<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.13 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc ipr="trust200902" docName="draft-ietf-rats-tpm-based-network-device-attest-04" category="info">

  <front>
    <title abbrev="Network Device RIV">TPM-based Network Device Remote Integrity Verification</title>

    <author initials="G.C." surname="Fedorkow" fullname="Guy Fedorkow" role="editor">
      <organization>Juniper Networks, Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>gfedorkow@juniper.net</email>
      </address>
    </author>
    <author initials="E." surname="Voit" fullname="Eric Voit">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>evoit@cisco.com</email>
      </address>
    </author>
    <author initials="J." surname="Fitzgerald-McKay" fullname="Jessica Fitzgerald-McKay">
      <organization>National Security Agency</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>jmfitz2@nsa.gov</email>
      </address>
    </author>

    <date year="2020" month="September" day="18"/>

    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a workflow for remote attestation of the integrity of firmware and software
installed on network devices that contain Trusted Platform Modules <xref target="TPM1.2"/>, <xref target="TPM2.0"/>.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>There are many aspects to consider in fielding a trusted computing device,
from operating systems to applications.  Mechanisms to prove that
a device installed at a customer’s site is authentic (i.e., not counterfeit) and has
been configured with authorized software, all as part of a trusted supply chain, are just a few of the many aspects which need to be considered concurrently to have confidence that a device is truly trustworthy.</t>

<t>A generic architecture for remote attestation has been defined in <xref target="I-D.ietf-rats-architecture"/>.  Additionally, the use cases for remotely attesting networking devices are discussed within Section 6 of <xref target="I-D.richardson-rats-usecases"/>.  However, these documents do not provide sufficient guidance for network equipment vendors and operators to design, build, and deploy interoperable devices.</t>

<t>The intent of this document is to provide such guidance. It does this by outlining the Remote Integrity Verification (RIV) problem, and then identifies elements that are necessary to get the complete, scalable attestation procedure working with commercial networking products such as routers, switches and firewalls.   An underlying assumption will be the availability within the device of a Trusted Platform Module <xref target="TPM1.2"/>, <xref target="TPM2.0"/> compliant cryptoprocessor to enable the trustworthy remote assessment of the device’s software and hardware.</t>

<section anchor="terminology" title="Terminology">

<t>A number of terms are reused from <xref target="I-D.ietf-rats-architecture"/>.  These include: Appraisal Policy for Attestation Results, Attestation Result, Attester, Evidence, Relying Party, Verifier, and Verifier Owner.</t>

<t>Additionally, this document defines the following terms:</t>

<t>Remote Attestation: the process of creating, conveying and appraising
claims about device trustworthiness characteristics, including supply chain trust,
identity, device provenance, software configuration, hardware configuration, device
composition, compliance to test suites, functional and assurance evaluations,
etc.</t>

<t>This document uses the term Endorser to refer to the trusted authority for any signed object
relating to the device, such as certificates or reference measurement.  Typically, the manufacturer
of an embedded device would be accepted as an Endorser.</t>

<t>The goal of attestation is simply to assure an administrator that the software
that was launched when the device was last started is an authentic and untampered-with 
copy of the software that the device vendor shipped.</t>

<t>Within the Trusted Computing Group context, attestation is the process by
which an independent Verifier can obtain cryptographic proof as to the identity
of the device in question, and evidence of the integrity of software loaded on
that device when it started up, and then verify that what’s there is what’s
supposed to be there.  For networking equipment, a Verifier capability can
be embedded in a Network Management Station (NMS), a posture collection server,
or other network analytics tool (such as a software asset management solution,
or a threat detection and mitigation tool, etc.). While informally referred
to as attestation, this document focuses on a subset defined here as Remote
Integrity Verification (RIV).  RIV takes a network equipment centric perspective
that includes a set of protocols and procedures for determining whether a
particular device was launched with authentic software, starting from Roots
of Trust.  While there are many ways to accomplish attestation, RIV sets
out a specific set of protocols and tools that work in environments commonly
found in Networking Equipment.  RIV does not cover other device characteristics
that could be attested (e.g., geographic location, connectivity; 
see <xref target="I-D.richardson-rats-usecases"/>), although it does provide evidence of a secure infrastructure
to increase the level of trust in other device characteristics attested
by other means (e.g., by Entity Attestation Tokens <xref target="I-D.ietf-rats-eat"/>).</t>

</section>
<section anchor="document-organization" title="Document Organization">

<t>The remainder of this document is organized into several sections:</t>

<t><list style="symbols">
  <t>The remainder of this section covers goals and requirements, plus a top-level description of RIV.</t>
  <t>The Solution Overview section outlines how Remote Integrity Verification works.</t>
  <t>The Standards Components section links components of RIV to normative standards.</t>
  <t>Privacy and Security shows how specific features of RIV contribute to the trustworthiness of the Attestation Result.</t>
  <t>Supporting material is in an appendix at the end.</t>
</list></t>

</section>
<section anchor="goals" title="Goals">

<t>Network operators benefit from a trustworthy attestation mechanism that provides
assurance that their network comprises authentic equipment, and has loaded software
free of known vulnerabilities and unauthorized tampering.  In line with the overall goal of assuring integrity, attestation can be used to assist in asset management, vulnerability and compliance
assessment, plus configuration management.</t>

<t>The RIV attestation workflow outlined in this document is intended to meet the following high-level goals:</t>

<t><list style="symbols">
  <t>Provable Device Identity - This specification requires that an attesting device includes
a cryptographic identifier unique to each device.  Effectively this means that the TPM
must be so provisioned during the manufacturing cycle.</t>
  <t>Software Inventory - A key goal is to identify the software release(s) installed
on the attesting device, and to provide evidence that the software stored within hasn’t
been altered without authorization.</t>
  <t>Verifiability - Verification of software and configuration of the device shows
that the software that was authorized for installation by the administrator has actually been launched.</t>
</list></t>

<t>In addition, RIV is designed to operate either in a centralized environment, such as with a central authority that manages and configures a number of network devices, or ‘peer-to-peer’, where network devices independently verify one another to establish a trust relationship.  (See <xref target="peer-to-peer"/> below, and also <xref target="I-D.voit-rats-trusted-path-routing"/>)</t>

</section>
<section anchor="description-of-remote-integrity-verification-riv" title="Description of Remote Integrity Verification (RIV)">

<t>Attestation requires two interlocking services between the Attester network device and the Verifier:</t>

<t><list style="symbols">
  <t>Device Identity, the mechanism providing trusted identity, can reassure network
managers that the specific devices they ordered from authorized manufacturers for
attachment to their network are those that were installed, and that they continue to
be present in their network. As part of the mechanism for Device Identity,
cryptographic proof of the identity of the manufacturer is also provided.</t>
  <t>Software Measurement is the mechanism that reports the state of mutable software components
on the device, and can assure network managers that they have known, authentic
software configured to run in their network.</t>
</list></t>

<t>Using these two interlocking services, RIV is a component in a chain of procedures that can assure a network operator that the equipment in
their network can be reliably identified, and that authentic software of
a known version is installed on each device.  Equipment in the network includes
devices that make up the network itself, such as routers, switches and firewalls.</t>

<t>RIV includes several major processes:</t>

<t><list style="numbers">
  <t>Creation of Evidence is the process whereby an Attester generates cryptographic
proof (Evidence) of claims about device properties. In particular, the
device identity and its software configuration are both of critical importance.</t>
  <t>Device Identification refers to the mechanism assuring the
Relying Party (ultimately, a network administrator) of the identity of devices that make up their network,
and that their manufacturers are known.</t>
  <t>Software used to boot a device can be described as a chain
of measurements, anchored at the start by a Root of Trust for Measurement,
that normally ends when the system software is loaded.
A measurement signifies the identity, integrity and version of each
software component registered with an attesting device’s TPM <xref target="TPM1.2"/>, <xref target="TPM2.0"/>, so that the
subsequent appraisal stage can determine if the software
installed is authentic, up-to-date, and free of tampering.</t>
  <t>Conveyance of Evidence
reliably transports at least the minimum amount of Evidence from Attester to a Verifier to allow a management station to perform
a meaningful appraisal in Step 5. The transport
is typically carried out via a management network. The channel must provide
integrity and authenticity, and, in some use cases, may also require confidentiality.</t>
  <t>Finally, Appraisal of Evidence occurs.  As the Verifier and Relying Party roles are
  often combined within RIV, this is the process of verifying the Evidence received by
  a Verifier from the Attesting device, and using an Appraisal Policy to develop an
  Attestation Result, used to inform decision making.  In practice, this means comparing
  the device measurements reported as Evidence with the Attester configuration expected
  by the Verifier.  Subsequently the Appraisal Policy for Attestation Results might
  match what was found against Reference Integrity Measurements (aka Golden
  Measurements) which represent the intended configured state
  of the connected device.</t>
</list></t>

<t>All implementations supporting this RIV specification require the support of the following three technologies:</t>

<t><list style="numbers">
  <t>Identity: Device identity MUST be based on IEEE 802.1AR Device Identity (DevID) <xref target="IEEE-802-1AR"/>,
coupled with careful supply-chain management by the manufacturer.  The
DevID certificate contains a statement by the manufacturer that establishes
the identity of the device as it left the factory.  Some applications with
a more-complex post-manufacture supply chain (e.g., Value Added Resellers),
or with different privacy concerns, may want to use alternative mechanisms for platform
authentication (for example, TCG Platform Certificates <xref target="Platform-Certificates"/>).</t>
  <t>Platform Attestation provides evidence of configuration of software elements
present in the device.  This form of attestation can be implemented
with TPM Platform Configuration Registers (PCRs), Quote and Log mechanisms, which provide cryptographically authenticated evidence
to report what software was started on the device through the boot cycle.  Successful attestation requires an 
unbroken chain from a boot-time root of trust through all layers of software needed to bring the device to an 
operational state, in which each stage measures components of the next stage, updates the attestation log, and 
extends hashes into a PCR.  The TPM can then report the hashes of all the measured hashes as signed evidence called a 
Quote (see <xref target="using-tpm"/> for an overview of TPM operation, or <xref target="TPM1.2"/> and <xref target="TPM2.0"/> for many more details).</t>
  <t>Reference Integrity Measurements must be conveyed from the Endorser (the entity accepted as the software authority,
often the manufacturer for embedded systems) to the system in which verification
will take place.</t>
</list></t>

</section>
<section anchor="solution-requirements" title="Solution Requirements">

<t>Remote Integrity Verification must address the “Lying Endpoint”
problem, in which malicious software on an endpoint may subvert the
intended function, and also prevent the endpoint from reporting its compromised
status.  (See <xref target="security-cons"/> for further Security Considerations)</t>

<t>RIV attestation is designed to be simple
to deploy at scale. RIV should work “out of the box” as far as possible,
that is, with the fewest possible provisioning steps or configuration databases
needed at the end-user’s site, as network equipment is often required to “self-configure”,
to reliably reach out without manual intervention to prove its identity and
operating posture, then download its own configuration. See <xref target="RFC8572"/> for an
example of Secure Zero Touch Provisioning.</t>

</section>
<section anchor="scope" title="Scope">

<t>Remote Attestation is a very general problem that could apply to most network-connected computing devices.  However, this document includes several assumptions that limit the scope to Network Equipment (e.g., routers, switches and firewalls):</t>

<t><list style="symbols">
  <t>This solution is for use in non-privacy-preserving applications (for example,
networking, Industrial IoT), avoiding the need for a Privacy Certificate
Authority for attestation keys <xref target="AIK-Enrollment"/> or TCG Platform
Certificates <xref target="Platform-Certificates"/></t>
  <t>This document assumes network protocols that are common in networking equipment such as YANG <xref target="RFC7950"/> and NETCONF <xref target="RFC6241"/>,
but not generally used in other applications.</t>
  <t>The approach outlined in this document mandates the use of a compliant TPM <xref target="TPM1.2"/>, <xref target="TPM2.0"/>.</t>
</list></t>

<section anchor="out-of-scope" title="Out of Scope">

<t><list style="symbols">
  <t>Run-Time Attestation: Run-time attestation of Linux or other multi-threaded
operating system processes considerably expands the scope of the problem.
Many researchers are working on that problem, but this document defers the
run-time attestation problem.</t>
  <t>Multi-Vendor Embedded Systems: Additional coordination would be needed for
devices that themselves comprise hardware and software from multiple vendors,
integrated by the end user.</t>
  <t>Processor Sleep Modes: Network equipment typically does not “sleep”, so
sleep and hibernate modes are not considered.  Although out of scope
for RIV, Trusted Computing Group specifications do encompass sleep and hibernate
states.</t>
  <t>Virtualization and Containerization:  In a non-virtualized system, the host OS is
responsible for measuring each User Space file or process, but that’t the end of the
boot process.  For virtualized systems, the host OS must verify the hypervisor, 
which then manages its own chain of trust through the virtual machine.  Virtualization 
and containerization technologies are increasingly used in Network equipment, but 
are not considered in this revision of the document.</t>
</list></t>

</section>
</section>
</section>
<section anchor="solution-overview" title="Solution Overview">

<section anchor="riv-software-configuration-attestation-using-tpm" title="RIV Software Configuration Attestation using TPM">

<t>RIV Attestation is a process which can be used to determine the identity of software running
on a specifically-identified device.  Remote Attestation is broken into two
phases, shown in Figure 1:</t>

<t><list style="symbols">
  <t>During system startup, each distinct software object is “measured”.
Its identity, hash (i.e., cryptographic digest) and version information are recorded in a log.
Hashes are also extended, or cryptographically folded, into the TPM, in a way that can be used to validate the log entries.  The measurement process generally
follows the Chain of Trust model used in Measured Boot, where each stage
of the system measures the next one, and extends its measurement into the TPM,
before launching it.</t>
  <t>Once the device is running and has operational network connectivity, a separate,
trusted Verifier will interrogate the network
device to retrieve the logs and a copy of the digests collected by hashing
each software object, signed by an attestation private key known only to
the TPM.</t>
</list></t>

<t>The result is that the Verifier can verify the device’s identity by checking
the Subject Field and signature of certificate containing the TPM’s attestation public key, and can
validate the software that was launched by verifying the correctness of the logs by comparing with the
signed digests from the TPM, and comparing digests in the log with
known-good values.</t>

<t>It should be noted that attestation and identity are inextricably linked;
signed Evidence that a particular version of software was loaded is of little
value without cryptographic proof of the identity of the Attester producing
the Evidence.</t>

<figure title="RIV Attestation Model" anchor="RIV-Attestation-Model"><artwork align="left"><![CDATA[
    +-------------------------------------------------------+
    | +--------+    +--------+   +--------+    +---------+  |
    | | BIOS   |--->| Loader |-->| Kernel |--->|Userland |  |
    | +--------+    +--------+   +--------+    +---------+  |
    |     |            |           |                        |
    |     |            |           |                        |
    |     +------------+-----------+-+                      |
    |                        Step 1  |                      |
    |                                V                      |
    |                            +--------+                 |
    |                            |  TPM   |                 |
    |                            +--------+                 |
    |   Router                       |                      |
    +--------------------------------|----------------------+
                                     |
                                     |  Step 2
                                     |    +-----------+
                                     +--->| Verifier  |
                                          +-----------+

    Reset---------------flow-of-time-during-boot--...------->
]]></artwork></figure>

<t>In Step 1, measurements are “extended”, or hashed, into the TPM as processes start, 
with the result that the PCR ends up containing a hash of all the measured hashes. In
Step 2, signed PCR digests are retrieved from the TPM for off-box analysis
after the system is operational.</t>

<section anchor="what-does-riv-attest" title="What Does RIV Attest?">

<t>TPM attestation is strongly focused on Platform Configuration Registers (PCRs), but those registers are only vehicles for certifying 
accompanying Evidence, conveyed in log entries.  It is the hashes in log entries that are extended into PCRs, where the final PCR values 
can be retrieved in the form of a structured called a Quote, signed by an Attestation key known only to the TPM.  The use of multiple PCRs serves only to 
provide some independence between different classes of object, so that one class of objects can be updated without changing the 
extended hash for other classes.  Although PCRs can be used for any purpose, this section outlines the objects within the 
scope of this document which may be extended into the TPM.</t>

<t>In general, assignment of measurements to PCRs is a policy choice made by the device manufacturer, selected to independently attest three classes of object:</t>

<t><list style="symbols">
  <t>Code, (i.e., instructions) to be executed by a CPU.</t>
  <t>Configuration - Many devices offer numerous options controlled by non-volatile configuration variables which can impact the device’s security posture.  These settings may have vendor defaults, but often can be changed by administrators, who may want to verify via attestation that the settings they intend are still in place.</t>
  <t>Credentials - Administrators may wish to verify via attestation that keys (and other credentials) outside the Root of Trust have not been subject to unauthorized tampering.  (By definition, keys inside the root of trust can’t be verified independently).</t>
</list></t>

<t>The TCG PC Client Platform Firmware Profile Specification <xref target="PC-Client-BIOS-TPM-2.0"/> gives considerable detail on what is to be 
measured during the boot phase of platform startup using a UEFI BOIS (www.uefi.org), but the goal is simply to measure every bit of 
code executed in the process of starting the device, along with any configuration information related to security posture, leaving 
no gap for unmeasured code to remain undetected and subvert the chain.</t>

<t>For devices using a UEFI BIOS, <xref target="PC-Client-BIOS-TPM-2.0"/> gives detailed normative requirements for PCR usage.  But for other 
platform architectures, the table in <xref target="Attested-Objects"/> gives guidance for PCR assignment that generalizes the specific 
details of <xref target="PC-Client-BIOS-TPM-2.0"/>.</t>

<t>By convention, most PCRs are assigned in pairs, which the even-numbered PCR used to measure executable code, and 
the odd-numbered PCR used to measure whatever data and configuration are associated with that code.  It is important 
to note that each PCR may contain results from dozens (or even thousands) of individual measurements.</t>

<figure title="Attested Objects" anchor="Attested-Objects"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|                                            |    Assigned PCR #   |
| Function                                   | Code | Configuration|
--------------------------------------------------------------------
| Firmware Static Root of Trust, (i.e.,      |  0   |    1         |
| initial boot firmware and drivers)         |      |              |
--------------------------------------------------------------------
| Drivers and initialization for optional    |  2   |    3         |
| or add-in devices                          |      |              |
--------------------------------------------------------------------
| OS Loader code and configuration, (i.e.,   |  4   |    5         |
| the code launched by firmware) to load an  |      |              |
| operating system kernel. These PCRs record |      |              |
| each boot attempt, and an identifier for   |      |              |
| where the loader was found                 |      |              |
--------------------------------------------------------------------
| Vendor Specific Measurements during boot   |  6   |    6         |
--------------------------------------------------------------------
| Secure Boot Policy.  This PCR records keys |      |    7         |
| and configuration used to validate the OS  |      |              |
| loader                                     |      |              |
--------------------------------------------------------------------
| Measurements made by the OS Loader         |  8   |    9         |
| (e.g GRUB2 for Linux)                      |      |              |
--------------------------------------------------------------------
| Measurements made by OS (e.g., Linux IMA)  |  10  |    10        |
+------------------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="notes-on-pcr-allocations" title="Notes on PCR Allocations">

<t>It is important to recognize that PCR[0] is critical.  The first measurement into PCR[0] taken by the Root of Trust for 
Measurement, is critical to 
establishing the chain of trust for all subsequent measurements.  If the PCR[0] measurement cannot be trusted, the 
validity of the entire chain is put into question.</t>

<t>Distinctions Between PCR[0], PCR[2], PCR[4] and PCR[8] are summarized below:</t>

<t><list style="symbols">
  <t>PCR[0] typically represents a consistent view of the Host Platform between boot cycles, allowing Attestation and 
Sealed Storage policies to be defined using the less changeable components of the transitive trust chain. This PCR 
typically provides a consistent view of the platform regardless of user selected options.</t>
  <t>PCR[2] is intended to represent a “user configurable” environment where the user has the ability to alter the 
components that are measured into PCR[2]. This is typically done by adding adapter cards, etc., into user-accessible 
PCI or other slots.  In UEFI systems these devices may be configured by Option ROMs measured into PCR[2] and 
executed by the BIOS.</t>
  <t>PCR[4] is intended to represent the software that manages the transition between the platform’s Pre-Operating System 
Start and the state of a system with the Operating System present.  This PCR, along with PCR[5], identifies the initial 
operating system loader (e.g., GRUB for Linux).</t>
  <t>PCR[8] is used by the OS loader to record measurements of the various components of the operating system.</t>
</list></t>

<t>Although the TCG PC Client document specifies the use of the first eight PCRs very carefully to ensure interoperability 
among multiple 
UEFI BIOS vendors, it should be noted that embedded software vendors may have considerably more flexibility.  Verifiers 
typically need to know which log entries are consequential and which are not (possibly controlled by local policies) but 
the Verifier may not need to know what each log entry means or why it was assigned to a particular PCR.   Designers must
recognize that some PCRs may cover log entries that a particular Verifier considers critical and other log entries that
are not considered important, so differing PCR values may not on their own constitute a check for authenticity.</t>

<t>Designers may allocate particular events to specific PCRs in order to achieve a particular objective with Local 
Attestation, (e.g., allowing a procedure to execute only if a given PCR is in a given state).  It may also be important 
to designers to consider whether streaming notification of PCR updates is required (see <xref target="I-D.birkholz-rats-network-device-subscription"/>).  Specific 
log entries can only be validated if the Verifier receives every log entry affecting the relevant PCR, so (for example) 
a designer might want to separate rare, high-value events such as configuration changes, from high-volume, routine 
measurements such as IMA <xref target="IMA"/> logs.</t>

</section>
</section>
<section anchor="riv-keying" title="RIV Keying">

<t>RIV attestation relies on two keys:</t>

<t><list style="symbols">
  <t>An identity key is required to certify the identity of the Attester itself.
RIV specifies the use of an IEEE 802.1AR Device Identity (DevID) <xref target="IEEE-802-1AR"/>,
signed by the device manufacturer, containing the device serial number.</t>
  <t>An Attestation Key is required to sign the Quote generated by the TPM to report evidence
of software configuration.</t>
</list></t>

<t>In TPM application, the Attestation key MUST be protected by the TPM, and the DevID
SHOULD be as well.  Depending on other TPM configuration procedures,
the two keys are likely be different; some of the considerations are outlined in TCG
Guidance for Securing Network Equipment <xref target="NetEq"/>.</t>

<t>TCG Guidance for Securing Network Equipment specifies further conventions for these keys:</t>

<t><list style="symbols">
  <t>When separate Identity and Attestation keys are used, the Attestation
Key (AK) and its X.509 certificate should parallel the DevID, with the same
device ID information as the DevID certificate (i.e., the same Subject Name
and Subject Alt Name, even though the key pairs are different).  This allows
a quote from the device, signed by an AK, to be linked directly to the
device that provided it, by examining the corresponding AK certificate.</t>
  <t>Network devices that are expected to use secure zero touch provisioning as
specified in <xref target="RFC8572"/>)
MUST be shipped by the manufacturer with pre-provisioned keys (Initial DevID and AK,
called IDevID and IAK).  Inclusion of an IDevID and IAK by a vendor does not
preclude a mechanism whereby an Administrator can define Local Identity and
Attestation Keys (LDevID and LAK) if desired.  IDevID and IAK certificates MUST
both be signed by the Endorser (typically the device manufacturer).</t>
</list></t>

</section>
<section anchor="riv-information-flow" title="RIV Information Flow">

<t>RIV workflow for networking equipment is organized around a simple use case
where a network operator wishes to verify the integrity of software installed
in specific, fielded devices.  This use case implies several components:</t>

<t><list style="numbers">
  <t>The Attesting Device, which the network operator wants to examine.</t>
  <t>A Verifier (which might be a network management station) somewhere separate
  from the Device that will retrieve the information and analyze it to pass
  judgment on the security posture of the device.</t>
  <t>A Relying Party, which can act on Attestation Results.  Interaction between the Relying Party and the
  Verifier is considered out of scope for RIV.</t>
  <t>Signed Reference Integrity Manifests (RIMs),
containing Reference Integrity Measurements, can
  either be created by the device manufacturer
  and shipped along with the device as part of its software image, or alternatively,
  could be obtained several other ways (direct to the Verifier from the
  manufacturer, from a third party, from the owner’s observation of what’s
  thought to be a “known good system”, etc.).  Retrieving RIMs from the device
  itself allows attestation to be done in systems that may not have access
  to the public internet, or by other devices that are not management stations
  per se (e.g., a peer device; see <xref target="RIM-policy"/>).  If Reference Integrity Measurements are obtained from
  multiple sources, the Verifier may need to evaluate the relative level of
  trust to be placed in each source in case of a discrepancy.</t>
</list></t>

<t>These components are illustrated in <xref target="RIV-Reference-Configuration"/>.</t>

<t>A more-detailed taxonomy of terms is given in <xref target="I-D.ietf-rats-architecture"/></t>

<figure title="RIV Reference Configuration for Network Equipment" anchor="RIV-Reference-Configuration"><artwork align="left"><![CDATA[
+---------------+        +-------------+        +---------+--------+
|               |        | Attester    | Step 1 | Verifier|        |
| Endorser      |        | (Device     |<-------| (Network| Relying|
| (Device       |        | under       |------->| Mngmt   | Party  |
| Manufacturer  |        | attestation)| Step 2 | Station)|        |
| or other      |        |             |        |         |        |
| authority)    |        |             |        |         |        |
+---------------+        +-------------+        +---------+--------+
       |                                             /\
       |                  Step 0                      |
       -----------------------------------------------

]]></artwork></figure>

<t>In Step 0, The Endorser (the device manufacturer or other authority) provides a software image
to the Attester (the device under attestation), and makes 
one or more Reference Integrity Manifests (RIMs) signed by the Endorser, available to the Verifier 
(see <xref target="RIM-policy"/> for “in-band” and “out of band” ways to make this happen). In Step 1, 
the Verifier (Network Management Station), on behalf of a Relying Party, requests Identity,
Measurement Values, and possibly RIMs, from the Attester. In Step 2, the
Attester responds to the request by providing a DevID, quotes (measured values, signed by the Attester),
and optionally RIMs.</t>

<t>To achieve interoperability, the following standards components SHOULD be used:</t>

<t><list style="numbers">
  <t>TPM Keys MUST be configured according to <xref target="Platform-DevID-TPM-2.0"/>, <xref target="PC-Client-BIOS-TPM-1.2"/>, or <xref target="Platform-ID-TPM-1.2"/>.</t>
  <t>For devices using UEFI and Linux, measurements of firmware and bootable modules SHOULD be taken according to TCG PC Client <xref target="PC-Client-BIOS-TPM-2.0"/> and Linux IMA <xref target="IMA"/></t>
  <t>Device Identity MUST be managed as specified in IEEE 802.1AR Device Identity certificates <xref target="IEEE-802-1AR"/>, with keys protected by TPMs.</t>
  <t>Attestation logs SHOULD be formatted according to the Canonical Event Log format <xref target="Canonical-Event-Log"/>, although other specialized formats may be used.  UEFI-based systems MAY use the TCG UEFI BIOS event log <xref target="EFI-TPM"/>).</t>
  <t>Quotes are retrieved from the TPM according to the TCG TAP Information Model <xref target="TAP"/>.  While the TAP IM gives a protocol-independent description of the data elements involved, it’s important to note that quotes from the TPM are signed inside the TPM, so MUST be retrieved in a way that does not invalidate the signature, as specified in <xref target="I-D.ietf-rats-yang-tpm-charra"/>, to preserve the trust model.  (See <xref target="security-cons"/> Security Considerations).</t>
  <t>Reference Integrity Measurements SHOULD be encoded as CoSWID tags, as defined in
  the TCG RIM document <xref target="RIM"/>, compatible with NIST IR 8060 <xref target="NIST-IR-8060"/> and the IETF CoSWID draft <xref target="I-D.ietf-sacm-coswid"/>.  See <xref target="RIM-section"/>.</t>
</list></t>

</section>
<section anchor="riv-simplifying-assumptions" title="RIV Simplifying Assumptions">

<t>This document makes the following simplifying assumptions to reduce complexity:</t>

<t><list style="symbols">
  <t>The product to be attested MUST be shipped with an IEEE 802.1AR Device Identity and an Initial
Attestation Key (IAK) with certificate.  The IAK cert contains the same identity
information as the DevID (specifically, the same Subject Name and Subject
Alt Name, signed by the manufacturer), but it’s a type of key that can be
used to sign a TPM Quote.  This convention is described in TCG Guidance for
Securing Network Equipment <xref target="NetEq"/>. For network equipment, which is generally non-privacy-sensitive, shipping
a device with both an IDevID and an IAK already provisioned substantially
simplifies initial startup. Privacy-sensitive applications may use the TCG
Platform Certificate and additional procedures to install identity credentials
into the device after manufacture.</t>
  <t>The product MUST be equipped with a Root of Trust for Measurement, Root of Trust
for Storage and Root of Trust for Reporting (as defined in <xref target="SP800-155"/>) that are
capable of conforming to the TCG Trusted Attestation Protocol (TAP) Information Model <xref target="TAP"/>.</t>
  <t>The authorized software supplier MUST make available Reference Integrity Measurements (i.e., known-good measurements)
in the form of signed CoSWID tags <xref target="I-D.ietf-sacm-coswid"/>, <xref target="SWID"/>,
as described in TCG Reference Integrity Measurement Manifest Information Model <xref target="RIM"/>.</t>
</list></t>

<section anchor="RIM-section" title="Reference Integrity Manifests (RIMs)">

<t><xref target="I-D.ietf-rats-yang-tpm-charra"/> focuses on collecting and transmitting evidence in
the form of PCR measurements and attestation logs.  But the critical part
of the process is enabling the Verifier to decide whether the measurements
are “the right ones” or not.</t>

<t>While it must be up to network administrators to decide what they want on
their networks, the software supplier should supply the Reference Integrity
Measurements that
may be used by a Verifier to determine if evidence shows known good, known
bad or unknown software configurations.</t>

<t>In general, there are two kinds of reference measurements:</t>

<t><list style="numbers">
  <t>Measurements of early system startup (e.g., BIOS, boot loader, OS kernel)
are essentially single-threaded, and executed exactly once, in a known sequence,
before any results could be reported.  In this case, while the method for
computing the hash and extending relevant PCRs may be complicated, the net
result is that the software (more likely, firmware) vendor will have one
known good PCR value that “should” be present in the relevant PCRs after the box has
booted.  In this case, the signed reference measurement could simply list the
expected hashes for the given version.  However, a RIM that contains the
intermediate hashes can be useful in debugging cases where the expected final hash
is not the one reported.</t>
  <t>Measurements taken later in operation of the system, once an OS has started
(for example, Linux IMA<xref target="IMA"/>), may be more complex, with unpredictable “final”
PCR values.  In this case, the Verifier must have enough information to reconstruct
the expected PCR values from logs and signed reference measurements from
a trusted authority.</t>
</list></t>

<t>In both cases, the expected values can be expressed as signed SWID or CoSWID tags,
but the SWID structure in the second case is somewhat more complex, as reconstruction of the extended hash in a PCR may involve thousands of files and other objects.</t>

<t>The TCG has published an information model defining elements of reference integrity
manifests under the title TCG Reference Integrity Manifest Information Model <xref target="RIM"/>.  This information model outlines how SWID tags should be structured to allow attestation, and defines “bundles” of SWID tags that may be needed to describe a complete software release.  The RIM contains metadata relating to the software release it belongs to, plus hashes for each individual file or other object that could be attested.</t>

<t>TCG has also published the PC Client Reference Integrity Measurement specification <xref target="PC-Client-RIM"/>, which focuses on a SWID-compatible format suitable for expressing expected measurement values in the specific case of a UEFI-compatible BIOS, where the SWID focus on files and file systems is not a direct fit.  While the PC Client RIM is not directly applicable to network equipment, many vendors do use a conventional UEFI BIOS to launch their network OS.</t>

</section>
<section anchor="attestation-logs" title="Attestation Logs">

<t>Quotes from a TPM can provide evidence of the state of a device up to the time
the evidence was recorded, but to make sense of the quote in most cases an
event log that identifies which software modules contributed which values to the quote
during startup MUST also be provided.  The log MUST contain enough information
to demonstrate its integrity by allowing exact reconstruction of the digest
conveyed in the signed quote (i.e., PCR values).</t>

<t>There are multiple event log formats which may be supported as viable formats of Evidence between the Attester and Verifier:</t>

<t><list style="symbols">
  <t>Event log exports from <xref target="I-D.ietf-rats-yang-tpm-charra"/></t>
  <t>IMA Event log file exports <xref target="IMA"/></t>
  <t>TCG UEFI BIOS event log (TCG EFI Platform Specification for TPM Family 1.1 or
1.2, Section 7) <xref target="EFI-TPM"/>)</t>
  <t>TCG Canonical Event Log <xref target="Canonical-Event-Log"/></t>
</list></t>

<t>Devices which use UEFI BIOS and Linux SHOULD use TCG Canonical Event Log <xref target="Canonical-Event-Log"/> and TCG UEFI BIOS event log <xref target="EFI-TPM"/>)</t>

</section>
</section>
</section>
<section anchor="standards-components" title="Standards Components">

<section anchor="prerequisites-for-riv" title="Prerequisites for RIV">

<t>The Reference Interaction Model for Challenge-Response-based Remote Attestation
is based on the standard roles defined in <xref target="I-D.ietf-rats-architecture"/>.  However additional prerequisites have been established to allow for interoperable RIV use case implementations.  These prerequisites are intended to provide sufficient context information so that the Verifier can acquire and evaluate Attester measurements.</t>

<section anchor="unique-device-identity" title="Unique Device Identity">

<t>A secure Device Identity (DevID) in the form of an IEEE 802.1AR DevID certificate <xref target="IEEE-802-1AR"/> MUST be provisioned in the Attester’s TPMs.</t>

</section>
<section anchor="keys" title="Keys">

<t>The Attestation Identity Key (AIK) and certificate MUST also be provisioned on the Attester according to <xref target="Platform-DevID-TPM-2.0"/>, <xref target="PC-Client-BIOS-TPM-1.2"/>, or <xref target="Platform-ID-TPM-1.2"/>.</t>

<t>The Attester’s TPM Keys MUST be associated with the DevID on the Verifier (see <xref target="Platform-DevID-TPM-2.0"/> and <xref target="security-cons"/> Security Considerations, below).</t>

</section>
<section anchor="RIM-policy" title="Appraisal Policy for Evidence">

<t>The Verifier MUST obtain trustworthy Endorsements in the form of reference measurements (e.g., Known Good Values, encoded as CoSWID tags <xref target="I-D.birkholz-yang-swid"/>). These reference measurements will eventually be compared to signed PCR Evidence acquired from an Attester’s TPM using Attestation Policies chosen by the administrator or owner of the device.</t>

<t>This document does not specify the format or contents for the Appraisal Policy for Evidence, but Endorsements may be acquired in one of two ways:</t>

<t><list style="numbers">
  <t>a Verifier may obtain reference measurements directly from an Endorser chosen by the Verifier administrator (e.g., through a web site).</t>
  <t>Signed reference measurements may be distributed by the Endorser to the Attester, as part of a software update.  From there, the reference measurement may be acquired by the Verifier.</t>
</list></t>

<t>In either case, the Verifier Owner MUST select the source of trusted endorsements through the Appraisal Policy for Evidence.</t>

<figure title="Appraisal Policy for Evidence Prerequisites" anchor="Appraisal-Prerequisites"><artwork align="left"><![CDATA[
*************         .-------------.         .-----------.
* Endorser  *         | Attester    |         | Verifier/ |
*           *         |             |         | Relying   |
*(Device    *----2--->| (Network    |----2--->| Party     |
* config    *         |  Device)    |         |(Ntwk Mgmt |
* Authority)*         |             |         |  Station) |
*************         '-------------'         '-----------'
        |                                           ^
        |                                           |
        '----------------1--------------------------'
]]></artwork></figure>

<t>In either case the Endorsements must be generated, acquired and delivered in a secure way, including reference measurements of firmware and bootable modules taken according to TCG PC Client <xref target="PC-Client-BIOS-TPM-2.0"/> and Linux IMA <xref target="IMA"/>.  Endorsementa MUST be encoded as SWID or CoSWID tags, signed by the device manufacturer, as defined in the TCG RIM document <xref target="RIM"/>, compatible with NIST IR 8060 <xref target="NIST-IR-8060"/> or the IETF CoSWID draft <xref target="I-D.ietf-sacm-coswid"/>.</t>

</section>
</section>
<section anchor="reference-model-for-challenge-response" title="Reference Model for Challenge-Response">

<t>Once the prerequisites for RIV are met, a Verifier is able to acquire Evidence from an Attester.  The following diagram illustrates a RIV information flow between a Verifier and an Attester, 
derived from Section 8.1 of <xref target="I-D.birkholz-rats-reference-interaction-model"/>.  Event times shown correspond to the time types described within Appendix A of <xref target="I-D.ietf-rats-architecture"/>:</t>

<figure title="IETF Attestation Information Flow" anchor="IETF-Attestation-Information-Flow"><artwork align="left"><![CDATA[
.----------.                                .--------------------------.
| Attester |                                | Relying Party / Verifier |
'----------'                                '--------------------------'
   time(VG)                                                       |
valueGeneration(targetEnvironment)                                |
     | => claims                                                  |
     |                                                            |
     | <--------------requestEvidence(nonce, PcrSelection)-----time(NS)
     |                                                            |
   time(EG)                                                       |
evidenceGeneration(nonce, PcrSelection, collectedClaims)          |
     | => SignedPcrEvidence(nonce, PcrSelection)                  |
     | => LogEvidence(collectedClaims)                            |
     |                                                            |
     | returnSignedPcrEvidence----------------------------------> |
     | returnLogEvidence----------------------------------------> |
     |                                                            |
     |                                                       time(RG,RA)
     |         evidenceAppraisal(SignedPcrEvidence, eventLog, refClaims)
     |                                       attestationResult <= |
     ~                                                            ~
     |                                                          time(RX)
]]></artwork></figure>

<t><list style="symbols">
  <t>Step 1 (time(VG)): One or more Attesting Network Device PCRs are extended with measurements.  RIV provides no direct link between 
the time at which the event takes place and the time that it’s attested, although streaming attestation as in <xref target="I-D.birkholz-rats-network-device-subscription"/> could.</t>
  <t>Step 2 (time(NS)): The Verifier generates a unique nonce (“number used once”), and makes a request attestation data for one or more PCRs from an Attester.  For interoperability, this MUST be accomplished via a YANG <xref target="RFC7950"/> interface that implements the TCG TAP model (e.g., YANG Module for Basic Challenge-Response-based Remote Attestation Procedures <xref target="I-D.ietf-rats-yang-tpm-charra"/>).</t>
  <t>Step 3 (time(EG)): On the Attester, measured values are retrieved from the Attester’s TPM. This requested PCR evidence is signed by the Attestation Identity Key (AIK) associated with the DevID.  Quotes are retrieved according to TCG TAP Information Model <xref target="TAP"/>.  While the TAP IM gives a protocol-independent description of the data elements involved, it’s important to note that quotes from the TPM are signed inside the TPM, so must be retrieved in a way that does not invalidate the signature, as specified in <xref target="I-D.ietf-rats-yang-tpm-charra"/>, to preserve the trust model.  (See <xref target="security-cons"/> Security Considerations).  At the same time, the Attester collects log evidence showing what values have been extended into that PCR.</t>
  <t>Step 4: Collected Evidence is passed from the Attester to the Verifier</t>
  <t>Step 5 (time(RG,RA)): The Verifier reviews the Evidence and takes action as needed.  As the interaction between Relying Party and Verifier is out of scope for RIV, this can happen in one step.  <list style="symbols">
      <t>If the signed PCR values do not match the set of log entries which have extended a particular PCR, the device SHOULD NOT be trusted.</t>
      <t>If the log entries that the Verifier considers important do not match known good values, the device SHOULD NOT be trusted.  We note that the process of collecting and analyzing the log can be omitted if the value in the relevant PCR is already a known-good value.</t>
      <t>If the set of log entries are not seen as acceptable by the Appraisal Policy for Evidence, the device SHOULD NOT be trusted.</t>
      <t>If the AIK signature is not correct, or freshness such as that provided by the nonce is not included in the response, the device SHOULD NOT be trusted.</t>
      <t>If time(RG)-time(NS) is greater than the threshold in the Appraisal Policy
for Evidence, the Evidence is considered stale and SHOULD NOT be trusted.</t>
    </list></t>
</list></t>

<section anchor="transport-and-encoding" title="Transport and Encoding">

<t>Network Management systems may retrieve signed PCR based Evidence as shown in <xref target="IETF-Attestation-Information-Flow"/>, and can be accomplished via NETCONF or RESTCONF, with XML, JSON, or CBOR encoded Evidence.</t>

<t>Implementations that use NETCONF MUST do so over a TLS or SSH secure tunnel.
Implementations that use RESTCONF transport MAY do so over a TLS or SSH secure tunnel.</t>

<t>Retrieval of Log Evidence SHOULD be via log interfaces on the network device.  (For example, see <xref target="I-D.ietf-rats-yang-tpm-charra"/>).</t>

</section>
</section>
<section anchor="peer-to-peer" title="Centralized vs Peer-to-Peer">

<t><xref target="IETF-Attestation-Information-Flow"/> above assumes that the Verifier is implicitly trusted, while the Attesting device is not.  In a Peer-to-Peer application such as two routers negotiating a trust relationship <xref target="I-D.voit-rats-trusted-path-routing"/>, the two peers can each ask the other to prove software integrity.  In this application, the information flow is the same, but each side plays a role both as an Attester and a Verifier.  Each device issues a challenge, and each device responds to the other’s challenge, as shown in <xref target="Peer-to-peer-Information-Flow"/>.  Peer-to-peer challenges, particularly if used to establish a trust relationship between routers, require devices to carry their own signed reference measurements (RIMs).  Devices may also have to carry Appraisal Policy for Evidence for each possible peer device so that each device has everything needed for attestation, without having to resort to a central authority.</t>

<figure title="Peer-to-Peer Attestation Information Flow" anchor="Peer-to-peer-Information-Flow"><artwork align="left"><![CDATA[
+---------------+                             +---------------+
|               |                             |               |
| Endorser A    |                             | Endorser B    |
| Firmware      |                             | Firmware      |
| Configuration |                             | Configuration |
| Authority     |                             | Authority     |
|               |                             |               |
+---------------+                             +---------------+
       |                                              |
       |       +-------------+        +------------+  |
       |       |             | Step 1 |            |  |   \
       |       | Attester    |<------>| Verifier   |  |   |
       |       |             |<------>|            |  |   |  Router B
       +------>|             | Step 2 |            |  |   |- Challenges
        Step 0A|             |        |            |  |   |  Router A
               |             |------->|            |  |   |
               |- Router A --| Step 3 |- Router B -|  |   /
               |             |        |            |  |
               |             |        |            |  |
               |             | Step 1 |            |  |   \
               | Verifier    |<------>| Attester   |<-+   |  Router A
               |             |<------>|            |      |- Challenges
               |             | Step 2 |            |      |  Router B
               |             |        |            |      |
               |             |<-------|            |      |
               +-------------+ Step 3 +------------+      /

]]></artwork></figure>

<t>In this application, each device may need to be equipped with signed RIMs to act as an Attester, and also an Appraisal Policy for Evidence and a selection of trusted X.509 root certificates, to allow the device to act as a Verifier.   An existing link layer protocol such as 802.1x <xref target="IEEE-802.1x"/> or 802.1AE <xref target="IEEE-802.1ae"/>, with Evidence being enclosed over a variant of EAP <xref target="RFC3748"/> or LLDP <xref target="LLDP"/> are suitable methods for such an exchange.</t>

</section>
</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>Networking Equipment, such as routers, switches and firewalls, has a key role to play in guarding the privacy of individuals using the network:</t>

<t><list style="symbols">
  <t>Packets passing through the device must not be sent to unauthorized destinations.  For example:  <list style="symbols">
      <t>Routers often act as Policy Enforcement Points, where individual subscribers may be checked for
authorization to access a network.  Subscriber login information must not be released to unauthorized parties.</t>
      <t>Networking Equipment is often called upon to block access to protected resources from unauthorized users.</t>
    </list></t>
  <t>Routing information, such as the identity of a router’s peers, must not be leaked to unauthorized neighbors.</t>
  <t>If configured, encryption and decryption of traffic must be carried out reliably, while protecting keys and credentials.</t>
</list></t>

<t>Functions that protect privacy are implemented as part of each layer of hardware and software that
makes up the networking device.
In light of these requirements for protecting the privacy of users of the network, the Network Equipment
must identify itself, and its boot configuration and measured device state (for example, PCR values),
to the Equipment’s Administrator, so there’s no uncertainty as to what function each device and
configuration is configured to carry out. This allows the administrator to ensure that the network
provides individual and peer privacy guarantees.</t>

<t>RIV specifically addresses the collection of information from enterprise network devices by authorized 
agents of the enterprise.  As such, privacy is a fundamental concern for those deploying this solution, given EU
GDPR, California CCPA, and many other privacy regulations.  The enterprise SHOULD implement
and enforce their duty of care.</t>

<t>See <xref target="NetEq"/> for more context on privacy in networking devices.</t>

</section>
<section anchor="security-cons" title="Security Considerations">

<t>Attestation Results from the RIV procedure are subject to a number of attacks:</t>

<t><list style="symbols">
  <t>Keys may be compromised.</t>
  <t>A counterfeit device may attempt to impersonate (spoof) a known authentic device.</t>
  <t>Man-in-the-middle attacks may be used by a counterfeit device to attempt to deliver
responses that originate in an actual authentic device.</t>
  <t>Replay attacks may be attempted by a compromised device.</t>
</list></t>

<section anchor="keys-used-in-riv" title="Keys Used in RIV">
<t>Trustworthiness of RIV attestation depends strongly on the validity of keys used for identity
and attestation reports.  RIV takes full advantage of TPM capabilities to ensure that results can be trusted.</t>

<t>Two sets of keys are relevant to RIV attestation:</t>

<t><list style="symbols">
  <t>A DevID key is used to certify the identity of the device in which the TPM is installed.</t>
  <t>An Attestation Key (AK) key signs attestation reports (called ‘quotes’ in TCG documents),
used to provide evidence for integrity of the software on the device.</t>
</list></t>

<t>TPM practices usually require that these keys be different, as a way of ensuring that a general-purpose
signing key cannot be used to spoof an attestation quote.</t>

<t>In each case, the private half of the key is known only to the TPM, and cannot be
retrieved externally, even by a trusted party.  To ensure that’s the case,
specification-compliant private/public key-pairs are generated inside the TPM, where they’re never
exposed, and cannot be extracted (See <xref target="Platform-DevID-TPM-2.0"/>).</t>

<t>Keeping keys safe is just part of attestation security; knowing which keys are bound
to the device in question is just as important.</t>

<t>While there are many ways to manage keys in a TPM (see <xref target="Platform-DevID-TPM-2.0"/>), RIV includes
support for “zero touch” provisioning (also known as zero-touch onboarding) of fielded
devices (e.g., Secure ZTP, <xref target="RFC8572"/>), where keys which have predictable trust properties are
provisioned by the device vendor.</t>

<t>Device identity in RIV is based on IEEE 802.1AR Device Identity (DevID). This specification provides several elements:</t>

<t><list style="symbols">
  <t>A DevID requires a unique key pair for each device, accompanied by an X.509 certificate,</t>
  <t>The private portion of the DevID key is to be stored in the device, in a manner that provides confidentiality (Section 6.2.5 <xref target="IEEE-802-1AR"/>)</t>
</list></t>

<t>The X.509 certificate contains several components:</t>

<t><list style="symbols">
  <t>The public part of the unique DevID key assigned to that device allows a challenge of identity.</t>
  <t>An identifying string that’s unique to the manufacturer of the device.  This is normally the
serial number of the unit, which might also be printed on a label on the device.</t>
  <t>The certificate must be signed by a key traceable to the manufacturer’s root key.</t>
</list></t>

<t>With these elements, the device’s manufacturer and serial number can be identified by analyzing the
DevID certificate plus the chain of intermediate certificates leading back to the manufacturer’s root
certificate.  As is conventional in TLS or SSH connections, a nonce must be signed by the device
in response to a challenge,
proving possession of its DevID private key.</t>

<t>RIV uses the DevID to validate a TLS or SSH connection to the device as the attestation session begins.  Security of
this process derives from TLS or SSH security, with the DevID providing proof that the session terminates on
the intended device. See <xref target="RFC8446"/>, <xref target="RFC4253"/>.</t>

<t>Evidence of software integrity is delivered in the form of a quote signed by the TPM
itself.  Because the contents of the quote are signed inside the TPM, any external
modification (including reformatting to a different data format) after measurements have been taken will be detected
as tampering.  An unbroken chain of trust is essential to ensuring that blocks of code that are taking
measurements have been verified before execution (see <xref target="RIV-Attestation-Model"/>.</t>

<t>Requiring results of attestation of the operating software to be signed by a key known only to the TPM also
removes the need to trust the device’s operating software (beyond the first measurement; see below); any
changes to the quote, generated and signed by the TPM itself, made by malicious device software, or in
the path back to the Verifier, will invalidate the signature on the quote.</t>

<t>A critical feature of the YANG model described in <xref target="I-D.ietf-rats-yang-tpm-charra"/> is the ability to carry TPM data structures in their native format, without requiring any changes to the structures as they were signed and delivered by the TPM.  While alternate methods of conveying TPM quotes could compress out redundant information, or add an additional layer of signing using external keys, the implementation MUST preserve the TPM signing, so that tampering anywhere in the path between the TPM itself and the Verifier can be detected.</t>

</section>
<section anchor="prevention-of-spoofing-and-man-in-the-middle-attacks" title="Prevention of Spoofing and Man-in-the-Middle Attacks">

<t>Prevention of spoofing attacks against attestation systems is also important.  There are two cases to consider:</t>

<t><list style="symbols">
  <t>The entire device could be spoofed, that is, when the Verifier goes to verify a specific device, it might be redirected to a different device.  Use of the 802.1AR Device Identity (DevID) in the TPM ensures that the Verifier’s TLS or SSH session is in fact terminating on the right device.</t>
  <t>A compromised device could respond with a spoofed Attestation Result, that is, a compromised OS could return a fabricated quote.</t>
</list></t>

<t>Protection against spoofed quotes from a device with valid identity is a bit more complex.
An identity key must be available to sign any kind of nonce or hash offered by the Verifier,
and consequently, could be used to sign a fabricated quote.  To block a spoofed Attestation
Result, the quote generated inside the TPM must be signed by
a key that’s different from the DevID, called an Attestation Key (AK).</t>

<t>Given separate Attestation and DevID keys, the
binding between the AK and the same device must also be proven to
prevent a man-in-the-middle attack (e.g., the ‘Asokan Attack’ <xref target="RFC6813"/>).</t>

<t>This is accomplished in RIV through use of an AK certificate with the same elements as the DevID
(i.e., same manufacturer’s serial number, signed by the same manufacturer’s key), but containing
the device’s unique AK public key instead of the DevID public key.</t>

<t>[Editor’s Note: does this require an OID that says the key is known by the CA to be an Attestation key?]</t>

<t>These two keys and certificates are used together:</t>

<t><list style="symbols">
  <t>The DevID is used to validate a TLS connection terminating on the device with a known serial number.</t>
  <t>The AK is used to sign attestation quotes, providing proof that the attestation
evidence comes from the same device.</t>
</list></t>

</section>
<section anchor="replay-attacks" title="Replay Attacks">

<t>Replay attacks, where results of a previous attestation are submitted in response to subsequent requests,
are usually prevented by inclusion of a nonce in the request to the TPM
for a quote.  Each request from the Verifier includes a new random number (a nonce). The resulting
quote signed by the TPM contains the same nonce, allowing the Verifier to determine
freshness, (i.e., that the resulting quote was generated in response to the Verifier’s specific request).
Time-Based Uni-directional Attestation <xref target="I-D.birkholz-rats-tuda"/> provides an alternate mechanism
to verify freshness without requiring a request/response cycle.</t>

</section>
<section anchor="owner-signed-keys" title="Owner-Signed Keys">

<t>Although device manufacturers MUST pre-provision devices with easily verified DevID and AK certificates,
use of those credentials is not mandatory.  IEEE 802.1AR incorporates the idea of an Initial Device ID
(IDevID), provisioned by the manufacturer, and a Local Device ID (LDevID) provisioned by the owner of
the device.  RIV and <xref target="Platform-DevID-TPM-2.0"/> extends that concept by defining an Initial Attestation Key (IAK) and Local Attestation
Key (LAK) with the same properties.</t>

<t>Device owners can use any method to provision the Local credentials.</t>

<t><list style="symbols">
  <t>The TCG document <xref target="Platform-DevID-TPM-2.0"/> shows how the initial Attestation
keys can be used to certify LDevID and LAK keys.  Use of the LDevID and LAK allows the device owner
to use a uniform identity structure across device types from multiple manufacturers (in the same way
that an “Asset Tag” is used by many enterprises to identify devices they own).  The TCG document
<xref target="Provisioning-TPM-2.0"/> also contains guidance on provisioning identity keys in TPM 2.0.</t>
  <t>Device owners, however, can use any other mechanism they want to assure themselves that Local identity
certificates are inserted into the intended device, including physical inspection and programming
in a secure location, if they prefer to avoid placing trust in the manufacturer-provided keys.</t>
</list></t>

<t>Clearly, Local keys can’t be used for secure Zero Touch provisioning; installation of the Local keys
can only be done by some process that runs before the device is installed for network operation.</t>

<t>On the other end of the device life cycle, provision should be made to wipe Local keys when a device
is decommissioned, to indicate that the device is no longer owned by the enterprise.  The manufacturer’s
Initial identity keys must be preserved, as they contain no information that’s not already printed on
the device’s serial number plate.</t>

</section>
<section anchor="other-trust-anchors" title="Other Trust Anchors">

<t>In addition to trustworthy provisioning of keys, RIV depends on other trust anchors.  (See <xref target="SP800-155"/> for definitions of Roots of Trust.)</t>

<t><list style="symbols">
  <t>Secure identity depends on mechanisms to prevent per-device secret keys from being compromised.  The TPM
provides this capability as a Root of Trust for Storage.</t>
  <t>Attestation depends on an unbroken chain of measurements, starting from the very first measurement.
That first measurement is made by code called the Root of Trust for Measurement, typically done by trusted
firmware stored in boot flash.  Mechanisms for maintaining the trustworthiness of the RTM are out of
scope for RIV, but could include immutable firmware, signed updates, or a vendor-specific hardware
verification technique.  See <xref target="using-tpm"/> for background on TPM practices.</t>
  <t>The device owner SHOULD provide some level of physical defense for the device.  If a TPM that has already been programmed
with an authentic DevID is stolen and inserted into a counterfeit device, attestation of that counterfeit
device may become indistinguishable from an authentic device.</t>
</list></t>

<t>RIV also depends on reliable reference measurements, as expressed by the RIM <xref target="RIM"/>.  The definition of
trust procedures for RIMs is out of scope for RIV, and the device owner is free to use any policy to validate
a set of reference measurements.  RIMs may be conveyed out-of-band or in-band, as part of the attestation
process (see <xref target="RIM-policy"/>).  But for embedded devices, where software is usually shipped as a self-contained
package, RIMs signed by the manufacturer and delivered in-band may be more convenient for the device owner.</t>

<t>The validity of RIV attestation results is also influenced by procedures used to create reference measurements:</t>

<t><list style="symbols">
  <t>While the RIM itself is signed, supply-chains SHOULD be carefully scrutinized to ensure that the values are 
not subject to unexpected manipulation prior to signing.  Insider-attacks against code bases and build chains
are particularly hard to spot.</t>
  <t>Designers SHOULD guard against hash collision attacks.  Reference Integrity Measurements often give hashes for large objects
of indeterminate size; if one of the measured objects can be replaced with an implant engineered to produce
the same hash, RIV will be unable to detect the substitution.  TPM1.2 uses SHA-1 hashes only, which have been
shown to be susceptible to collision attack.  TPM2.0 will produce quotes with SHA-256, which so far has resisted
such attacks.  Consequently RIV implementations SHOULD use TPM2.0.</t>
</list></t>

</section>
</section>
<section anchor="conclusion" title="Conclusion">

<t>TCG technologies can play an important part in the implementation of Remote
Integrity Verification.  Standards for many of the components needed for
implementation of RIV already exist:</t>

<t><list style="symbols">
  <t>Platform identity can be based on IEEE 802.1AR Device Identity, coupled with
careful supply-chain management by the manufacturer.</t>
  <t>Complex supply chains can be certified using TCG Platform Certificates <xref target="Platform-Certificates"/>.</t>
  <t>The TCG TAP mechanism can be used to retrieve attestation evidence.  Work
is needed on a YANG model for this protocol.</t>
  <t>Reference Integrity Measurements must be conveyed from the software authority (e.g.,
the manufacturer) to the system in which verification will take place.  IETF
CoSWID work forms the basis for this, but new work is needed to create an
information model and YANG implementation.</t>
</list></t>

</section>
<section anchor="IANA" title="IANA Considerations">

<t>This memo includes no request to IANA.</t>

</section>
<section anchor="appendix" title="Appendix">

<section anchor="using-tpm" title="Using a TPM for Attestation">

<t>The Trusted Platform Module and surrounding ecosystem provide three interlocking capabilities to enable secure collection 
of evidence from a remote device, Platform Configuration Registers (PCRs), a Quote mechanism, and a standardized Event Log.</t>

<t>Each TPM has at least between eight and twenty-four PCRs (depending on the profile and vendor choices), each one large 
enough to hold one hash value (SHA-1, SHA-256, and other hash algorithms can 
be used, depending on TPM version).  PCRs can’t be accessed directly from outside the chip, but the TPM 
interface provides a way to “extend” a new security measurement hash into any PCR, a process by which the existing value 
in the PCR is hashed with the new security measurement hash, and the result placed back into the same PCR.  The result 
is a composite fingerprint of all the security measurements extended into each PCR since the system was reset.</t>

<t>Every time a PCR is extended, an entry should be added to the corresponding Event Log.  Logs contain the security 
measurement hash plus informative fields offering hints as to what event it was that generated the security measurement.<vspace />
The Event Log itself is protected against accidental manipulation, but it is implicitly tamper-evident – any 
verification process can read the security measurement hash from the log events, compute the composite value 
and compare that to what ended up in the PCR.   If there’s a discrepancy, the logs do not provide an accurate 
view of what was placed into the PCR.</t>

<t>In a conventional TPM Attestation environment, the first measurement must be made and extended into the TPM by trusted 
device code (called the Root of Trust for Measurement, RTM).  That first measurement should cover the segment of 
code that is run immediately after the RTM, which then measures the next code segment before running it, and so on, 
forming an unbroken chain of trust.  See <xref target="TCGRoT"/> for more on Mutable vs Immutable roots of trust.</t>

<t>The TPM provides another mechanism called a Quote that can read the current value of the PCRs and package them 
into a data structure signed by an Attestation Key (which is private key that is known only to the TPM).</t>

<t>The Verifier uses the Quote and Log together.  The Quote, containing the composite hash of the complete sequence 
of security measurement hashes, is used to verify the integrity of the Event Log.  Each hash in the validated 
Quote can then be compared to corresponding expected values in the set of Reference Integrity Measurements to 
validate overall system integrity.</t>

<t>A summary of information exchanged in obtaining quotes from TPM1.2 and TPM2.0 can be found in <xref target="TAP"/>, Section 4.
Detailed information about PCRs and Quote data structures can be found in <xref target="TPM1.2"/>, <xref target="TPM2.0"/>.  Recommended log 
formats include <xref target="PC-Client-BIOS-TPM-2.0"/> and <xref target="Canonical-Event-Log"/>.</t>

</section>
<section anchor="root-of-trust-for-measurement" title="Root of Trust for Measurement">

<t>The measurements needed for attestation require that the device being attested
is equipped with a Root of Trust for Measurement, that is, some trustworthy
mechanism that can compute the first measurement in the chain of trust required
to attest that each stage of system startup is verified, a Root of Trust for Storage (i.e., 
the TPM PCRs) to record the results, and a Root of Trust
for Reporting to report the results <xref target="TCGRoT"/>, <xref target="SP800-155"/>.</t>

<t>While there are many complex aspects of a Root of Trust, two aspects that
are important in the case of attestation are:</t>

<t><list style="symbols">
  <t>The first measurement computed by the Root of Trust for Measurement, and stored
in the TPM’s Root of Trust for Storage, is presumed to be correct.</t>
  <t>There must not be a way to reset the Root of Trust for Storage without re-entering
the Root of Trust for Measurement code.</t>
</list></t>

<t>The first measurement must be computed by code that is implicitly trusted; if that
first measurement can be subverted, none of the remaining measurements can
be trusted. (See <xref target="NIST-SP-800-155"/>)</t>

</section>
<section anchor="layering-model-for-network-equipment-attester-and-verifier" title="Layering Model for Network Equipment Attester and Verifier">

<t>Retrieval of identity and attestation state uses one protocol stack, while
retrieval of Reference Measurements uses a different set of protocols.  Figure
5 shows the components involved.</t>

<figure title="RIV Protocol Stacks" anchor="RIV-Protocol-Stacks"><artwork align="left"><![CDATA[
+-----------------------+              +-------------------------+
|                       |              |                         |
|       Attester        |<-------------|        Verifier         |
|       (Device)        |------------->|   (Management Station)  |
|                       |      |       |                         |
+-----------------------+      |       +-------------------------+
                               |
           -------------------- --------------------
           |                                        |
---------------------------------- ---------------------------------
|Reference Integrity Measurements| |         Attestation           |
---------------------------------- ---------------------------------

********************************************************************
*         IETF Attestation Reference Interaction Diagram           *
********************************************************************

    .......................         .......................
    . Reference Integrity .         .  TAP (PTS2.0) Info  .
    .      Manifest       .         . Model and Canonical .
    .                     .         .     Log Format      .
    .......................         .......................

    *************************  .............. **********************
    * YANG SWID Module      *  . TCG        . * YANG Attestation   *
    * I-D.birkholz-yang-swid*  . Attestation. * Module             *
    *                       *  . MIB        . * I-D.ietf-rats-     *
    *                       *  .            . * yang-tpm-charra    *
    *************************  .............. **********************

    *************************  ************ ************************
    * XML, JSON, CBOR (etc) *  *    UDP   * * XML, JSON, CBOR (etc)*
    *************************  ************ ************************

    *************************               ************************
    *   RESTCONF/NETCONF    *               *   RESTCONF/NETCONF   *
    ************************               *************************

    *************************               ************************
    *       TLS, SSH        *               *       TLS, SSH       *
    *************************               ************************

]]></artwork></figure>

<t>IETF documents are captured in boxes surrounded by asterisks. TCG documents
are shown in boxes surrounded by dots.</t>

<section anchor="why-is-os-attestation-different" title="Why is OS Attestation Different?">

<t>Even in embedded systems, adding Attestation at the OS level (e.g., Linux
IMA, Integrity Measurement Architecture <xref target="IMA"/>) increases the number of objects to
be attested by one or two orders of
magnitude, involves software that’s updated and changed frequently, and introduces
processes that begin in an unpredictable order.</t>

<t>TCG and others (including the Linux community) are working on methods and
procedures for attesting the operating system and application software, but
standardization is still in process.</t>

</section>
</section>
<section anchor="implementation-notes" title="Implementation Notes">

<t><xref target="Component-Status"/> summarizes many of the actions needed to complete an Attestation
system, with links to relevant documents.  While documents are controlled
by several standards organizations, the implied actions required for
implementation are all the responsibility of the manufacturer of the device,
unless otherwise noted.  It should be noted that, while the YANG model is 
RECOMMENDED for attestation, this table identifies an optional SNMP MIB as 
well, <xref target="Attest-MIB"/>.</t>

<figure title="Component Status" anchor="Component-Status"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|             Component                           |  Controlling   |
|                                                 | Specification  |
--------------------------------------------------------------------
| Make a Secure execution environment             |   TCG RoT      |
|   o Attestation depends on a secure root of     |   UEFI.org     |
|     trust for measurement outside the TPM, as   |                |
|     well as roots for storage and reporting     |                |
|     inside the TPM.                             |                |
|   o  Refer to TCG Root of Trust for Measurement.|                |
|   o  NIST SP 800-193 also provides guidelines   |                |
|      on Roots of Trust                          |                |
--------------------------------------------------------------------
| Provision the TPM as described in               | TCG TPM DevID  |
|   TCG documents.                                | TCG Platform   |
|                                                 |   Certificate  |
--------------------------------------------------------------------
| Put a DevID or Platform Cert in the TPM         | TCG TPM DevID  |
|    o Install an Initial Attestation Key at the  | TCG Platform   |
|      same time so that Attestation can work out |   Certificate  |
|      of the box                                 |-----------------
|    o Equipment suppliers and owners may want to | IEEE 802.1AR   |
|      implement Local Device ID as well as       |                |
|      Initial Device ID                          |                |
--------------------------------------------------------------------
| Connect the TPM to the TLS stack                | Vendor TLS     |
|    o  Use the DevID in the TPM to authenticate  | stack (This    |
|       TAP connections, identifying the device   | action is      |
|                                                 | simply         |
|                                                 | configuring TLS|
|                                                 | to use the     |
|                                                 | DevID as its   |
|                                                 | trust anchor.) |
--------------------------------------------------------------------
| Make CoSWID tags for BIOS/LoaderLKernel objects | IETF CoSWID    |
|    o  Add reference measurements into SWID tags | ISO/IEC 19770-2|
|    o  Manufacturer should sign the SWID tags    | NIST IR 8060   |
|    o  The TCG RIM-IM identifies further         |                |
|       procedures to create signed RIM           |                |
|       documents that provide the necessary      |                |
|       reference information                     |                |
--------------------------------------------------------------------
|  Package the SWID tags with a vendor software   | Retrieve tags  |
|  release                                        | with           |
|    o  A tag-generator plugin such      | draft-birkholz-yang-swid|
|     as [SWID-Gen] can be used                   |----------------|
|                                                 | TCG PC Client  |
|                                                 | RIM            |
--------------------------------------------------------------------
|  Use PC Client measurement definitions          | TCG PC Client  |
|  to define the use of PCRs                      | BIOS           |
|  (although Windows  OS is rare on Networking    |                |
|  Equipment, UEFI BIOS is not)                   |                |
--------------------------------------------------------------------
|  Use TAP to retrieve measurements               |                |
|    o  Map TAP to SNMP                           | TCG SNMP MIB   |
|    o  Map to YANG                               | YANG Module for|
|  Use Canonical Log Format                       |   Basic        |
|                                                 |   Attestation  |
|                                                 | TCG Canonical  |
|                                                 |   Log Format   |
--------------------------------------------------------------------
| Posture Collection Server (as described in IETF |                |
|  SACMs ECP) should request the                  |                |
|  attestation and analyze the result             |                |
| The Management application might be broken down |                |
|  to several more components:                    |                |
|    o  A Posture Manager Server                  |                |
|       which collects reports and stores them in |                |
|       a database                                |                |
|    o  One or more Analyzers that can look at the|                |
|       results and figure out what it means.     |                |
--------------------------------------------------------------------
]]></artwork></figure>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC8572" target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author initials='K.' surname='Watsen' fullname='K. Watsen'><organization /></author>
<author initials='I.' surname='Farrer' fullname='I. Farrer'><organization /></author>
<author initials='M.' surname='Abrahamsson' fullname='M. Abrahamsson'><organization /></author>
<date year='2019' month='April' />
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference  anchor="RFC4253" target='https://www.rfc-editor.org/info/rfc4253'>
<front>
<title>The Secure Shell (SSH) Transport Layer Protocol</title>
<author initials='T.' surname='Ylonen' fullname='T. Ylonen'><organization /></author>
<author initials='C.' surname='Lonvick' fullname='C. Lonvick' role='editor'><organization /></author>
<date year='2006' month='January' />
<abstract><t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t><t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP.  The protocol can be used as a basis for a number of secure network services.  It provides strong encryption, server authentication, and integrity protection.  It may also provide compression.</t><t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t><t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4253'/>
<seriesInfo name='DOI' value='10.17487/RFC4253'/>
</reference>



<reference  anchor="RFC7950" target='https://www.rfc-editor.org/info/rfc7950'>
<front>
<title>The YANG 1.1 Data Modeling Language</title>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund' role='editor'><organization /></author>
<date year='2016' month='August' />
<abstract><t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='7950'/>
<seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>



<reference  anchor="RFC6241" target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author initials='R.' surname='Enns' fullname='R. Enns' role='editor'><organization /></author>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund' role='editor'><organization /></author>
<author initials='J.' surname='Schoenwaelder' fullname='J. Schoenwaelder' role='editor'><organization /></author>
<author initials='A.' surname='Bierman' fullname='A. Bierman' role='editor'><organization /></author>
<date year='2011' month='June' />
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor="I-D.ietf-rats-yang-tpm-charra">
<front>
<title>A YANG Data Model for Challenge-Response-based Remote Attestation Procedures using TPMs</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Eckel' fullname='Michael Eckel'>
    <organization />
</author>

<author initials='S' surname='Bhandari' fullname='Shwetha Bhandari'>
    <organization />
</author>

<author initials='B' surname='Sulzen' fullname='Bill Sulzen'>
    <organization />
</author>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<author initials='L' surname='Xia' fullname='Liang Xia'>
    <organization />
</author>

<author initials='T' surname='Laffey' fullname='Tom Laffey'>
    <organization />
</author>

<author initials='G' surname='Fedorkow' fullname='Guy Fedorkow'>
    <organization />
</author>

<date month='June' day='24' year='2020' />

<abstract><t>This document defines a YANG RPC and a minimal datastore tree required to retrieve attestation evidence about integrity measurements from a composite device with one or more roots of trust for reporting.  Complementary measurement logs are also provided by the YANG RPC originating from one or more roots of trust of measurement.  The module defined requires at least one TPM 1.2 or TPM 2.0 and corresponding Trusted Software Stack included in the device components of the composite device the YANG server is running on.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-yang-tpm-charra-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-yang-tpm-charra-02.txt' />
</reference>



<reference anchor="I-D.birkholz-yang-swid">
<front>
<title>Software Inventory YANG module based on Software Identifiers</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<date month='October' day='23' year='2018' />

<abstract><t>This document provides a YANG module definition that enables a computing context to provide detailed information about installed software components.  The structure of the module is based on the Concise Software Identifier draft and therefore also strongly related to the ISO 19770-2:2015 Software Identifiers standard.  Both standards provide no interface to transport the SWID tag information between system entities and this document leverages the wide adoption of YANG based management interfaces.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-yang-swid-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-yang-swid-02.txt' />
</reference>



<reference anchor="I-D.ietf-sacm-coswid">
<front>
<title>Concise Software Identification Tags</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='J' surname='Fitzgerald-McKay' fullname='Jessica Fitzgerald-McKay'>
    <organization />
</author>

<author initials='C' surname='Schmidt' fullname='Charles Schmidt'>
    <organization />
</author>

<author initials='D' surname='Waltermire' fullname='David Waltermire'>
    <organization />
</author>

<date month='May' day='1' year='2020' />

<abstract><t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles.  SWID tag representations can be too large for devices with network and storage constraints.  This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags.  CoSWID supports the same features as SWID tags, as well as additional semantics that allow CoSWIDs to describe additional types of information, all in a more memory efficient format.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-15' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-sacm-coswid-15.txt' />
</reference>


<reference anchor="IEEE-802-1AR" >
  <front>
    <title>802.1AR-2018 - IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity, IEEE Computer Society</title>
    <author initials="M." surname="Seaman">
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2018" month="August"/>
  </front>
</reference>
<reference anchor="TAP" target="https://trustedcomputinggroup.org/resource/tcg-tap-information-model/">
  <front>
    <title>TCG Trusted Attestation Protocol (TAP) Information Model for TPM Families 1.2 and 2.0 and DICE Family 1.0, Version 1.0, Revision 0.36</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="Canonical-Event-Log" >
  <front>
    <title>DRAFT Canonical Event Log Format Version: 1.0, Revision: .12</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-2.0" target="https://trustedcomputinggroup.org/pc-client-specific-platform-firmware-profile-specification">
  <front>
    <title>PC Client Specific Platform Firmware Profile Specification Family "2.0", Level 00 Revision 1.04</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-1.2" target="https://trustedcomputinggroup.org/resource/pc-client-work-group-specific-implementation-specification-for-conventional-bios/">
  <front>
    <title>TCG PC Client Specific Implementation Specification for Conventional BIOS, Specification Version 1.21 Errata, Revision 1.00</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2012" month="February"/>
  </front>
</reference>
<reference anchor="RIM" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_RIM_Model_v1-r13_2feb20.pdf">
  <front>
    <title>DRAFT: TCG Reference Integrity Manifest Information Model</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-RIM" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_PC_Client_RIM_r0p15_15june2020.pdf">
  <front>
    <title>DRAFT: TCG PC Client Reference Integrity Manifest Specification, v.09</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="December"/>
  </front>
</reference>
<reference anchor="Platform-DevID-TPM-2.0" >
  <front>
    <title>DRAFT: TPM Keys for Platform DevID for TPM2, Specification Version 0.7, Revision 0</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="Platform-ID-TPM-1.2" target="https://trustedcomputinggroup.org/resource/tpm-keys-for-platform-identity-for-tpm-1-2-2/">
  <front>
    <title>TPM Keys for Platform Identity for TPM 1.2, Specification Version 1.0, Revision 3</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
</reference>
<reference anchor="SWID" target="https://www.iso.org/standard/65666.html">
  <front>
    <title>Information Technology Software Asset Management Part 2: Software Identification Tag, ISO/IEC 19770-2</title>
    <author >
      <organization>The International Organization for Standardization/International Electrotechnical Commission</organization>
    </author>
    <date year="2015" month="October"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>





<reference  anchor="RFC6813" target='https://www.rfc-editor.org/info/rfc6813'>
<front>
<title>The Network Endpoint Assessment (NEA) Asokan Attack Analysis</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='S.' surname='Hanna' fullname='S. Hanna'><organization /></author>
<date year='2012' month='December' />
<abstract><t>The Network Endpoint Assessment (NEA) protocols are subject to a subtle forwarding attack that has become known as the NEA Asokan Attack. This document describes the attack and countermeasures that may be mounted.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6813'/>
<seriesInfo name='DOI' value='10.17487/RFC6813'/>
</reference>



<reference  anchor="RFC3748" target='https://www.rfc-editor.org/info/rfc3748'>
<front>
<title>Extensible Authentication Protocol (EAP)</title>
<author initials='B.' surname='Aboba' fullname='B. Aboba'><organization /></author>
<author initials='L.' surname='Blunk' fullname='L. Blunk'><organization /></author>
<author initials='J.' surname='Vollbrecht' fullname='J. Vollbrecht'><organization /></author>
<author initials='J.' surname='Carlson' fullname='J. Carlson'><organization /></author>
<author initials='H.' surname='Levkowetz' fullname='H. Levkowetz' role='editor'><organization /></author>
<date year='2004' month='June' />
<abstract><t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.  EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP.  EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees.  Fragmentation is not supported within EAP itself; however, individual EAP methods may support this.  This document obsoletes RFC 2284.  A summary of the changes between this document and RFC 2284 is available in Appendix A.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3748'/>
<seriesInfo name='DOI' value='10.17487/RFC3748'/>
</reference>



<reference anchor="I-D.ietf-rats-architecture">
<front>
<title>Remote Attestation Procedures Architecture</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='N' surname='Smith' fullname='Ned Smith'>
    <organization />
</author>

<author initials='W' surname='Pan' fullname='Wei Pan'>
    <organization />
</author>

<date month='September' day='1' year='2020' />

<abstract><t>In network protocol exchanges, it is often the case that one entity (a Relying Party) requires evidence about a remote peer to assess the peer's trustworthiness, and a way to appraise such evidence.  The evidence is typically a set of claims about its software and hardware platform.  This document describes an architecture for such remote attestation procedures (RATS).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-architecture-06.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-reference-interaction-model">
<front>
<title>Reference Interaction Models for Remote Attestation Procedures</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Eckel' fullname='Michael Eckel'>
    <organization />
</author>

<author initials='C' surname='Newton' fullname='Christopher Newton'>
    <organization />
</author>

<author initials='L' surname='Chen' fullname='Liqun Chen'>
    <organization />
</author>

<date month='July' day='7' year='2020' />

<abstract><t>This document describes interaction models for remote attestation procedures (RATS).  Three conveying mechanisms - Challenge/Response, Uni-Directional, and Streaming Remote Attestation - are illustrated and defined.  Analogously, a general overview about the information elements typically used by corresponding conveyance protocols are highlighted.  Privacy preserving conveyance of Evidence via Direct Anonymous Attestation is elaborated on for each interaction model, individually.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-reference-interaction-model-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-reference-interaction-model-03.txt' />
</reference>



<reference anchor="I-D.richardson-rats-usecases">
<front>
<title>Use cases for Remote Attestation common encodings</title>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='C' surname='Wallace' fullname='Carl Wallace'>
    <organization />
</author>

<author initials='W' surname='Pan' fullname='Wei Pan'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>This document details mechanisms created for performing Remote Attestation that have been used in a number of industries.  The document initially focuses on existing industry verticals, mapping terminology used in those specifications to the more abstract terminology used by the IETF RATS Working Group.  The document aspires to describe possible future use cases that would be enabled by common formats.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-richardson-rats-usecases-07' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-richardson-rats-usecases-07.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-tuda">
<front>
<title>Time-Based Uni-Directional Attestation</title>

<author initials='A' surname='Fuchs' fullname='Andreas Fuchs'>
    <organization />
</author>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='I' surname='McDonald' fullname='Ira McDonald'>
    <organization />
</author>

<author initials='C' surname='Bormann' fullname='Carsten Bormann'>
    <organization />
</author>

<date month='July' day='13' year='2020' />

<abstract><t>This documents defines the method and bindings used to conduct Time- based Uni-Directional Attestation (TUDA) between two RATS (Remote ATtestation procedureS) entities over the Internet.  TUDA does not require a challenge-response handshake and thereby does not rely on the conveyance of a nonce to prove freshness of remote attestation Evidence.  Conversely, TUDA enables the creation of Secure Audit Logs that can constitute Evidence about current and past operational states of an Attester.  Every RATS entity requires access to a trustable and synchronized time-source.  A Handle Distributor takes on the corresponding role of a Time Stamp Authority (TSA) to provide Time Stamp Tokens (TST) to all RATS entities.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-tuda-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-tuda-03.txt' />
</reference>



<reference anchor="I-D.voit-rats-trusted-path-routing">
<front>
<title>Trusted Path Routing</title>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<date month='June' day='10' year='2020' />

<abstract><t>There are end-users who believe encryption technologies like IPSec alone are insufficient to protect the confidentiality of their highly sensitive traffic flows.  These end-users want their flows to traverse devices which have been freshly appraised and verified. This specification describes Trusted Path Routing.  Trusted Path Routing protects sensitive flows as they transit a network by forwarding traffic to/from sensitive subnets across network devices recently appraised as trustworthy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-voit-rats-trusted-path-routing-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-voit-rats-trusted-path-routing-02.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-network-device-subscription">
<front>
<title>Attestation Event Stream Subscription</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<author initials='W' surname='Pan' fullname='Wei Pan'>
    <organization />
</author>

<date month='June' day='24' year='2020' />

<abstract><t>This document defines how to subscribe to a stream of attestation related Evidence on TPM-based network devices.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-network-device-subscription-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-network-device-subscription-00.txt' />
</reference>



<reference anchor="I-D.ietf-rats-eat">
<front>
<title>The Entity Attestation Token (EAT)</title>

<author initials='G' surname='Mandyam' fullname='Giridhar Mandyam'>
    <organization />
</author>

<author initials='L' surname='Lundblade' fullname='Laurence Lundblade'>
    <organization />
</author>

<author initials='M' surname='Ballesteros' fullname='Miguel Ballesteros'>
    <organization />
</author>

<author initials='J' surname='O&apos;Donoghue' fullname='Jeremy O&apos;Donoghue'>
    <organization />
</author>

<date month='August' day='31' year='2020' />

<abstract><t>An Entity Attestation Token (EAT) provides a signed (attested) set of claims that describe state and characteristics of an entity, typically a device like a phone or an IoT device.  These claims are used by a relying party to determine how much it wishes to trust the entity.  An EAT is either a CWT or JWT with some attestation-oriented claims. To a large degree, all this document does is extend CWT and JWT.  Contributing  TBD</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-04.txt' />
<format type='PDF'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-eat-04.pdf' />
</reference>


<reference anchor="TPM1.2" target="https://trustedcomputinggroup.org/resource/tpm-main-specification/">
  <front>
    <title>TPM Main Specification Level 2 Version 1.2, Revision 116</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2011" month="March"/>
  </front>
</reference>
<reference anchor="TPM2.0" target="https://trustedcomputinggroup.org/resource/tpm-library-specification/">
  <front>
    <title>Trusted Platform Module Library Specification, Family “2.0”, Level 00, Revision 01.59</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="November"/>
  </front>
</reference>
<reference anchor="NIST-SP-800-155" target="https://csrc.nist.gov/csrc/media/publications/sp/800-155/draft/documents/draft-sp800-155_dec2011.pdf">
  <front>
    <title>BIOS Integrity Measurement Guidelines (Draft)</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2011" month="December"/>
  </front>
</reference>
<reference anchor="EFI-TPM" target="https://trustedcomputinggroup.org/resource/tcg-efi-platform-specification/">
  <front>
    <title>TCG EFI Platform Specification for TPM Family 1.1 or 1.2, Specification Version 1.22, Revision 15</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2014" month="January"/>
  </front>
</reference>
<reference anchor="Platform-Certificates" target="https://trustedcomputinggroup.org/resource/tcg-platform-attribute-credential-profile/">
  <front>
    <title>TCG Platform Attribute Credential Profile, Specification Version 1.0, Revision 16</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="January"/>
  </front>
</reference>
<reference anchor="Provisioning-TPM-2.0" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-TPM-v2.0-Provisioning-Guidance-Published-v1r1.pdf">
  <front>
    <title>TCG TPM v2.0 Provisioning Guidance, Version 1.0, Revision 1.0</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="March"/>
  </front>
</reference>
<reference anchor="Attest-MIB" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_SNMP_MIB_for_TPM-Based_Attestation_v0.8r2_PUBLIC_REVIEW.pdf">
  <front>
    <title>SNMP MIB for TPM-Based Attestation, Version 0.8Revision 0.02</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>
<reference anchor="IEEE-802.1x" target="https://standards.ieee.org/standard/802_1X-2020.html">
  <front>
    <title>802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks--Port-Based Network Access Control</title>
    <author >
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>
<reference anchor="IEEE-802.1ae" target="https://1.ieee802.org/security/802-1ae/">
  <front>
    <title>802.1AE MAC Security (MACsec)</title>
    <author initials="M." surname="Seaman">
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="LLDP" target="https://standards.ieee.org/standard/802_1AB-2016.html">
  <front>
    <title>802.1AB-2016 - IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery</title>
    <author >
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2016" month="March"/>
  </front>
</reference>
<reference anchor="IMA" target="https://sourceforge.net/p/linux-ima/wiki/Home/">
  <front>
    <title>Integrity Measurement Architecture</title>
    <author surname="dsafford">
      <organization></organization>
    </author>
    <author surname="kds_etu">
      <organization></organization>
    </author>
    <author surname="mzohar">
      <organization></organization>
    </author>
    <author surname="reinersailer">
      <organization></organization>
    </author>
    <author surname="serge_hallyn">
      <organization></organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="TCGRoT" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_Roots_of_Trust_Specification_v0p20_PUBLIC_REVIEW.pdf">
  <front>
    <title>DRAFT: TCG Roots of Trust Specification</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="SP800-155" target="https://csrc.nist.gov/csrc/media/publications/sp/800-155/draft/documents/draft-sp800-155_dec2011.pdf">
  <front>
    <title>BIOS Integrity Measurement Guidelines (Draft)</title>
    <author >
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <date year="2011" month="December"/>
  </front>
</reference>
<reference anchor="NetEq" target="https://trustedcomputinggroup.org/resource/tcg-guidance-securing-network-equipment/">
  <front>
    <title>TCG Guidance for Securing Network Equipment, Version 1.0, Revision 29</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="January"/>
  </front>
</reference>
<reference anchor="NIST-IR-8060" target="https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8060.pdf">
  <front>
    <title>Guidelines for the Creation of Interoperable Software Identification (SWID) Tags</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2016" month="April"/>
  </front>
</reference>
<reference anchor="AIK-Enrollment" target="https://trustedcomputinggroup.org/resource/tcg-infrastructure-working-group-a-cmc-profile-for-aik-certificate-enrollment/">
  <front>
    <title>TCG Infrastructure Working Group - A CMC Profile for AIK Certificate Enrollment Version 1.0, Revision 7</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2011" month="March"/>
  </front>
</reference>
<reference anchor="SWID-Gen" target="https://github.com/Labs64/swid-maven-plugin">
  <front>
    <title>SoftWare IDentification (SWID) Tags Generator (Maven Plugin)</title>
    <author >
      <organization>Labs64, Munich, Germany</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

