<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-acme-device-attest-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="ACME DA">Automated Certificate Management Environment (ACME) Device Attestation Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-acme-device-attest-05"/>
    <author initials="B." surname="Weeks" fullname="Brandon Weeks">
      <organization abbrev="Google Inc">Google Inc</organization>
      <address>
        <email>me@brandonweeks.com</email>
      </address>
    </author>
    <author initials="G." surname="Mallaya" fullname="Ganesh Mallaya">
      <organization abbrev="AppViewX Inc.">AppViewX Inc.</organization>
      <address>
        <email>ganesh.mallaya@appviewx.com</email>
      </address>
    </author>
    <author initials="S." surname="Rajala" fullname="Sven Rajala">
      <organization abbrev="Keyfactor">Keyfactor</organization>
      <address>
        <email>sven.rajala@keyfactor.com</email>
      </address>
    </author>
    <author initials="C." surname="Bonnell" fullname="Corey Bonnell">
      <organization abbrev="DigiCert, Inc.">DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author initials="R." surname="Hurst" fullname="Ryan Hurst">
      <organization abbrev="Peculiar Ventures">Peculiar Ventures</organization>
      <address>
        <email>ryan.hurst+ietf@peculiarventures.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="19"/>
    <area>Security</area>
    <workgroup>ACME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 84?>

<t>This document specifies new identifiers and a challenge for the Automated Certificate Management Environment (ACME) protocol which allows validating the identity of a device using attestation.</t>
    </abstract>
  </front>
  <middle>
    <?line 88?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Automatic Certificate Management Environment (ACME) <xref target="RFC8555"/> standard specifies methods for validating control over identifiers, such as domain names. It is also useful to be able to validate properties of the device requesting the certificate, such as the identity of the device and whether the certificate key is protected by a secure cryptoprocessor.</t>
      <t>Many operating systems and device vendors offer functionality enabling a device to generate a cryptographic attestation of their identity, such as:</t>
      <ul spacing="normal">
        <li>
          <t><eref target="https://source.android.com/security/keystore/attestation">Android Key Attestation</eref></t>
        </li>
        <li>
          <t><eref target="https://developers.google.com/chrome/verified-access/overview">Chrome OS Verified Access</eref></t>
        </li>
        <li>
          <t><eref target="https://trustedcomputinggroup.org/resource/trusted-platform-module-tpm-summary/">Trusted Platform Module</eref></t>
        </li>
        <li>
          <t><eref target="https://support.apple.com/en-om/guide/deployment/dep28afbde6a/web">Managed Device Attestation for Apple Devices</eref></t>
        </li>
      </ul>
      <t>Using ACME and device attestation to issue client certificates for enterprise PKI will be a common use case. The following variances to the ACME specification are described in this document:</t>
      <ul spacing="normal">
        <li>
          <t>Addition of <tt>permanent-identifier</tt> <xref target="RFC4043"/> and <tt>hardware-module</tt> <xref target="RFC4108"/> identifier types.</t>
        </li>
        <li>
          <t>Addition of the <tt>device-attest-01</tt> challenge type to prove control of the <tt>permanent-identifier</tt> and <tt>hardware-module</tt> identifier types.</t>
        </li>
        <li>
          <t>The challenge response payload contains a serialized WebAuthn attestation statement format instead of an empty JSON object (<tt>{}</tt>).</t>
        </li>
        <li>
          <t>Accounts and external account binding being used as a mechanism to pre-authenticate requests to an enterprise CA.</t>
        </li>
      </ul>
      <t>This document does not specify the attestation verification procedures. Section 13 of <xref target="WebAuthn"/> gives some guidance, however verification procedures are complex and may require changes to address future security issues.</t>
      <t>Efforts are underway within the Remote ATtestation ProcedureS (RATS) working group to define a set of standard formats and protocols for attestation. An explicit aim of this document is to support vendor specific formats and protocols that are widely deployed at publication time of this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="permanent-identifier">
      <name>Permanent Identifier</name>
      <t>A new identifier type, <tt>permanent-identifier</tt> is introduced to represent the identity of a device assigned by the manufacturer, typically a serial number. Additionally, the assigner of the identifier <bcp14>MAY</bcp14> also be specified. The name of this identifier type was chosen to align with <xref target="RFC4043"/>. This specification does not prescribe the lifetime of the identifier, which is at the discretion of the Assigner Authority.</t>
      <t>Although <xref target="RFC4043"/> permits any valid UTF-8 string to be used as the identifier, this specification mandates that identifiers <bcp14>MUST NOT</bcp14> contain the forward-slash "/" (UTF-8: U+002F) character. This restriction is required to make the ABNF production rule for the <tt>permanent-identifier-value</tt> unambiguous.</t>
      <section anchor="representation-in-order-resources">
        <name>Representation in Order resources</name>
        <t>The identifier's <tt>value</tt> field contains a UTF-8 string representation of the identity of the device. In addition to the value being a valid UTF-8 string, the value <bcp14>MUST</bcp14> match the <tt>permanent-identifier-value</tt> production rule as defined in this ABNF <xref target="RFC5234"/> syntax:</t>
        <artwork><![CDATA[
assigner-value = first-and-second-components *("." component)
first-and-second-components = (("0" / "1") "." (*1(%x31-33) %x30-39))) / ("2" "." component)
component = "0" / (%x31-39 *%x30-39)
device-identifier-value = 1*(%x00-2E / %x30-FF)

permanent-identifier-value = device-identifier-value ["/" assigner-value]
]]></artwork>
        <t>A valid <tt>permanent-identifier-value</tt> value is a UTF-8 string that contains an identity consisting of one or more characters without any forward-slash "/" (UTF-8: U+002F) characters. Optionally, a forward-slash "/" character and "dotted-decimal" object identifier identifying the assigner may follow the identity. The assigner-value is a dotted-decimal representation of an ASN.1 OBJECT IDENTIFIER.</t>
        <t>The Server <bcp14>MUST</bcp14> verify that identifier values in newOrder requests conform to the <tt>permanent-identifier-value</tt> production rule and <bcp14>MUST</bcp14> reject requests containing non-conforming values with a "malformed" error.</t>
        <t>Example identifier without an assigner:</t>
        <artwork><![CDATA[
{
  "type": "permanent-identifier",
  "value": "ABCDEF123456"
}
]]></artwork>
        <t>Example identifier with an assigner:</t>
        <artwork><![CDATA[
{
  "type": "permanent-identifier",
  "value": "ABCDEF123456/1.2.3.4"
}
]]></artwork>
      </section>
      <section anchor="representation-in-certificate-signing-requests-csrs-and-x509-certificates">
        <name>Representation in Certificate Signing Requests (CSRs) and X.509 Certificates</name>
        <t>This section describes the X.509 representation of the <tt>permanent-identifier</tt>. Other credential types may use the same identifier values with representations appropriate to those credential types.</t>
        <t>The identity is included in the Subject Alternative Name Extension using the <tt>identifierValue</tt> field of the PermanentIdentifier form described in <xref target="RFC4043"/>. Although <xref target="RFC4043"/> permits the requester to include the <tt>identifierValue</tt> in a <tt>serialNumber</tt> subject attribute, this specification mandates that the <tt>identifierValue</tt> field of the PermanentIdentifier <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain the identifier.</t>
        <t>The value of the identifierValue field of the PermanentIdentifier <bcp14>MUST</bcp14> be an octet-for-octet match of the device-identifier-value value as encoded in the Order resource. If the <tt>assigner-value</tt> value is included in the identifier as encoded in the Order resource, then the <tt>assigner</tt> field of the PermanentIdentifier <bcp14>MUST</bcp14> be the encoding of the "dotted-decimal" object identifier encoded as the <tt>assigner-value</tt> value.</t>
        <t>This strict matching requirement ensures that the SAN in the issued certificate appears exactly as it appeared during proof-of-ownership validation, preventing identifier malleability. Serial number allocation schemes may be case-sensitive or otherwise sensitive to exact byte representation, so no normalization or transformation is permitted.</t>
        <t>To ensure that the identifier as presented in the Order resource and CSR match, the Server <bcp14>MUST</bcp14> perform the logical equivalent of extracting the <tt>device-identifier-value</tt> and <tt>assigner-value</tt> values from the CSR and reconstructing the UTF-8 representation of the identifier. The Server <bcp14>MUST</bcp14> then ensure that the UTF-8 representation and the identifier presented in the Order resource are an octet-for-octet match and reject the Order otherwise. Servers that derive identifier values directly from verified attestation evidence and construct the certificate SAN from that evidence, provided the derived values are verified against the attested device identity in the attestation statement, satisfy the intent of this requirement.</t>
        <t><xref target="RFC8555"/> section 7.4 mandates that "The CSR <bcp14>MUST</bcp14> indicate the exact same set of requested identifiers as the initial newOrder request". However, there are some environments where the Server requires validation of the identifier but does not include the identifier in certificates due to privacy concerns. To support privacy-preserving certificates, Clients <bcp14>MAY</bcp14> omit this identifier in the certificate signing request (CSR). Similarly, if the Server wishes to issue privacy-preserving certificates, it <bcp14>MAY</bcp14> reject CSRs containing a PermanentIdentifier in the subjectAltName extension. See the <xref target="privacy-considerations"/> for more information.</t>
      </section>
    </section>
    <section anchor="hardware-module">
      <name>Hardware Module</name>
      <t>A new identifier type, <tt>hardware-module</tt> is introduced to represent the identity of the secure crypto-processor that generated the certificate key. The identity is modeled after the HardwareModuleName form described in <xref target="RFC4108"/>. It consists of two components: an OBJECT IDENTIFIER to represent the type of hardware module, and a serial number that identifies the specific hardware module.</t>
      <t>Although <xref target="RFC4108"/> specifies that serial numbers can be represented as any sequence of bytes, this specification requires that serial numbers <bcp14>MUST</bcp14> be representable as valid UTF-8 strings consisting of at least one code point and <bcp14>MUST NOT</bcp14> contain a forward-slash "/" (UTF-8: U+002F) character. This restriction ensures that serial numbers can be included in <tt>hardware-module</tt> identifier string values and that the ABNF production rule for the value is unambiguous.</t>
      <section anchor="representation-in-order-resources-1">
        <name>Representation in Order resources</name>
        <t>The identifier's <tt>value</tt> field contains a UTF-8 string representation of the identity of the hardware module. In addition to the value being a valid UTF-8 string, the value <bcp14>MUST</bcp14> match the <tt>hardware-module-value</tt> production rule as defined in this ABNF <xref target="RFC5234"/> syntax:</t>
        <artwork><![CDATA[
hw-type-value = first-and-second-components *("." component)
first-and-second-components = (("0" / "1") "." (*1(%x31-33) %x30-39))) / ("2" "." component)
component = "0" / (%x31-39 *%x30-39)
hw-serial-num-value = 1*(%x00-2E / %x30-FF)

hardware-module-value = hw-serial-num-value ["/" hw-type-value]
]]></artwork>
        <t>A valid <tt>hardware-module-value</tt> value is a UTF-8 string that contains a serial number consisting of one or more characters without any forward-slash "/" (UTF-8: U+002F) characters. Optionally, a forward-slash "/" character and "dotted-decimal" object identifier identifying the hardware type may follow the serial number.</t>
        <t>The Server <bcp14>MUST</bcp14> verify that identifier values in newOrder requests conform to the <tt>hardware-module-value</tt> production rule and <bcp14>MUST</bcp14> reject requests containing non-conforming values with a "malformed" error.</t>
        <t>Example identifier with the type of the hardware module represented using the OBJECT IDENTIFIER "1.2.3.4" and a serial number of "ABCD":</t>
        <artwork><![CDATA[
{
  "type": `hardware-module`,
  "value": "ABCD/1.2.3.4"
}
]]></artwork>
        <t>Example identifier with no type specified and a serial number of "ABCD":</t>
        <artwork><![CDATA[
{
  "type": `hardware-module`,
  "value": "ABCD"
}
]]></artwork>
      </section>
      <section anchor="representation-in-certificate-signing-requests-and-x509-certificates">
        <name>Representation in Certificate Signing Requests and X.509 Certificates</name>
        <t>This section describes the X.509 representation of the <tt>hardware-module</tt> identifier. Other credential types may use the same identifier values with representations appropriate to those credential types.</t>
        <t>The hardware module identity is included in the Subject Alternate Name Extension using the HardwareModuleName form described in <xref target="RFC4108"/>. The HardwareModuleName is encoded as an otherName with the OID id-on-hardwareModuleName (1.3.6.1.5.5.7.8.4) and consists of:</t>
        <ul spacing="normal">
          <li>
            <t>hwType: An OBJECT IDENTIFIER that identifies the type of hardware module</t>
          </li>
          <li>
            <t>hwSerialNum: An OCTET STRING containing the hardware module serial number</t>
          </li>
        </ul>
        <t>The value of the hwSerialNum field of the HardwareModuleName <bcp14>MUST</bcp14> be an octet-for-octet match of the hw-serial-num-value value as encoded in the Order resource. If the <tt>hw-type-value</tt> value is included in the identifier as encoded in the Order resource, then the <tt>hwType</tt> field of the HardwareModuleName <bcp14>MUST</bcp14> be the encoding of the "dotted-decimal" object identifier encoded as the <tt>hw-type-value</tt> value.</t>
        <t>This strict matching requirement ensures that the SAN in the issued certificate appears exactly as it appeared during proof-of-ownership validation, preventing identifier malleability. Serial number allocation schemes may be case-sensitive or otherwise sensitive to exact byte representation, so no normalization or transformation is permitted.</t>
        <t>To ensure that the identifier as presented in the Order resource and CSR match, the Server <bcp14>MUST</bcp14> perform the logical equivalent of extracting the <tt>hw-serial-num-value</tt> and <tt>hw-type-value</tt> values from the CSR and reconstructing the UTF-8 representation of the identifier. The Server <bcp14>MUST</bcp14> then ensure that the UTF-8 representation and the identifier presented in the Order resource are an octet-for-octet match and reject the Order otherwise. Servers that derive identifier values directly from verified attestation evidence and construct the certificate SAN from that evidence, provided the derived values are verified against the attested device identity in the attestation statement, satisfy the intent of this requirement.</t>
        <t><xref target="RFC8555"/> section 7.4 mandates that "The CSR <bcp14>MUST</bcp14> indicate the exact same set of requested identifiers as the initial newOrder request". However, there are some environments where the Server requires validation of the identifier but does not include the identifier in certificates due to privacy concerns. To support privacy-preserving certificates, Clients <bcp14>MAY</bcp14> omit this identifier in the certificate signing request (CSR). Similarly, if the Server wishes to issue privacy-preserving certificates, it <bcp14>MAY</bcp14> reject CSRs containing a HardwareModuleName in the subjectAltName extension. See the <xref target="privacy-considerations"/> for more information.</t>
      </section>
    </section>
    <section anchor="device-attestation-challenge">
      <name>Device Attestation Challenge</name>
      <t>The Client can prove control over a permanent identifier of a device by providing an attestation statement containing the identifier of the device.</t>
      <t>The device-attest-01 ACME challenge object has the following format:</t>
      <dl>
        <dt>type (required, string):</dt>
        <dd>
          <t>The string "device-attest-01".</t>
        </dd>
        <dt>token (required, string):</dt>
        <dd>
          <t>A random value that uniquely identifies the challenge.</t>
        </dd>
      </dl>
      <artwork><![CDATA[
{
  "type": "device-attest-01",
  "url": "https://example.com/acme/chall/Rg5dV14Gh1Q",
  "status": "pending",
  "token": "evaGxfADs6pSRb2LAv9IZf17Dt3juxGJ-PCt92wr-oA"
}
]]></artwork>
      <t>A Client fulfills this challenge by constructing a key authorization (<xref section="8.1" sectionFormat="of" target="RFC8555"/>) from the "token" value provided in the challenge and the Client's account key. The Client then generates a WebAuthn attestation object using the key authorization as the challenge.</t>
      <t>This specification borrows the WebAuthn <em>attestation object</em> representation as described in Section 6.5.4 of <xref target="WebAuthn"/> for encapsulating attestation formats, but with these modifications:</t>
      <ul spacing="normal">
        <li>
          <t>The key authorization is used to form <em>attToBeSigned</em>. This replaces the concatenation of <em>authenticatorData</em> and <em>clientDataHash</em>. <em>attToBeSigned</em> is hashed using an algorithm specified by the attestation format.</t>
        </li>
        <li>
          <t>Some attestation formats use an external attestation authority that issues a certificate binding the challenge to the device before the Client's account key is available. In these formats, <em>attToBeSigned</em> is formed from the token alone rather than the full key authorization, because the external authority signs at attestation time before the account key thumbprint can be incorporated. The token construction provides freshness. The key authorization construction additionally binds the attestation to a specific account key. The Server <bcp14>MUST</bcp14> consult format-specific documentation to determine which construction applies and <bcp14>MUST</bcp14> verify accordingly. Attestation formats whose signing procedure does not incorporate <em>attToBeSigned</em> cannot be used to satisfy this challenge type.</t>
        </li>
        <li>
          <t>The <em>authData</em> field carries browser-context data (including the RP ID hash) that has no meaning in the ACME context and <bcp14>SHOULD</bcp14> be omitted.</t>
        </li>
      </ul>
      <t>A Client responds with the response object containing the WebAuthn attestation object in the "attObj" field to acknowledge that the challenge can be validated by the Server. Clients <bcp14>MAY</bcp14> include additional fields beyond "attObj" in the response object. Servers <bcp14>MUST</bcp14> ignore unrecognized fields in the challenge response.</t>
      <t>On receiving a response, the Server constructs and stores the key authorization from the challenge's "token" value and the current Client account key.</t>
      <t>To validate a device attestation challenge, the Server performs the following steps:</t>
      <ol spacing="normal" type="1"><li>
          <t>Perform the verification procedures described in Section 6 of <xref target="WebAuthn"/>.</t>
        </li>
        <li>
          <t>Verify that <em>attToBeSigned</em> contains the key authorization or the token, according to the construction required by the attestation format, and that the value matches what the Server stored.</t>
        </li>
        <li>
          <t>Verify that the attestation statement contains a device identifier and that it matches the identifier in the Order. The means by which the identifier is encoded in the attestation statement are specific to the attestation format.</t>
        </li>
      </ol>
      <t>If any of the steps fail, then the Server <bcp14>MUST</bcp14> respond to the Client with a "badAttestationStatement" error and set the status of the challenge object to "invalid". The Server <bcp14>SHOULD</bcp14> provide the reason for rejecting the challenge in the "detail" field of the problem document.</t>
      <!-- This specification defines a new challenge response field `attObj` to contain WebAuthn attestation objects as described in Section 7.5.1 of {{RFC8555}}. -->
<artwork><![CDATA[
POST /acme/chall/Rg5dV14Gh1Q
Host: example.com
Content-Type: application/jose+json

{
  "protected": base64url({
    "alg": "ES256",
    "kid": "https://example.com/acme/acct/evOfKhNU60wg",
    "nonce": "SS2sSl1PtspvFZ08kNtzKd",
    "url": "https://example.com/acme/chall/Rg5dV14Gh1Q"
  }),
  "payload": base64url({
    "attObj": base64url(/* WebAuthn attestation object */),
  }),
  "signature": "Q1bURgJoEslbD1c5...3pYdSMLio57mQNN4"
}
]]></artwork>
      <t>The webauthn payload <bcp14>MAY</bcp14> contain any identifiers registered in "WebAuthn Attestation Statement Format Identifiers" and any extensions registered in "WebAuthn Extension Identifiers" <xref target="IANA-Webauthn"/>, <xref target="RFC8809"/>.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Although this document focuses guidance on implementing new identifier types and a challenge for certificate issuance using ACME, it does not define a new protocol, a protocol extension, or an architecture.</t>
      <section anchor="enterprise-pki">
        <name>Enterprise PKI</name>
        <t>ACME was originally envisioned for issuing certificates in the Web PKI, however this extension will primarily be useful in enterprise PKI.</t>
        <section anchor="external-account-binding">
          <name>External Account Binding</name>
          <t>An enterprise CA likely only wants to receive requests from authorized devices. It is <bcp14>RECOMMENDED</bcp14> that the Server require a value for the "externalAccountBinding" field to be present in "newAccount" requests.</t>
          <t>If an enterprise CA desires to limit the number of certificates that can be requested with a given account, including limiting an account to a single certificate, after the desired number of certificates have been issued to an account the Server <bcp14>MAY</bcp14> revoke the account as described in Section 7.1.2 of <xref target="RFC8555"/>.</t>
        </section>
        <section anchor="attestation-posture">
          <name>Attestation Posture</name>
          <t>Enterprise deployments often consist of heterogeneous device fleets where not all devices are capable of hardware attestation. A Server <bcp14>MAY</bcp14> offer device-attest-01 alongside other challenge types within a single authorization, allowing capable devices to complete device-attest-01 while other devices complete an alternative challenge. This posture allows operators to observe fleet attestation coverage before enforcing policy and is compatible with phased deployments.</t>
          <t>Servers <bcp14>MAY</bcp14> rely on other authorization mechanisms, such as external account binding or pre-authorized accounts, to establish device identity instead of completing the device-attest-01 challenge.</t>
        </section>
        <section anchor="multiple-challenge-types">
          <name>Multiple Challenge Types</name>
          <t><xref target="RFC8555"/> permits a Server to offer multiple challenge types within a single authorization, with any one being sufficient to complete it. Servers <bcp14>MAY</bcp14> offer device-attest-01 alongside other challenge types for the same authorization, allowing capable devices to attest while other devices use an alternative challenge type.</t>
        </section>
      </section>
      <section anchor="attestation-trust">
        <name>Attestation Trust</name>
        <t>Attestation formats differ in the authority that enforces the boundary around the attested key and in the claims that authority can make. At one end, dedicated security hardware (such as a TPM or HSM) provides manufacturer-backed guarantees that the key is generated and stored within the hardware and cannot be exported. At the other end, OS-enforced isolation boundaries (such as platform keystores protected by the operating system kernel) provide meaningful key protection guarantees without discrete security hardware. Intermediate cases include TEE-based attestation where a hypervisor or trusted execution environment acts as the authority.</t>
        <t>Servers <bcp14>SHOULD</bcp14> consider the trust properties of each attestation format when establishing issuance policy, including the nature of the authority making the attestation and the key protection guarantees it can assert. The key authorization construction described in <xref target="device-attestation-challenge"/> also contributes to this trust model: formats that use the full key authorization as <em>attToBeSigned</em> bind the attestation to a specific account key, while formats that use the token alone provide freshness without account key binding.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This section analyzes the privacy implications of the <tt>permanent-identifier</tt> and <tt>hardware-module</tt> identifier types introduced in this document. The guidance here is informed by the threat taxonomy defined in <xref target="RFC6973"/> and is intended to help implementers make informed decisions about whether and when to include these identifiers in certificate requests and issued certificates.</t>
      <t>Both identifier types represent unchanging hardware-bound properties of a device. Unlike domain names or other identifiers whose lifetime is bounded by operational changes, these identifiers typically persist across the entire operational life of a device and cannot be rotated or revoked by the device owner. This permanence has material privacy consequences that implementers must weigh carefully.</t>
      <t>The privacy analysis below addresses the two phases in which these identifiers appear: the attestation exchange between the Client and server during challenge validation, and the optional embedding of identifiers in the issued certificate.</t>
      <section anchor="identification-and-correlation">
        <name>Identification and Correlation</name>
        <t>The <tt>permanent-identifier</tt> type encodes a manufacturer assigned device identity, typically a serial number. The <tt>hardware-module</tt> type encodes the identity of the secure cryptoprocessor that generated the certificate key. In both cases, the identifier is globally unique within its assigner scope and unchanging for the lifetime of the device or hardware module.</t>
        <t>From the perspective of <xref target="RFC6973"/> Section 5.2.2, such identifiers enable direct identification of a device across protocol interactions, deployments, and time. Any entity that receives or observes these identifiers, including the server, intermediary infrastructure, and any relying party that processes the issued certificate acquires an observable reference that can be used to track the device's certificate issuance history, renewal patterns, and operational context.</t>
        <t>When the same <tt>permanent-identifier</tt> or <tt>hardware-module</tt> value appears across multiple certificate requests (as it will in any recurring renewal workflow), it enables <xref target="RFC6973"/> correlation: an observer with access to server logs can reconstruct the full lifecycle of a device's certificate activity. Similarly, when such identifiers are included in issued certificates, logging issued certificates in a central location (in certificate transparency logs, etc.) produces a persistent device audit trail regardless of whether the log operator intends to maintain one.</t>
        <t>Implementers <bcp14>SHOULD</bcp14> assess whether the operational benefit of unchanging device identification outweighs this correlation exposure. In deployments where device anonymity or pseudonymity is a requirement, such as systems handling sensitive workloads on behalf of individuals, implementers <bcp14>SHOULD</bcp14> consider whether alternative validation mechanisms that do not bind the certificate to a permanent hardware identifier are more appropriate.</t>
      </section>
      <section anchor="fingerprinting-via-attestation-payloads">
        <name>Fingerprinting via Attestation Payloads</name>
        <t>The <tt>device-attest-01</tt> challenge response carries a WebAuthn attestation object that may contain significantly more information than the identifier value alone. Depending on the attestation format, this payload may include device model, firmware version, bootloader state, hardware security level, and operating system version. Even when the resulting certificate is issued in a privacy-preserving form that omits the identifier from the subjectAltName extension (see Section 3.2 and Section 4.2), the attestation payload itself is transmitted to and evaluated by the server during challenge validation.</t>
        <t>This constitutes a fingerprinting surface as defined in <xref target="RFC6973"/> Section 3.2. The combination of a hardware serial number, hardware type OID, and firmware attestation attributes may uniquely identify not just the device model but the specific device unit, even in the absence of an explicit <tt>permanent-identifier</tt> value. Implementers operating servers may consider applying data minimization principles to attestation payload handling by limiting only the attributes necessary to make the authorization decision should be evaluated, and the full attestation payload <bcp14>SHOULD NOT</bcp14> be retained beyond the duration of the challenge validation exchange unless there is a specific, documented operational requirement to do so.</t>
        <t>Implementers operating ACME Clients <bcp14>SHOULD</bcp14> be aware that the attestation format selected may expose more device state than is necessary to satisfy the server's authorization policy. Where multiple attestation formats are available, Clients <bcp14>SHOULD</bcp14> prefer formats that minimize the set of disclosed attributes.</t>
      </section>
      <section anchor="secondary-use-of-attestation-data">
        <name>Secondary Use of Attestation Data</name>
        <t>The server receives attestation data in the context of authorizing a certificate issuance request. <xref target="RFC6973"/> Section 5.2.3 identifies secondary use as the processing of data for purposes beyond the original collection context and as a distinct privacy threat.</t>
        <t>Attestation payloads received during challenge validation may contain information about device health, software configuration, and hardware capability that is operationally useful beyond certificate issuance. For example, for asset inventory, compliance monitoring, or security posture assessment. Implementers operating servers must clearly define and document the purposes for which attestation data is processed and must not process attestation data for purposes materially different from authorization of the certificate request without explicit policy disclosure to the device owner or operator.</t>
        <t>Implementers integrating ACME device attestation into enterprise PKI platforms should publish a clear attestation data handling policy that specifies what attributes are evaluated, how long they are retained, and whether they are shared with other systems.</t>
      </section>
      <section anchor="privacy-preserving-certificate-issuance">
        <name>Privacy-Preserving Certificate Issuance</name>
        <t>This document provides an explicit mechanism to decouple attestation-based validation from identifier disclosure in the issued certificate. Clients <bcp14>MAY</bcp14> omit the <tt>permanent-identifier</tt> or <tt>hardware-module</tt> from the CSR, and servers <bcp14>MAY</bcp14> issue certificates that do not contain these identifiers in the subjectAltName extension, even when those identifiers were used to authorize the request.</t>
        <t>Implementers should treat this privacy-preserving mode as the default posture unless there is a specific operational requirement for the identifier to appear in the certificate. The following considerations apply to this decision:</t>
        <ul spacing="normal">
          <li>
            <t>If the issued certificate will be presented to relying parties outside the issuing organization's trust boundary, embedding a <tt>permanent-identifier</tt> or <tt>hardware-module</tt> value in the certificate enables those relying parties to correlate certificate presentations with specific physical hardware. This may be acceptable in closed enterprise environments but is likely inappropriate in any context where the certificate is presented to external services, counter-parties, or public infrastructure.</t>
          </li>
          <li>
            <t>If the certificate is used for mutual TLS in a workload identity context, embedding an unchanging hardware identifier couples the cryptographic identity of the workload to the physical device rather than to the logical identity of the workload. This can impede key rotation, device replacement, and workload migration, in addition to creating the correlation risks described above. In such cases, implementers should prefer logical workload identifiers (such as SPIFFE URIs) in the issued certificate and treat the hardware attestation as a bootstrap authorization mechanism only.</t>
          </li>
          <li>
            <t>If the certificate is intended for use in certificate transparency logs, implementers <bcp14>MUST</bcp14> consider that embedding a <tt>permanent-identifier</tt> or <tt>hardware-module</tt> value will make that identifier permanently and publicly discoverable, indexed by issuance time, issuer, and subject. This constitutes an irreversible disclosure under <xref target="RFC6973"/> Section 5.2.4 and should be avoided unless public discoverability of the device identifier is an explicit operational requirement.</t>
          </li>
        </ul>
      </section>
      <section anchor="stored-data-and-account-binding">
        <name>Stored Data and Account Binding</name>
        <t>This document recommends the use of externalAccountBinding to pre-authenticate device requests to an enterprise server. When an ACME account is persistently bound to a device identity, the server's account store contains a durable mapping between the cryptographic account credential and the physical device. Per <xref target="RFC6973"/> Section 5.1.2, this stored association constitutes a target for compromise: an attacker who obtains the account store gains not only account credentials but a historical record of device-to-identity mappings across all certificate issuances.</t>
        <t>Implementers operating servers <bcp14>SHOULD</bcp14> store account-to-device bindings using the minimum fidelity necessary for authorization decisions. Where the operational requirement is only to confirm that a given device is authorized to request certificates, it may be sufficient to store a hash or other one-way transformation of the device identifier rather than the identifier itself. Implementers should also define and enforce retention limits on historical account-to-certificate linkage records.</t>
      </section>
      <section anchor="implementer-decision-guidance">
        <name>Implementer Decision Guidance</name>
        <t>Implementers considering whether to include <tt>permanent-identifier</tt> or <tt>hardware-module</tt> in CSRs and issued certificates <bcp14>SHOULD</bcp14> work through the following questions before enabling these identifiers:</t>
        <ul spacing="normal">
          <li>
            <t>Is unchanging hardware identity in the certificate necessary for the relying party to make authorization decisions, or is it sufficient for the server to have validated it at issuance time? If the latter, prefer privacy-preserving certificate mode.</t>
          </li>
          <li>
            <t>Will the certificate be logged to a certificate transparency log or otherwise made publicly accessible? If so, embedding a permanent hardware identifier creates an irrevocable, publicly indexed disclosure and should be avoided unless explicitly required.</t>
          </li>
          <li>
            <t>Will the certificate be presented to parties outside the issuing organization's administrative control? If so, consider whether those parties should have visibility into the device's hardware identity.</t>
          </li>
          <li>
            <t>Does the deployment have requirements for device replacement or key rotation without service interruption? Binding the certificate's identity to a specific hardware module OID and serial number complicates these operational scenarios and may require reissuance policies that expose additional identifier churn in logs.</t>
          </li>
          <li>
            <t>What is the attestation data handling policy of the server operator? If this is not documented or auditable, device operators <bcp14>SHOULD</bcp14> treat the attestation exchange as a full disclosure of all attributes present in the attestation payload.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Please reference <xref target="RFC8555"/> for other security considerations.</t>
      <t>See Section 13 of <xref target="WebAuthn"/> for additional security considerations related to attestation statement formats, including certificate revocation.</t>
      <t>Key attestation statements may include a variety of information in addition to the public key being attested. While not described in this document, the Server <bcp14>MAY</bcp14> use any policy when evaluating this information. This evaluation can result in rejection of a certificate request that features a verifiable key attestation for the public key contained in the request. For example, an attestation statement may indicate use of an unacceptable firmware version.</t>
      <t>The "token" value <bcp14>MUST</bcp14> have at least 128 bits of entropy. It <bcp14>MUST NOT</bcp14> contain any characters outside the base64url alphabet, including padding characters ("="). See <xref target="I-D.ietf-tls-rfc8446bis"/>, Appendix C.1 for additional information on randomness requirements.</t>
      <t>The binding between the certified public key and the device identifier is established through the attestation statement rather than through the CSR alone. The attestation authority cryptographically binds the public key to the device identity, either by signing the attestation statement directly, by issuing an attestation certificate, or by other cryptographic means specific to the attestation format. The Server verifies this chain: the attestation is produced by a trusted attestation authority, the public key in the attestation matches the public key in the CSR, and the device identifier in the attestation matches the identifier in the Order. This three-way binding is the basis on which the Server can associate a certified public key with a particular device.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="acme-identifier-types">
        <name>ACME Identifier Types</name>
        <t>The "ACME Identifier Types" registry is to be updated to include the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Label</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">permanent-identifier</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">hardware-module</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="acme-validation-method">
        <name>ACME Validation Method</name>
        <t>The "ACME Validation Methods" registry is to be updated to include the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Label</th>
              <th align="left">Identifier Type</th>
              <th align="left">ACME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">device-attest-01</td>
              <td align="left">permanent-identifier</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">device-attest-01</td>
              <td align="left">hardware-module</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <!-- Begin WebAuthn registry text -->
<!-- Editor's note: the below text was written by Carl Wallance as part of draft-wallace-lamps-key-attestation-ext. These registries only need to be established by a single document, so if they are established by another document prior to this document being approved, this text will be removed and replaced with a reference to the other document.  -->

</section>
      <section anchor="new-error-types">
        <name>New Error Types</name>
        <t>The "ACME Error Types" registry is to be updated to include the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">badAttestationStatement</td>
              <td align="left">The attestation statement is unacceptable (e.g. not signed by an attestation authority trusted by the CA)</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <!-- End WebAuthn registry text -->

</section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4043">
          <front>
            <title>Internet X.509 Public Key Infrastructure Permanent Identifier</title>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="T. Gindin" initials="T." surname="Gindin"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines a new form of name, called permanent identifier, that may be included in the subjectAltName extension of a public key certificate issued to an entity.</t>
              <t>The permanent identifier is an optional feature that may be used by a CA to indicate that two or more certificates relate to the same entity, even if they contain different subject name (DNs) or different names in the subjectAltName extension, or if the name or the affiliation of that entity stored in the subject or another name form in the subjectAltName extension has changed.</t>
              <t>The subject name, carried in the subject field, is only unique for each subject entity certified by the one CA as defined by the issuer name field. However, the new name form can carry a name that is unique for each subject entity certified by a CA. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4043"/>
          <seriesInfo name="DOI" value="10.17487/RFC4043"/>
        </reference>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC8809">
          <front>
            <title>Registries for Web Authentication (WebAuthn)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This specification defines IANA registries for W3C Web Authentication (WebAuthn) attestation statement format identifiers and extension identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8809"/>
          <seriesInfo name="DOI" value="10.17487/RFC8809"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="WebAuthn" target="https://www.w3.org/TR/webauthn-2/">
          <front>
            <title>Web Authentication: An API for accessing Public Key Credentials Level 2</title>
            <author fullname="Jeff Hodges">
              <organization>Google</organization>
            </author>
            <author fullname="J.C. Jones">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Michael B. Jones">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Akshay Kumar">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Emil Lundberg">
              <organization>Yubico</organization>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-Webauthn" target="https://www.iana.org/assignments/webauthn/webauthn.xhtml">
          <front>
            <title>IANA Registries for Web Authentication (WebAuthn)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 451?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank the participants on the ACME Working Group mailing list for their insightful feedback and comments. In particular, the authors extend sincere appreciation to Mike Ounsworth, Deb Cooley, Aaron Gable, Richard Barnes, and  Herman Slatman for their reviews and suggestions, which greatly improved the quality of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
