<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-ar4si-10" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="Attestation Results">Attestation Results for Secure Interactions</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-10"/>
    <author initials="E." surname="Voit" fullname="Eric Voit">
      <organization abbrev="Cisco">Cisco Systems</organization>
      <address>
        <email>evoit@cisco.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Hardjono" fullname="Thomas Hardjono">
      <organization>MIT</organization>
      <address>
        <email>hardjono@mit.edu</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="V." surname="Scarlata" fullname="Vincent Scarlata">
      <organization>Intel</organization>
      <address>
        <email>vincent.r.scarlata@intel.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="18"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 106?>

<t>This document defines reusable Attestation Result information elements.
When these elements are offered to Relying Parties as Evidence, different aspects of Attester trustworthiness can be evaluated.
Additionally, where the Relying Party is interfacing with a heterogeneous mix of Attesting Environment and Verifier types, consistent policies can be applied to subsequent information exchange between each Attester and the Relying Party.</t>
      <t>This document also defines two serialisations of the proposed information model, utilising CBOR and JSON.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-ar4si"/>.</t>
    </note>
  </front>
  <middle>
    <?line 114?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The first paragraph of the May 2021 US Presidential Executive Order on Improving the Nation's Cybersecurity <xref target="US-Executive-Order"/> ends with the statement "the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is."
Later this order explores aspects of trustworthiness such as an auditable trust relationship, which it defines as an "agreed-upon relationship between two or more system elements that is governed by criteria for secure interaction, behavior, and outcomes."</t>
      <t>The Remote ATtestation procedureS (RATS) architecture <xref target="RFC9334"/> provides a useful context for programmatically establishing and maintaining such auditable trust relationships.
Specifically, the architecture defines conceptual messages conveyed between architectural subsystems to support trustworthiness appraisal.
The RATS conceptual message used to convey evidence of trustworthiness is the Attestation Results.
The Attestation Results includes Verifier generated appraisals of an Attester including such information as the identity of the Attester, the security mechanisms employed on this Attester, and the Attester's current state of trustworthiness.</t>
      <t>Generated Attestation Results are ultimately conveyed to one or more Relying Parties.
Reception of an Attestation Result enables a Relying Party to determine what action to take with regards to an Attester.
Frequently, this action will be to choose whether to allow the Attester to securely interact with the Relying Party over some connection between the two.</t>
      <t>When determining whether to allow secure interactions with an Attester, a Relying Party is challenged with a number of difficult problems which it must be able to handle successfully.
These problems include:</t>
      <ul spacing="normal">
        <li>
          <t>What Attestation Results (AR) might a Relying Party be willing to trust from a specific Verifier?</t>
        </li>
        <li>
          <t>What information does a Relying Party need before allowing interactions or choosing policies to apply to a connection?</t>
        </li>
        <li>
          <t>What are the operating/environmental realities of the Attesting Environment where a Relying Party should only be able to associate a certain confidence regarding Attestation Results out of the Verifier?  (In other words, different types of Trusted Execution Environments (TEE) need not be treated as equivalent.)</t>
        </li>
        <li>
          <t>How to make direct comparisons where there is a heterogeneous mix of Attesting Environments and Verifier types.</t>
        </li>
      </ul>
      <t>To address these problems, it is important that specific Attestation Result information elements are framed independently of Attesting Environment specific constraints.
If they are not, a Relying Party would be forced to adapt to the syntax and semantics of many vendor specific environments.
This is not a reasonable ask as there can be many types of Attesters interacting with or connecting to a Relying Party.</t>
      <t>The business need therefore is for common Attestation Result information element definitions.
With these definitions, consistent interaction or connectivity decisions can be made by a Relying Party where there is a heterogenous mix of Attesting Environment types and Verifier types.</t>
      <t>This document defines information elements for Attestation Results in a way which normalizes the trustworthiness assertions that can be made from a diverse set of Attesters.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The following terms are imported from <xref target="RFC9334"/>:
Appraisal Policy for Attestation Results, Attester, Attesting Environment, Claims, Evidence, Relying Party, Target Environment and Verifier.</t>
        <t><xref target="RFC9334"/> also describes topological patterns that illustrate the need for interoperable conceptual messages.
The two patterns called "background-check model" and "passport model" are imported from the RATS architecture and used in this document as a reference to the architectural concepts:
Background-Check Model and Passport Model.</t>
        <t>Newly defined terms for this document:</t>
        <dl>
          <dt>AR-augmented Evidence:</dt>
          <dd>
            <t>a bundle of Evidence which includes at least the following:
</t>
            <ol spacing="normal" type="1"><li>
                <t>Verifier signed Attestation Results.
These Attestation Results must include Identity Evidence for the Attester, a Trustworthiness Vector describing a Verifier's most recent appraisal of an Attester, and some Verifier Proof-of-Freshness (PoF).</t>
              </li>
              <li>
                <t>A Relying Party PoF which is bound to the Attestation Results of (1) by the Attester's Attesting Environment signature.</t>
              </li>
              <li>
                <t>Sufficient information to determine the elapsed interval between the Verifier PoF and Relying Party PoF.</t>
              </li>
            </ol>
          </dd>
          <dt>Identity Evidence:</dt>
          <dd>
            <t>Evidence which unambiguously identifies an Attesting Environment entity.
Identity Evidence could take different forms, such as a certificate, or a signature which can be appraised to have only been generated by a specific private/public key pair.</t>
          </dd>
          <dt>Trustworthiness Claim:</dt>
          <dd>
            <t>a specific quanta of trustworthiness which can be assigned by a Verifier based on its appraisal policy.</t>
          </dd>
          <dt>Trustworthiness Tier:</dt>
          <dd>
            <t>a categorization of the levels of trustworthiness which may be assigned by a Verifier to a specific Trustworthiness Claim.
These enumerated categories are: Affirming, Warning, Contraindicated, and None.</t>
          </dd>
          <dt>Trustworthiness Vector:</dt>
          <dd>
            <t>a set of Trustworthiness Claims assigned during a single appraisal procedure by a Verifier using Evidence generated by an Attester.
The vector is included within Attestation Results.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="attestation-results-for-secure-interactions">
      <name>Attestation Results for Secure Interactions</name>
      <t>A Verifier generates the Attestation Results used by a Relying Party.
When a Relying Party needs to determine whether communications with an Attester is trustworthy, these Attestation Results must contain a specific set of information elements.
This section defines those information elements, and in some cases encodings for information elements.</t>
      <section anchor="information-driving-a-relying-party-action">
        <name>Information driving a Relying Party Action</name>
        <t>During a communication establishment attempt with an Attester, there is only a limited set of actions which a Relying Party might take.
These actions include:</t>
        <ul spacing="normal">
          <li>
            <t>Allow or deny information exchange with the Attester.
When there is a deny, reasons should be returned to the Attester.</t>
          </li>
          <li>
            <t>Establish a transport connection between an Attester and a specific context within a Relying Party (e.g., a TEE, or Virtual Routing Function (VRF).)</t>
          </li>
          <li>
            <t>Apply policies on this connection (e.g., rate limits).</t>
          </li>
        </ul>
        <t>There are three categories of information which must be conveyed to the Relying Party (which also is integrated with a Verifier) before it determines which of these actions to take.</t>
        <ol spacing="normal" type="1"><li>
            <t>Non-repudiable Identity Evidence</t>
          </li>
          <li>
            <t>Trustworthiness Claims</t>
          </li>
          <li>
            <t>Claim Freshness</t>
          </li>
        </ol>
        <t>The following sections detail requirements for these three categories.</t>
      </section>
      <section anchor="identity-section">
        <name>Non-repudiable Identity</name>
        <t>Identity Evidence must be conveyed during the establishment of any trust-based relationship.
Specific use cases will define the minimum types of identities required by a particular Relying Party as it evaluates Attestation Results, and perhaps additional associated Evidence.
At a bare minimum, a Relying Party MUST start with the ability to verify the identity of a Verifier it chooses to trust.</t>
        <t>Attester identities may then be acquired through signed or encrypted communications with the Verifier identity and/or the pre-provisioning Attester public keys in the Attester.</t>
        <t>During the Remote Attestation process, the Verifier's identity must be established with a Relying Party, often via a Verifier signature across recent Attestation Results.
This Verifier identity could only have come from a key pair maintained by a trusted developer or operator of the Verifier.</t>
        <t>Additionally, each set of Attestation Results must be provably and non-reputably bound to the identity of the original Attesting Environment which was evaluated by the Verifier.
This is accomplished via satisfying two requirements.
First the Verifier signed Attestation Results MUST include sufficient Identity Evidence to ensure that this Attesting Environment signature refers to the same Attesting Environment appraised by the Verifier.
Second, where the passport model is used as a subsystem, an Attesting Environment signature which spans the Verifier signature MUST also be included.
As the Verifier signature already spans the Attester Identity as well as the Attestation Results, this restricts the viability of spoofing attacks.</t>
        <t>In a subset of use cases, these two pieces of Identity Evidence may be sufficient for a Relying Party to successfully meet the criteria for its Appraisal Policy for Attestation Results.
If the use case is a connection request, a Relying Party may simply then establish a transport session with an Attester after a successful appraisal.
However an Appraisal Policy for Attestation Results will often be more nuanced, and the Relying Party may need additional information.
Some Identity Evidence related policy questions which the Relying Party may consider include:</t>
        <ul spacing="normal">
          <li>
            <t>Does the Relying Party only trust this Verifier to make Trustworthiness Claims on behalf a specific type of Attesting Environment?  Might a mix of Verifiers be necessary to cover all mandatory Trustworthiness Claims?</t>
          </li>
          <li>
            <t>Does the Relying Party only accept connections from a verified-authentic software build from a specific software developer?</t>
          </li>
          <li>
            <t>Does the Relying Party only accept connections from specific preconfigured list of Attesters?</t>
          </li>
        </ul>
        <t>For any of these more nuanced appraisals, additional Identity Evidence or other policy related information must be conveyed or pre-provisioned during the formation of a trust context between the Relying Party, the Attester, the Attester's Attesting Environment, and the Verifier.</t>
        <section anchor="attester-and-attesting-environment">
          <name>Attester and Attesting Environment</name>
          <t>Per <xref target="RFC9334"/> Figure 2, an Attester and a corresponding Attesting Environment might not share common code or even hardware boundaries.
Consequently, an Attester implementation needs to ensure that any Evidence which originates from outside the Attesting Environment MUST have been collected and delivered securely before any Attesting Environment signing may occur.
After the Verifier performs its appraisal, it will include sufficient information in the Attestation Results to enable a Relying Party to have confidence that the Attester's trustworthiness is represented via Trustworthiness Claims signed by the appropriate Attesting Environment.</t>
          <t>This document recognizes three general categories of Attesters.</t>
          <ol spacing="normal" type="1"><li>
              <t>HSM-based: A Hardware Security Module (HSM) based cryptoprocessor which hashes one or more streams of security measurements from an Attester within the Attesting Environment. Maintenance of this hash enables detection of an Attester which is not reporting the exact set of security measurements (such as log entries) taken within the Attesting Environment. An example of a HSM is a TPM2.0 <xref target="TPM2.0"/>.</t>
            </li>
            <li>
              <t>Process-based: An individual process which has its runtime memory encrypted by an Attesting Environment in a way that no other processes can read and decrypt that memory (e.g., <xref target="SGX"/> or <xref target="RFC9783"/>.)</t>
            </li>
            <li>
              <t>VM-based: An entire Guest VM (or a set of containers within a host) have been encrypted as a walled-garden unit by an Attesting Environment.  The result is that the host operating system cannot read and decrypt what is executing within that VM (e.g., <xref target="SEV-SNP"/>, <xref target="TDX"/> or <xref target="ARM-CCA"/>.)</t>
            </li>
          </ol>
          <t>Each of these categories of Attesters above will be capable of generating Evidence which is protected using private keys / certificates which are not accessible outside of the corresponding Attesting Environment.
The owner of these secrets is the owner of the identity which is bound within the Attesting Environment.
Effectively this means that for any Attester identity, there will exist a chain of trust ultimately bound to a hardware-based root of trust in the Attesting Environment.
It is upon this root of trust that unique, non-repudiable Attester identities may be founded.</t>
          <t>There are several types of Attester identities defined in this document.  This list is extensible:</t>
          <ul spacing="normal">
            <li>
              <t>chip-vendor: the vendor of the hardware chip used for the Attesting Environment (e.g., a primary Endorsement Key from a TPM)</t>
            </li>
            <li>
              <t>chip-hardware: specific hardware with specific firmware from an 'chip-vendor'</t>
            </li>
            <li>
              <t>target-environment: a unique instance of a software build running in an Attester (e.g., MRENCLAVE <xref target="SGX"/>, an Identity Block <xref target="SEV-SNP"/>, a Realm Initial Measurement (RIM) <xref target="ARM-CCA"/>, or a hash which represents a set of software loaded since boot (e.g., TPM based integrity verification.))</t>
            </li>
            <li>
              <t>target-developer: the organizational unit responsible for a particular 'target-environment' (e.g., MRSIGNER <xref target="SGX"/>)</t>
            </li>
            <li>
              <t>instance: a unique instantiated instance of an Attesting Environment running on 'chip-hardware' (e.g., an LDevID <xref target="IEEE802.1AR"/>, an Instance ID <xref target="RFC9783"/> <xref target="ARM-CCA"/>)</t>
            </li>
          </ul>
          <t>Based on the category of the Attesting Environment, different types of identities might be exposed by an Attester.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Attester Identity type</th>
                <th align="left">Process-based</th>
                <th align="left">VM-based</th>
                <th align="left">HSM-based</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">chip-vendor</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
              </tr>
              <tr>
                <td align="left">chip-hardware</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
              </tr>
              <tr>
                <td align="left">target-environment</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Optional</td>
              </tr>
              <tr>
                <td align="left">target-developer</td>
                <td align="left">Mandatory</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
              </tr>
              <tr>
                <td align="left">instance</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
              </tr>
            </tbody>
          </table>
          <t>It is expected that drafts subsequent to this specification will provide the definitions and value domains for specific identities, each of which falling within the Attester identity types listed above.
In some cases the actual unique identities might be encoded as complex structures.
An example complex structure might be a 'target-environment' encoded as a Software Bill of Materials (SBOM).</t>
          <t>With the identity definitions and value domains, a Relying Party will have sufficient information to ensure that the Attester identities and Trustworthiness Claims asserted are actually capable of being supported by the underlying type of Attesting Environment.
Consequently, the Relying Party SHOULD require Identity Evidence which indicates of the type of Attesting Environment when it considers its Appraisal Policy for Attestation Results.</t>
        </section>
        <section anchor="sec-verifier">
          <name>Verifier</name>
          <t>For the Verifier identity, it is critical for a Relying Party to review the certificate and chain of trust for that Verifier.
Additionally, the Relying Party must have confidence that the Trustworthiness Claims being relied upon from the Verifier considered the chain of trust for the Attesting Environment.</t>
          <t>There are two categorizations of Verifier identities defined in this document:</t>
          <ul spacing="normal">
            <li>
              <t>verifier build: a unique instance of a software build running as a Verifier.</t>
            </li>
            <li>
              <t>verifier developer: the organizational unit responsible for a particular 'verifier build'.</t>
            </li>
          </ul>
          <t>Within each category, communicating the identity can be accomplished via a variety of objects and encodings.</t>
        </section>
        <section anchor="communicating-identity">
          <name>Communicating Identity</name>
          <t>Any of the above identities used by the Appraisal Policy for Attestation Results needed to be pre-established by the Relying Party before, or provided during, the exchange of Attestation Results.
When provided during this exchange, the identity may be communicated either implicitly or explicitly.</t>
          <t>An example of explicit communication would be to include the following Identity Evidence directly within the Attestation Results: a unique identifier for an Attesting Environment, the name of a key which can be provably associated with that unique identifier, and the set of Attestation Results which are signed using that key.
As these Attestation Results are signed by the Verifier, it is the Verifier which is explicitly asserting the credentials it believes are trustworthy.</t>
          <t>An example of implicit communication would be to include Identity Evidence in the form of a signature which has been placed over the Attestation Results asserted by a Verifier.
It would be then up to the Relying Party's Appraisal Policy for Attestation Results to extract this signature and confirm that it only could have been generated by an Attesting Environment having access to a specific private key.
This implicit identity communication is only viable if the Attesting Environment's public key is already known by the Relying Party.</t>
          <t>One final step in communicating identity is proving the freshness of the Attestation Results to the degree needed by the Relying Party.
A typical way to accomplish this is to include an element of freshness be embedded within a signed portion of the Attestation Results.
This element of freshness reduces the identity spoofing risks from a replay attack.
For more on this, see <xref target="freshness-section"/>.</t>
        </section>
      </section>
      <section anchor="vector-section">
        <name>Trustworthiness Claims</name>
        <section anchor="design-principles">
          <name>Design Principles</name>
          <t>Trust is not absolute.
Trust is a belief in some aspect about an entity (in this case an Attester), and that this aspect is something which can be depended upon (in this case by a Relying Party.)
Within the context of Remote Attestation, believability of this aspect is facilitated by a Verifier.
This facilitation depends on the Verifier's ability to parse detailed Evidence from an Attester and then to assert conclusions about this aspect in a way interpretable by a Relying Party.</t>
          <t>Specific aspects for which a Verifier will assert trustworthiness are defined in this section.
These are known as Trustworthiness Claims.
These claims have been designed to enable a common understanding between a broad array of Attesters, Verifiers, and Relying Parties.
The following set of design principles have been applied in the Trustworthiness Claim definitions:</t>
          <ol spacing="normal" type="1"><li>
              <t>Expose a small number of Trustworthiness Claims.  </t>
              <t>
Reason: a plethora of similar Trustworthiness Claims will result in divergent choices made on which to support between different Verifiers.  This would place a lot of complexity in the Relying Party as it would be up to the Relying Party (and its policy language) to enable normalization across rich but incompatible Verifier object definitions.</t>
            </li>
            <li>
              <t>Each Trustworthiness Claim enumerates only the specific states that could viably result in a different outcome after the Policy for Attestation Results has been applied.  </t>
              <t>
Reason: by explicitly disallowing the standardization of enumerated states which cannot easily be connected to a use case, we avoid forcing implementers from making incompatible guesses on what these states might mean.</t>
            </li>
            <li>
              <t>Verifier and RP developers need explicit definitions of each state in order to accomplish the goals of (1) and (2).  </t>
              <t>
Reason: without such guidance, the Verifier will append plenty of raw supporting info.  This relieves the Verifier of making the hard decisions.  Of course, this raw info will be mostly non-interpretable and therefore non-actionable by the Relying Party.</t>
            </li>
            <li>
              <t>Support standards and non-standard extensibility for (1) and (2).  </t>
              <t>
Reason: standard types of Verifier generated Trustworthiness Claims should be vetted by the full RATS working group, rather than being maintained in a repository which doesn't follow the RFC process.  This will keep a tight lid on extensions which must be considered by the Relying Party's policy language.  Because this process takes time, non-standard extensions will be needed for implementation speed and flexibility.</t>
            </li>
          </ol>
          <t>These design principles are important to keep the number of Verifier generated claims low, and to retain the complexity in the Verifier rather than the Relying Party.</t>
        </section>
        <section anchor="sec-enum-encoding">
          <name>Enumeration Encoding</name>
          <t>Per design principle (2), each Trustworthiness Claim will only expose specific encoded values.
To simplify the processing of these enumerations by the Relying Party, the enumeration will be encoded as a single signed 8 bit integer.  These value assignments for this integer will be in four Trustworthiness Tiers which follow these guidelines:</t>
          <t>None: The Verifier makes no assertions regarding this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>
              <t>Value 0: The Evidence received is insufficient to make a conclusion. Note: this should always be always treated equivalently by the Relying Party as no claim being made. I.e., the RP's Appraisal Policy for Attestation Results SHOULD NOT make any distinction between a Trustworthiness Claim with enumeration '0', and no Trustworthiness Claim being provided.</t>
            </li>
            <li>
              <t>Value 1: The Evidence received contains unknown elements which the Verifier is unable to evaluate. An example might be that the wrong type of Evidence has been delivered.  Another  case is that of Evidence coming from a composite Attester: a Verifier may understand only part of it and leave as "unknown" the Trustworthiness claims related to features it can't appraise.</t>
            </li>
            <li>
              <t>Value -1: A verifier malfunction occurred during the Verifier's appraisal processing.</t>
            </li>
          </ul>
          <t>Affirming: The Verifier affirms the Attester support for this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>
              <t>Values 2 to 31: A standards enumerated reason for affirming.</t>
            </li>
            <li>
              <t>Values -2 to -32: A non-standard reason for affirming.</t>
            </li>
          </ul>
          <t>Warning: The Verifier warns about this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>
              <t>Values 32 to 95: A standards enumerated reason for the warning.</t>
            </li>
            <li>
              <t>Values -33 to -96: A non-standard reason for the warning.</t>
            </li>
          </ul>
          <t>Contraindicated: The Verifier asserts the Attester is explicitly untrustworthy in regard to this aspect.</t>
          <ul spacing="normal">
            <li>
              <t>Values 96 to 127: A standards enumerated reason for the contraindication.</t>
            </li>
            <li>
              <t>Values -97 to -128: A non-standard reason for the contraindication.</t>
            </li>
          </ul>
          <t>This enumerated encoding listed above will simplify the Appraisal Policy for Attestation Results.
Such a policies may be as simple as saying that a specific Verifier has recently asserted Trustworthiness Claims, all of which are Affirming.</t>
        </section>
        <section anchor="sec-assign-tc">
          <name>Assigning a Trustworthiness Claim value</name>
          <t>In order to simplify design, only a single encoded value is asserted by a Verifier for any Trustworthiness Claim within a using the following process.</t>
          <ol spacing="normal" type="1"><li>
              <t>If applicable, a Verifier MUST assign a standardized value from the Contraindicated tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a non-standardized value from the Contraindicated tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a standardized value from the Warning tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a non-standardized value from the Warning tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a standardized value from the Affirming tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a non-standardized value from the Affirming tier.</t>
            </li>
            <li>
              <t>Else a Verifier MAY assign a 0 or -1.</t>
            </li>
          </ol>
        </section>
        <section anchor="sec-specific-claims">
          <name>Specific Claims</name>
          <t>The following enumerations apply to all Trustworthiness Claims:</t>
          <dl>
            <dt>0:</dt>
            <dd>
              <t>No assertion</t>
            </dd>
            <dt>1:</dt>
            <dd>
              <t>Evidence contains unknown elements which inhibit Verifier evaluation.</t>
            </dd>
            <dt>-1:</dt>
            <dd>
              <t>Verifier malfunction</t>
            </dd>
            <dt>31:</dt>
            <dd>
              <t>Generic affirming reason</t>
            </dd>
            <dt>95:</dt>
            <dd>
              <t>Generic warning reason</t>
            </dd>
            <dt>99:</dt>
            <dd>
              <t>Cryptographic validation of the Evidence has failed.</t>
            </dd>
            <dt>127:</dt>
            <dd>
              <t>Generic contraindicated reason</t>
            </dd>
          </dl>
          <t>The following Trustworthiness Claims-specific enumerations also apply:</t>
          <dl>
            <dt>configuration:</dt>
            <dd>
              <t>A Verifier has appraised an Attester's configuration, and is able to make conclusions regarding the exposure of known vulnerabilities
</t>
              <dl>
                <dt>2:</dt>
                <dd>
                  <t>The configuration is a known and approved config.</t>
                </dd>
                <dt>3:</dt>
                <dd>
                  <t>The configuration includes or exposes no known vulnerabilities.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>The configuration includes or exposes known vulnerabilities.</t>
                </dd>
                <dt>36:</dt>
                <dd>
                  <t>Elements of the configuration relevant to security are unavailable to the Verifier.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The configuration is unsupportable as it exposes unacceptable security vulnerabilities.</t>
                </dd>
              </dl>
            </dd>
            <dt>executables:</dt>
            <dd>
              <t>A Verifier has appraised and evaluated relevant runtime files, scripts, and/or other objects which have been loaded into the Target environment's memory.
</t>
              <dl>
                <dt>2:</dt>
                <dd>
                  <t>Only a recognized genuine set of approved executables, scripts, files, and/or objects have been loaded during and after the boot process.</t>
                </dd>
                <dt>3:</dt>
                <dd>
                  <t>Only a recognized genuine set of approved executables have been loaded during the boot process.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>Only a recognized genuine set of executables, scripts, files, and/or objects have been loaded.  However the Verifier cannot vouch for a subset of these due to known bugs or other known vulnerabilities.</t>
                </dd>
                <dt>33:</dt>
                <dd>
                  <t>Runtime memory includes executables, scripts, files, and/or objects which are not recognized.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>Runtime memory includes executables, scripts, files, and/or object which are contraindicated.</t>
                </dd>
              </dl>
            </dd>
            <dt>file-system:</dt>
            <dd>
              <t>A Verifier has evaluated a specific set of directories within the Attester's file system.  (Note: the Verifier may or may not indicate what these directory and expected files are via an unspecified management interface.)
</t>
              <dl>
                <dt>2:</dt>
                <dd>
                  <t>Only a recognized set of approved files are found.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>The file system includes unrecognized executables, scripts, or files.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The file system includes contraindicated executables, scripts, or files.</t>
                </dd>
              </dl>
            </dd>
            <dt>hardware:</dt>
            <dd>
              <t>A Verifier has appraised any Attester hardware and firmware which are able to expose fingerprints of their identity and running code.
</t>
              <dl>
                <dt>2:</dt>
                <dd>
                  <t>An Attester has passed its hardware and/or firmware verifications needed to demonstrate that these are genuine/supported.</t>
                </dd>
              </dl>
              <t>32: An Attester contains only genuine/supported hardware and/or firmware, but there are known security vulnerabilities.</t>
              <dl>
                <dt>96:</dt>
                <dd>
                  <t>Attester hardware and/or firmware is recognized, but its trustworthiness is contraindicated.</t>
                </dd>
                <dt>97:</dt>
                <dd>
                  <t>A Verifier does not recognize an Attester's hardware or firmware, but it should be recognized.</t>
                </dd>
              </dl>
            </dd>
            <dt>instance-identity:</dt>
            <dd>
              <t>A Verifier has appraised an Attesting Environment's unique identity based upon private key signed Evidence which can be correlated to a unique instantiated instance of the Attester.  (Note: this Trustworthiness Claim should only be generated if the Verifier actually expects to recognize the unique identity of the Attester.)
</t>
              <dl>
                <dt>2:</dt>
                <dd>
                  <t>The Attesting Environment is recognized, and the associated instance of the Attester is not known to be compromised.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The Attesting Environment is recognized, and but its unique private key indicates a device which is not trustworthy.</t>
                </dd>
                <dt>97:</dt>
                <dd>
                  <t>The Attesting Environment is not recognized; however the Verifier believes it should be.</t>
                </dd>
              </dl>
            </dd>
            <dt>runtime-opaque:</dt>
            <dd>
              <t>A Verifier has appraised the visibility of Attester objects in memory from perspectives outside the Attester.
</t>
              <dl>
                <dt>2:</dt>
                <dd>
                  <t>the Attester's executing Target Environment and Attesting Environments are encrypted and within Trusted Execution Environment(s) opaque to the operating system, virtual machine manager, and peer  applications.  (Note: This value corresponds to the protections asserted by O.RUNTIME_CONFIDENTIALITY from <xref target="GP-TEE-PP"/>)</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>the Attester's executing Target Environment and Attesting Environments inaccessible from any other parallel application or Guest VM running on the Attester's physical device.  (Note that unlike "1" these environments are not encrypted in a way which restricts the Attester's root operator visibility. See O.TA_ISOLATION from <xref target="GP-TEE-PP"/>.)</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The Verifier has concluded that in memory objects are unacceptably visible within the physical host that supports the Attester.</t>
                </dd>
              </dl>
            </dd>
            <dt>sourced-data:</dt>
            <dd>
              <t>A Verifier has evaluated of the integrity of data objects from external systems used by the Attester.
</t>
              <dl>
                <dt>2:</dt>
                <dd>
                  <t>All essential Attester source data objects have been provided by other Attester(s) whose most recent appraisal(s) had both no Trustworthiness Claims of "0" where the current Trustworthiness Claim is "Affirming", as well as no "Warning" or "Contraindicated" Trustworthiness Claims.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>Attester source data objects come from unattested sources, or attested sources with "Warning" type Trustworthiness Claims.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>Attester source data objects come from contraindicated sources.</t>
                </dd>
              </dl>
            </dd>
            <dt>storage-opaque:</dt>
            <dd>
              <t>A Verifier has appraised that an Attester is capable of encrypting persistent storage. (Note: Protections must meet the capabilities of <xref target="OMTP-ATE"/> Section 5, but need not be hardware tamper resistant.)
</t>
              <dl>
                <dt>2:</dt>
                <dd>
                  <t>the Attester encrypts all secrets in persistent storage via using keys which are never visible outside an HSM or the Trusted Execution Environment hardware.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>the Attester encrypts all persistently stored secrets, but without using hardware backed keys</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>There are persistent secrets which are stored unencrypted in an Attester.</t>
                </dd>
              </dl>
            </dd>
          </dl>
          <t>It is possible for additional Trustworthiness Claims and enumerated values to be defined in subsequent documents.
At the same time, the standardized Trustworthiness Claim values listed above have been designed so there is no overlap within a Trustworthiness Tier.
As a result, it is possible to imagine a future where overlapping Trustworthiness Claims within a single Trustworthiness Tier may be defined.
Wherever possible, the Verifier SHOULD assign the best fitting standardized value.</t>
          <t>Where a Relying Party doesn't know how to handle a particular Trustworthiness Claim, it MAY choose an appropriate action based on the Trustworthiness Tier under which the enumerated value fits.</t>
          <t>It is up to the Verifier to publish the types of evaluations it performs when determining how Trustworthiness Claims are derived for a type of any particular type of Attester.
It is out of the scope of this document for the Verifier to provide proof or specific logic on how a particular Trustworthiness Claim which it is asserting was derived.</t>
        </section>
        <section anchor="trustworthiness-vector">
          <name>Trustworthiness Vector</name>
          <t>Multiple Trustworthiness Claims may be asserted about an Attesting Environment at single point in time.
The set of Trustworthiness Claims inserted into an instance of Attestation Results by a Verifier is known as a Trustworthiness Vector.
The order of Claims in the vector is NOT meaningful.
A Trustworthiness Vector with no Trustworthiness Claims (i.e., a null Trustworthiness Vector) is a valid construct.
In this case, the Verifier is making no Trustworthiness Claims but is confirming that an appraisal has been made.</t>
        </section>
        <section anchor="trustworthiness-vector-for-a-type-of-attesting-environment">
          <name>Trustworthiness Vector for a type of Attesting Environment</name>
          <t>Some Trustworthiness Claims are implicit based on the underlying type of Attesting Environment.
For example, a validated MRSIGNER identity can be present where the underlying <xref target="SGX"/> hardware is authentic.
Where such implicit Trustworthiness Claims exist, they do not have to be explicitly included in the Trustworthiness Vector.
However, these implicit Trustworthiness Claims SHOULD be considered as being present by the Relying Party.
Another way of saying this is if a Trustworthiness Claim is automatically supported as a result of coming from a specific type of TEE, that claim need not be redundantly articulated. Such implicit Trustworthiness Claims can be seen in the tables within <xref target="process-based-claims"/> and <xref target="VM-based-claims"/>.</t>
          <t>Additionally, there are some Trustworthiness Claims which cannot be adequately supported by an Attesting Environment.
For example, it would be difficult for an Attester that includes only a TPM (and no other TEE) from ever having a Verifier appraise support for 'runtime-opaque'.
As such, a Relying Party would be acting properly if it rejects any non-supportable Trustworthiness Claims asserted from a Verifier.</t>
          <t>As a result, the need for the ability to carry a specific Trustworthiness Claim will vary by the type of Attesting Environment.
Example mappings can be seen in <xref target="claim-for-TEE-types"/>.</t>
        </section>
      </section>
      <section anchor="freshness-section">
        <name>Freshness</name>
        <t>A Relying Party will care about the recentness of the Attestation Results, and the specific Trustworthiness Claims which are embedded.
All freshness mechanisms of <xref target="RFC9334"/>, Section 10 are supportable by this specification.</t>
        <t>Additionally, a Relying Party may track when a Verifier expires its confidence for the Trustworthiness Claims or the Trustworthiness Vector as a whole.  Mechanisms for such expiry are not defined within this document.</t>
        <t>There is a subset of secure interactions where the freshness of Trustworthiness Claims may need to be revisited asynchronously.
This subset is when trustworthiness depends on the continuous availability of a transport session between the Attester and Relying Party.
With such connectivity dependent Attestation Results, if there is a reboot which resets transport connectivity, all established Trustworthiness Claims should be cleared.
Subsequent connection re-establishment will allow fresh new Trustworthiness Claims to be delivered.</t>
      </section>
    </section>
    <section anchor="sec-dm">
      <name>Data Model</name>
      <t>The following CDDL <xref target="RFC8610"/> defines the necessary AR4SI types for use in CBOR and JSON serializations.</t>
      <t>Other serializations are possible but must be defined in subsequent documents.</t>
      <section anchor="sec-tvector">
        <name>Trustworthiness Vector</name>
        <t>The <tt>trustworthiness-vector</tt> is defined as follows:</t>
        <figure anchor="fig-cddl-tvec">
          <name>Trustworthiness Vector</name>
          <sourcecode type="cddl"><![CDATA[
trustworthiness-vector = non-empty<{
  ? instance-identity-label => trustworthiness-claim
  ? configuration-label => trustworthiness-claim
  ? executables-label => trustworthiness-claim
  ? file-system-label => trustworthiness-claim
  ? hardware-label => trustworthiness-claim
  ? runtime-opaque-label => trustworthiness-claim
  ? storage-opaque-label => trustworthiness-claim
  ? sourced-data-label => trustworthiness-claim
}>

instance-identity-label = JC<"instance-identity", 0>
configuration-label = JC<"configuration", 1>
executables-label = JC<"executables", 2>
file-system-label = JC<"file-system", 3>
hardware-label = JC<"hardware", 4>
runtime-opaque-label = JC<"runtime-opaque", 5>
storage-opaque-label = JC<"storage-opaque", 6>
sourced-data-label = JC<"sourced-data", 7>

trustworthiness-claim = -128..127
]]></sourcecode>
        </figure>
        <t>This type contains an entry for each one of the eight AR4SI appraisals that have been conducted on the submitted evidence (<xref target="sec-specific-claims"/>).</t>
        <t>The value of each entry is chosen in the -128..127 range according to the rules described in <xref target="sec-assign-tc"/> and <xref target="sec-specific-claims"/>.</t>
        <t>All categories are optional.</t>
        <t>A missing entry means that the verifier makes no claim about this specific appraisal facet because the category is not applicable to the submitted evidence.</t>
        <t>As required by the <tt>non-empty</tt> macro, at least one entry MUST be present in the vector.</t>
      </section>
      <section anchor="sec-trusttiers">
        <name>Trustworthiness Tiers</name>
        <t>The <tt>trustworthiness-tier</tt> type represents one of the equivalency classes in which the <tt>trustworthiness-claim</tt> space is partitioned.</t>
        <t>See <xref target="sec-enum-encoding"/> for the details.</t>
        <t>The allowed values for the type are as follows:</t>
        <figure anchor="fig-cddl-ttiers">
          <name>Trustworthiness Tiers</name>
          <sourcecode type="cddl"><![CDATA[
trustworthiness-tier-none-label = JC<"none", 0>
trustworthiness-tier-affirming-label = JC<"affirming", 2>
trustworthiness-tier-warning-label = JC<"warning", 32>
trustworthiness-tier-contraindicated-label = JC<"contraindicated", 96>

trustworthiness-tier /= trustworthiness-tier-none-label
trustworthiness-tier /= trustworthiness-tier-affirming-label
trustworthiness-tier /= trustworthiness-tier-warning-label
trustworthiness-tier /= trustworthiness-tier-contraindicated-label
]]></sourcecode>
        </figure>
      </section>
      <section anchor="dm-verifier-id">
        <name>Verifier ID</name>
        <t>The <tt>verifier-id</tt> type identifies the software that runs the verifier according to the information model defined in <xref target="sec-verifier"/>.</t>
        <figure anchor="fig-cddl-verifier-id">
          <name>Verifier ID</name>
          <sourcecode type="cddl"><![CDATA[
verifier-id = {
  developer-label => text
  build-label => text
}

developer-label = JC<"developer", 0>
build-label = JC<"build", 1>
]]></sourcecode>
        </figure>
        <t>The fields are:</t>
        <dl>
          <dt><tt>build</tt> (mandatory)</dt>
          <dd>
            <t>A text string that uniquely identifies the software build running the verifier.</t>
          </dd>
          <dt><tt>developer</tt> (mandatory)</dt>
          <dd>
            <t>A text string that uniquely identifies the organizational unit responsible for this <tt>build</tt>.</t>
          </dd>
        </dl>
      </section>
      <section anchor="consolidated-cddl">
        <name>Consolidated CDDL</name>
        <t><xref target="fig-cddl"/> contains the CDDL of the entire AR4SI type system.</t>
        <figure anchor="fig-cddl">
          <name>AR4SI CDDL</name>
          <sourcecode type="cddl"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

$.start.$ = trustworthiness-vector / trustworthiness-tier / verifier\
                                          -id / trustworthiness-claim
trustworthiness-vector = non-empty<{
    ? instance-identity-label => trustworthiness-claim,
    ? configuration-label => trustworthiness-claim,
    ? executables-label => trustworthiness-claim,
    ? file-system-label => trustworthiness-claim,
    ? hardware-label => trustworthiness-claim,
    ? runtime-opaque-label => trustworthiness-claim,
    ? storage-opaque-label => trustworthiness-claim,
    ? sourced-data-label => trustworthiness-claim,
}>
instance-identity-label = JC<"instance-identity", 0>
configuration-label = JC<"configuration", 1>
executables-label = JC<"executables", 2>
file-system-label = JC<"file-system", 3>
hardware-label = JC<"hardware", 4>
runtime-opaque-label = JC<"runtime-opaque", 5>
storage-opaque-label = JC<"storage-opaque", 6>
sourced-data-label = JC<"sourced-data", 7>
trustworthiness-claim = -128 .. 127
trustworthiness-tier-none-label = JC<"none", 0>
trustworthiness-tier-affirming-label = JC<"affirming", 2>
trustworthiness-tier-warning-label = JC<"warning", 32>
trustworthiness-tier-contraindicated-label = JC<"contraindicated", \
                                                                  96>
trustworthiness-tier /= trustworthiness-tier-none-label / \
trustworthiness-tier-affirming-label / trustworthiness-tier-warning-\
                   label / trustworthiness-tier-contraindicated-label
verifier-id = {
  developer-label => text,
  build-label => text,
}
developer-label = JC<"developer", 0>
build-label = JC<"build", 1>
non-empty<M> = M .within ({+ any => any})
JSON-ONLY<J> = J .feature "json"
CBOR-ONLY<C> = C .feature "cbor"
JC<J, C> = JSON-ONLY<J> / CBOR-ONLY<C>
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="secure-interactions-models">
      <name>Secure Interactions Models</name>
      <t>There are multiple ways of providing a Trustworthiness Vector to a Relying Party.
This section describes two alternatives.</t>
      <section anchor="background-check">
        <name>Background-Check</name>
        <section anchor="verifier-retrieval">
          <name>Verifier Retrieval</name>
          <t>It is possible to for a Relying Party to follow the Background-Check Model defined in <xref section="5.2" sectionFormat="of" target="RFC9334"/>.
In this case, a Relying Party will receive Attestation Results containing the Trustworthiness Vector directly from a Verifier.
These Attestation Results can then be used by the Relying Party in determining the appropriate treatment for interactions with the Attester.</t>
          <t>While applicable in some cases, the utilization of the Background-Check Model without modification has potential drawbacks in other cases.
These include:</t>
          <ul spacing="normal">
            <li>
              <t>Verifier scale: if the Attester has many Relying Parties, a Verifier appraising that Attester could be frequently be queried based on the same Evidence.</t>
            </li>
            <li>
              <t>Information leak: Evidence which the Attester might consider private can be visible to the Relying Party.  Hiding that Evidence could devalue any resulting appraisal.</t>
            </li>
            <li>
              <t>Latency: a Relying Party will need to wait for the Verifier to return Attestation Results before proceeding with secure interactions with the Attester.</t>
            </li>
          </ul>
          <t>An implementer should examine these potential drawbacks before selecting this alternative.</t>
        </section>
        <section anchor="co-resident-verifier">
          <name>Co-resident Verifier</name>
          <t>A simplified Background-Check Model may exist in a very specific case.
This is where the Relying Party and Verifier functions are co-resident.
This model is appropriate when:</t>
          <ul spacing="normal">
            <li>
              <t>Some hardware-based private key is used by an Attester while proving its identity as part of a mutually authenticated secure channel establishment with the Relying Party, and</t>
            </li>
            <li>
              <t>this Attester identity is accepted as sufficient proof of Attester integrity.</t>
            </li>
          </ul>
          <t>Effectively this means that detailed forensic capabilities of a robust Verifier are unnecessary because it is accepted that the code and operational behavior of the Attester cannot be manipulated after TEE initialization.</t>
          <t>An example of such a scenario may be when an SGX's MRENCLAVE and MRSIGNER values have been associated with a known QUOTE value.
And the code running within the TEE is not modifiable after launch.</t>
        </section>
      </section>
      <section anchor="below-zero-trust">
        <name>Below Zero Trust</name>
        <t>Zero Trust Architectures are referenced in <xref target="US-Executive-Order"/> eleven times.
However despite this high profile, there is an architectural gap with Zero Trust.
The credentials used for authentication and admission control can be manipulated on the endpoint.
Attestation can fill this gap through the generation of a compound credential called AR-augmented Evidence.
This compound credential is rooted in the hardware based Attesting Environment of an endpoint, plus the trustworthiness of a Verifier.
The overall solution is known as "Below Zero Trust" as the compound credential cannot be manipulated or spoofed by an administrator of an endpoint with root access.
This solution is not adversely impacted by the potential drawbacks with pure background-check described above.</t>
        <t>To kick-off the "Below Zero Trust" compound credential creation sequence, a Verifier evaluates an Attester and returns signed Attestation Results back to this original Attester no less frequently than a well-known interval.
This interval may also be asynchronous, based on the changing of certain Evidence as described in <xref target="I-D.ietf-rats-network-device-subscription"/>.</t>
        <t>When a Relying Party is to receive information about the Attester's trustworthiness, the Attesting Environment assembles the minimal set of Evidence which can be used to confirm or refute whether the Attester remains in the state of trustworthiness represented by the AR.
To this Evidence, the Attesting Environment appends the signature from the most recent AR as well as a Relying Party Proof-of-Freshness.
The Attesting Environment then signs the combination.</t>
        <t>The Attester then assembles AR Augmented Evidence by taking the signed combination and appending the full AR. The assembly now consists of two independent but semantically bound sets of signed Evidence.</t>
        <t>The AR Augmented Evidence is then sent to the Relying Party.
The Relying Party then can appraise these semantically bound sets of signed Evidence by applying an Appraisal Policy for Attestation Results as described below.
This policy will consider both the AR as well as additional information about the Attester within the AR Augmented Evidence when determining what action to take.</t>
        <t>This alternative combines the <xref target="RFC9334"/> Sections 5.1 Passport Model and Section 5.2 Background-Check Model.
<xref target="interactions"/> describes this flow of information.
The flows within this combined model are mapped to <xref target="RFC9334"/> in the following way.
"Verifier A" below corresponds to the "Verifier" Figure 5 within <xref target="RFC9334"/>.
And "Relying Party/Verifier B" below corresponds to the union of the "Relying Party" and "Verifier" boxes within Figure 6 of <xref target="RFC9334"/>.
This union is possible because Verifier B can be implemented as a simple, self-contained process.
The resulting combined process can appraise the AR-augmented Evidence to determine whether an Attester qualifies for secure interactions with the Relying Party.
The specific steps of this process are defined later in this section.</t>
        <figure anchor="interactions">
          <name>Below Zero Trust</name>
          <artwork><![CDATA[
  .----------------.
  | Attester       |
  | .-------------.|
  | | Attesting   ||             .----------.    .---------------.
  | | Environment ||             | Verifier |    | Relying Party |
  | '-------------'|             |     A    |    |  / Verifier B |
  '----------------'             '----------'    '---------------'
        time(VG)                       |                 |
          |<------Verifier PoF-------time(NS)            |
          |                            |                 |
 time(EG)(1)------Evidence------------>|                 |
          |                          time(RG)            |
          |<------Attestation Results-(2)                |
          ~                            ~                 ~
        time(VG')?                     |                 |
          ~                            ~                 ~
          |<------Relying Party PoF-----------------(3)time(NS')
          |                            |                 |
time(EG')(4)------AR-augmented Evidence----------------->|
          |                            |   time(RG',RA')(5)
                                                        (6)
                                                         ~
                                                      time(RX')
]]></artwork>
        </figure>
        <t>The interaction model depicted above includes specific time related events from Appendix A of <xref target="RFC9334"/>.
With the identification of these time related events, time duration/interval tracking becomes possible.
Such duration/interval tracking can become important if the Relying Party cares if too much time has elapsed between the Verifier PoF and Relying Party PoF.
If too much time has elapsed, perhaps the Attestation Results themselves are no longer trustworthy.</t>
        <t>Note that while time intervals will often be relevant, there is a simplified case that does not require a Relying Party's PoF in step (3).
In this simplified case, the Relying Party trusts that the Attester cannot be meaningfully changed from the outside during any reportable interval.
Based on that assumption, and when this is the case then the step of the Relying Party PoF can be safely omitted.</t>
        <t>In all cases, appraisal policies define the conditions and prerequisites for when an Attester does qualify for secure interactions.
To qualify, an Attester has to be able to provide all of the mandatory affirming Trustworthiness Claims and identities needed by a Relying Party's Appraisal Policy for Attestation Results, and none of the disqualifying detracting Trustworthiness Claims.</t>
        <t>More details on each interaction step of Below Zero Trust are as follows.
The numbers used in this sequence match to the numbered steps in <xref target="interactions"/>:</t>
        <ol spacing="normal" type="1"><li>
            <t>An Attester sends Evidence which is provably fresh to Verifier A at time(EG).
Freshness from the perspective of Verifier A MAY be established with Verifier PoF such as a nonce.</t>
          </li>
          <li>
            <t>Verifier A appraises (1), then sends the following items back to that Attester within Attestation Results:  </t>
            <ol spacing="normal" type="1"><li>
                <t>the verified identity of the Attesting Environment,</t>
              </li>
              <li>
                <t>the Verifier A appraised Trustworthiness Vector of an Attester,</t>
              </li>
              <li>
                <t>a freshness proof associated with the Attestation Results,</t>
              </li>
              <li>
                <t>a Verifier signature across (2.1) though (2.3).</t>
              </li>
            </ol>
          </li>
          <li>
            <t>At time(EG') a Relying Party PoF (such as a nonce) known to the Relying Party is sent to the Attester.</t>
          </li>
          <li>
            <t>The Attester generates and sends AR-augmented Evidence to the Relying Party/Verifier B.
This AR-augmented Evidence includes:  </t>
            <ol spacing="normal" type="1"><li>
                <t>The Attestation Results from (2)</t>
              </li>
              <li>
                <t>Any (optionally) new incremental Evidence from the Attesting Environment</t>
              </li>
              <li>
                <t>Attestation Environment signature which spans a hash of the Attestation Results (such as the signature of (2.4)), the proof-of-freshness from (3), and (4.2).  Note: this construct allows the delta of time between (2.3) and (3) to be definitively calculated by the Relying Party.</t>
              </li>
            </ol>
          </li>
          <li>
            <t>On receipt of (4), the Relying Party applies its Appraisal Policy for Attestation Results.
At minimum, this appraisal policy process must include the following:  </t>
            <ol spacing="normal" type="1"><li>
                <t>Verify that (4.3) includes the nonce from (3).</t>
              </li>
              <li>
                <t>Use a local certificate to validate the signature (4.1).</t>
              </li>
              <li>
                <t>Verify that the hash from (4.3) matches (4.1)</t>
              </li>
              <li>
                <t>Use the identity of (2.1) to validate the signature of (4.3).</t>
              </li>
              <li>
                <t>Failure of any steps (5.1) through (5.4) means the link does not meet minimum validation criteria, therefore appraise the link as having a null Verifier B Trustworthiness Vector.
Jump to step (6.1).</t>
              </li>
              <li>
                <t>When there is large or uncertain time gap between time(EG) and time(EG'), the link should be assigned a null Verifier B Trustworthiness Vector.
Jump to step (6.1).</t>
              </li>
              <li>
                <t>Assemble the Verifier B Trustworthiness Vector
                </t>
                <ol spacing="normal" type="1"><li>
                    <t>Copy Verifier A Trustworthiness Vector to Verifier B Trustworthiness Vector</t>
                  </li>
                  <li>
                    <t>Add implicit Trustworthiness Claims inherent to the type of TEE.</t>
                  </li>
                  <li>
                    <t>Prune any Trustworthiness Claims unsupportable by the Attesting Environment.</t>
                  </li>
                  <li>
                    <t>Prune any Trustworthiness Claims the Relying Party doesn't accept from this Verifier.</t>
                  </li>
                </ol>
              </li>
            </ol>
          </li>
          <li>
            <t>The Relying Party takes action based on Verifier B's appraised Trustworthiness Vector, and applies the Appraisal Policy for Attestation Results.  Following is a reasonable process for such evaluation:  </t>
            <ol spacing="normal" type="1"><li>
                <t>Prune any Trustworthiness Claims from the Trustworthiness Vector not used in the Appraisal Policy for Attestation Results.</t>
              </li>
              <li>
                <t>Allow the information exchange from the Attester into a Relying Party context in the Appraisal Policy for Attestation Results where the Verifier B appraised Trustworthiness Vector includes all the mandatory Trustworthiness Claims are in the "Affirming" value range, and none of the disqualifying Trustworthiness Claims are in the "Contraindicated" value range.</t>
              </li>
              <li>
                <t>Disallow any information exchange into a Relying Party context for which that Verifier B appraised Trustworthiness Vector is not qualified.</t>
              </li>
            </ol>
          </li>
        </ol>
        <t>As link layer protocols re-authenticate, steps (1) to (2) and steps (3) to (6) will independently refresh.
This allows the Trustworthiness of Attester to be continuously re-appraised.
There are only specific event triggers which will drive the refresh of Evidence generation (1), Attestation Result generation (2), or AR-augmented Evidence generation (4):</t>
        <ul spacing="normal">
          <li>
            <t>life-cycle events, e.g. a change to an Authentication Secret of the Attester or an update of a software component.</t>
          </li>
          <li>
            <t>uptime-cycle events, e.g. a hard reset or a re-initialization of an Attester.</t>
          </li>
          <li>
            <t>authentication-cycle events, e.g. a link-layer interface reset could result in a new (4).</t>
          </li>
        </ul>
      </section>
      <section anchor="mutual-attestation">
        <name>Mutual Attestation</name>
        <t>In the interaction models described above, each device on either side of a secure interaction may require remote attestation of its peer.
This process is known as mutual-attestation.
To support mutual-attestation, the interaction models listed above may be run independently on either side of the connection.</t>
      </section>
      <section anchor="transport-protocol-integration">
        <name>Transport Protocol Integration</name>
        <t>Either unidirectional attestation or mutual attestation may be supported within the protocol interactions needed for the establishment of a single transport session.
While this document does not mandate specific transport protocols, messages containing the Attestation Results and AR Augmented Evidence can be passed within an authentication framework such the EAP protocol <xref target="RFC5247"/> over TLS <xref target="RFC8446"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Privacy Considerations Text</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security Considerations Text</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>See Body.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="OMTP-ATE" target="https://www.gsma.com/newsroom/wp-content/uploads/2012/03/omtpadvancedtrustedenvironmentomtptr1v11.pdf">
          <front>
            <title>Open Mobile Terminal Platform - Advanced Trusted Environment</title>
            <author>
              <organization/>
            </author>
            <date year="2009" month="May"/>
          </front>
        </reference>
        <reference anchor="GP-TEE-PP" target="https://globalplatform.org/specs-library/tee-protection-profile-v1-3/">
          <front>
            <title>Global Platform TEE Protection Profile v1.3</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="September"/>
          </front>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5247">
          <front>
            <title>Extensible Authentication Protocol (EAP) Key Management Framework</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, enables extensible network access authentication. This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material and parameters generated by EAP authentication algorithms, known as "methods". It also provides a detailed system-level security analysis, describing the conditions under which the key management guidelines described in RFC 4962 can be satisfied. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5247"/>
          <seriesInfo name="DOI" value="10.17487/RFC5247"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TPM-ID" target="https://www.trustedcomputinggroup.org/wp-content/uploads/TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf">
          <front>
            <title>TPM Keys for Platform Identity for TPM 1.2</title>
            <author>
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="SEV-SNP" target="https://www.amd.com/system/files/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf">
          <front>
            <title>AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="SGX" target="https://software.intel.com/content/dam/develop/external/us/en/documents/intel-sgx-support-for-third-party-attestation-801017.pdf">
          <front>
            <title>Supporting Third Party Attestation for Intel SGX with Intel Data Center Attestation Primitives</title>
            <author>
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="TDX" target="https://software.intel.com/content/dam/develop/external/us/en/documents/tdx-whitepaper-final9-17.pdf">
          <front>
            <title>Intel Trust Domain Extensions</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="ARM-CCA">
          <front>
            <title>Arm's Confidential Compute Architecture Reference Attestation Token</title>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek Inc</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   The Arm Confidential Compute Architecture (CCA) is series of hardware
   and software innovations that enhance Arm’s support for Confidential
   Computing for large, compute-intensive workloads.  Devices that
   implement CCA can produce attestation tokens as described in this
   memo, which are the basis for trustworthiness assessment of the
   Confidential Compute environment.  This document specifies the CCA
   attestation token structure and semantics.

   The CCA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by CCA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with Arm's architecture.  It is not a
   standard nor a product of the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ffm-rats-cca-token-03"/>
        </reference>
        <reference anchor="IEEE802.1AR" target="https://ieeexplore.ieee.org/document/8423794">
          <front>
            <title>802.1AR: Secure Device Identity</title>
            <author>
              <organization/>
            </author>
            <date year="2018" month="August" day="02"/>
          </front>
        </reference>
        <reference anchor="RFC9783">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="S. Frost" initials="S." surname="Frost"/>
            <author fullname="M. Brossard" initials="M." surname="Brossard"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Arm's Platform Security Architecture (PSA) is a family of hardware and firmware security specifications, along with open-source reference implementations, aimed at helping device makers and chip manufacturers integrate best-practice security into their products. Devices that comply with PSA can generate attestation tokens as described in this document, which serve as the foundation for various protocols, including secure provisioning and network access control. This document specifies the structure and semantics of the PSA attestation token.</t>
              <t>The PSA attestation token is a profile of the Entity Attestation Token (EAT). This specification describes the claims used in an attestation token generated by PSA-compliant systems, how these claims are serialized for transmission, and how they are cryptographically protected.</t>
              <t>This Informational document is published as an Independent Submission to improve interoperability with Arm's architecture. It is not a standard nor a product of the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9783"/>
          <seriesInfo name="DOI" value="10.17487/RFC9783"/>
        </reference>
        <reference anchor="I-D.ietf-rats-network-device-subscription">
          <front>
            <title>Attestation Event Stream Subscription</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="30" month="March" year="2026"/>
            <abstract>
              <t>   This document defines how to subscribe to YANG Event Streams for
   Remote Attestation Procedures (RATS).  Specifically, this document
   defines a YANG module that augments the YANG module for TPM-based
   Challenge-Response Remote Attestation (CHARRA), enabling subscription
   to RATS Conceptual Messages of the Evidence type and auxiliary Event
   Logs as part of that Evidence.  The module defined requires that at
   least one TPM 1.2 or TPM 2.0 (or equivalent hardware implementation
   providing the same protected capabilities as a TPM) must be available
   on the Attester on which the YANG server is running.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-network-device-subscription-11"/>
        </reference>
        <reference anchor="TPM2.0" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-1-Architecture-01.07-2014-03-13.pdf">
          <front>
            <title>Trusted Platform Module Library - Part 1: Architecture</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="US-Executive-Order" target="https://bidenwhitehouse.archives.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">
          <front>
            <title>Executive Order on Improving the Nation's Cybersecurity</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="May" day="12"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 897?>

<section anchor="implementation-guidance">
      <name>Implementation Guidance</name>
      <section anchor="supplementing-trustworthiness-claims">
        <name>Supplementing Trustworthiness Claims</name>
        <t>What has been encoded into each Trustworthiness Claim is the domain of integer values which is likely to drive a different programmatic decision in the Relying Party's Appraisal Policy for Attestation Results.
This will not be the only thing a Relying Party's Operations team might care to track for measurement or debugging purposes.</t>
        <t>There is also the opportunity for the Verifier to include supplementary Evidence beyond a set of asserted Trustworthiness Claims.
It is recommended that if supplementary Evidence is provided by the Verifier within the Attestation Results, that this supplementary Evidence includes a reference to a specific Trustworthiness Claim.
This will allow a deeper understanding of some of the reasoning behind the integer value assigned.</t>
      </section>
    </section>
    <section anchor="claim-for-TEE-types">
      <name>Supportable Trustworthiness Claims</name>
      <t>The following is a table which shows what Claims are supportable by different Attesting Environment types.
Note that claims MAY BE implicit to an Attesting Environment type, and therefore do not have to be included in the Trustworthiness Vector to be considered as set by the Relying Party.</t>
      <section anchor="supportable-trustworthiness-claims-for-hsm-based-cc">
        <name>Supportable Trustworthiness Claims for HSM-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a HSM-based Confidential Computing Attester. (Such as a TPM <xref target="TPM-ID"/>.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">Verifier evaluation of Attester reveals no configuration lines which expose the Attester to known security vulnerabilities.  This may be done with or without the involvement of a TPM PCR.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Yes</td>
              <td align="left">Checks the TPM PCRs for the static operating system, and for any tracked files subsequently loaded</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">No</td>
              <td align="left">Can be supported, but TPM tracking is unlikely</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Yes</td>
              <td align="left">If TPM PCR check ok from BIOS checks, through Master Boot Record configuration</td>
            </tr>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Check IDevID</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">n/a</td>
              <td align="left">TPMs are not recommended to provide a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">n/a</td>
              <td align="left">TPMs are not recommended to provide a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Minimal</td>
              <td align="left">With a TPM, secure storage space exists and is writeable by external applications. But the space is so limited that it often is used just be used to store keys.</td>
            </tr>
          </tbody>
        </table>
        <t>Setting the Trustworthiness Claims may follow the following logic at the Verifier A within (2) of <xref target="interactions"/>:</t>
        <artwork><![CDATA[
Start: Evidence received starts the generation of a new
Trustworthiness Vector.  (e.g.,  TPM Quote Received, log received,
or appraisal timer expired)

Step 0: set Trustworthiness Vector = Null

Step 1: Is there sufficient fresh signed evidence to appraise?
  (yes) - No Action
  (no) -  Goto Step 6

Step 2: Appraise Hardware Integrity PCRs
   if (hardware NOT "0") - push onto vector
   if (hardware NOT affirming or warning), go to Step 6

Step 3: Appraise Attesting Environment identity
   if (instance-identity <> "0") - push onto vector

Step 4: Appraise executable loaded and filesystem integrity
   if (executables NOT "0") - push onto vector
   if (executables NOT affirming or warning), go to Step 6

Step 5: Appraise all remaining Trustworthiness Claims
        Independently and set as appropriate.

Step 6: Assemble Attestation Results, and push to Attester

End

]]></artwork>
      </section>
      <section anchor="process-based-claims">
        <name>Supportable Trustworthiness Claims for process-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a process-based Confidential Computing based Attester. (Such as a SGX Enclaves and TrustZone.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">If done, this is at the Application Layer.  Plus each process needs its own protection mechanism as the protection is limited to the process itself.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">Optional</td>
              <td align="left">Can be supported by application, but process-based CC is not a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Implicit in signature</td>
              <td align="left">At least the TEE is protected here. Other elements of the system outside of the TEE might need additional protections is used by the application process.</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">From the TEE</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">Although the application must assert that this function is used by the code itself.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">Optional</td>
              <td align="left">Will need to be supported by application code</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="VM-based-claims">
        <name>Supportable Trustworthiness Claims for VM-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a VM-based Confidential Computing based Attester. (Such as SEV, TDX, ACCA, SEV-SNP.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">Requires application integration.  Easier than with process-based solution, as the whole protected machine can be evaluated.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">Optional</td>
              <td align="left">Can be supported by application</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Chip dependent</td>
              <td align="left">At least the TEE is protected here. Other elements of the system outside of the TEE might need additional protections is used by the application process.</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">From the TEE</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Chip dependent</td>
              <td align="left">Although the application must assert that this function is used by the code itself.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">Optional</td>
              <td align="left">Will need to be supported by application code</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="some-issues-being-worked">
      <name>Some issues being worked</name>
      <t>It is possible for a cluster/hierarchy of Verifiers to have aggregate AR which are perhaps signed/endorsed by a lead Verifier.
What should be the Proof-of-Freshness or Verifier associated with any of the aggregate set of Trustworthiness Claims?</t>
      <t>There will need to be a subsequent document which documents how these objects which will be translated into a protocol on a wire (e.g. EAP on TLS).
Some breakpoint between what is in this draft, and what is in specific drafts for wire encoding will need to be determined.
Questions like architecting the cluster/hierarchy of Verifiers fall into this breakdown.</t>
      <t>For some Trustworthiness Claims, there could be value in identifying a specific Appraisal Policy for Attestation Results applied within the Attester.
One way this could be done would be a URI which identifies the policy used at Verifier A, and this URI would reference a specific Trustworthiness Claim.
As the URI also could encode the version of the software, it might also act as a mechanism to signal the Relying Party to refresh/re-evaluate its view of Verifier A.
Do we need this type of structure to be included here?
Should it be in subsequent documents?</t>
      <t>Expand the variant of <xref target="interactions"/> which requires no Relying Party PoF into its own picture.</t>
      <t>In what document (if any) do we attempt normalization of the identity claims between different types of TEE.   E.g., does MRSIGNER plus extra loaded software = the sum of TrustZone Signer IDs for loaded components?</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to
Michael Richardson
for helpful comments, suggestions and discussions that have shaped this document.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="G." surname="Fedorkow" fullname="Guy Fedorkow">
        <organization/>
        <address>
          <email>gfedorkow@juniper.net</email>
        </address>
      </contact>
      <contact initials="D." surname="Thaler" fullname="Dave Thaler">
        <organization/>
        <address>
          <email>dthaler@microsoft.com</email>
        </address>
      </contact>
      <contact initials="N." surname="Smith" fullname="Ned Smith">
        <organization/>
        <address>
          <email>ned.smith@intel.com</email>
        </address>
      </contact>
      <contact initials="L." surname="Lundblade" fullname="Lawrence Lundblade">
        <organization/>
        <address>
          <email>lgl@island-resort.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
