<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-acme-device-attest-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="ACME DA">Automated Certificate Management Environment (ACME) Device Attestation Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-acme-device-attest-04"/>
    <author initials="B." surname="Weeks" fullname="Brandon Weeks">
      <organization abbrev="Google Inc">Google Inc</organization>
      <address>
        <email>me@brandonweeks.com</email>
      </address>
    </author>
    <author initials="G." surname="Mallaya" fullname="Ganesh Mallaya">
      <organization abbrev="AppViewX Inc.">AppViewX Inc.</organization>
      <address>
        <email>ganesh.mallaya@appviewx.com</email>
      </address>
    </author>
    <author initials="S." surname="Rajala" fullname="Sven Rajala">
      <organization abbrev="Keyfactor">Keyfactor</organization>
      <address>
        <email>sven.rajala@keyfactor.com</email>
      </address>
    </author>
    <author initials="C." surname="Bonnell" fullname="Corey Bonnell">
      <organization abbrev="DigiCert, Inc.">DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author initials="R." surname="Hurst" fullname="Ryan Hurst">
      <organization abbrev="Peculiar Ventures">Peculiar Ventures</organization>
      <address>
        <email>ryan.hurst+ietf@peculiarventures.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="05"/>
    <area>Security</area>
    <workgroup>ACME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 84?>

<t>This document specifies new identifiers and a challenge for the Automated Certificate Management Environment (ACME) protocol which allows validating the identity of a device using attestation.</t>
    </abstract>
  </front>
  <middle>
    <?line 88?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Automatic Certificate Management Environment (ACME) <xref target="RFC8555"/> standard specifies methods for validating control over identifiers, such as domain names. It is also useful to be able to validate properties of the device requesting the certificate, such as the identity of the device and whether the certificate key is protected by a secure cryptoprocessor.</t>
      <t>Many operating systems and device vendors offer functionality enabling a device to generate a cryptographic attestation of their identity, such as:</t>
      <ul spacing="normal">
        <li>
          <t><eref target="https://source.android.com/security/keystore/attestation">Android Key Attestation</eref></t>
        </li>
        <li>
          <t><eref target="https://developers.google.com/chrome/verified-access/overview">Chrome OS Verified Access</eref></t>
        </li>
        <li>
          <t><eref target="https://trustedcomputinggroup.org/resource/trusted-platform-module-tpm-summary/">Trusted Platform Module</eref></t>
        </li>
        <li>
          <t><eref target="https://support.apple.com/en-om/guide/deployment/dep28afbde6a/web">Managed Device Attestation for Apple Devices</eref></t>
        </li>
      </ul>
      <t>Using ACME and device attestation to issue client certificates for enterprise PKI will be a common use case. The following variances to the ACME specification are described in this document:</t>
      <ul spacing="normal">
        <li>
          <t>Addition of <tt>permanent-identifier</tt> <xref target="RFC4043"/> and <tt>hardware-module</tt> <xref target="RFC4108"/> identifier types.</t>
        </li>
        <li>
          <t>Addition of the <tt>device-attest-01</tt> challenge type to prove control of the <tt>permanent-identifier</tt> and <tt>hardware-module</tt> identifier types.</t>
        </li>
        <li>
          <t>The challenge response payload contains a serialized WebAuthn attestation statement format instead of an empty JSON object (<tt>{}</tt>).</t>
        </li>
        <li>
          <t>Accounts and external account binding being used as a mechanism to pre-authenticate requests to an enterprise CA.</t>
        </li>
      </ul>
      <t>This document does not specify the attestation verification procedures. Section 13 of <xref target="WebAuthn"/> gives some guidance, however verification procedures are complex and may require changes to address future security issues.</t>
      <t>Efforts are underway within the Remote ATtestation ProcedureS (RATS) working group to define a set of standard formats and protocols for attestation. An explicit aim of this document is to support vendor specific formats and protocols that are widely deployed at publication time of this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="permanent-identifier">
      <name>Permanent Identifier</name>
      <t>A new identifier type, <tt>permanent-identifier</tt> is introduced to represent the identity of a device assigned by the manufacturer, typically a serial number. Additionally, the assigner of the identifier <bcp14>MAY</bcp14> also be specified. The name of this identifier type was chosen to align with <xref target="RFC4043"/>. This specification does not prescribe the lifetime of the identifier, which is at the discretion of the Assigner Authority.</t>
      <t>Although <xref target="RFC4043"/> permits any valid UTF-8 string to be used as the identifier, this specification mandates that identifiers <bcp14>MUST NOT</bcp14> contain the forward-slash "/" (UTF-8: U+002F) character. This restriction is required to make the ABNF production rule for the <tt>permanent-identifier-value</tt> unambiguous.</t>
      <section anchor="representation-in-order-resources">
        <name>Representation in Order resources</name>
        <t>The identifier's <tt>value</tt> field contains a UTF-8 string representation of the identity of the device. In addition to the value being a valid UTF-8 string, the value <bcp14>MUST</bcp14> match the <tt>permanent-identifier-value</tt> production rule as defined in this ABNF <xref target="RFC5234"/> syntax:</t>
        <artwork><![CDATA[
assigner-value = ("0" / "1" / "2")  1*("." 1*DIGIT)
device-identifier-value = 1*(%x00-2E / %x30-FF)

permanent-identifier-value = device-identifier-value ["/" assigner-value]
]]></artwork>
        <t>A valid <tt>permanent-identifier-value</tt> value is a UTF-8 string that contains an identity consisting of one or more characters without any forward-slash "/" (UTF-8: U+002F) characters. Optionally, a forward-slash "/" character and "dotted-decimal" object identifier identifying the assigner may follow the identity. The assigner-value is a dotted-decimal representation of an ASN.1 OBJECT IDENTIFIER.</t>
        <t>The Server <bcp14>MUST</bcp14> verify that identifier values in newOrder requests conform to the <tt>permanent-identifier-value</tt> production rule and <bcp14>MUST</bcp14> reject requests containing non-conforming values with a "malformed" error.</t>
        <t>Example identifier without an assigner:</t>
        <artwork><![CDATA[
{
  "type": "permanent-identifier",
  "value": "ABCDEF123456"
}
]]></artwork>
        <t>Example identifier with an assigner:</t>
        <artwork><![CDATA[
{
  "type": "permanent-identifier",
  "value": "ABCDEF123456/1.2.3.4"
}
]]></artwork>
      </section>
      <section anchor="representation-in-certificate-signing-requests-csrs-and-x509-certificates">
        <name>Representation in Certificate Signing Requests (CSRs) and X.509 Certificates</name>
        <t>This section describes the X.509 representation of the <tt>permanent-identifier</tt>. Other credential types may use the same identifier values with representations appropriate to those credential types.</t>
        <t>The identity is included in the Subject Alternative Name Extension using the <tt>identifierValue</tt> field of the PermanentIdentifier form described in <xref target="RFC4043"/>. Although <xref target="RFC4043"/> permits the requester to include the <tt>identifierValue</tt> in a <tt>serialNumber</tt> subject attribute, this specification mandates that the <tt>identifierValue</tt> field of the PermanentIdentifier <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain the identifier.</t>
        <t>The value of the identifierValue field of the PermanentIdentifier <bcp14>MUST</bcp14> be an octet-for-octet match of the device-identifier-value value as encoded in the Order resource. If the <tt>assigner-value</tt> value is included in the identifier as encoded in the Order resource, then the <tt>assigner</tt> field of the PermanentIdentifier <bcp14>MUST</bcp14> be the encoding of the "dotted-decimal" object identifier encoded as the <tt>assigner-value</tt> value.</t>
        <t>This strict matching requirement ensures that the SAN in the issued certificate appears exactly as it appeared during proof-of-ownership validation, preventing identifier malleability. Serial number allocation schemes may be case-sensitive or otherwise sensitive to exact byte representation, so no normalization or transformation is permitted.</t>
        <t>To ensure that the identifier as presented in the Order resource and CSR match, the Server <bcp14>MUST</bcp14> perform the logical equivalent of extracting the <tt>device-identifier-value</tt> and <tt>assigner-value</tt> values from the CSR and reconstructing the UTF-8 representation of the identifier. The Server <bcp14>MUST</bcp14> then ensure that the UTF-8 representation and the identifier presented in the Order resource are an octet-for-octet match and reject the Order otherwise. Servers that derive identifier values directly from verified attestation evidence and construct the certificate SAN from that evidence, provided the derived values are verified against the attested device identity in the attestation statement, satisfy the intent of this requirement.</t>
        <t><xref target="RFC8555"/> section 7.4 mandates that "The CSR <bcp14>MUST</bcp14> indicate the exact same set of requested identifiers as the initial newOrder request". However, there are some environments where the Server requires validation of the identifier but does not include the identifier in certificates due to privacy concerns. To support privacy-preserving certificates, Clients <bcp14>MAY</bcp14> omit this identifier in the certificate signing request (CSR). Similarly, if the Server wishes to issue privacy-preserving certificates, it <bcp14>MAY</bcp14> reject CSRs containing a PermanentIdentifier in the subjectAltName extension. See the <xref target="privacy-considerations"/> for more information.</t>
      </section>
    </section>
    <section anchor="hardware-module">
      <name>Hardware Module</name>
      <t>A new identifier type, <tt>hardware-module</tt> is introduced to represent the identity of the secure crypto-processor that generated the certificate key. The identity is modeled after the HardwareModuleName form described in <xref target="RFC4108"/>. It consists of two components: an OBJECT IDENTIFIER to represent the type of hardware module, and a serial number that identifies the specific hardware module.</t>
      <t>Although <xref target="RFC4108"/> specifies that serial numbers can be represented as any sequence of bytes, this specification requires that serial numbers <bcp14>MUST</bcp14> be representable as valid UTF-8 strings consisting of at least one code point and <bcp14>MUST NOT</bcp14> contain a forward-slash "/" (UTF-8: U+002F) character. This restriction ensures that serial numbers can be included in <tt>hardware-module</tt> identifier string values and that the ABNF production rule for the value is unambiguous.</t>
      <section anchor="representation-in-order-resources-1">
        <name>Representation in Order resources</name>
        <t>The identifier's <tt>value</tt> field contains a UTF-8 string representation of the identity of the hardware module. In addition to the value being a valid UTF-8 string, the value <bcp14>MUST</bcp14> match the <tt>hardware-module-value</tt> production rule as defined in this ABNF <xref target="RFC5234"/> syntax:</t>
        <artwork><![CDATA[
hw-type-value = ("0" / "1" / "2")  1*("." 1*DIGIT)
hw-serial-num-value = 1*(%x00-2E / %x30-FF)

hardware-module-value = hw-serial-num-value ["/" hw-type-value]
]]></artwork>
        <t>A valid <tt>hardware-module-value</tt> value is a UTF-8 string that contains a serial number consisting of one or more characters without any forward-slash "/" (UTF-8: U+002F) characters. Optionally, a forward-slash "/" character and "dotted-decimal" object identifier identifying the hardware type may follow the serial number.</t>
        <t>The Server <bcp14>MUST</bcp14> verify that identifier values in newOrder requests conform to the <tt>hardware-module-value</tt> production rule and <bcp14>MUST</bcp14> reject requests containing non-conforming values with a "malformed" error.</t>
        <t>Example identifier with the type of the hardware module represented using the OBJECT IDENTIFIER "1.2.3.4" and a serial number of "ABCD":</t>
        <artwork><![CDATA[
{
  "type": `hardware-module`,
  "value": "ABCD/1.2.3.4"
}
]]></artwork>
        <t>Example identifier with no type specified and a serial number of "ABCD":</t>
        <artwork><![CDATA[
{
  "type": `hardware-module`,
  "value": "ABCD"
}
]]></artwork>
      </section>
      <section anchor="representation-in-certificate-signing-requests-and-x509-certificates">
        <name>Representation in Certificate Signing Requests and X.509 Certificates</name>
        <t>This section describes the X.509 representation of the <tt>hardware-module</tt> identifier. Other credential types may use the same identifier values with representations appropriate to those credential types.</t>
        <t>The hardware module identity is included in the Subject Alternate Name Extension using the HardwareModuleName form described in <xref target="RFC4108"/>. The HardwareModuleName is encoded as an otherName with the OID id-on-hardwareModuleName (1.3.6.1.5.5.7.8.4) and consists of:</t>
        <ul spacing="normal">
          <li>
            <t>hwType: An OBJECT IDENTIFIER that identifies the type of hardware module</t>
          </li>
          <li>
            <t>hwSerialNum: An OCTET STRING containing the hardware module serial number</t>
          </li>
        </ul>
        <t>The value of the hwSerialNum field of the HardwareModuleName <bcp14>MUST</bcp14> be an octet-for-octet match of the hw-serial-num-value value as encoded in the Order resource. If the <tt>hw-type-value</tt> value is included in the identifier as encoded in the Order resource, then the <tt>hwType</tt> field of the HardwareModuleName <bcp14>MUST</bcp14> be the encoding of the "dotted-decimal" object identifier encoded as the <tt>hw-type-value</tt> value.</t>
        <t>This strict matching requirement ensures that the SAN in the issued certificate appears exactly as it appeared during proof-of-ownership validation, preventing identifier malleability. Serial number allocation schemes may be case-sensitive or otherwise sensitive to exact byte representation, so no normalization or transformation is permitted.</t>
        <t>To ensure that the identifier as presented in the Order resource and CSR match, the Server <bcp14>MUST</bcp14> perform the logical equivalent of extracting the <tt>hw-serial-num-value</tt> and <tt>hw-type-value</tt> values from the CSR and reconstructing the UTF-8 representation of the identifier. The Server <bcp14>MUST</bcp14> then ensure that the UTF-8 representation and the identifier presented in the Order resource are an octet-for-octet match and reject the Order otherwise. Servers that derive identifier values directly from verified attestation evidence and construct the certificate SAN from that evidence, provided the derived values are verified against the attested device identity in the attestation statement, satisfy the intent of this requirement.</t>
        <t><xref target="RFC8555"/> section 7.4 mandates that "The CSR <bcp14>MUST</bcp14> indicate the exact same set of requested identifiers as the initial newOrder request". However, there are some environments where the Server requires validation of the identifier but does not include the identifier in certificates due to privacy concerns. To support privacy-preserving certificates, Clients <bcp14>MAY</bcp14> omit this identifier in the certificate signing request (CSR). Similarly, if the Server wishes to issue privacy-preserving certificates, it <bcp14>MAY</bcp14> reject CSRs containing a HardwareModuleName in the subjectAltName extension. See the <xref target="privacy-considerations"/> for more information.</t>
      </section>
    </section>
    <section anchor="device-attestation-challenge">
      <name>Device Attestation Challenge</name>
      <t>The Client can prove control over a permanent identifier of a device by providing an attestation statement containing the identifier of the device.</t>
      <t>The device-attest-01 ACME challenge object has the following format:</t>
      <dl>
        <dt>type (required, string):</dt>
        <dd>
          <t>The string "device-attest-01".</t>
        </dd>
        <dt>token (required, string):</dt>
        <dd>
          <t>A random value that uniquely identifies the challenge.</t>
        </dd>
      </dl>
      <artwork><![CDATA[
{
  "type": "device-attest-01",
  "url": "https://example.com/acme/chall/Rg5dV14Gh1Q",
  "status": "pending",
  "token": "evaGxfADs6pSRb2LAv9IZf17Dt3juxGJ-PCt92wr-oA"
}
]]></artwork>
      <t>A Client fulfills this challenge by constructing a key authorization (<xref section="8.1" sectionFormat="of" target="RFC8555"/>) from the "token" value provided in the challenge and the Client's account key. The Client then generates a WebAuthn attestation object using the key authorization as the challenge.</t>
      <t>This specification borrows the WebAuthn <em>attestation object</em> representation as described in Section 6.5.4 of <xref target="WebAuthn"/> for encapsulating attestation formats, but with these modifications:</t>
      <ul spacing="normal">
        <li>
          <t>The key authorization is used to form <em>attToBeSigned</em>. This replaces the concatenation of <em>authenticatorData</em> and <em>clientDataHash</em>. <em>attToBeSigned</em> is hashed using an algorithm specified by the attestation format.</t>
        </li>
        <li>
          <t>Some attestation formats use an external attestation authority that issues a certificate binding the challenge to the device before the Client's account key is available. In these formats, <em>attToBeSigned</em> is formed from the token alone rather than the full key authorization, because the external authority signs at attestation time before the account key thumbprint can be incorporated. The token construction provides freshness. The key authorization construction additionally binds the attestation to a specific account key. The Server <bcp14>MUST</bcp14> consult format-specific documentation to determine which construction applies and <bcp14>MUST</bcp14> verify accordingly. Attestation formats whose signing procedure does not incorporate <em>attToBeSigned</em> cannot be used to satisfy this challenge type.</t>
        </li>
        <li>
          <t>The <em>authData</em> field carries browser-context data (including the RP ID hash) that has no meaning in the ACME context and <bcp14>SHOULD</bcp14> be omitted.</t>
        </li>
      </ul>
      <t>A Client responds with the response object containing the WebAuthn attestation object in the "attObj" field to acknowledge that the challenge can be validated by the Server. Clients <bcp14>MAY</bcp14> include additional fields beyond "attObj" in the response object. Servers <bcp14>MUST</bcp14> ignore unrecognized fields in the challenge response.</t>
      <t>On receiving a response, the Server constructs and stores the key authorization from the challenge's "token" value and the current Client account key.</t>
      <t>To validate a device attestation challenge, the Server performs the following steps:</t>
      <ol spacing="normal" type="1"><li>
          <t>Perform the verification procedures described in Section 6 of <xref target="WebAuthn"/>.</t>
        </li>
        <li>
          <t>Verify that <em>attToBeSigned</em> contains the key authorization or the token, according to the construction required by the attestation format, and that the value matches what the Server stored.</t>
        </li>
        <li>
          <t>Verify that the attestation statement contains a device identifier and that it matches the identifier in the Order. The means by which the identifier is encoded in the attestation statement are specific to the attestation format.</t>
        </li>
      </ol>
      <!-- This specification defines a new challenge response field `attObj` to contain WebAuthn attestation objects as described in Section 7.5.1 of {{RFC8555}}. -->
<artwork><![CDATA[
POST /acme/chall/Rg5dV14Gh1Q
Host: example.com
Content-Type: application/jose+json

{
  "protected": base64url({
    "alg": "ES256",
    "kid": "https://example.com/acme/acct/evOfKhNU60wg",
    "nonce": "SS2sSl1PtspvFZ08kNtzKd",
    "url": "https://example.com/acme/chall/Rg5dV14Gh1Q"
  }),
  "payload": base64url({
    "attObj": base64url(/* WebAuthn attestation object */),
  }),
  "signature": "Q1bURgJoEslbD1c5...3pYdSMLio57mQNN4"
}
]]></artwork>
      <t>The webauthn payload <bcp14>MAY</bcp14> contain any identifiers registered in "WebAuthn Attestation Statement Format Identifiers" and any extensions registered in "WebAuthn Extension Identifiers" <xref target="IANA-Webauthn"/>, <xref target="RFC8809"/>.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Although this document focuses guidance on implementing new identifier types and a challenge for certificate issuance using ACME, it does not define a new protocol, a protocol extension, or an architecture.</t>
      <section anchor="enterprise-pki">
        <name>Enterprise PKI</name>
        <t>ACME was originally envisioned for issuing certificates in the Web PKI, however this extension will primarily be useful in enterprise PKI.</t>
        <section anchor="external-account-binding">
          <name>External Account Binding</name>
          <t>An enterprise CA likely only wants to receive requests from authorized devices. It is <bcp14>RECOMMENDED</bcp14> that the Server require a value for the "externalAccountBinding" field to be present in "newAccount" requests.</t>
          <t>If an enterprise CA desires to limit the number of certificates that can be requested with a given account, including limiting an account to a single certificate, after the desired number of certificates have been issued to an account the Server <bcp14>MAY</bcp14> revoke the account as described in Section 7.1.2 of <xref target="RFC8555"/>.</t>
        </section>
        <section anchor="attestation-posture">
          <name>Attestation Posture</name>
          <t>Enterprise deployments often consist of heterogeneous device fleets where not all devices are capable of hardware attestation. A Server <bcp14>MAY</bcp14> offer device-attest-01 alongside other challenge types within a single authorization, allowing capable devices to complete device-attest-01 while other devices complete an alternative challenge. This posture allows operators to observe fleet attestation coverage before enforcing policy and is compatible with phased deployments.</t>
          <t>Servers <bcp14>MAY</bcp14> rely on other authorization mechanisms, such as external account binding or pre-authorized accounts, to establish device identity instead of completing the device-attest-01 challenge.</t>
        </section>
        <section anchor="multiple-challenge-types">
          <name>Multiple Challenge Types</name>
          <t><xref target="RFC8555"/> permits a Server to offer multiple challenge types within a single authorization, with any one being sufficient to complete it. Servers <bcp14>MAY</bcp14> offer device-attest-01 alongside other challenge types for the same authorization, allowing capable devices to attest while other devices use an alternative challenge type.</t>
        </section>
      </section>
      <section anchor="attestation-trust">
        <name>Attestation Trust</name>
        <t>Attestation formats differ in the authority that enforces the boundary around the attested key and in the claims that authority can make. At one end, dedicated security hardware (such as a TPM or HSM) provides manufacturer-backed guarantees that the key is generated and stored within the hardware and cannot be exported. At the other end, OS-enforced isolation boundaries (such as platform keystores protected by the operating system kernel) provide meaningful key protection guarantees without discrete security hardware. Intermediate cases include TEE-based attestation where a hypervisor or trusted execution environment acts as the authority.</t>
        <t>Servers <bcp14>SHOULD</bcp14> consider the trust properties of each attestation format when establishing issuance policy, including the nature of the authority making the attestation and the key protection guarantees it can assert. The key authorization construction described in <xref target="device-attestation-challenge"/> also contributes to this trust model: formats that use the full key authorization as <em>attToBeSigned</em> bind the attestation to a specific account key, while formats that use the token alone provide freshness without account key binding.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This section analyzes the privacy implications of the <tt>permanent-identifier</tt> and <tt>hardware-module</tt> identifier types introduced in this document. The guidance here is informed by the threat taxonomy defined in <xref target="RFC6973"/> and is intended to help implementers make informed decisions about whether and when to include these identifiers in certificate requests and issued certificates.</t>
      <t>Both identifier types represent unchanging hardware-bound properties of a device. Unlike domain names or other identifiers whose lifetime is bounded by operational changes, these identifiers typically persist across the entire operational life of a device and cannot be rotated or revoked by the device owner. This permanence has material privacy consequences that implementers must weigh carefully.</t>
      <t>The privacy analysis below addresses the two phases in which these identifiers appear: the attestation exchange between the Client and server during challenge validation, and the optional embedding of identifiers in the issued certificate.</t>
      <section anchor="identification-and-correlation">
        <name>Identification and Correlation</name>
        <t>The <tt>permanent-identifier</tt> type encodes a manufacturer assigned device identity, typically a serial number. The <tt>hardware-module</tt> type encodes the identity of the secure cryptoprocessor that generated the certificate key. In both cases, the identifier is globally unique within its assigner scope and unchanging for the lifetime of the device or hardware module.</t>
        <t>From the perspective of <xref target="RFC6973"/> Section 5.2.2, such identifiers enable direct identification of a device across protocol interactions, deployments, and time. Any entity that receives or observes these identifiers, including the server, intermediary infrastructure, and any relying party that processes the issued certificate acquires an observable reference that can be used to track the device's certificate issuance history, renewal patterns, and operational context.</t>
        <t>When the same <tt>permanent-identifier</tt> or <tt>hardware-module</tt> value appears across multiple certificate requests (as it will in any recurring renewal workflow), it enables <xref target="RFC6973"/> correlation: an observer with access to server logs can reconstruct the full lifecycle of a device's certificate activity. Similarly, when such identifiers are included in issued certificates, logging issued certificates in a central location (in certificate transparency logs, etc.) produces a persistent device audit trail regardless of whether the log operator intends to maintain one.</t>
        <t>Implementers <bcp14>SHOULD</bcp14> assess whether the operational benefit of unchanging device identification outweighs this correlation exposure. In deployments where device anonymity or pseudonymity is a requirement, such as systems handling sensitive workloads on behalf of individuals, implementers <bcp14>SHOULD</bcp14> consider whether alternative validation mechanisms that do not bind the certificate to a permanent hardware identifier are more appropriate.</t>
      </section>
      <section anchor="fingerprinting-via-attestation-payloads">
        <name>Fingerprinting via Attestation Payloads</name>
        <t>The <tt>device-attest-01</tt> challenge response carries a WebAuthn attestation object that may contain significantly more information than the identifier value alone. Depending on the attestation format, this payload may include device model, firmware version, bootloader state, hardware security level, and operating system version. Even when the resulting certificate is issued in a privacy-preserving form that omits the identifier from the subjectAltName extension (see Section 3.2 and Section 4.2), the attestation payload itself is transmitted to and evaluated by the server during challenge validation.</t>
        <t>This constitutes a fingerprinting surface as defined in <xref target="RFC6973"/> Section 3.2. The combination of a hardware serial number, hardware type OID, and firmware attestation attributes may uniquely identify not just the device model but the specific device unit, even in the absence of an explicit <tt>permanent-identifier</tt> value. Implementers operating servers may consider applying data minimization principles to attestation payload handling by limiting only the attributes necessary to make the authorization decision should be evaluated, and the full attestation payload <bcp14>SHOULD NOT</bcp14> be retained beyond the duration of the challenge validation exchange unless there is a specific, documented operational requirement to do so.</t>
        <t>Implementers operating ACME Clients <bcp14>SHOULD</bcp14> be aware that the attestation format selected may expose more device state than is necessary to satisfy the server's authorization policy. Where multiple attestation formats are available, Clients <bcp14>SHOULD</bcp14> prefer formats that minimize the set of disclosed attributes.</t>
      </section>
      <section anchor="secondary-use-of-attestation-data">
        <name>Secondary Use of Attestation Data</name>
        <t>The server receives attestation data in the context of authorizing a certificate issuance request. <xref target="RFC6973"/> Section 5.2.3 identifies secondary use as the processing of data for purposes beyond the original collection context and as a distinct privacy threat.</t>
        <t>Attestation payloads received during challenge validation may contain information about device health, software configuration, and hardware capability that is operationally useful beyond certificate issuance. For example, for asset inventory, compliance monitoring, or security posture assessment. Implementers operating servers must clearly define and document the purposes for which attestation data is processed and must not process attestation data for purposes materially different from authorization of the certificate request without explicit policy disclosure to the device owner or operator.</t>
        <t>Implementers integrating ACME device attestation into enterprise PKI platforms should publish a clear attestation data handling policy that specifies what attributes are evaluated, how long they are retained, and whether they are shared with other systems.</t>
      </section>
      <section anchor="privacy-preserving-certificate-issuance">
        <name>Privacy-Preserving Certificate Issuance</name>
        <t>This document provides an explicit mechanism to decouple attestation-based validation from identifier disclosure in the issued certificate. Clients <bcp14>MAY</bcp14> omit the <tt>permanent-identifier</tt> or <tt>hardware-module</tt> from the CSR, and servers <bcp14>MAY</bcp14> issue certificates that do not contain these identifiers in the subjectAltName extension, even when those identifiers were used to authorize the request.</t>
        <t>Implementers should treat this privacy-preserving mode as the default posture unless there is a specific operational requirement for the identifier to appear in the certificate. The following considerations apply to this decision:</t>
        <ul spacing="normal">
          <li>
            <t>If the issued certificate will be presented to relying parties outside the issuing organization's trust boundary, embedding a <tt>permanent-identifier</tt> or <tt>hardware-module</tt> value in the certificate enables those relying parties to correlate certificate presentations with specific physical hardware. This may be acceptable in closed enterprise environments but is likely inappropriate in any context where the certificate is presented to external services, counter-parties, or public infrastructure.</t>
          </li>
          <li>
            <t>If the certificate is used for mutual TLS in a workload identity context, embedding an unchanging hardware identifier couples the cryptographic identity of the workload to the physical device rather than to the logical identity of the workload. This can impede key rotation, device replacement, and workload migration, in addition to creating the correlation risks described above. In such cases, implementers should prefer logical workload identifiers (such as SPIFFE URIs) in the issued certificate and treat the hardware attestation as a bootstrap authorization mechanism only.</t>
          </li>
          <li>
            <t>If the certificate is intended for use in certificate transparency logs, implementers <bcp14>MUST</bcp14> consider that embedding a <tt>permanent-identifier</tt> or <tt>hardware-module</tt> value will make that identifier permanently and publicly discoverable, indexed by issuance time, issuer, and subject. This constitutes an irreversible disclosure under <xref target="RFC6973"/> Section 5.2.4 and should be avoided unless public discoverability of the device identifier is an explicit operational requirement.</t>
          </li>
        </ul>
      </section>
      <section anchor="stored-data-and-account-binding">
        <name>Stored Data and Account Binding</name>
        <t>This document recommends the use of externalAccountBinding to pre-authenticate device requests to an enterprise server. When an ACME account is persistently bound to a device identity, the server's account store contains a durable mapping between the cryptographic account credential and the physical device. Per <xref target="RFC6973"/> Section 5.1.2, this stored association constitutes a target for compromise: an attacker who obtains the account store gains not only account credentials but a historical record of device-to-identity mappings across all certificate issuances.</t>
        <t>Implementers operating servers <bcp14>SHOULD</bcp14> store account-to-device bindings using the minimum fidelity necessary for authorization decisions. Where the operational requirement is only to confirm that a given device is authorized to request certificates, it may be sufficient to store a hash or other one-way transformation of the device identifier rather than the identifier itself. Implementers should also define and enforce retention limits on historical account-to-certificate linkage records.</t>
      </section>
      <section anchor="implementer-decision-guidance">
        <name>Implementer Decision Guidance</name>
        <t>Implementers considering whether to include <tt>permanent-identifier</tt> or <tt>hardware-module</tt> in CSRs and issued certificates <bcp14>SHOULD</bcp14> work through the following questions before enabling these identifiers:</t>
        <ul spacing="normal">
          <li>
            <t>Is unchanging hardware identity in the certificate necessary for the relying party to make authorization decisions, or is it sufficient for the server to have validated it at issuance time? If the latter, prefer privacy-preserving certificate mode.</t>
          </li>
          <li>
            <t>Will the certificate be logged to a certificate transparency log or otherwise made publicly accessible? If so, embedding a permanent hardware identifier creates an irrevocable, publicly indexed disclosure and should be avoided unless explicitly required.</t>
          </li>
          <li>
            <t>Will the certificate be presented to parties outside the issuing organization's administrative control? If so, consider whether those parties should have visibility into the device's hardware identity.</t>
          </li>
          <li>
            <t>Does the deployment have requirements for device replacement or key rotation without service interruption? Binding the certificate's identity to a specific hardware module OID and serial number complicates these operational scenarios and may require reissuance policies that expose additional identifier churn in logs.</t>
          </li>
          <li>
            <t>What is the attestation data handling policy of the server operator? If this is not documented or auditable, device operators <bcp14>SHOULD</bcp14> treat the attestation exchange as a full disclosure of all attributes present in the attestation payload.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Please reference <xref target="RFC8555"/> for other security considerations.</t>
      <t>See Section 13 of <xref target="WebAuthn"/> for additional security considerations related to attestation statement formats, including certificate revocation.</t>
      <t>Key attestation statements may include a variety of information in addition to the public key being attested. While not described in this document, the Server <bcp14>MAY</bcp14> use any policy when evaluating this information. This evaluation can result in rejection of a certificate request that features a verifiable key attestation for the public key contained in the request. For example, an attestation statement may indicate use of an unacceptable firmware version.</t>
      <t>The "token" value <bcp14>MUST</bcp14> have at least 128 bits of entropy. It <bcp14>MUST NOT</bcp14> contain any characters outside the base64url alphabet, including padding characters ("="). See <xref target="I-D.ietf-tls-rfc8446bis"/>, Appendix C.1 for additional information on randomness requirements.</t>
      <t>The binding between the certified public key and the device identifier is established through the attestation statement rather than through the CSR alone. The attestation authority cryptographically binds the public key to the device identity, either by signing the attestation statement directly, by issuing an attestation certificate, or by other cryptographic means specific to the attestation format. The Server verifies this chain: the attestation is produced by a trusted attestation authority, the public key in the attestation matches the public key in the CSR, and the device identifier in the attestation matches the identifier in the Order. This three-way binding is the basis on which the Server can associate a certified public key with a particular device.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="acme-identifier-types">
        <name>ACME Identifier Types</name>
        <t>The "ACME Identifier Types" registry is to be updated to include the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Label</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">permanent-identifier</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">hardware-module</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="acme-validation-method">
        <name>ACME Validation Method</name>
        <t>The "ACME Validation Methods" registry is to be updated to include the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Label</th>
              <th align="left">Identifier Type</th>
              <th align="left">ACME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">device-attest-01</td>
              <td align="left">permanent-identifier</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">device-attest-01</td>
              <td align="left">hardware-module</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <!-- Begin WebAuthn registry text -->
<!-- Editor's note: the below text was written by Carl Wallance as part of draft-wallace-lamps-key-attestation-ext. These registries only need to be established by a single document, so if they are established by another document prior to this document being approved, this text will be removed and replaced with a reference to the other document.  -->

</section>
      <section anchor="new-error-types">
        <name>New Error Types</name>
        <t>This document adds the following entries to the ACME Error Type registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">badAttestationStatement</td>
              <td align="left">The attestation statement is unacceptable (e.g. not signed by an attestation authority trusted by the CA)</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <!-- End WebAuthn registry text -->

</section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4043">
          <front>
            <title>Internet X.509 Public Key Infrastructure Permanent Identifier</title>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="T. Gindin" initials="T." surname="Gindin"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines a new form of name, called permanent identifier, that may be included in the subjectAltName extension of a public key certificate issued to an entity.</t>
              <t>The permanent identifier is an optional feature that may be used by a CA to indicate that two or more certificates relate to the same entity, even if they contain different subject name (DNs) or different names in the subjectAltName extension, or if the name or the affiliation of that entity stored in the subject or another name form in the subjectAltName extension has changed.</t>
              <t>The subject name, carried in the subject field, is only unique for each subject entity certified by the one CA as defined by the issuer name field. However, the new name form can carry a name that is unique for each subject entity certified by a CA. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4043"/>
          <seriesInfo name="DOI" value="10.17487/RFC4043"/>
        </reference>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC8809">
          <front>
            <title>Registries for Web Authentication (WebAuthn)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This specification defines IANA registries for W3C Web Authentication (WebAuthn) attestation statement format identifiers and extension identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8809"/>
          <seriesInfo name="DOI" value="10.17487/RFC8809"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="WebAuthn" target="https://www.w3.org/TR/webauthn-2/">
          <front>
            <title>Web Authentication: An API for accessing Public Key Credentials Level 2</title>
            <author fullname="Jeff Hodges">
              <organization>Google</organization>
            </author>
            <author fullname="J.C. Jones">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Michael B. Jones">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Akshay Kumar">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Emil Lundberg">
              <organization>Yubico</organization>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-Webauthn" target="https://www.iana.org/assignments/webauthn/webauthn.xhtml">
          <front>
            <title>IANA Registries for Web Authentication (WebAuthn)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 446?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank the participants on the ACME Working Group mailing list for their insightful feedback and comments. In particular, the authors extend sincere appreciation to Mike Ounsworth, Deb Cooley, Aaron Gable, Richard Barnes, and  Herman Slatman for their reviews and suggestions, which greatly improved the quality of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
