           -------------------- --------------------
           |                                        |
---------------------------------- ---------------------------------
|Reference Integrity Measurements| |         Attestation           |
---------------------------------- ---------------------------------

********************************************************************
*         IETF Attestation Reference Interaction Diagram           *
********************************************************************

    .......................         .......................
    . Reference Integrity .         .  TAP (PTS2.0) Info  .
    .      Manifest       .         . Model and Canonical .
    .                     .         .     Log Format      .
    .......................         .......................

    *************************  .............. **********************
    * YANG SWID Module      *  . TCG        . * YANG Attestation   *
    * I-D.birkholz-yang-swid*  . Attestation. * Module             *
    *                       *  . MIB        . * I-D.ietf-rats-     *
    *                       *  .            . * yang-tpm-charra    *
    *************************  .............. **********************

    *************************  ************ ************************
    * XML, JSON, CBOR (etc) *  *    UDP   * * XML, JSON, CBOR (etc)*
    *************************  ************ ************************

    *************************               ************************
    *   RESTCONF/NETCONF    *               *   RESTCONF/NETCONF   *
    ************************               *************************

    *************************               ************************
    *       TLS, SSH        *               *       TLS, SSH       *
    *************************               ************************

]]></artwork></figure>

<t>IETF documents are captured in boxes surrounded by asterisks. TCG documents
are shown in boxes surrounded by dots. The IETF Attestation Reference Interaction
Diagram, Reference Integrity Manifest, TAP Information Model
and Canonical Log Format, and both YANG modules are works in progress. Information
Model layers describe abstract data objects that can be requested, and the
corresponding response SNMP is still widely used, but the industry is transitioning
to YANG, so in some cases, both will be required. TLS Authentication with
TPM has been shown to work; SSH authentication using TPM-protected keys is
not as easily done [as of 2019]</t>

<section anchor="why-is-os-attestation-different" title="Why is OS Attestation Different?">

<t>Even in embedded systems, adding Attestation at the OS level (e.g. Linux
IMA, Integrity Measurement Architecture <xref target="IMA"/>) increases the number of objects to
be attested by one or two orders of
magnitude, involves software that’s updated and changed frequently, and introduces
processes that begin in unpredictable order.</t>

<t>TCG and others (including the Linux community) are working on methods and
procedures for attesting the operating system and application software, but
standardization is still in process.</t>

</section>
</section>
<section anchor="implementation-notes" title="Implementation Notes">

<t>Table 1 summarizes many of the actions needed to complete an Attestation
system, with links to relevant documents.  While documents are controlled
by several standards organizations, the implied actions required for
implementation are all the responsibility of the manufacturer of the device,
unless otherwise noted.</t>

<figure title="Component Status" anchor="Component-Status"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|             Component                           |  Controlling   |
|                                                 | Specification  |
--------------------------------------------------------------------
| Make a Secure execution environment             |   TCG RoT      |
|   o Attestation depends on a secure root of     |   UEFI.org     |
|     trust for measurement outside the TPM, as   |                |
|     well as roots for storage amd reporting     |                |
|     inside the TPM.                             |                |
|   o  Refer to TCG Root of Trust for Measurement.|                |
|   o  NIST SP 800-193 also provides guidelines   |                |
|      on Roots of Trust                          |                |
--------------------------------------------------------------------
| Provision the TPM as described in               | TCG TPM DevID  |
|   TCG documents.                                | TCG Platform   |
|                                                 |   Certificate  |
--------------------------------------------------------------------
| Put a DevID or Platform Cert in the TPM         | TCG TPM DevID  |
|    o Install an Initial Attestation Key at the  | TCG Platform   |
|      same time so that Attestation can work out |   Certificate  |
|      of the box                                 |-----------------
|    o Equipment suppliers and owners may want to | IEEE 802.1AR   |
|      implement Local Device ID as well as       |                |
|      Initial Device ID                          |                |
--------------------------------------------------------------------
| Connect the TPM to the TLS stack                | Vendor TLS     |
|    o  Use the DevID in the TPM to authenticate  | stack (This    |
|       TAP connections, identifying the device   | action is      |
|                                                 | simply         |
|                                                 | configuring TLS|
|                                                 | to use the     |
|                                                 | DevID as its   |
|                                                 | trust anchor.) |
--------------------------------------------------------------------
| Make CoSWID tags for BIOS/LoaderLKernel objects | IETF CoSWID    |
|    o  Add reference measurements into SWID tags | ISO/IEC 19770-2|
|    o  Manufacturer should sign the SWID tags    | NIST IR 8060   |
|    o  The TCG RIM-IM identifies further         |                |
|       procedures to create signed RIM           |                |
|       documents that provide the necessary      |                |
|       reference information                     |                |
--------------------------------------------------------------------
|  Package the SWID tags with a vendor software   | Retrieve tags  |
|  release                                        | with           |
|    o  A tag-generator plugin such      | {{I-D.birkholz-yang-swid}}|
|     as https://github.com/Labs64/swid-maven-plugin               |
|     can be used                                 |----------------|
|                                                 | TCG PC Client  |
|                                                 | RIM            |
--------------------------------------------------------------------
|  Use PC Client measurement definitions          | TCG PC Client  |
|  to define the use of PCRs                      | BIOS           |
|  (although Windows  OS is rare on Networking    |                |
|  Equipment, UEFI BIOS is not)                   |                |
--------------------------------------------------------------------
|  Use TAP to retrieve measurements               |                |
|    o  Map TAP to SNMP                           | TCG SNMP MIB   |
|    o  Map to YANG                               | YANG Module for|
|  Use Canonical Log Format                       |   Basic        |
|                                                 |   Attestation  |
|                                                 | TCG Canonical  |
|                                                 |   Log Format   |
--------------------------------------------------------------------
| Posture Collection Server (as described in IETF |                |
|  SACMs ECP) should request the                  |                |
|  attestation and analyze the result             |                |
| The Management application might be broken down |                |
|  to several more components:                    |                |
|    o  A Posture Manager Server                  |                |
|       which collects reports and stores them in |                |
|       a database                                |                |
|    o  One or more Analyzers that can look at the|                |
|       results and figure out what it means.     |                |
--------------------------------------------------------------------
]]></artwork></figure>

</section>
<section anchor="root-of-trust-for-measurement" title="Root of Trust for Measurement">

<t>The measurements needed for attestation require that the device being attested
is equipped with a Root of Trust for Measurement, i.e., some trustworthy
mechanism that can compute the first measurement in the chain of trust required
to attest that each stage of system startup is verified, and a Root of Trust
for Reporting to report the results <xref target="TCGRoT"/>, <xref target="GloPlaRoT"/>.</t>

<t>While there are many complex aspects of a Root of Trust, two aspects that
are important in the case of attestation are:</t>

<t><list style="symbols">
  <t>The first measurement computed by the Root of Trust for Measurement, and stored
in the TPM’s Root of Trust for Storage, is presumed to be correct.</t>
  <t>There must not be a way to reset the RTS without re-entering the RTM code.</t>
</list></t>

<t>The first measurement must be computed by code that is implicitly trusted; if that
first measurement can be subverted, none of the remaining measurements can
be trusted. (See <xref target="NIST-SP-800-155"/>)</t>

</section>
</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC8572" target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author initials='K.' surname='Watsen' fullname='K. Watsen'><organization /></author>
<author initials='I.' surname='Farrer' fullname='I. Farrer'><organization /></author>
<author initials='M.' surname='Abrahamsson' fullname='M. Abrahamsson'><organization /></author>
<date year='2019' month='April' />
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference  anchor="RFC6813" target='https://www.rfc-editor.org/info/rfc6813'>
<front>
<title>The Network Endpoint Assessment (NEA) Asokan Attack Analysis</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='S.' surname='Hanna' fullname='S. Hanna'><organization /></author>
<date year='2012' month='December' />
<abstract><t>The Network Endpoint Assessment (NEA) protocols are subject to a subtle forwarding attack that has become known as the NEA Asokan Attack. This document describes the attack and countermeasures that may be mounted.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6813'/>
<seriesInfo name='DOI' value='10.17487/RFC6813'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference  anchor="RFC3748" target='https://www.rfc-editor.org/info/rfc3748'>
<front>
<title>Extensible Authentication Protocol (EAP)</title>
<author initials='B.' surname='Aboba' fullname='B. Aboba'><organization /></author>
<author initials='L.' surname='Blunk' fullname='L. Blunk'><organization /></author>
<author initials='J.' surname='Vollbrecht' fullname='J. Vollbrecht'><organization /></author>
<author initials='J.' surname='Carlson' fullname='J. Carlson'><organization /></author>
<author initials='H.' surname='Levkowetz' fullname='H. Levkowetz' role='editor'><organization /></author>
<date year='2004' month='June' />
<abstract><t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.  EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP.  EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees.  Fragmentation is not supported within EAP itself; however, individual EAP methods may support this.  This document obsoletes RFC 2284.  A summary of the changes between this document and RFC 2284 is available in Appendix A.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3748'/>
<seriesInfo name='DOI' value='10.17487/RFC3748'/>
</reference>



<reference  anchor="RFC7950" target='https://www.rfc-editor.org/info/rfc7950'>
<front>
<title>The YANG 1.1 Data Modeling Language</title>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund' role='editor'><organization /></author>
<date year='2016' month='August' />
<abstract><t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='7950'/>
<seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>



<reference  anchor="RFC6241" target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author initials='R.' surname='Enns' fullname='R. Enns' role='editor'><organization /></author>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund' role='editor'><organization /></author>
<author initials='J.' surname='Schoenwaelder' fullname='J. Schoenwaelder' role='editor'><organization /></author>
<author initials='A.' surname='Bierman' fullname='A. Bierman' role='editor'><organization /></author>
<date year='2011' month='June' />
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor="I-D.ietf-rats-yang-tpm-charra">
<front>
<title>A YANG Data Model for Challenge-Response-based Remote Attestation Procedures using TPMs</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Eckel' fullname='Michael Eckel'>
    <organization />
</author>

<author initials='S' surname='Bhandari' fullname='Shwetha Bhandari'>
    <organization />
</author>

<author initials='B' surname='Sulzen' fullname='Bill Sulzen'>
    <organization />
</author>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<author initials='L' surname='Xia' fullname='Liang Xia'>
    <organization />
</author>

<author initials='T' surname='Laffey' fullname='Tom Laffey'>
    <organization />
</author>

<author initials='G' surname='Fedorkow' fullname='Guy Fedorkow'>
    <organization />
</author>

<date month='March' day='11' year='2020' />

<abstract><t>This document defines a YANG RPC and a minimal datastore tree required to retrieve attestation evidence about integrity measurements from a composite device with one or more roots of trust for reporting.  Complementary measurement logs are also provided by the YANG RPC originating from one or more roots of trust of measurement.  The module defined requires at least one TPM 1.2 or TPM 2.0 and corresponding Trusted Software Stack included in the device components of the composite device the YANG server is running on.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-yang-tpm-charra-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-yang-tpm-charra-01.txt' />
</reference>



<reference anchor="I-D.ietf-rats-architecture">
<front>
<title>Remote Attestation Procedures Architecture</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='N' surname='Smith' fullname='Ned Smith'>
    <organization />
</author>

<author initials='W' surname='Pan' fullname='Wei Pan'>
    <organization />
</author>

<date month='March' day='7' year='2020' />

<abstract><t>In network protocol exchanges, it is often the case that one entity (a Relying Party) requires evidence about a remote peer to assess the peer's trustworthiness, and a way to appraise such evidence.  The evidence is typically a set of claims about its software and hardware platform.  This document describes an architecture for such remote attestation procedures (RATS).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-architecture-02.txt' />
</reference>



<reference anchor="I-D.richardson-rats-usecases">
<front>
<title>Use cases for Remote Attestation common encodings</title>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='C' surname='Wallace' fullname='Carl Wallace'>
    <organization />
</author>

<author initials='W' surname='Pan' fullname='Wei Pan'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>This document details mechanisms created for performing Remote Attestation that have been used in a number of industries.  The document initially focuses on existing industry verticals, mapping terminology used in those specifications to the more abstract terminology used by the IETF RATS Working Group.  The document aspires to describe possible future use cases that would be enabled by common formats.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-richardson-rats-usecases-07' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-richardson-rats-usecases-07.txt' />
</reference>



<reference anchor="I-D.birkholz-yang-swid">
<front>
<title>Software Inventory YANG module based on Software Identifiers</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<date month='October' day='23' year='2018' />

<abstract><t>This document provides a YANG module definition that enables a computing context to provide detailed information about installed software components.  The structure of the module is based on the Concise Software Identifier draft and therefore also strongly related to the ISO 19770-2:2015 Software Identifiers standard.  Both standards provide no interface to transport the SWID tag information between system entities and this document leverages the wide adoption of YANG based management interfaces.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-yang-swid-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-yang-swid-02.txt' />
</reference>



<reference anchor="I-D.ietf-sacm-coswid">
<front>
<title>Concise Software Identification Tags</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='J' surname='Fitzgerald-McKay' fullname='Jessica Fitzgerald-McKay'>
    <organization />
</author>

<author initials='C' surname='Schmidt' fullname='Charles Schmidt'>
    <organization />
</author>

<author initials='D' surname='Waltermire' fullname='David Waltermire'>
    <organization />
</author>

<date month='November' day='17' year='2019' />

<abstract><t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles.  SWID tag representations can be too large for devices with network and storage constraints.  This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags.  CoSWID supports the same features as SWID tags, as well as additional semantics that allow CoSWIDs to describe additional types of information, all in a more memory efficient format.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-13' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-sacm-coswid-13.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-tuda">
<front>
<title>Time-Based Uni-Directional Attestation</title>

<author initials='A' surname='Fuchs' fullname='Andreas Fuchs'>
    <organization />
</author>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='I' surname='McDonald' fullname='Ira McDonald'>
    <organization />
</author>

<author initials='C' surname='Bormann' fullname='Carsten Bormann'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>This documents defines the method and bindings used to conduct Time- based Uni-Directional Attestation (TUDA) between two RATS (Remote ATtestation procedureS) Principals over the Internet.  TUDA does not require a challenge-response handshake and thereby does not rely on the conveyance of a nonce to prove freshness of remote attestation Evidence.  Conversely, TUDA enables the creation of Secure Audit Logs that can constitute Evidence about current and past operational states of an Attester.  As a prerequisite for TUDA, every RATS Principal requires access to a trusted and synchronized time-source. Per default, in TUDA this is a Time Stamp Authority (TSA) issuing signed Time Stamp Tokens (TST).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-tuda-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-tuda-02.txt' />
</reference>



<reference anchor="I-D.voit-rats-trusted-path-routing">
<front>
<title>Trusted Path Routing using Remote Attestation</title>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>There are end-users who believe encryption technologies like IPSec alone are insufficient to protect the confidentiality of their highly sensitive traffic flows.  This specification describes two alternatives for protecting these sensitive flows as they transit a network.  In both alternatives, protection is accomplished by forwarding sensitive flows across network devices currently appraised as trustworthy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-voit-rats-trusted-path-routing-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-voit-rats-trusted-path-routing-01.txt' />
</reference>



<reference anchor="I-D.ietf-rats-eat">
<front>
<title>The Entity Attestation Token (EAT)</title>

<author initials='G' surname='Mandyam' fullname='Giridhar Mandyam'>
    <organization />
</author>

<author initials='L' surname='Lundblade' fullname='Laurence Lundblade'>
    <organization />
</author>

<author initials='M' surname='Ballesteros' fullname='Miguel Ballesteros'>
    <organization />
</author>

<author initials='J' surname='O&apos;Donoghue' fullname='Jeremy O&apos;Donoghue'>
    <organization />
</author>

<date month='February' day='20' year='2020' />

<abstract><t>An Entity Attestation Token (EAT) provides a signed (attested) set of claims that describe state and characteristics of an entity, typically a device like a phone or an IoT device.  These claims are used by a relying party to determine how much it wishes to trust the entity.  An EAT is either a CWT or JWT with some attestation-oriented claims. To a large degree, all this document does is extend CWT and JWT.  Contributing  TBD</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-03.txt' />
<format type='PDF'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-03.pdf' />
</reference>


<reference anchor="TAP" >
  <front>
    <title>DRAFT: TCG Trusted Attestation Protocol (TAP) Information Model for TPM Families 1.2 and 2.0 and DICE Family 1.0, Version 1.0, Revision 0.29</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="NIST-SP-800-155" target="https://csrc.nist.gov/csrc/media/publications/sp/800-155/draft/documents/draft-sp800-155_dec2011.pdf">
  <front>
    <title>BIOS Integrity Measurement Guidelines (Draft)</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2011" month="December"/>
  </front>
</reference>
<reference anchor="Canonical-Event-Log" >
  <front>
    <title>DRAFT Canonical Event Log Format Version: 1.0, Revision: .12</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-2.0" target="https://trustedcomputinggroup.org/pc-client-specific-platform-firmware-profile-specification">
  <front>
    <title>PC Client Specific Platform Firmware Profile Specification Family "2.0", Level 00 Revision 1.04</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-1.2" target="https://www.trustedcomputinggroup.org/wp-content/uploads/TCG_PCClientImplementation_1-21_1_00.pdf">
  <front>
    <title>TCG PC Client Specific Implementation Specification for Conventional BIOS, Specification Version 1.21 Errata, Revision 1.00</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2012" month="February"/>
  </front>
</reference>
<reference anchor="EFI-TPM" target="https://trustedcomputinggroup.org/wp-content/uploads/EFI-Protocol-Specification-rev13-160330final.pdf">
  <front>
    <title>TCG EFI Platform Specification for TPM Family 1.1 or 1.2, Specification Version 1.22, Revision 15</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2014" month="January"/>
  </front>
</reference>
<reference anchor="RIM" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_RIM_Model_v1-r13_2feb20.pdf">
  <front>
    <title>DRAFT: TCG Reference Integrity Manifest Information Model</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-RIM" target="https://trustedcomputinggroup.org/xx">
  <front>
    <title>DRAFT: TCG PC Client Reference Integrity Manifest Specification, v.09</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="December"/>
  </front>
</reference>
<reference anchor="Platform-DevID-TPM-2.0" >
  <front>
    <title>DRAFT: TPM Keys for Platform DevID for TPM2, Specification Version 0.7, Revision 0</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="Platform-Certificates" >
  <front>
    <title>DRAFT: TCG Platform Attribute Credential Profile, Specification Version 1.0, Revision 15, 07 December 2017</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2017" month="December"/>
  </front>
</reference>
<reference anchor="Platform-ID-TPM-1.2" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf">
  <front>
    <title>TPM Keys for Platform Identity for TPM 1.2, Specification Version 1.0, Revision 3</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
</reference>
<reference anchor="Provisioning-TPM-2.0" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-TPM-v2.0-Provisioning-Guidance-Published-v1r1.pdf">
  <front>
    <title>TCG TPM v2.0 Provisioning Guidance</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="March"/>
  </front>
</reference>
<reference anchor="IEEE-802-1AR" >
  <front>
    <title>802.1AR-2018 - IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity, IEEE Computer Society</title>
    <author initials="M." surname="Seaman">
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2018" month="August"/>
  </front>
</reference>
<reference anchor="IEEE-802.1x" target="https://standards.ieee.org/standard/802_1X-2020.html">
  <front>
    <title>802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks--Port-Based Network Access Control</title>
    <author >
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>
<reference anchor="IEEE-802.1ae" target="https://1.ieee802.org/security/802-1ae/">
  <front>
    <title>802.1AE MAC Security (MACsec)</title>
    <author initials="M." surname="Seaman">
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="LLDP" target="https://standards.ieee.org/standard/802_1AB-2016.html">
  <front>
    <title>802.1AB-2016 - IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery</title>
    <author >
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2016" month="March"/>
  </front>
</reference>
<reference anchor="IMA" target="https://sourceforge.net/p/linux-ima/wiki/Home/">
  <front>
    <title>Integrity Measurement Architecture</title>
    <author surname="dsafford">
      <organization></organization>
    </author>
    <author surname="kds_etu">
      <organization></organization>
    </author>
    <author surname="mzohar">
      <organization></organization>
    </author>
    <author surname="reinersailer">
      <organization></organization>
    </author>
    <author surname="serge_hallyn">
      <organization></organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="TCGRoT" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_Roots_of_Trust_Specification_v0p20_PUBLIC_REVIEW.pdf">
  <front>
    <title>TCG Roots of Trust Specification</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="GloPlaRoT" target="https://globalplatform.org/specs-library/globalplatform-root-of-trust-definitions-and-requirements/">
  <front>
    <title>Root of Trust Definitions and Requirements Version 1.1</title>
    <author >
      <organization>GlobalPlatform Technology</organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="NetEq" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_Guidance_for_Securing_NetEq_1_0r29.pdf">
  <front>
    <title>TCG Guidance for Securing Network Equipment</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="January"/>
  </front>
</reference>
<reference anchor="NIST-IR-8060" target="https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8060.pdf">
  <front>
    <title>Guidelines for the Creation of Interoperable Software Identification (SWID) Tags</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2016" month="April"/>
  </front>
</reference>
<reference anchor="SWID" target="https://www.iso.org/standard/65666.html">
  <front>
    <title>Information Technology Software Asset Management Part 2: Software Identification Tag, ISO/IEC 19770-2</title>
    <author >
      <organization>The International Organization for Standardization/International Electrotechnical Commission</organization>
    </author>
    <date year="2015" month="October"/>
  </front>
</reference>
<reference anchor="AIK-Enrollment" target="https://trustedcomputinggroup.org/wp-content/uploads/IWG_CMC_Profile_Cert_Enrollment_v1_r7.pdf">
  <front>
    <title>TCG Infrastructure Working GroupA CMC Profile for AIK Certificate Enrollment Version 1.0, Revision 7</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2011" month="March"/>
  </front>
</reference>


    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

