<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-acme-device-attest-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="ACME DA">Automated Certificate Management Environment (ACME) Device Attestation Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-acme-device-attest-03"/>
    <author fullname="Brandon Weeks">
      <organization/>
      <address>
        <email>me@brandonweeks.com</email>
      </address>
    </author>
    <author fullname="Ganesh Mallaya">
      <organization/>
      <address>
        <email>ganesh.mallaya@appviewx.com</email>
      </address>
    </author>
    <author fullname="Sven Rajala">
      <organization/>
      <address>
        <email>sven.rajala@keyfactor.com</email>
      </address>
    </author>
    <author fullname="Corey Bonnell">
      <organization/>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author fullname="Ryan Hurst">
      <organization/>
      <address>
        <email>ryan.hurst+ietf@peculiarventures.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="22"/>
    <area>Security</area>
    <workgroup>ACME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 74?>

<t>This document specifies new identifiers and a challenge for the Automated Certificate Management Environment (ACME) protocol which allows validating the identity of a device using attestation.</t>
    </abstract>
  </front>
  <middle>
    <?line 78?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Automatic Certificate Management Environment (ACME) <xref target="RFC8555"/> standard specifies methods for validating control over identifiers, such as domain names. It is also useful to be able to validate properties of the device requesting the certificate, such as the identity of the device and whether the certificate key is protected by a secure cryptoprocessor.</t>
      <t>Many operating systems and device vendors offer functionality enabling a device to generate a cryptographic attestation of their identity, such as:</t>
      <ul spacing="normal">
        <li>
          <t><eref target="https://source.android.com/security/keystore/attestation">Android Key Attestation</eref></t>
        </li>
        <li>
          <t><eref target="https://developers.google.com/chrome/verified-access/overview">Chrome OS Verified Access</eref></t>
        </li>
        <li>
          <t><eref target="https://trustedcomputinggroup.org/resource/trusted-platform-module-tpm-summary/">Trusted Platform Module</eref></t>
        </li>
        <li>
          <t><eref target="https://support.apple.com/en-om/guide/deployment/dep28afbde6a/web">Managed Device Attestation for Apple Devices</eref></t>
        </li>
      </ul>
      <t>Using ACME and device attestation to issue client certificates for enterprise PKI is to be a common use case. The following variances to the ACME specification are described in this document:</t>
      <ul spacing="normal">
        <li>
          <t>Addition of <tt>permanent-identifier</tt> <xref target="RFC4043"/> and <tt>hardware-module</tt> <xref target="RFC4108"/> identifier types.</t>
        </li>
        <li>
          <t>Addition of the <tt>device-attest-01</tt> challenge type to prove control of the <tt>permanent-identifier</tt> and <tt>hardware-module</tt> identifier types.</t>
        </li>
        <li>
          <t>The challenge response payload contains a serialized WebAuthn attestation statement format instead of an empty JSON object (<tt>{}</tt>).</t>
        </li>
        <li>
          <t>Accounts and external account binding being used as a mechanism to pre-authenticate requests to an enterprise CA.</t>
        </li>
      </ul>
      <t>This document does not specify the attestation verification procedures. Section 13 of <xref target="WebAuthn"/> gives some guidance, however verification procedures are complex and may require changes to address future security issues.</t>
      <t>Efforts are underway within the Remote ATtestation ProcedureS (RATS) working group to define a set of standard formats and protocols for attestation. An explicit aim of this document is to support vendor specific formats and protocols that are widely deployed at publication time of this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="permanent-identifier">
      <name>Permanent Identifier</name>
      <t>A new identifier type, <tt>permanent-identifier</tt> is introduced to represent the identity of a device assigned by the manufacturer, typically a serial number. Additionally, the assigner of the identifier <bcp14>MAY</bcp14> also be specified. The name of this identifier type was chosen to align with <xref target="RFC4043"/>. This specification does not prescribe the lifetime of the identifier, which is at the discretion of the Assigner Authority.</t>
      <t>Although <xref target="RFC4043"/> permits any valid UTF-8 string to be used as the identifier, this specification mandates that identifiers <bcp14>MUST NOT</bcp14> contain the forward-slash "/" (UTF-8: U+002F) character. This restriction is required to make the ABNF production rule for the <tt>permanent-identifier-value</tt> unambiguous.</t>
      <section anchor="representation-in-order-resources">
        <name>Representation in Order resources</name>
        <t>The identifier's <tt>value</tt> field contains a UTF-8 string representation of the identity of the device. In addition to the value being a valid UTF-8 string, the value <bcp14>MUST</bcp14> match the <tt>permanent-identifier-value</tt> production rule as defined in this ABNF <xref target="RFC5234"/> syntax:</t>
        <artwork><![CDATA[
assigner-value = ("0" / "1" / "2")  1*("." 1*DIGIT)
device-identifier-value = 1*(%x00-2E / %x30-FF)

permanent-identifier-value = device-identifier-value ["/" assigner-value]
]]></artwork>
        <t>A valid <tt>permanent-identifier-value</tt> value is a UTF-8 string that contains an identity consisting of one or more characters without any forward-slash "/" (UTF-8: U+002F) characters. Optionally, a forward-slash "/" character and "dotted-decimal" object identifier identifying the assigner may follow the identity.</t>
        <t>The Server <bcp14>MUST</bcp14> verify that identifier values in newOrder requests conform to the <tt>permanent-identifier-value</tt> production rule and <bcp14>MUST</bcp14> reject requests containing non-conforming values with a "malformed" error.</t>
        <t>Example identifier without an assigner:</t>
        <artwork><![CDATA[
{
  "type": "permanent-identifier",
  "value": "ABCDEF123456"
}
]]></artwork>
        <t>Example identifier with an assigner:</t>
        <artwork><![CDATA[
{
  "type": "permanent-identifier",
  "value": "ABCDEF123456/1.2.3.4"
}
]]></artwork>
      </section>
      <section anchor="representation-in-certificate-signing-requests-and-x509-certificates">
        <name>Representation in Certificate Signing Requests and X.509 Certificates</name>
        <t>This section describes the X.509 representation of the <tt>permanent-identifier</tt>. Other credential types may use the same identifier values with representations appropriate to those credential types.</t>
        <t>The identity is included in the Subject Alternative Name Extension using the <tt>identifierValue</tt> field of the PermanentIdentifier form described in <xref target="RFC4043"/>. Although <xref target="RFC4043"/> permits the requester to include the <tt>identifierValue</tt> in a <tt>serialNumber</tt> subject attribute, this specification mandates that the <tt>identifierValue</tt> field of the PermanentIdentifier <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain the identifier.</t>
        <t>The value of the <tt>identifierValue</tt> field of the PermanentIdentifier <bcp14>MUST</bcp14> be an octet-for-octet match of the <tt>device-identifier-value</tt> value as encoded in the Order resource. If the <tt>assigner-value</tt> value is included in the identifier as encoded in the Order resource, then the <tt>assigner</tt> field of the PermanentIdentifier <bcp14>MUST</bcp14> be the encoding of the "dotted-decimal" object identifier encoded as the <tt>assigner-value</tt> value.</t>
        <t>To ensure that the identifier as presented in the Order resource and CSR match, the Server <bcp14>MUST</bcp14> perform the logical equivalent of extracting the <tt>device-identifier-value</tt> and <tt>assigner-value</tt> values from the CSR and reconstructing the UTF-8 representation of the identifier. The Server <bcp14>MUST</bcp14> then ensure that the UTF-8 representation and the identifier presented in the Order resource are an octet-for-octet match and reject the Order otherwise. Servers that derive identifier values directly from verified attestation evidence and construct the certificate SAN from that evidence, provided the derived values are verified against the attested device identity in the attestation statement, satisfy the intent of this requirement.</t>
        <t><xref target="RFC8555"/> section 7.4 mandates that "The CSR <bcp14>MUST</bcp14> indicate the exact same set of requested identifiers as the initial newOrder request". However, there are some environments where the Server requires validation of the identifier but does not include the identifier in certificates due to privacy concerns. To support privacy-preserving certificates, Clients <bcp14>MAY</bcp14> omit this identifier in the certificate signing request (CSR). Similarly, if the Server wishes to issue privacy-preserving certificates, it <bcp14>MAY</bcp14> reject CSRs containing a PermanentIdentifier in the subjectAltName extension. See the <xref target="privacy-considerations"/> for more information.</t>
      </section>
    </section>
    <section anchor="hardware-module">
      <name>Hardware Module</name>
      <t>A new identifier type, <tt>hardware-module</tt> is introduced to represent the identity of the secure crypto-processor that generated the certificate key. The identity is modeled after the HardwareModuleName form described in <xref target="RFC4108"/>. It consists of two components: an OBJECT IDENTIFIER to represent the type of hardware module, and a serial number that identifies the specific hardware module.</t>
      <t>Although <xref target="RFC4108"/> specifies that serial numbers can be represented as any sequence of bytes, this specification requires that serial numbers <bcp14>MUST</bcp14> be representable as valid UTF-8 strings consisting of at least one code point and <bcp14>MUST NOT</bcp14> contain a forward-slash "/" (UTF-8: U+002F) character. This restriction ensures that serial numbers can be included in <tt>hardware-module</tt> identifier string values and that the ABNF production rule for the value is unambiguous.</t>
      <section anchor="representation-in-order-resources-1">
        <name>Representation in Order resources</name>
        <t>The identifier's <tt>value</tt> field contains a UTF-8 string representation of the identity of the hardware module. In addition to the value being a valid UTF-8 string, the value <bcp14>MUST</bcp14> match the <tt>hardware-module-value</tt> production rule as defined in this ABNF <xref target="RFC5234"/> syntax:</t>
        <artwork><![CDATA[
hw-type-value = ("0" / "1" / "2")  1*("." 1*DIGIT)
hw-serial-num-value = 1*(%x00-2E / %x30-FF)

hardware-module-value = hw-serial-num-value ["/" hw-type-value]
]]></artwork>
        <t>A valid <tt>hardware-module-value</tt> value is a UTF-8 string that contains a serial number consisting of one or more characters without any forward-slash "/" (UTF-8: U+002F) characters. Optionally, a forward-slash "/" character and "dotted-decimal" object identifier identifying the hardware type may follow the serial number.</t>
        <t>The Server <bcp14>MUST</bcp14> verify that identifier values in newOrder requests conform to the <tt>hardware-module-value</tt> production rule and <bcp14>MUST</bcp14> reject requests containing non-conforming values with a "malformed" error.</t>
        <t>Example identifier with the type of the hardware module represented using the OBJECT IDENTIFIER "1.2.3.4" and a serial number of "ABCD":</t>
        <artwork><![CDATA[
{
  "type": `hardware-module`,
  "value": "ABCD/1.2.3.4"
}
]]></artwork>
        <t>Example identifier with no type specified and a serial number of "ABCD":</t>
        <artwork><![CDATA[
{
  "type": `hardware-module`,
  "value": "ABCD"
}
]]></artwork>
      </section>
      <section anchor="representation-in-certificate-signing-requests-and-x509-certificates-1">
        <name>Representation in Certificate Signing Requests and X.509 Certificates</name>
        <t>This section describes the X.509 representation of the <tt>hardware-module</tt> identifier. Other credential types may use the same identifier values with representations appropriate to those credential types.</t>
        <t>The hardware module identity is included in the Subject Alternate Name Extension using the HardwareModuleName form described in <xref target="RFC4108"/>. The HardwareModuleName is encoded as an otherName with the OID id-on-hardwareModuleName (1.3.6.1.5.5.7.8.4) and consists of:</t>
        <ul spacing="normal">
          <li>
            <t>hwType: An OBJECT IDENTIFIER that identifies the type of hardware module</t>
          </li>
          <li>
            <t>hwSerialNum: An OCTET STRING containing the hardware module serial number</t>
          </li>
        </ul>
        <t>The value of the <tt>hwSerialNum</tt> field of the HardwareModuleName <bcp14>MUST</bcp14> be an octet-for-octet match of the <tt>hw-serial-num-value</tt> value as encoded in the Order resource. If the <tt>hw-type-value</tt> value is included in the identifier as encoded in the Order resource, then the <tt>hwType</tt> field of the HardwareModuleName <bcp14>MUST</bcp14> be the encoding of the "dotted-decimal" object identifier encoded as the <tt>hw-type-value</tt> value.</t>
        <t>To ensure that the identifier as presented in the Order resource and CSR match, the Server <bcp14>MUST</bcp14> perform the logical equivalent of extracting the <tt>hw-serial-num-value</tt> and <tt>hw-type-value</tt> values from the CSR and reconstructing the UTF-8 representation of the identifier. The Server <bcp14>MUST</bcp14> then ensure that the UTF-8 representation and the identifier presented in the Order resource are an octet-for-octet match and reject the Order otherwise. Servers that derive identifier values directly from verified attestation evidence and construct the certificate SAN from that evidence, provided the derived values are verified against the attested device identity in the attestation statement, satisfy the intent of this requirement.</t>
        <t><xref target="RFC8555"/> section 7.4 mandates that "The CSR <bcp14>MUST</bcp14> indicate the exact same set of requested identifiers as the initial newOrder request". However, there are some environments where the Server requires validation of the identifier but does not include the identifier in certificates due to privacy concerns. To support privacy-preserving certificates, Clients <bcp14>MAY</bcp14> omit this identifier in the certificate signing request (CSR). Similarly, if the Server wishes to issue privacy-preserving certificates, it <bcp14>MAY</bcp14> reject CSRs containing a HardwareModuleName in the subjectAltName extension. See the <xref target="privacy-considerations"/> for more information.</t>
      </section>
    </section>
    <section anchor="device-attestation-challenge">
      <name>Device Attestation Challenge</name>
      <t>The Client can prove control over a permanent identifier of a device by providing an attestation statement containing the identifier of the device.</t>
      <t>The device-attest-01 ACME challenge object has the following format:</t>
      <dl>
        <dt>type (required, string):</dt>
        <dd>
          <t>The string "device-attest-01".</t>
        </dd>
        <dt>token (required, string):</dt>
        <dd>
          <t>A random value that uniquely identifies the challenge.</t>
        </dd>
      </dl>
      <artwork><![CDATA[
{
  "type": "device-attest-01",
  "url": "https://example.com/acme/chall/Rg5dV14Gh1Q",
  "status": "pending",
  "token": "evaGxfADs6pSRb2LAv9IZf17Dt3juxGJ-PCt92wr-oA"
}
]]></artwork>
      <t>A Client fulfills this challenge by constructing a key authorization (<xref section="8.1" sectionFormat="of" target="RFC8555"/>) from the "token" value provided in the challenge and the Client's account key. The Client then generates a WebAuthn attestation object using the key authorization as the challenge.</t>
      <t>This specification borrows the WebAuthn <em>attestation object</em> representation as described in Section 6.5.4 of <xref target="WebAuthn"/> for encapsulating attestation formats, but with these modifications:</t>
      <ul spacing="normal">
        <li>
          <t>The key authorization is used to form <em>attToBeSigned</em>. This replaces the concatenation of <em>authenticatorData</em> and <em>clientDataHash</em>. <em>attToBeSigned</em> is hashed using an algorithm specified by the attestation format.</t>
        </li>
        <li>
          <t>Some attestation formats use an external attestation authority that issues a certificate binding the challenge to the device before the Client's account key is available. In these formats, <em>attToBeSigned</em> is formed from the token alone rather than the full key authorization, because the external authority signs at attestation time before the account key thumbprint can be incorporated. The token construction provides freshness. The key authorization construction additionally binds the attestation to a specific account key. The Server <bcp14>MUST</bcp14> consult format-specific documentation to determine which construction applies and <bcp14>MUST</bcp14> verify accordingly. Attestation formats whose signing procedure does not incorporate <em>attToBeSigned</em> cannot be used to satisfy this challenge type.</t>
        </li>
        <li>
          <t>The <em>authData</em> field carries browser-context data (including the RP ID hash) that has no meaning in the ACME context and <bcp14>SHOULD</bcp14> be omitted.</t>
        </li>
      </ul>
      <t>A Client responds with the response object containing the WebAuthn attestation object in the "attObj" field to acknowledge that the challenge can be validated by the Server. Clients <bcp14>MAY</bcp14> include additional fields beyond "attObj" in the response object. Servers <bcp14>MUST</bcp14> ignore unrecognized fields in the challenge response.</t>
      <t>On receiving a response, the Server constructs and stores the key authorization from the challenge's "token" value and the current Client account key.</t>
      <t>To validate a device attestation challenge, the Server performs the following steps:</t>
      <ol spacing="normal" type="1"><li>
          <t>Perform the verification procedures described in Section 6 of <xref target="WebAuthn"/>.</t>
        </li>
        <li>
          <t>Verify that <em>attToBeSigned</em> contains the key authorization or the token, according to the construction required by the attestation format, and that the value matches what the Server stored.</t>
        </li>
        <li>
          <t>Verify that the attestation statement contains a device identifier and that it matches the identifier in the Order. The means by which the identifier is encoded in the attestation statement are specific to the attestation format.</t>
        </li>
      </ol>
      <!-- This specification defines a new challenge response field `attObj` to contain WebAuthn attestation objects as described in Section 7.5.1 of {{RFC8555}}. -->
<artwork><![CDATA[
POST /acme/chall/Rg5dV14Gh1Q
Host: example.com
Content-Type: application/jose+json

{
  "protected": base64url({
    "alg": "ES256",
    "kid": "https://example.com/acme/acct/evOfKhNU60wg",
    "nonce": "SS2sSl1PtspvFZ08kNtzKd",
    "url": "https://example.com/acme/chall/Rg5dV14Gh1Q"
  }),
  "payload": base64url({
    "attObj": base64url(/* WebAuthn attestation object */),
  }),
  "signature": "Q1bURgJoEslbD1c5...3pYdSMLio57mQNN4"
}
]]></artwork>
      <t>The webauthn payload <bcp14>MAY</bcp14> contain any identifiers registered in "WebAuthn Attestation Statement Format Identifiers" and any extensions registered in "WebAuthn Extension Identifiers" <xref target="IANA-Webauthn"/>, <xref target="RFC8809"/>.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Although this document focuses guidance on implementing new identifier types and a challenge for certificate issuance using ACME, it does not define a new protocol, a protocol extension, or an architecture.</t>
      <section anchor="enterprise-pki">
        <name>Enterprise PKI</name>
        <t>ACME was originally envisioned for issuing certificates in the Web PKI, however this extension will primarily be useful in enterprise PKI.
<!-- TODO: ^^^ perhaps also mention/cover IoT attestation PKI usecases -->
### External Account Binding</t>
        <t>An enterprise CA likely only wants to receive requests from authorized devices. It is <bcp14>RECOMMENDED</bcp14> that the Server require a value for the "externalAccountBinding" field to be present in "newAccount" requests.</t>
        <t>If an enterprise CA desires to limit the number of certificates that can be requested with a given account, including limiting an account to a single certificate, after the desired number of certificates have been issued to an account the Server <bcp14>MAY</bcp14> revoke the account as described in Section 7.1.2 of <xref target="RFC8555"/>.</t>
        <section anchor="attestation-posture">
          <name>Attestation Posture</name>
          <t>Enterprise deployments often consist of heterogeneous device fleets where not all devices are capable of hardware attestation. A Server <bcp14>MAY</bcp14> offer device-attest-01 alongside other challenge types within a single authorization, allowing capable devices to complete device-attest-01 while other devices complete an alternative challenge. This posture allows operators to observe fleet attestation coverage before enforcing policy and is compatible with phased deployments.</t>
          <t>Servers that issue certificates without requiring a completed device-attest-01 challenge rely on other authorization mechanisms, such as external account binding or pre-authorized accounts, to establish device identity.</t>
        </section>
        <section anchor="multiple-challenge-types">
          <name>Multiple Challenge Types</name>
          <t><xref target="RFC8555"/> permits a Server to offer multiple challenge types within a single authorization, with any one being sufficient to complete it. Servers <bcp14>MAY</bcp14> offer device-attest-01 alongside other challenge types for the same authorization, allowing capable devices to attest while other devices use an alternative challenge type.</t>
        </section>
      </section>
      <section anchor="attestation-trust">
        <name>Attestation Trust</name>
        <t>Attestation formats differ in the authority that enforces the boundary around the attested key and in the claims that authority can make. At one end, dedicated security hardware (such as a TPM or HSM) provides manufacturer-backed guarantees that the key is generated and stored within the hardware and cannot be exported. At the other end, OS-enforced isolation boundaries (such as platform keystores protected by the operating system kernel) provide meaningful key protection guarantees without discrete security hardware. Intermediate cases include TEE-based attestation where a hypervisor or trusted execution environment acts as the authority.</t>
        <t>Servers <bcp14>SHOULD</bcp14> consider the trust properties of each attestation format when establishing issuance policy, including the nature of the authority making the attestation and the key protection guarantees it can assert. The key authorization construction described in <xref target="device-attestation-challenge"/> also contributes to this trust model: formats that use the full key authorization as <em>attToBeSigned</em> bind the attestation to a specific account key, while formats that use the token alone provide freshness without account key binding.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This section analyzes the privacy implications of the <tt>permanent-identifier</tt> and <tt>hardware-module</tt> identifier types introduced in this document. The guidance here is informed by the threat taxonomy defined in <xref target="RFC6973"/> and is intended to help implementers make informed decisions about whether and when to include these identifiers in certificate requests and issued certificates.</t>
      <t>Both identifier types represent unchanging hardware-bound properties of a device. Unlike domain names or other identifiers whose lifetime is bounded by operational changes, these identifiers typically persist across the entire operational life of a device and cannot be rotated or revoked by the device owner. This permanence has material privacy consequences that implementers must weigh carefully.</t>
      <t>The privacy analysis below addresses the two phases in which these identifiers appear: the attestation exchange between the Client and server during challenge validation, and the optional embedding of identifiers in the issued certificate.</t>
      <section anchor="identification-and-correlation">
        <name>Identification and Correlation</name>
        <t>The <tt>permanent-identifier</tt> type encodes a manufacturer assigned device identity, typically a serial number. The <tt>hardware-module</tt> type encodes the identity of the secure cryptoprocessor that generated the certificate key. In both cases, the identifier is globally unique within its assigner scope and unchanging for the lifetime of the device or hardware module.</t>
        <t>From the perspective of <xref target="RFC6973"/> Section 5.2.2, such identifiers enable direct identification of a device across protocol interactions, deployments, and time. Any entity that receives or observes these identifiers, including the server, intermediary infrastructure, and any relying party that processes the issued certificate acquires an observable reference that can be used to track the device's certificate issuance history, renewal patterns, and operational context.</t>
        <t>When the same <tt>permanent-identifier</tt> or <tt>hardware-module</tt> value appears across multiple certificate requests (as it will in any recurring renewal workflow), it enables <xref target="RFC6973"/> correlation: an observer with access to server logs can reconstruct the full lifecycle of a device's certificate activity. Similarly, when such identifiers are included in issued certificates, logging issued certificates in a central location (in certificate transparency logs, etc.) produces a persistent device audit trail regardless of whether the log operator intends to maintain one.</t>
        <t>Implementers <bcp14>SHOULD</bcp14> assess whether the operational benefit of unchanging device identification outweighs this correlation exposure. In deployments where device anonymity or pseudonymity is a requirement, such as systems handling sensitive workloads on behalf of individuals, implementers <bcp14>SHOULD</bcp14> consider whether alternative validation mechanisms that do not bind the certificate to a permanent hardware identifier are more appropriate.</t>
      </section>
      <section anchor="fingerprinting-via-attestation-payloads">
        <name>Fingerprinting via Attestation Payloads</name>
        <t>The <tt>device-attest-01</tt> challenge response carries a WebAuthn attestation object that may contain significantly more information than the identifier value alone. Depending on the attestation format, this payload may include device model, firmware version, bootloader state, hardware security level, and operating system version. Even when the resulting certificate is issued in a privacy-preserving form that omits the identifier from the subjectAltName extension (see Section 3.2 and Section 4.2), the attestation payload itself is transmitted to and evaluated by the server during challenge validation.</t>
        <t>This constitutes a fingerprinting surface as defined in <xref target="RFC6973"/> Section 3.2. The combination of a hardware serial number, hardware type OID, and firmware attestation attributes may uniquely identify not just the device model but the specific device unit, even in the absence of an explicit <tt>permanent-identifier</tt> value. Implementers operating servers may consider applying data minimization principles to attestation payload handling by limiting only the attributes necessary to make the authorization decision should be evaluated, and the full attestation payload <bcp14>SHOULD NOT</bcp14> be retained beyond the duration of the challenge validation exchange unless there is a specific, documented operational requirement to do so.</t>
        <t>Implementers operating ACME Clients <bcp14>SHOULD</bcp14> be aware that the attestation format selected may expose more device state than is necessary to satisfy the server's authorization policy. Where multiple attestation formats are available, Clients <bcp14>SHOULD</bcp14> prefer formats that minimize the set of disclosed attributes.</t>
      </section>
      <section anchor="secondary-use-of-attestation-data">
        <name>Secondary Use of Attestation Data</name>
        <t>The server receives attestation data in the context of authorizing a certificate issuance request. <xref target="RFC6973"/> Section 5.2.3 identifies secondary use as the processing of data for purposes beyond the original collection context and as a distinct privacy threat.</t>
        <t>Attestation payloads received during challenge validation may contain information about device health, software configuration, and hardware capability that is operationally useful beyond certificate issuance. For example, for asset inventory, compliance monitoring, or security posture assessment. Implementers operating servers must clearly define and document the purposes for which attestation data is processed and must not process attestation data for purposes materially different from authorization of the certificate request without explicit policy disclosure to the device owner or operator.</t>
        <t>Implementers integrating ACME device attestation into enterprise PKI platforms should publish a clear attestation data handling policy that specifies what attributes are evaluated, how long they are retained, and whether they are shared with other systems.</t>
      </section>
      <section anchor="privacy-preserving-certificate-issuance">
        <name>Privacy-Preserving Certificate Issuance</name>
        <t>This document provides an explicit mechanism to decouple attestation-based validation from identifier disclosure in the issued certificate. Clients <bcp14>MAY</bcp14> omit the <tt>permanent-identifier</tt> or <tt>hardware-module</tt> from the CSR, and servers <bcp14>MAY</bcp14> issue certificates that do not contain these identifiers in the subjectAltName extension, even when those identifiers were used to authorize the request.</t>
        <t>Implementers should treat this privacy-preserving mode as the default posture unless there is a specific operational requirement for the identifier to appear in the certificate. The following considerations apply to this decision:</t>
        <ul spacing="normal">
          <li>
            <t>If the issued certificate will be presented to relying parties outside the issuing organization's trust boundary, embedding a <tt>permanent-identifier</tt> or <tt>hardware-module</tt> value in the certificate enables those relying parties to correlate certificate presentations with specific physical hardware. This may be acceptable in closed enterprise environments but is likely inappropriate in any context where the certificate is presented to external services, counter-parties, or public infrastructure.</t>
          </li>
          <li>
            <t>If the certificate is used for mutual TLS in a workload identity context, embedding an unchanging hardware identifier couples the cryptographic identity of the workload to the physical device rather than to the logical identity of the workload. This can impede key rotation, device replacement, and workload migration, in addition to creating the correlation risks described above. In such cases, implementers should prefer logical workload identifiers (such as SPIFFE URIs) in the issued certificate and treat the hardware attestation as a bootstrap authorization mechanism only.</t>
          </li>
          <li>
            <t>If the certificate is intended for use in certificate transparency logs, implementers <bcp14>MUST</bcp14> consider that embedding a <tt>permanent-identifier</tt> or <tt>hardware-module</tt> value will make that identifier permanently and publicly discoverable, indexed by issuance time, issuer, and subject. This constitutes an irreversible disclosure under <xref target="RFC6973"/> Section 5.2.4 and should be avoided unless public discoverability of the device identifier is an explicit operational requirement.</t>
          </li>
        </ul>
      </section>
      <section anchor="stored-data-and-account-binding">
        <name>Stored Data and Account Binding</name>
        <t>This document recommends the use of externalAccountBinding to pre-authenticate device requests to an enterprise server. When an ACME account is persistently bound to a device identity, the server's account store contains a durable mapping between the cryptographic account credential and the physical device. Per <xref target="RFC6973"/> Section 5.1.2, this stored association constitutes a target for compromise: an attacker who obtains the account store gains not only account credentials but a historical record of device-to-identity mappings across all certificate issuances.</t>
        <t>Implementers operating servers <bcp14>SHOULD</bcp14> store account-to-device bindings using the minimum fidelity necessary for authorization decisions. Where the operational requirement is only to confirm that a given device is authorized to request certificates, it may be sufficient to store a hash or other one-way transformation of the device identifier rather than the identifier itself. Implementers should also define and enforce retention limits on historical account-to-certificate linkage records.</t>
      </section>
      <section anchor="implementer-decision-guidance">
        <name>Implementer Decision Guidance</name>
        <t>Implementers considering whether to include <tt>permanent-identifier</tt> or <tt>hardware-module</tt> in CSRs and issued certificates <bcp14>SHOULD</bcp14> work through the following questions before enabling these identifiers:</t>
        <ul spacing="normal">
          <li>
            <t>Is unchanging hardware identity in the certificate necessary for the relying party to make authorization decisions, or is it sufficient for the server to have validated it at issuance time? If the latter, prefer privacy-preserving certificate mode.</t>
          </li>
          <li>
            <t>Will the certificate be logged to a certificate transparency log or otherwise made publicly accessible? If so, embedding a permanent hardware identifier creates an irrevocable, publicly indexed disclosure and should be avoided unless explicitly required.</t>
          </li>
          <li>
            <t>Will the certificate be presented to parties outside the issuing organization's administrative control? If so, consider whether those parties should have visibility into the device's hardware identity.</t>
          </li>
          <li>
            <t>Does the deployment have requirements for device replacement or key rotation without service interruption? Binding the certificate's identity to a specific hardware module OID and serial number complicates these operational scenarios and may require reissuance policies that expose additional identifier churn in logs.</t>
          </li>
          <li>
            <t>What is the attestation data handling policy of the server operator? If this is not documented or auditable, device operators <bcp14>SHOULD</bcp14> treat the attestation exchange as a full disclosure of all attributes present in the attestation payload.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Please reference <xref target="RFC8555"/> for other security considerations.</t>
      <t>See Section 13 of <xref target="WebAuthn"/> for additional security considerations related to attestation statement formats, including certificate revocation.</t>
      <t>Key attestation statements may include a variety of information in addition to the public key being attested. While not described in this document, the Server <bcp14>MAY</bcp14> use any policy when evaluating this information. This evaluation can result in rejection of a certificate request that features a verifiable key attestation for the public key contained in the request. For example, an attestation statement may indicate use of an unacceptable firmware version.</t>
      <t>The "token" value <bcp14>MUST</bcp14> have at least 128 bits of entropy. It <bcp14>MUST NOT</bcp14> contain any characters outside the base64url alphabet, including padding characters ("="). See <xref target="I-D.ietf-tls-rfc8446bis"/>, Appendix C.1 for additional information on randomness requirements.</t>
      <t>The binding between the certified public key and the device identifier is established through the attestation statement rather than through the CSR alone. The attestation authority cryptographically binds the public key to the device identity, either by signing the attestation statement directly, by issuing an attestation certificate, or by other cryptographic means specific to the attestation format. The Server verifies this chain: the attestation is produced by a trusted attestation authority, the public key in the attestation matches the public key in the CSR, and the device identifier in the attestation matches the identifier in the Order. This three-way binding is the basis on which the Server can associate a certified public key with a particular device.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="acme-identifier-types">
        <name>ACME Identifier Types</name>
        <t>The "ACME Identifier Types" registry is to be updated to include the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Label</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">permanent-identifier</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">hardware-module</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="acme-validation-method">
        <name>ACME Validation Method</name>
        <t>The "ACME Validation Methods" registry is to be updated to include the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Label</th>
              <th align="left">Identifier Type</th>
              <th align="left">ACME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">device-attest-01</td>
              <td align="left">permanent-identifier</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">device-attest-01</td>
              <td align="left">hardware-module</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <!-- Begin WebAuthn registry text -->
<!-- Editor's note: the below text was written by Carl Wallance as part of draft-wallace-lamps-key-attestation-ext. These registries only need to be established by a single document, so if they are established by another document prior to this document being approved, this text will be removed and replaced with a reference to the other document.  -->

</section>
      <section anchor="new-error-types">
        <name>New Error Types</name>
        <t>This document adds the following entries to the ACME Error Type registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">badAttestationStatement</td>
              <td align="left">The attestation statement is unacceptable (e.g. not signed by an attestation authority trusted by the CA)</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <!-- End WebAuthn registry text -->

</section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4043">
          <front>
            <title>Internet X.509 Public Key Infrastructure Permanent Identifier</title>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="T. Gindin" initials="T." surname="Gindin"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines a new form of name, called permanent identifier, that may be included in the subjectAltName extension of a public key certificate issued to an entity.</t>
              <t>The permanent identifier is an optional feature that may be used by a CA to indicate that two or more certificates relate to the same entity, even if they contain different subject name (DNs) or different names in the subjectAltName extension, or if the name or the affiliation of that entity stored in the subject or another name form in the subjectAltName extension has changed.</t>
              <t>The subject name, carried in the subject field, is only unique for each subject entity certified by the one CA as defined by the issuer name field. However, the new name form can carry a name that is unique for each subject entity certified by a CA. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4043"/>
          <seriesInfo name="DOI" value="10.17487/RFC4043"/>
        </reference>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC8809">
          <front>
            <title>Registries for Web Authentication (WebAuthn)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This specification defines IANA registries for W3C Web Authentication (WebAuthn) attestation statement format identifiers and extension identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8809"/>
          <seriesInfo name="DOI" value="10.17487/RFC8809"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="WebAuthn" target="https://www.w3.org/TR/webauthn-2/">
          <front>
            <title>Web Authentication: An API for accessing Public Key Credentials Level 2</title>
            <author fullname="Jeff Hodges">
              <organization>Google</organization>
            </author>
            <author fullname="J.C. Jones">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Michael B. Jones">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Akshay Kumar">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Emil Lundberg">
              <organization>Yubico</organization>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-Webauthn" target="https://www.iana.org/assignments/webauthn/webauthn.xhtml">
          <front>
            <title>IANA Registries for Web Authentication (WebAuthn)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 432?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank the participants on the ACME Working Group mailing list for their insightful feedback and comments. In particular, the authors extend sincere appreciation to Mike Ounsworth, Deb Cooley, Aaron Gable, Richard Barnes, and  Herman Slatman for their reviews and suggestions, which greatly improved the quality of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
