<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.9 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="pre5378Trust200902" docName="draft-ietf-teep-architecture-14" category="info">

  <front>
    <title abbrev="TEEP Architecture">Trusted Execution Environment Provisioning (TEEP) Architecture</title>

    <author initials="M." surname="Pei" fullname="Mingliang Pei">
      <organization>Broadcom</organization>
      <address>
        <email>mingliang.pei@broadcom.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Arm Limited</organization>
      <address>
        <email>hannes.tschofenig@arm.com</email>
      </address>
    </author>
    <author initials="D." surname="Thaler" fullname="Dave Thaler">
      <organization>Microsoft</organization>
      <address>
        <email>dthaler@microsoft.com</email>
      </address>
    </author>
    <author initials="D." surname="Wheeler" fullname="David Wheeler">
      <organization>Intel</organization>
      <address>
        <email>david.m.wheeler@intel.com</email>
      </address>
    </author>

    <date year="2021" month="February" day="22"/>

    <area>Security</area>
    <workgroup>TEEP</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>A Trusted Execution Environment (TEE) is an environment that
enforces that any code within that environment cannot be tampered with,
and that any data used by such code cannot be read or tampered with
by any code outside that environment.
This architecture document motivates the design and standardization
of a protocol for managing the lifecycle of trusted applications
running inside such a TEE.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">
<t>Applications executing in a device are exposed to many different attacks
intended to compromise the execution of the application or reveal the
data upon which those applications are operating. These attacks increase
with the number of other applications on the device, with such other
applications coming from potentially untrustworthy sources. The
potential for attacks further increases with the complexity of features
and applications on devices, and the unintended interactions among those
features and applications. The danger of attacks on a system increases
as the sensitivity of the applications or data on the device increases.
As an example, exposure of emails from a mail client is likely to be of
concern to its owner, but a compromise of a banking application raises
even greater concerns.</t>

<t>The Trusted Execution Environment (TEE) concept is designed to execute
applications in a protected environment that enforces that any code 
within that environment cannot be tampered with, 
and that any data used by such code 
cannot be read or tampered with by any code outside that environment, 
including by a commodity operating system (if present).
In a system with multiple TEEs, this also means that code in one TEE 
cannot be read or tampered with by code in the other TEE.</t>

<t>This separation reduces the possibility
of a successful attack on application components and the data contained inside the
TEE. Typically, application components are chosen to execute inside a TEE because
those application components perform security sensitive operations or operate on
sensitive data. An application component running inside a TEE is referred to as a
Trusted Application (TA), while an application running outside any TEE, i.e., in the
Rich Execution Environment (REE),
is referred to as an Untrusted Application. In the example of a banking application, 
code that relates to the authentication protocol could reside in a TA while the 
application logic including HTTP protocol parsing could be contained in the 
Untrusted Application.  In addition, processing of credit card numbers or account balances could be done in a TA as it is sensitive data.
The precise code split is ultimately a decision of the 
developer based on the assets he or she wants to protect according to the threat model.</t>

<t>TEEs use hardware enforcement combined with software protection to secure TAs and
its data. TEEs typically offer a more limited set of services to TAs than is 
normally available to Untrusted Applications.</t>

<t>Not all TEEs are the same, however, and different vendors may have different
implementations of TEEs with different security properties, different
features, and different control mechanisms to operate on TAs. Some
vendors may themselves market multiple different TEEs with different
properties attuned to different markets. A device vendor may integrate
one or more TEEs into their devices depending on market needs.</t>

<t>To simplify the life of TA developers interacting
with TAs in a TEE, an interoperable protocol for managing TAs running in
different TEEs of various devices is needed. This software update protocol 
needs to make sure that compatible trusted and untrusted components (if any) of an 
application are installed on the correct device. In this TEE ecosystem,
there often arises a need for an external trusted party to verify the
identity, claims, and rights of TA developers, devices, and their TEEs.
This trusted third party is the Trusted Application Manager (TAM).</t>

<t>The Trusted Execution Environment Provisioning (TEEP) protocol addresses
the following problems:</t>

<t><list style="symbols">
  <t>An installer of an Untrusted Application that depends on a given TA
wants to request installation of that TA in the device’s TEE
so that the Untrusted Application can complete, but the TEE
needs to verify whether such a TA is actually authorized to
run in the TEE and consume potentially scarce TEE resources.</t>
  <t>A TA developer providing a TA whose code itself is considered
confidential wants to determine 
security-relevant information of a device before allowing their
TA to be provisioned to the TEE within the device. An example 
is the verification of 
the type of TEE included in a device and that it is capable of 
providing the security protections required.</t>
  <t>A TEE in a device wants to determine whether an entity
that wants to manage a TA in the device is authorized to manage TAs
in the TEE, and what TAs the entity is permitted to manage.</t>
  <t>A Device Administrator wants to determine if a TA exists (is
installed) on a device (in the TEE), and if not, install the TA in
the TEE.</t>
  <t>A Device Administrator wants to check whether a TA in a
device’s TEE is the most up-to-date version, and if not, update the
TA in the TEE.</t>
  <t>A Device Administrator wants to remove a TA from a device’s TEE if
the TA developer is no longer maintaining that TA, when the TA has
been revoked or is not used for other reasons anymore (e.g., due to an 
expired subscription).</t>
</list></t>

<t>For TEEs that simply verify and load signed TA’s from an untrusted
filesystem, classic application distribution protocols can be used
without modification.  The problems in the bullets above, on the other hand,
require a new protocol, i.e.,
the TEEP protocol, for TEEs that can install and enumerate TAs in a
TEE-secured location and where another domain-specific protocol standard
(e.g., <xref target="GSMA"/>, <xref target="OTRP"/>) that meets the needs is not already in use.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The following terms are used:</t>

<t><list style="symbols">
  <t>Device: A physical piece of hardware that hosts one or more TEEs,
often along with
an REE.</t>
  <t>Device Administrator:  An entity that is responsible for administration
of a device, which could be the Device Owner. A Device Administrator
has privileges on the device to install and remove Untrusted Applications and TAs,
approve or reject Trust Anchors, and approve or reject TA developers,
among possibly other privileges on the device. A Device Administrator can
manage the list of allowed TAMs by modifying the list of Trust
Anchors on the device. Although a Device Administrator may have
privileges and device-specific controls to locally administer a
device, the Device Administrator may choose to remotely
administer a device through a TAM.</t>
  <t>Device Owner: A device is always owned by someone. In some cases, it is common for
the (primary) device user to also own the device, making the device
user/owner also the Device Administrator. In enterprise environments
it is more common for the enterprise to own the device, and any device
user has no or limited administration rights. In this case, the
enterprise appoints a Device Administrator that is not the device
owner.</t>
  <t>Device User: A human being that uses a device. Many devices have
a single device user. Some devices have a primary device user with
other human beings as secondary device users (e.g., parent allowing
children to use their tablet or laptop). Other devices are not used
by a human being and hence have no device user. Relates to Device Owner
and Device Administrator.</t>
  <t>Personalization Data: A set of configuration data that is specific to
   the device or user. The Personalization Data may depend on the type of
   TEE, a particular TEE instance, the TA, and even the user of the device;
   an example of Personalization Data might be a secret symmetric key used
   by a TA to communicate with some service.</t>
  <t>Raw Public Key: The raw public key only consists of the SubjectPublicKeyInfo
   structure of a PKIX certificate <xref target="RFC5280"/> that carries the parameters necessary
   to describe the public key. Other serialization formats that do not 
   rely on ASN.1 may also be used.</t>
  <t>Rich Execution Environment (REE): An environment that is provided
and governed by a typical OS (e.g., Linux, Windows, Android, iOS),
potentially in conjunction with other supporting operating systems
and hypervisors; it is outside of any TEE. This environment and
applications running on it are considered untrusted (or more precisely,
less trusted than a TEE).</t>
  <t>Trust Anchor: As defined in <xref target="RFC6024"/> and <xref target="I-D.ietf-suit-manifest"/>,
“A trust anchor represents an authoritative entity via a public
key and associated data.  The public key is used to verify digital
signatures, and the associated data is used to constrain the types
of information for which the trust anchor is authoritative.”
The Trust Anchor may be a certificate or it may be a raw public key
along with additional data if necessary such as its public key
algorithm and parameters.</t>
  <t>Trust Anchor Store: As defined in <xref target="RFC6024"/>, “A trust anchor
store is a set of one or more trust anchors stored in a device.
A device may have more than one trust anchor store, each of which
may be used by one or more applications.”  As noted in <xref target="I-D.ietf-suit-manifest"/>,
a Trust Anchor Store must resist modification against unauthorized
insertion, deletion, and modification.</t>
  <t>Trusted Application (TA): An application (or, in some implementations, an application component) that runs in a TEE.</t>
  <t>Trusted Application (TA) Developer: An entity that develops one or
more TAs.</t>
  <t>Trusted Component (TA) Signer: An entity that signs a Trusted Component with
a key that a TEE will trust.  The signer might or might not be the
same entity as the TA Developer.  For example, a TA might
be signed (or re-signed) by a Device Administrator if the TEE will
only trust the Device Administrator.  A TA might also be encrypted,
if the code is considered confidential.</t>
  <t>Trusted Application Manager (TAM): An entity that manages Trusted
Components running in TEEs of various devices.</t>
  <t>Trusted Component: A set of code and/or data in a TEE managed as a unit
   by a Trusted Application Manager.  Trusted Applications and
   Personalization Data are thus managed by being included in
   Trusted Components.  Trusted OS code or trusted firmware can also be
   expressed as Trusted Components that a TA depends on.</t>
  <t>Trusted Execution Environment (TEE): An execution environment that enforces that
only authorized code can execute within the TEE, and data used by that
code cannot be read or tampered with by code outside the TEE.
A TEE also generally has a device unique credential that cannot be cloned.
There are multiple technologies that can be used to implement
a TEE, and the level of security achieved varies accordingly.
In addition, TEEs typically use an isolation mechanism between Trusted Applications to ensure
that one TA cannot read, modify or delete the data and code of another
TA.</t>
  <t>Untrusted Application: An application running in an REE. An Untrusted Application 
might depend on one or more TAs.</t>
</list></t>

</section>
<section anchor="use-cases" title="Use Cases">

<section anchor="payment" title="Payment">

<t>A payment application in a mobile device requires high security and
trust in the hosting device. Payments initiated from a mobile
device can use a Trusted Application
to provide strong identification and proof of transaction.</t>

<t>For a mobile payment application, some biometric identification
information could also be stored in a TEE. The mobile payment
application can use such information for unlocking the device and 
for local identification of the user.</t>

<t>A trusted user interface (UI) may be used in a mobile device to
prevent malicious software from stealing sensitive user input data.
Such an implementation often relies on a TEE for providing access 
to peripherals, such as PIN input or a trusted display, so that
the REE cannot observe or tamper with the user input or output.</t>

</section>
<section anchor="authentication" title="Authentication">

<t>For better security of authentication, a device may store its
keys and cryptographic libraries inside a TEE limiting access to 
cryptographic functions via a well-defined interface and thereby 
reducing access to keying material.</t>

</section>
<section anchor="internet-of-things" title="Internet of Things">

<t>The Internet of Things (IoT) has been posing threats to 
critical infrastructure because of weak security in devices.
It is desirable that IoT devices can prevent malware from
manipulating actuators (e.g., unlocking a door), or
stealing or modifying sensitive data, such as authentication credentials
in the device. A TEE can be the best way to implement such IoT
security functions.</t>

</section>
<section anchor="confidential-cloud-computing" title="Confidential Cloud Computing">

<t>A tenant can store sensitive data, such as customer details or credit
card numbers, in a TEE in a cloud computing
server such that only the tenant can access the data, preventing
the cloud hosting provider from accessing the data. A tenant can
run TAs inside a server TEE for secure operation and enhanced
data security. This provides benefits not only to tenants with
better data security but also to cloud hosting providers for reduced
liability and increased cloud adoption.</t>

</section>
</section>
<section anchor="architecture" title="Architecture">

<section anchor="system-components" title="System Components">

<t><xref target="notionalarch"/> shows the main components in a typical device with an REE. Full descriptions of
components not previously defined are provided below. Interactions of
all components are further explained in the following paragraphs.</t>

<figure title="Notional Architecture of TEEP" anchor="notionalarch"><artwork><![CDATA[
   +-------------------------------------------+
   | Device                                    |    Trusted Component
   |                          +--------+       |              Signer
   |    +-------------+       |        |-----------+              |
   |    | TEE-1       |       | TEEP   |---------+ |              |
   |    | +--------+  |  +----| Broker |       | | |  +--------+  |
   |    | | TEEP   |  |  |    |        |<---+  | | +->|        |<-+
   |    | | Agent  |<----+    |        |    |  | |  +-|  TAM-1 |
   |    | +--------+  |       |        |<-+ |  | +->| |        |<-+
   |    |             |       +--------+  | |  |    | +--------+  |
   |    | +---+ +---+ |                   | |  |    | TAM-2  |    |
   |  +-->|TA1| |TA2| |        +-------+  | |  |    +--------+    |
   |  | | |   | |   |<---------| App-2 |--+ |  |                  |
   |  | | +---+ +---+ |    +-------+   |    |  |    Device Administrator
   |  | +-------------+    | App-1 |   |    |  |
   |  |                    |       |   |    |  |
   |  +--------------------|       |---+    |  |
   |                       |       |--------+  |
   |                       +-------+           |
   +-------------------------------------------+
]]></artwork></figure>

<t><list style="symbols">
  <t>Trusted Component Signers and Device Administrators utilize the services
of a TAM to manage TAs on devices. Trusted Component Signers do not directly interact
with devices. Device Administators may elect to use a TAM for remote administration
of TAs instead of managing each device directly.</t>
  <t>Trusted Application Manager (TAM):  A TAM is responsible for performing lifecycle
management activity on Trusted Components on behalf of Trusted Component Signers
and Device Administrators. This includes installation and
deletion of Trusted Components, and may include, for example, over-the-air
updates to keep Trusted Components up-to-date and clean up when one
should be removed. TAMs may provide services that make it easier for
Trusted Component Signers or Device Administators to use the TAM’s service to manage multiple devices,
although that is not required of a TAM.  <vspace blankLines='1'/>
The TAM performs its management of Trusted Components on the device through
interactions with a device’s TEEP Broker, which relays
messages between a TAM and a TEEP Agent running inside the TEE. 
TEEP authentication is performed between a TAM and a TEEP Agent.  <vspace blankLines='1'/>
As shown in
<xref target="notionalarch"/>, the TAM cannot directly contact a TEEP Agent, but must
wait for the TEEP Broker to contact
the TAM requesting a particular service. This architecture is
intentional in order to accommodate network and application firewalls
that normally protect user and enterprise devices from arbitrary
connections from external network entities.  <vspace blankLines='1'/>
A TAM may be publicly available for use by many Trusted Component Signers, or a TAM
may be private, and accessible by only one or a limited number of
Trusted Component Signers. It is expected that many manufacturers and network carriers
will run their own private TAM.  <vspace blankLines='1'/>
A Trusted Component Signer or Device Administrator chooses a particular TAM based on
whether the TAM is trusted by a device or set of devices. The
TAM is trusted by a device if the TAM’s public key is, or chains up to,
an authorized
Trust Anchor in the device. A Trusted Component Signer or Device Administrator may run
their own TAM, but the devices they wish to manage must include
this TAM’s public key or certificate, or a certificate it chains up to, in the
Trust Anchor Store.  <vspace blankLines='1'/>
A Trusted Component Signer or Device Administrator is free to utilize multiple TAMs. This may
be required for managing Trusted Components on multiple different types of devices
from different manufacturers, or mobile devices on
different network carriers, since
the Trust Anchor Store on these different devices may contain different
TAMs. A Device Administrator may be able to add their own TAM’s
public key or certificate to the Trust Anchor Store on all their devices,
overcoming this limitation.  <vspace blankLines='1'/>
Any entity is free to operate a TAM. For a TAM to be successful, it must
have its public key or certificate installed in a device’s Trust Anchor Store.
A TAM may set up a relationship with device manufacturers or network carriers
to have them install the TAM’s keys in their device’s Trust Anchor Store.
Alternatively, a TAM may publish its certificate and allow Device
Administrators to install the TAM’s certificate in their devices as
an after-market-action.</t>
  <t>TEEP Broker: A TEEP Broker is an application component running in a Rich
Execution Environment (REE) that enables the message protocol exchange between
a TAM and a TEE in a device. A TEEP Broker does not process messages
on behalf of a TEE, but merely is responsible for relaying messages from
the TAM to the TEE, and for returning the TEE’s responses to the TAM.
In devices with no REE (e.g., a microcontroller where all code runs
in an environment that meets the definition of a Trusted Execution
Environment in <xref target="terminology"/>), the TEEP Broker would be absent and
instead the
TEEP protocol transport would be implemented inside the TEE itself.</t>
  <t>TEEP Agent: The TEEP Agent is a processing module running inside
a TEE that receives TAM requests (typically relayed via a TEEP Broker
that runs in an REE). A TEEP Agent in the TEE may parse requests or
forward requests to other processing modules in a TEE, which is
up to a TEE provider’s implementation. A response message
corresponding to a TAM request is sent back to the TAM, again typically
relayed via a TEEP Broker.</t>
  <t>Certification Authority (CA): A CA is an entity that issues digital 
certificates (especially X.509 certificates) and vouches for the 
binding between the data items in a certificate <xref target="RFC4949"/>. 
Certificates are then used for authenticating a device, a TAM, or a 
Trusted Component Signer, as discussed in <xref target="trustanchors"/>.  The CAs do not need to be the same;
different CAs can be chosen by each TAM, and different device CAs
can be used by different device manufacturers.</t>
</list></t>

</section>
<section anchor="multiple-tees-in-a-device" title="Multiple TEEs in a Device">

<t>Some devices might implement multiple TEEs. 
In these cases, there might be one shared TEEP Broker 
that interacts with all the TEEs in the device.
However, some TEEs (for example, SGX <xref target="SGX"/>) present themselves as separate containers
within memory without a controlling manager within the TEE. As such,
there might be multiple TEEP Brokers in the REE,
where each TEEP Broker communicates with one or more TEEs associated with it.</t>

<t>It is up to the REE and the Untrusted Applications
how they select the correct TEEP Broker. Verification that the correct TA
has been reached then becomes a matter of properly verifying TA attestations,
which are unforgeable.</t>

<t>The multiple TEEP Broker approach is shown in the diagram below.
For brevity, TEEP Broker 2 is shown interacting with only one TAM and Untrusted Application and only one TEE, but
no such limitations are intended to be implied in the architecture.</t>

<figure title="Notional Architecture of TEEP with multiple TEEs" anchor="notionalarch2"><artwork><![CDATA[
   +-------------------------------------------+            Trusted
   | Device                                    |          Component
   |                                           |             Signer
   |    +-------------+                        |                  |
   |    | TEE-1       |                        |                  |
   |    | +-------+   |       +--------+       |      +--------+  |
   |    | | TEEP  |   |       | TEEP   |------------->|        |<-+
   |    | | Agent |<----------| Broker |       |      |        | TA 
   |    | | 1     |   |       | 1      |---------+    |        |
   |    | +-------+   |       |        |       | |    |        |
   |    |             |       |        |<---+  | |    |        |
   |    | +---+ +---+ |       |        |    |  | |  +-|  TAM-1 |Policy
   |    | |TA1| |TA2| |       |        |<-+ |  | +->| |        |<-+
   |  +-->|   | |   |<---+    +--------+  | |  |    | +--------+  |
   |  | | +---+ +---+ |  |                | |  |    | TAM-2  |    |
   |  | |             |  |     +-------+  | |  |    +--------+    |
   |  | +-------------+  +-----| App-2 |--+ |  |       ^          |
   |  |                    +-------+   |    |  |       |       Device
   |  +--------------------| App-1 |   |    |  |       |   Administrator
   |                +------|       |   |    |  |       |
   |    +-----------|-+    |       |---+    |  |       |
   |    | TEE-2     | |    |       |--------+  |       |
   |    | +------+  | |    |       |------+    |       |
   |    | | TEEP |  | |    +-------+      |    |       |
   |    | | Agent|<-----+                 |    |       |
   |    | | 2    |  | | |                 |    |       |
   |    | +------+  | | |                 |    |       |
   |    |           | | |                 |    |       |
   |    | +---+     | | |                 |    |       |
   |    | |TA3|<----+ | |  +----------+   |    |       |
   |    | |   |       | |  | TEEP     |<--+    |       |
   |    | +---+       | +--| Broker   |        |       |
   |    |             |    | 2        |----------------+
   |    +-------------+    +----------+        |
   |                                           |
   +-------------------------------------------+
]]></artwork></figure>

<t>In the diagram above, TEEP Broker 1 controls interactions with the TAs in TEE-1,
and TEEP Broker 2 controls interactions with the TAs in TEE-2. This presents some
challenges for a TAM in completely managing the device, since a TAM may not
interact with all the TEEP Brokers on a particular platform. In addition, since
TEEs may be physically separated, with wholly different resources, there may be no
need for TEEP Brokers to share information on installed Trusted Components or resource usage.</t>

</section>
<section anchor="multiple-tams-and-relationship-to-tas" title="Multiple TAMs and Relationship to TAs">

<t>As shown in <xref target="notionalarch2"/>, a TEEP Broker provides communication between 
one or more TEEP Agents and
one or more TAMs. The selection of which TAM to communicate with might be
made with or without input from an Untrusted Application, but is ultimately
the decision of a TEEP Agent.</t>

<t>A TEEP Agent is assumed to be able to determine, for any given Trusted Component,
whether that Trusted Component is installed (or minimally, is running) in a TEE with
which the TEEP Agent is associated.</t>

<t>Each Trusted Component is digitally signed, protecting its integrity, and linking
the Trusted Component back to the Trusted Component Signer. The Trusted Component Signer is often the TA Developer, but in
some cases might be another party such as a Device Administrator
or other party
to whom the code has been licensed (in which case the same code might
be signed by multiple licensees and distributed as if it were different TAs).</t>

<t>A Trusted Component Signer selects one or more TAMs and communicates the Trusted Component(s) to the TAM.
For example, the Trusted Component Signer might choose TAMs based upon the markets into which the TAM can provide access. There
may be TAMs that provide services to specific types of devices, or device
operating systems, or specific geographical regions or network carriers. A Trusted Component Signer may be
motivated to utilize multiple TAMs in order to maximize market penetration
and availability on multiple types of devices. This means that the same Trusted Component
will often be available through multiple TAMs.</t>

<t>When the developer of an Untrusted Application that depends on a Trusted Component publishes
the Untrusted Application to an app store or other app repository, the developer
optionally binds the Untrusted Application with a manifest that identifies
what TAMs can be contacted for
the Trusted Component. In some situations, a Trusted Component may only be available via a single TAM - this is likely the case
for enterprise applications or Trusted Component Signers serving a closed community. For broad public apps,
there will likely be multiple TAMs in the Untrusted Application’s manifest - one servicing one brand of mobile
device and another servicing a different manufacturer, etc. Because different devices
and different manufacturers trust different TAMs, the manifest can include multiple
TAMs that support the required Trusted Component.</t>

<t>When a TEEP Broker receives a request (see the RequestTA API in <xref target="apis"/>) from an Untrusted Application to install a Trusted Component,
a list of TAM URIs may be provided for that Trusted Component, and the request is passed to the TEEP Agent.
If the TEEP Agent decides that the Trusted Component needs to be installed, the TEEP Agent selects a single TAM URI
that is consistent with the list of trusted TAMs provisioned in the TEEP Agent, invokes the
HTTP transport for TEEP to connect to the TAM URI, and begins a TEEP protocol exchange.  When the TEEP Agent
subsequently receives the Trusted Component to install and the Trusted Component’s manifest indicates dependencies
on any other trusted components, each dependency can include a list of TAM URIs for the
relevant dependency.  If such dependencies exist that are prerequisites to install the Trusted Component,
then the TEEP Agent recursively follows the same procedure for each dependency that needs to be installed
or updated, including selecting a TAM URI that is consistent with the list of trusted TAMs provisioned
on the device, and beginning a TEEP exchange.  If multiple TAM URIs are considered trusted,
only one needs to be contacted and they can be attempted in some order until one responds.</t>

<t>Separate from the Untrusted Application’s manifest, this framework relies on the use of the manifest 
format in <xref target="I-D.ietf-suit-manifest"/> for expressing how to install a Trusted Component, as well as any
dependencies on other TEE components and versions.
That is, dependencies from Trusted Components on other Trusted Components can be expressed in a SUIT manifest,
including dependencies on any other TAs, or trusted OS code (if any), or trusted firmware.
Installation steps can also be expressed in a SUIT manifest.</t>

<t>For example, TEEs compliant
with GlobalPlatform may have a notion of a “security domain” (which is a grouping of
one or more TAs installed on a device, that can share information within such a group)
that must be created and into which one or more TAs can then be installed. It is thus up
to the SUIT manifest to express a dependency on having such a security domain existing
or being created first, as appropriate.</t>

<t>Updating a Trusted Component may cause compatibility issues with any Untrusted Applications or other
components that depend on the updated Trusted Component, just like updating the OS or a shared library
could impact an Untrusted Application.  Thus, an implementation needs to take into
account such issues.</t>

</section>
<section anchor="untrusted-apps-trusted-apps-and-personalization-data" title="Untrusted Apps, Trusted Apps, and Personalization Data">

<t>In TEEP, there is an explicit relationship and dependence between an Untrusted Application
in an REE and one or more TAs in a TEE, as shown in <xref target="notionalarch2"/>.
For most purposes, an Untrusted Application that uses one or more TAs in a TEE
appears no different from any other Untrusted Application in the REE. However, the way
the Untrusted Application and its corresponding TAs are packaged, delivered, and installed on
the device can vary. The variations depend on whether the Untrusted Application and TA are bundled
together or are provided separately, and this has implications to the management of
the TAs in a TEE. In addition to the Untrusted Application and TA(s), the TA(s) and/or TEE may also require additional data to personalize the TA to the device or a user.
Implementations must support encryption of such
Personalization Data to preserve the confidentiality of potentially
sensitive data contained within it and support integrity protection
of the Personalization Data.
Other than the requirement to support confidentiality and integrity protection,
the TEEP architecture places no limitations or requirements on the Personalization Data.</t>

<t>There are three possible cases for bundling of an Untrusted Application, TA(s), and Personalization Data:</t>

<t><list style="numbers">
  <t>The Untrusted Application, TA(s), and Personalization Data are all bundled together in a single
package by a Trusted Component Signer and either provided to the TEEP Broker through the TAM, or provided separately (with encrypted Personalization Data), with
key material needed to decrypt and install the Personalization
Data and TA provided by a TAM.</t>
  <t>The Untrusted Application and the TA(s) are bundled together in a single package, which a TAM or
a publicly accessible app store maintains, and the Personalization Data
is separately provided by the Trusted Component Signer’s TAM.</t>
  <t>All components are independent. The Untrusted Application is installed through some
independent or device-specific mechanism, and the TAM provides the TA and Personalization
Data from the Trusted Component Signer. Delivery of the TA and Personalization Data may be combined or separate.</t>
</list></t>

<t>The TEEP protocol can treat each TA, any dependencies the TA has, and Personalization Data as
separate Trusted Components with separate installation steps that are expressed in SUIT manifests,
and a SUIT manifest might contain or reference multiple binaries (see <xref target="I-D.ietf-suit-manifest"/>
for more details). The TEEP Agent is responsible for handling any installation steps
that need to be performed inside the TEE, such as decryption of private TA binaries or
Personalization Data.</t>

<t>In order to better understand these cases, it is helpful to review actual implementations of TEEs and their application delivery mechanisms.</t>

<section anchor="example-application-delivery-mechanisms-in-intel-sgx" title="Example: Application Delivery Mechanisms in Intel SGX">

<t>In Intel Software Guard Extensions (SGX), the Untrusted Application and TA are typically bundled into the
same package (Case 2). The TA 
exists in the package as a shared library (.so or .dll). The Untrusted Application loads the TA into
an SGX enclave when the Untrusted Application needs the TA. This organization makes it easy to maintain
compatibility between the Untrusted Application and the TA, since they are updated together. It is
entirely possible to create an Untrusted Application that loads an external TA into an SGX enclave, and
use that TA (Case 3). In this case, the Untrusted Application would require a reference to an external
file or download such a file dynamically, place the contents of the file into memory, and
load that as a TA. Obviously, such file or downloaded content must be properly formatted
and signed for it to be accepted by the SGX TEE. In SGX, for Case 2 and Case 3, the
Personalization Data is normally loaded into the SGX enclave (the TA) after the TA has
started. Although Case 1 is possible with SGX, there are no instances of this known to
be in use at this time, since such a construction would require a special installation
program and SGX TA to receive the encrypted binary, decrypt it, separate it into the
three different elements, and then install all three. This installation is complex
because the Untrusted Application decrypted inside the TEE must be passed out of the TEE to an
installer in the REE which would install the Untrusted Application; this assumes that the Untrusted
Application package includes the TA code also, since otherwise there is a significant problem in getting
the SGX enclave code (the TA) from the TEE, through the installer, and into the Untrusted Application
in a trusted fashion. Finally, the Personalization Data would need to be sent out of the
TEE (encrypted in an SGX enclave-to-enclave manner) to the REE’s installation app, which
would pass this data to the installed Untrusted Application, which would in turn send this data
to the SGX enclave (TA). This complexity is due to the fact that each SGX enclave is separate
and does not have direct communication to other SGX enclaves.</t>

<t>As long as signed files (TAs and/or Personalization Data) are installed into
an untrusted filesystem and trust is verified by the TEE at load time, classic
distribution mechanisms can be used.  Some uses of SGX, however, allow a model
where a TA can be dynamically installed into an SGX enclave that
provides a runtime platform.  The TEEP protocol can be used in
such cases, where the runtime platform could include a TEEP Agent.</t>

</section>
<section anchor="example-application-delivery-mechanisms-in-arm-trustzone" title="Example: Application Delivery Mechanisms in Arm TrustZone">

<t>In Arm TrustZone <xref target="TrustZone"/> for A-class devices, the Untrusted Application and TA may or may not be
bundled together. This differs from SGX since in TrustZone the TA lifetime is not inherently tied
to a specific Untrused Application process lifetime as occurs in SGX.  A TA is loaded by
a trusted OS running in the TEE such as a GlobalPlatform compliant TEE, where the trusted OS is 
separate from the OS in the REE.
Thus Cases 2 and 3 are equally applicable.  In addition, it is possible for TAs to communicate
with each other without involving any Untrusted Application, and so the complexity of Case 1
is lower than in the SGX example.  Thus, Case 1 is possible as well, though still more
complex than Cases 2 and 3.</t>

<t>TEE OS’s (e.g., OP-TEE) that support loading and verifying signed TAs from
an untrusted filesystem can, like SGX, use classic file distribution
mechanisms.  If secure TA storage is used (e.g., a Replay-Protected
Memory Block device) on the other hand, the TEEP protocol can be used
to manage such storage.</t>

</section>
</section>
<section anchor="entity-relations" title="Entity Relations">

<t>This architecture leverages asymmetric cryptography to
authenticate a device to a TAM. Additionally, a TEEP Agent
in a device authenticates a TAM. The
provisioning of Trust Anchors to a device may be different from
one use case to the other. A Device Administrator may want to
have the capability to control what TAs are allowed.
A device manufacturer enables verification by one or more TAMs and by Trusted Component Signers; 
it may embed a list of default Trust Anchors into the TEEP Agent
and TEE for TAM trust verification and TA signature verification.</t>

<figure title="Example Developer Experience" anchor="experience"><artwork><![CDATA[
 (App Developers)   (App Store)   (TAM)      (Device with TEE)  (CAs)
        |                   |       |                |            |
        |                   |       |      (Embedded TEE cert) <--|
        |                   |       |                |            |
        | <--- Get an app cert -----------------------------------|
        |                   |       |                |            |
        |                   |       | <-- Get a TAM cert ---------|
        |                   |       |                |            |
1. Build two apps:          |       |                |            |
                            |       |                |            |
   (a) Untrusted            |       |                |            |
       App - 2a. Supply --> | --- 3. Install ------> |            |
                            |       |                |            |
   (b) TA -- 2b. Supply ----------> | 4. Messaging-->|            |
                            |       |                |            |
]]></artwork></figure>

<t><xref target="experience"/> shows an example where the same developer builds and signs
two applications: (a) an Untrusted Application; (b) a TA
that provides some security functions to be run inside
a TEE.  This example assumes that the developer, the TEE, and the TAM have
previously been provisioned with certificates.</t>

<t>At step 1, the developer authors the two applications.</t>

<t>At step 2, the developer uploads the
Untrusted Application (2a) to an Application Store. 
In this example, the developer is also the Trusted Component Signer, and so generates
a signed TA.
The developer can then either bundle the signed TA
with the Untrusted Application, or the developer can provide a signed Trusted Component containing the TA
to a TAM that will be managing the TA in various devices.</t>

<t>At step 3, a user
will go to an Application Store to download the Untrusted
Application (where the arrow indicates the direction of data transfer).</t>

<t>At step 4, since the Untrusted Application depends on the TA,
installing the Untrusted Application will trigger TA installation
by initiating communication with a TAM. The TEEP Agent
will interact with TAM via a TEEP Broker that faciliates communications between a TAM
and the TEEP Agent in TEE.</t>

<t>Some Trusted Component installation implementations might ask for a user’s consent. In other
implementations,
a Device Administrator might choose what Untrusted Applications and related Trusted Components to
be installed. A user consent flow is out of scope of the TEEP architecture.</t>

<t>The main components consist of a set of standard messages created by
a TAM to deliver Trusted Component management commands to a device,
and device attestation and response messages created by a TEE that
responds to a TAM’s message.</t>

<t>It should be noted that network communication capability is generally
not available in TAs in today’s TEE-powered devices.  Consequently, Trusted
Applications generally rely on broker in the REE to provide access to
network functionality in the REE.  A broker does not need to know the actual
content of messages to facilitate such access.</t>

<t>Similarly, since the TEEP Agent runs inside a TEE, the TEEP Agent generally
relies on a TEEP Broker in the REE to provide network access, and relay
TAM requests to the TEEP Agent and relay the responses back to the TAM.</t>

</section>
</section>
<section anchor="trustanchors" title="Keys and Certificate Types">

<t>This architecture leverages the following credentials, which allow
delivering end-to-end security between a TAM and a TEEP Agent.</t>

<t><xref target="keys"/> summarizes the relationships between various keys and where
they are stored.  Each public/private key identifies a Trusted Component Signer, TAM, or TEE,
and gets a certificate that chains up to some trust anchor.  A list of trusted
certificates is then used to check a presented certificate against.</t>

<t>Different CAs can be used for different
types of certificates.  TEEP messages are always signed, where the signer
key is the message originator’s private key, such as that of a TAM
or a TEE.  In addition to the keys shown in <xref target="keys"/>,
there may be additional keys used for attestation.  Refer to the 
RATS Architecture <xref target="I-D.ietf-rats-architecture"/> for more discussion.</t>

<figure title="Signature Keys" anchor="keys"><artwork><![CDATA[
                    Cardinality &                    Location of
                     Location of    Private Key     Trust Anchor
Purpose              Private Key       Signs           Store
------------------   -----------   -------------    -------------
Authenticating TEE    1 per TEE    TEEP responses       TAM

Authenticating TAM    1 per TAM    TEEP requests     TEEP Agent

Code Signing          1 per Trusted  TA binary          TEE
                      Component
                      Signer
]]></artwork></figure>

<t>Note that Personalization Data is not included in the table above. 
The use of Personalization Data is dependent on how TAs are used 
and what their security requirements are.</t>

<t>TEEP requests from a TAM to a TEEP Agent are signed with the TAM
private key (for authentication and integrity protection). 
Personalization Data and TA binaries can be encrypted with a key 
that is established with a content-encryption key established with 
the TEE public key (to provide confidentiality). Conversely, 
TEEP responses from a TEEP Agent to a TAM can be signed with the TEE 
private key.</t>

<t>The TEE key pair and certificate are thus used for authenticating the TEE
to a remote TAM, and for sending private data to the TEE.  Often, 
the key pair is burned into the TEE by the
TEE manufacturer and the key pair and its certificate are valid for
the expected lifetime of the TEE.  A TAM provider is responsible
for configuring the TAM’s Trust Anchor Store with the manufacturer certificates or CAs
that are used to sign TEE keys. This is discussed further in
<xref target="trust-anchors-in-tam"/> below.</t>

<t>The TAM key pair and certificate are used for authenticating a TAM
to a remote TEE, and for sending private data to the TAM.  A TAM provider
is responsible for acquiring a
certificate from a CA that is trusted by the TEEs it manages. This
is discussed further in <xref target="trust-anchors-in-teep-agent"/> below.</t>

<t>The Trusted Component Signer key pair and certificate are used to sign Trusted Components that the TEE
will consider authorized to execute.  TEEs must be configured with
the certificates or keys that it considers authorized to sign TAs
that it will execute.  This is discussed further in
<xref target="trust-anchors-in-tee"/> below.</t>

<section anchor="trust-anchors-in-teep-agent" title="Trust Anchors in a TEEP Agent">

<t>A TEEP Agent’s Trust Anchor Store contains a list of Trust Anchors, which
are CA certificates that sign various TAM certificates.  The list
is typically preloaded at manufacturing time, and
can be updated using the TEEP protocol if the TEE has some form of
“Trust Anchor Manager TA” that has Trust Anchors in its configuration data.
Thus, Trust Anchors can be updated similar to updating the Personalization Data
for any other TA.</t>

<t>When Trust Anchor update is carried out, it is imperative that any update
must maintain integrity where only an authentic Trust Anchor list from
a device manufacturer or a Device Administrator is accepted. Details
are out of scope of the architecture and can be addressed in a protocol
document.</t>

<t>Before a TAM can begin operation in the marketplace to support a
device with a particular TEE, it must obtain a TAM
certificate from a CA or the raw public key of a TAM that is listed in 
the Trust Anchor Store of the TEEP Agent.</t>

</section>
<section anchor="trust-anchors-in-tee" title="Trust Anchors in a TEE">

<t>A TEE determines whether TA binaries are allowed to execute by 
verifying whether their signature can be verified using certificate(s) or raw public key(s)
in the TEE’s Trust Anchor Store. The list
is typically preloaded at manufacturing time, and
can be updated using the TEEP protocol if the TEE has some form of
“Trust Anchor Manager TA” that has Trust Anchors in its configuration data.
Thus, Trust Anchors can be updated similar to updating the Personalization Data
for any other TA, as discussed in <xref target="trust-anchors-in-teep-agent"/>.</t>

</section>
<section anchor="trust-anchors-in-tam" title="Trust Anchors in a TAM">

<t>The Trust Anchor Store in a TAM consists of a list of Trust Anchors, which
are certificates that sign various device TEE certificates.  A TAM will accept a
device for Trusted Component management if the TEE in the device uses a TEE certificate
that is chained to a certificate or raw public key that the TAM trusts, is contained in an allow list, 
is not found on a block list, and/or fulfills any other policy criteria.</t>

</section>
<section anchor="scalability" title="Scalability">

<t>This architecture uses a PKI (including self-signed certificates). Trust Anchors exist on the devices to
enable the TEE to authenticate TAMs and Trusted Component Signers, and TAMs use Trust Anchors to
authenticate TEEs.  When a PKI is used, many intermediate CA
certificates can chain to a root certificate, each of which can issue
many certificates.  This makes the protocol highly scalable.  New
factories that produce TEEs can join the ecosystem.  In this case,
such a factory can get an intermediate CA certificate from one of the
existing roots without requiring that TAMs are updated with
information about the new device factory.  Likewise, new TAMs can
join the ecosystem, providing they are issued a TAM certificate that
chains to an existing root whereby existing TEEs will be allowed to
be personalized by the TAM without requiring changes to the TEE
itself.  This enables the ecosystem to scale, and avoids the need for
centralized databases of all TEEs produced or all TAMs that exist or
all Trusted Component Signers that exist.</t>

</section>
<section anchor="message-security" title="Message Security">

<t>Messages created by a TAM are used to deliver Trusted Component
management commands to a device, and device attestation and
messages created by the device TEE to respond to TAM messages.</t>

<t>These messages are signed end-to-end between a TEEP Agent and a TAM.
Confidentiality is provided by encrypting sensitive payloads (such as
Personalization Data and attestation evidence), rather than encrypting the
messages themselves.  Using encrypted payloads is important to ensure
that only the targeted device TEE or TAM is able to decrypt and view
the actual content.</t>

</section>
</section>
<section anchor="broker" title="TEEP Broker">

<t>A TEE and TAs often do not have the capability to directly communicate
outside of the hosting device.  For example, GlobalPlatform
<xref target="GPTEE"/> specifies one such architecture.  This calls for a software
module in the REE world to handle network communication with a TAM.</t>

<t>A TEEP Broker is an application component
running in the REE of the device or an SDK that facilitates
communication between a TAM and a TEE.  It also provides interfaces for
Untrusted Applications to query and trigger installation of Trusted Components that the
application needs to use.</t>

<t>An Untrusted Application might communicate with a TEEP Broker at runtime
to trigger Trusted Component installation itself, or an Untrusted Application might simply
have a metadata file that describes the Trusted Components it depends on and the associated TAM(s) for each Trusted Component,
and an REE Application Installer can inspect this
application metadata file and invoke the TEEP Broker to trigger Trusted Component installation
on behalf of the Untrusted
Application without requiring the Untrusted Application to run first.</t>

<section anchor="role-of-the-teep-broker" title="Role of the TEEP Broker">

<t>A TEEP Broker abstracts the message exchanges with a TEE in a device.
The input data is originated from a TAM or the first initialization
call to trigger a Trusted Component installation.</t>

<t>The Broker doesn’t need to parse a message content received from a TAM
that should be processed by a TEE (see the ProcessTeepMessage API in <xref target="apis"/>).
When a device has more than one TEE, one TEEP Broker per TEE could
be present in the REE. A TEEP Broker interacts with a TEEP Agent inside
a TEE.</t>

<t>A TAM message may indicate the target TEE where a Trusted Component should be installed.
A compliant TEEP protocol should include a target TEE identifier for a
TEEP Broker when multiple TEEs are present.</t>

<t>The Broker relays the response messages generated from a TEEP Agent in a TEE
to the TAM.</t>

<t>The Broker only needs to return a (transport) error message if the TEE is
not reachable for some reason.  Other errors are represented as
response messages returned from the TEE which will then be passed to
the TAM.</t>

</section>
<section anchor="teep-broker-implementation-consideration" title="TEEP Broker Implementation Consideration">

<t>As depicted in <xref target="broker-models"/>, there are multiple ways in which a TEEP Broker
can be implemented, with more or fewer layers being inside the TEE.  For example, in
model A, the model with the smallest TEE footprint, only the TEEP implementation is inside
the TEE, whereas the TEEP/HTTP implementation is in the TEEP Broker outside the TEE.</t>

<figure title="TEEP Broker Models" anchor="broker-models"><artwork><![CDATA[
                        Model:    A      B      C     ...

                                 TEE    TEE    TEE
     +----------------+           |      |      |
     |      TEEP      |     Agent |      |      | Agent
     | implementation |           |      |      |
     +----------------+           v      |      |
              |                          |      |
     +----------------+           ^      |      |
     |    TEEP/HTTP   |    Broker |      |      |
     | implementation |           |      |      |
     +----------------+           |      v      |
              |                   |             |
     +----------------+           |      ^      |
     |      HTTP      |           |      |      |
     | implementation |           |      |      |
     +----------------+           |      |      v
              |                   |      |
     +----------------+           |      |      ^
     |   TCP or QUIC  |           |      |      | Broker
     | implementation |           |      |      |
     +----------------+           |      |      |
                                 REE    REE    REE
]]></artwork></figure>

<t>In other models, additional layers are moved into the TEE, increasing the TEE footprint,
with the Broker either containing or calling the topmost protocol layer outside of the TEE.
An implementation is free to choose any of these models.</t>

<t>TEEP Broker implementers should consider methods of distribution, scope and
   concurrency on devices and runtime options.</t>

<section anchor="apis" title="TEEP Broker APIs">

<t>The following conceptual APIs exist from a TEEP Broker to a TEEP Agent:</t>

<t><list style="numbers">
  <t>RequestTA: A notification from an REE application (e.g., an installer,
or an Untrusted Application) that it depends on a given Trusted Component, which may or may not
already be installed in the TEE.</t>
  <t>UnrequestTA: A notification from an REE application (e.g., an installer,
or an Untrusted Application) that it no longer depends on a given
Trusted Component, which may or may not already be installed in the TEE. 
For example, if the Untrusted Application is uninstalled, the uninstaller
might invoke this conceptual API.</t>
  <t>ProcessTeepMessage: A message arriving from the network, to be delivered
to the TEEP Agent for processing.</t>
  <t>RequestPolicyCheck: A hint (e.g., based on a timer) that the TEEP Agent
may wish to contact the TAM for any changes, without the device itself
needing any particular change.</t>
  <t>ProcessError: A notification that the TEEP Broker could not deliver an outbound
TEEP message to a TAM.</t>
</list></t>

<t>For comparison, similar APIs may exist on the TAM side, where a Broker may or may not
exist, depending on whether the TAM uses a TEE or not:</t>

<t><list style="numbers">
  <t>ProcessConnect: A notification that an incoming TEEP session is being requested by a TEEP Agent.</t>
  <t>ProcessTeepMessage: A message arriving from the network, to be delivered
to the TAM for processing.</t>
</list></t>

<t>For further discussion on these APIs, see <xref target="I-D.ietf-teep-otrp-over-http"/>.</t>

</section>
<section anchor="teep-broker-distribution" title="TEEP Broker Distribution">

<t>The Broker installation is commonly carried out at OEM time. A user
can dynamically download and install a Broker on-demand.</t>

</section>
</section>
</section>
<section anchor="attestation" title="Attestation">
<t>Attestation is the process through which one entity (an Attester) presents “evidence”, in the form
of a series of claims, to another entity (a Verifier), and provides sufficient proof that the claims
are true. Different Verifiers may require different degrees of confidence in attestation proofs
and not all attestations are acceptable to every verifier.  A third entity (a Relying Party)
can then use “attestation results”, in the form of another series of claims, from a Verifier
to make authorization decisions.  (See <xref target="I-D.ietf-rats-architecture"/> for more discussion.)</t>

<t>In TEEP, as depicted in <xref target="attestation-roles"/>,
the primary purpose of an attestation is to allow a device (the Attester) to prove to a TAM
(the Relying Party) that a TEE in the device has particular properties, was built by a particular
manufacturer, and/or is executing a particular TA. Other claims are possible; TEEP
does not limit the claims that may appear in evidence or attestation results,
but defines a minimal set of attestation result claims
required for TEEP to operate properly. Extensions to these claims are possible.
Other standards or groups may define the format and semantics
of extended claims.</t>

<figure title="TEEP Attestation Roles" anchor="attestation-roles"><artwork><![CDATA[
   +----------------+
   | Device         |            +----------+            
   | +------------+ |  Evidence  |   TAM    |   Evidence    +----------+
   | |     TEE    |------------->| (Relying |-------------->| Verifier |
   | | (Attester) | |            |  Party)  |<--------------|          |
   | +------------+ |            +----------+  Attestation  +----------+
   +----------------+                             Result
]]></artwork></figure>

<t>As of the writing of this specification, device and TEE attestations have not been standardized
across the market. Different devices, manufacturers, and TEEs support different attestation
protocols. In order for TEEP to be inclusive, it is agnostic to the format of evidence,
allowing proprietary or standardized formats to be used between a TEE and a verifier (which may or may not
be colocated in the TAM), as long as the format supports encryption of
any information that is considered sensitive.</t>

<t>However, it should be recognized
that not all Verifiers may be able to process all proprietary forms of attestation evidence.
Similarly, the TEEP protocol is agnostic as to the format of attestation results, and the protocol
(if any) used between the TAM and a verifier, as long as they convey at least the required set of claims
in some format. Note that the respective attestation algorithms are not defined in the TEEP protocol itself; see <xref target="I-D.ietf-rats-architecture"/> and <xref target="I-D.ietf-teep-protocol"/> for more discussion.</t>

<t>There are a number of considerations that need to be considered when appraising
evidence provided by a TEE, including:</t>

<t><list style="symbols">
  <t>What security measures a manufacturer takes when provisioning keys into devices/TEEs;</t>
  <t>What hardware and software components have access to the attestation keys of the TEE;</t>
  <t>The source or local verification of claims within an attestation prior to a TEE signing a set of claims;</t>
  <t>The level of protection afforded to attestation keys against exfiltration, modification, and side channel attacks;</t>
  <t>The limitations of use applied to TEE attestation keys;</t>
  <t>The processes in place to discover or detect TEE breaches; and</t>
  <t>The revocation and recovery process of TEE attestation keys.</t>
</list></t>

<t>Some TAMs may require additional claims in order to properly authorize a device or TEE.  The specific
format for these additional claims are outside the scope of this specification, but the TEEP protocol
allows these additional claims to be included in the attestation messages.</t>

<t>For more discussion of the attestation and appraisal process, see
the RATS Architecture <xref target="I-D.ietf-rats-architecture"/>.</t>

<t>The following information is required for TEEP attestation:</t>

<t><list style="symbols">
  <t>Device Identifying Information: Attestation information may need to uniquely identify a device to the TAM.
Unique device identification allows the TAM to provide services to the device, such as managing installed
TAs, and providing subscriptions to services, and locating device-specific keying material to
communicate with or authenticate the device. In some use cases it may be sufficient to identify 
only the class of the device. The security and privacy requirements regarding device identification 
will vary with the type of TA provisioned to the TEE.</t>
  <t>TEE Identifying Information: The type of TEE that generated this attestation must be identified.
This includes version identification information for hardware, firmware, and software version of the TEE, as applicable by the
TEE type. TEE manufacturer information for the TEE is
required in order to disambiguate the same TEE type created by different manufacturers and
address considerations around manufacturer provisioning, keying and support for the TEE.</t>
  <t>Freshness Proof: A claim that includes freshness information must be included, such as a nonce
or timestamp.</t>
</list></t>

</section>
<section anchor="algorithm-and-attestation-agility" title="Algorithm and Attestation Agility">

<t>RFC 7696 <xref target="RFC7696"/> outlines the requirements to migrate from one
mandatory-to-implement cryptographic algorithm suite to another over time.
This feature is also known as crypto agility. Protocol evolution
is greatly simplified when crypto agility is considered
during the design of the protocol. In the case of the TEEP
protocol the diverse range of use cases, from trusted app
updates for smart phones and tablets to updates of code on
higher-end IoT devices, creates the need for different
mandatory-to-implement algorithms already from the start.</t>

<t>Crypto agility in TEEP concerns the use of symmetric as well as asymmetric 
algorithms. In the context of TEEP, symmetric algorithms are used for 
encryption and integrity protection of TA binaries and Personalization Data 
whereas the asymmetric algorithms are used for signing messages and managing 
symmetric keys.</t>

<t>In addition to the use of cryptographic algorithms in TEEP, there
is also the need to make use of different attestation technologies.
A device must provide techniques to inform a TAM about the
attestation technology it supports. For many deployment cases it
is more likely for the TAM to support one or more attestation
techniques whereas the device may only support one.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<section anchor="broker-trust-model" title="Broker Trust Model">

<t>The architecture enables the TAM to communicate, via a TEEP Broker, with the device’s TEE
to manage Trusted Components.  Since the TEEP Broker runs in a potentially vulnerable REE,
the TEEP Broker could, however, be (or be infected by) malware.
As such, all TAM messages are signed and sensitive
data is encrypted such that the TEEP Broker cannot modify or capture
sensitive data, but the TEEP Broker can still conduct DoS attacks
as discussed in <xref target="compromised-ree"/>.</t>

<t>A TEEP Agent in a TEE is responsible for protecting against potential attacks
from a compromised 
TEEP Broker or rogue malware in the REE. A rogue TEEP Broker
might send corrupted data to the TEEP Agent, or launch a DoS attack by sending a flood
of TEEP protocol requests. The TEEP Agent validates the signature of each TEEP protocol request
and checks the signing certificate against its Trust Anchors. To mitigate
DoS attacks, it might also add some protection
scheme such as a threshold on repeated requests or number of TAs that can be installed.</t>

</section>
<section anchor="data-protection" title="Data Protection">

<t>It is the responsibility of the TAM to protect data on its servers.
Similarly, it is the responsibility of the TEE implementation to provide protection of
data against integrity and confidentiality attacks from outside the TEE.
TEEs that provide isolation among TAs within the TEE are likewise
responsible for protecting TA data against the REE and other TAs.
For example, this can be used to protect one user’s or tenant’s data
from compromise by another user or tenant, even if the attacker has TAs.</t>

<t>The protocol between TEEP Agents and TAMs similarly is responsible for
securely providing integrity and confidentiality protection against
adversaries between them. Since the transport protocol under the TEEP
protocol might be implemented outside a TEE, as discussed in <xref target="broker"/>,
it cannot be relied upon for sufficient protection.  The TEEP protocol
provides integrity protection, but confidentiality must be provided by
payload encryption, i.e., using encrypted TA binaries and encrypted
attestation information.  See <xref target="I-D.ietf-teep-protocol"/> for more
discussion.</t>

</section>
<section anchor="compromised-ree" title="Compromised REE">

<t>It is possible that the REE of a device is compromised. 
We have already seen examples of attacks on the public Internet of billions
of compromised devices being used to mount DDoS attacks.  A compromised
REE can be used for such an attack but it cannot tamper with the TEE’s
code or data in doing so.  A compromised REE can, however, launch DoS attacks
against the TEE.</t>

<t>The compromised REE
may terminate the TEEP Broker such that TEEP transactions cannot reach the TEE,
or might drop or delay messages between a TAM and a TEEP Agent.
However, while a DoS attack cannot be prevented, the REE cannot access
anything in the TEE if it is implemented correctly.
Some TEEs may have some watchdog scheme to observe REE state and mitigate DoS
attacks against it but most TEEs don’t have such a capability.</t>

<t>In some other scenarios, the compromised REE may ask a TEEP Broker
to make repeated requests to a TEEP Agent in a TEE to install or
uninstall a Trusted Component.  An installation or uninstallation request constructed
by the TEEP Broker or REE will be rejected by the TEEP Agent because
the request won’t have the correct signature from a TAM to pass the request
signature validation.</t>

<t>This can become a DoS attack by exhausting resources in a TEE with
repeated requests. In general, a DoS attack threat exists when the REE
is compromised, and a DoS attack can happen to other resources. The TEEP
architecture doesn’t change this.</t>

<t>A compromised REE might also request initiating the full flow of
installation of Trusted Components that are not necessary.
It may also repeat a prior legitimate Trusted Component installation
request. A TEEP Agent implementation is responsible for ensuring that it
can recognize and decline such repeated requests. It is also responsible
for protecting the resource usage allocated for Trusted Component management.</t>

</section>
<section anchor="ca-compromise-or-expiry-of-ca-certificate" title="CA Compromise or Expiry of CA Certificate">

<t>A root CA for TAM certificates might get compromised or its certificate might
expire, or a Trust Anchor other than a root CA certificate may also expire or
be compromised.
TEEs are responsible for validating the entire TAM certificate chain,
including the TAM certificate and any intermediate certificates up to
the root certificate.  Such validation includes checking for certificate
revocation.</t>

<t>If a TAM certificate chain validation fails, the TAM
might be rejected by a TEEP Agent.
To address this, some certificate chain update mechanism
is expected from TAM operators, so that the TAM can get
a new certificate chain that can be validated by a TEEP Agent.
In addition, the Trust Anchor in the TEEP Agent’s Trust Anchor Store
may need to be updated.  To address this, some TEE Trust Anchor update 
mechanism is expected from device OEMs.</t>

<t>Similarly, 
a root CA for TEE certificates might get compromised or its certificate might
expire, or a Trust Anchor other than a root CA certificate may also expire or
be compromised.
TAMs are responsible for validating the entire TEE certificate chain,
including the TEE certificate and any intermediate certificates up to
the root certificate.  Such validation includes checking for certificate
revocation.</t>

<t>If a TEE certificate chain validation fails, the TEE
might be rejected by a TAM, subject to the TAM’s policy.
To address this, some certificate chain update mechanism
is expected from device OEMs, so that the TEE can get
a new certificate chain that can be validated by a TAM.
In addition, the Trust Anchor in the TAM’s Trust Anchor Store
may need to be updated.</t>

</section>
<section anchor="compromised-tam" title="Compromised TAM">

<t>Device TEEs are responsible for validating the supplied TAM certificates
to determine that the TAM is trustworthy.</t>

</section>
<section anchor="malicious-ta-removal" title="Malicious TA Removal">

<t>It is possible that a rogue developer distributes a malicious Untrusted 
Application and intends to get a malicious TA installed. Such a TA
might be able to escape from malware detection by the REE, or access trusted
resources within the TEE (but could not access other TEEs, or access other
TA’s if the TEE provides isolation between TAs).</t>

<t>It is the responsibility
of the TAM to not install malicious TAs in the first place. The TEEP
architecture allows a TEEP Agent to decide which TAMs it trusts via Trust Anchors, 
and delegates the TA authenticity check to the TAMs it trusts.</t>

<t>It may happen that a TA was previously considered trustworthy but is later
found to be buggy or compromised.
In this case, the TAM can initiate the removal of the TA by notifying devices 
to remove the TA (and potentially the REE or Device Owner to remove any Untrusted 
Application that depend on the TA).  If the TAM does not currently have a
connection to the TEEP Agent on a device, such a notification would occur
the next time connectivity does exist.  That is, to recover, the TEEP Agent
must be able to reach out to the TAM, for example whenever the 
RequestPolicyCheck API (<xref target="apis"/>) is invoked by a timer or other event.</t>

<t>Furthermore the policy in the Verifier in an attestation process can be
updated so that any evidence that includes the malicious TA would result
in an attestation failure.  There is, however, a time window during which
a malicious TA might be able to operate successfully, which is the
validity time of the previous attestation result.  For example, if
the Verifier in <xref target="attestation-roles"/> is updated to treat a previously
valid TA as no longer trustworthy, any attestation result it previously
generated saying that the TA is valid will continue to be used until
the attestation result expires.  As such, the TAM’s Verifier should
take into account the acceptable time window when generating attestation
results. See <xref target="I-D.ietf-rats-architecture"/> for further discussion.</t>

</section>
<section anchor="certificate-expiry-and-renewal" title="Certificate Expiry and Renewal">

<t>TEE device certificates are expected to be long lived, longer
than the lifetime of a device.  A TAM certificate usually has a
moderate lifetime of 2 to 5 years.  A TAM should get renewed or
rekeyed certificates.  The root CA certificates for a TAM, which are
embedded into the Trust Anchor Store in a device, should have long
lifetimes that don’t require device Trust Anchor updates.  On the
other hand, it is imperative that OEMs or device providers plan for
support of Trust Anchor update in their shipped devices.</t>

<t>For those cases where TEE devices are given certificates for which no good
expiration date can be assigned the recommendations in Section 4.1.2.5 of 
<xref target="RFC5280"/> are applicable.</t>

</section>
<section anchor="keeping-secrets-from-the-tam" title="Keeping Secrets from the TAM">

<t>In some scenarios, it is desirable to protect the TA binary or Personalization Data
from being disclosed to the TAM that distributes them.  In such a scenario,
the files can be encrypted end-to-end between a Trusted Component Signer and a TEE.  However, there
must be some means of provisioning the decryption key into the TEE and/or some
means of the Trusted Component Signer securely learning a public key of the TEE that it can use to
encrypt.  One way to do this is for the Trusted Component Signer to run its own TAM so that it can
distribute the decryption key via the TEEP protocol, and the key file can be a
dependency in the manifest of the encrypted TA.  Thus, the TEEP Agent would
look at the Trusted Component manifest, determine there is a dependency with a TAM URI of the
Trusted Component Signer’s TAM. The Agent would then install the dependency, and then continue with
the Trusted Component installation steps, including decrypting the TA binary with the relevant key.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document does not require actions by IANA.</t>

</section>
<section anchor="contributors" title="Contributors">

<t><list style="symbols">
  <t>Andrew Atyeo, Intercede (andrew.atyeo@intercede.com)</t>
  <t>Liu Dapeng, Alibaba Group (maxpassion@gmail.com)</t>
</list></t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>We would like to thank Nick Cook, Minho Yoo, Brian Witten, Tyler Kim, Alin Mutu, Juergen Schoenwaelder, Nicolae Paladi, Sorin Faibish, Ned Smith, Russ Housley, Jeremy O’Donoghue, and Anders Rundgren for their feedback.</t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC6024" target='https://www.rfc-editor.org/info/rfc6024'>
<front>
<title>Trust Anchor Management Requirements</title>
<author initials='R.' surname='Reddy' fullname='R. Reddy'><organization /></author>
<author initials='C.' surname='Wallace' fullname='C. Wallace'><organization /></author>
<date year='2010' month='October' />
<abstract><t>A trust anchor represents an authoritative entity via a public key and associated data.  The public key is used to verify digital signatures, and the associated data is used to constrain the types of information for which the trust anchor is authoritative.  A relying party uses trust anchors to determine if a digitally signed object is valid by verifying a digital signature using the trust anchor's public key, and by enforcing the constraints expressed in the associated data for the trust anchor.  This document describes some of the problems associated with the lack of a standard trust anchor management mechanism and defines requirements for data formats and push-based protocols designed to address these problems.  This  document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6024'/>
<seriesInfo name='DOI' value='10.17487/RFC6024'/>
</reference>



<reference anchor="I-D.ietf-rats-architecture">
<front>
<title>Remote Attestation Procedures Architecture</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='N' surname='Smith' fullname='Ned Smith'>
    <organization />
</author>

<author initials='W' surname='Pan' fullname='Wei Pan'>
    <organization />
</author>

<date month='December' day='8' year='2020' />

<abstract><t>In network protocol exchanges it is often the case that one entity requires believable evidence about the operational state of a remote peer.  Such evidence is typically conveyed as claims about the peer's software and hardware platform, and is subsequently appraised in order to assess the peer's trustworthiness.  The process of generating and appraising this kind of evidence is known as remote attestation.  This document describes an architecture for remote attestation procedures that generate, convey, and appraise evidence about a peer's operational state.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-08' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-rats-architecture-08.txt' />
</reference>



<reference anchor="I-D.ietf-suit-manifest">
<front>
<title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>

<author initials='B' surname='Moran' fullname='Brendan Moran'>
    <organization />
</author>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='K' surname='Zandberg' fullname='Koen Zandberg'>
    <organization />
</author>

<date month='December' day='8' year='2020' />

<abstract><t>This specification describes the format of a manifest.  A manifest is a bundle of metadata about code/data obtained by a recipient (chiefly the firmware for an IoT device), where to find the that code/data, the devices to which it applies, and cryptographic information protecting the manifest.  Software updates and Trusted Invocation both tend to use sequences of common operations, so the manifest encodes those sequences of operations, rather than declaring the metadata.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-suit-manifest-11' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-suit-manifest-11.txt' />
</reference>



<reference anchor="I-D.ietf-teep-otrp-over-http">
<front>
<title>HTTP Transport for Trusted Execution Environment Provisioning: Agent-to- TAM Communication</title>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<date month='November' day='2' year='2020' />

<abstract><t>The Trusted Execution Environment Provisioning (TEEP) Protocol is used to manage code and configuration data in a Trusted Execution Environment (TEE).  This document specifies the HTTP transport for TEEP communication where a Trusted Application Manager (TAM) service is used to manage code and data in TEEs on devices that can initiate communication to the TAM.  An implementation of this document can (if desired) run outside of any TEE, but interacts with a TEEP implementation that runs inside a TEE.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-teep-otrp-over-http-09' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-teep-otrp-over-http-09.txt' />
</reference>



<reference anchor="I-D.ietf-teep-protocol">
<front>
<title>Trusted Execution Environment Provisioning (TEEP) Protocol</title>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='M' surname='Pei' fullname='Mingliang Pei'>
    <organization />
</author>

<author initials='D' surname='Wheeler' fullname='David Wheeler'>
    <organization />
</author>

<author initials='D' surname='Thaler' fullname='Dave Thaler'>
    <organization />
</author>

<author initials='A' surname='Tsukamoto' fullname='Akira Tsukamoto'>
    <organization />
</author>

<date month='November' day='2' year='2020' />

<abstract><t>This document specifies a protocol that installs, updates, and deletes Trusted Applications (TAs) in a device with a Trusted Execution Environment (TEE).  This specification defines an interoperable protocol for managing the lifecycle of TAs.  The protocol name is pronounced teepee.  This conjures an image of a wedge-shaped protective covering for one's belongings, which sort of matches the intent of this protocol.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-teep-protocol-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-teep-protocol-04.txt' />
</reference>



<reference  anchor="RFC7696" target='https://www.rfc-editor.org/info/rfc7696'>
<front>
<title>Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms</title>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<date year='2015' month='November' />
<abstract><t>Many IETF protocols use cryptographic algorithms to provide confidentiality, integrity, authentication, or digital signature.  Communicating peers must support a common set of cryptographic algorithms for these mechanisms to work properly.  This memo provides guidelines to ensure that protocols have the ability to migrate from one mandatory-to-implement algorithm suite to another over time.</t></abstract>
</front>
<seriesInfo name='BCP' value='201'/>
<seriesInfo name='RFC' value='7696'/>
<seriesInfo name='DOI' value='10.17487/RFC7696'/>
</reference>



<reference  anchor="RFC5280" target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='D.' surname='Cooper' fullname='D. Cooper'><organization /></author>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='S.' surname='Boeyen' fullname='S. Boeyen'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author>
<date year='2008' month='May' />
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>


<reference anchor="GPTEE" target="https://globalplatform.org/specs-library/tee-system-architecture-v1-1/">
  <front>
    <title>GlobalPlatform Device Technology: TEE System Architecture, v1.1</title>
    <author >
      <organization>GlobalPlatform</organization>
    </author>
    <date year="2017" month="January"/>
  </front>
  <seriesInfo name="GlobalPlatform" value="GPD_SPE_009"/>
</reference>
<reference anchor="GSMA" target="https://www.gsma.com/esim/wp-content/uploads/2020/06/SGP.22-v2.2.2.pdf">
  <front>
    <title>GP.22 RSP Technical Specification, Version 2.2.2</title>
    <author >
      <organization>GSM Association</organization>
    </author>
    <date year="2020" month="June"/>
  </front>
</reference>
<reference anchor="OTRP" target="https://globalplatform.org/specs-library/tee-management-framework-open-trust-protocol/">
  <front>
    <title>Open Trust Protocol (OTrP) Profile v1.1</title>
    <author >
      <organization>GlobalPlatform</organization>
    </author>
    <date year="2020" month="July"/>
  </front>
  <seriesInfo name="GlobalPlatform" value="GPD_SPE_123"/>
</reference>
<reference anchor="SGX" target="https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html">
  <front>
    <title>Intel(R) Software Guard Extensions (Intel (R) SGX)</title>
    <author >
      <organization>Intel</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TrustZone" target="https://developer.arm.com/ip-products/security-ip/trustzone">
  <front>
    <title>Arm TrustZone Technology</title>
    <author >
      <organization>Arm</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference  anchor="RFC4949" target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

