<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-csr-attestation-22" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Remote Attestation with CSRs">Use of Remote Attestation with Certification Signing Requests</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-22"/>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Cryptic Forest">Cryptic Forest Software</organization>
      <address>
        <postal>
          <city>Sioux Lookout, Ontario</city>
          <country>Canada</country>
        </postal>
        <email>mike@ounsworth.ca</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization/>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>mwiseman32@acm.org</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization/>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>ned.smith.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="11"/>
    <keyword>PKI</keyword>
    <keyword>PKCS#10</keyword>
    <keyword>CRMF</keyword>
    <keyword>Attestation</keyword>
    <keyword>Certificate Signing Requests</keyword>
    <abstract>
      <?line 87?>

<t>Certification Authorities (CAs) issuing certificates to Public Key Infrastructure (PKI) end entities may require a certificate signing request (CSR) to include additional verifiable information to confirm policy compliance. For example, a CA may require an end entity to demonstrate that the private key corresponding to a CSR's public key is secured by a hardware security module (HSM), is not exportable, etc. The process of generating, transmitting, and verifying  additional information required by the CA is called remote attestation. While work is currently underway to standardize various aspects of  remote attestation, a variety of proprietary mechanisms have been in use for years, particularly regarding protection of private keys.</t>
      <t>This specification defines an ASN.1 structure for
remote attestation that can accommodate proprietary and standardized
attestation mechanisms, as well as an attribute and an extension to carry the structure in PKCS#10 and Certificate
Request Message Format (CRMF) messages, respectively.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://lamps-wg.github.io/csr-attestation/draft-ietf-lamps-csr-attestation.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-csr-attestation/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/csr-attestation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 96?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Certification Authorities (CAs) issuing certificates to PKI end entities may require a certificate signing request (CSR) to include verifiable attestations that contain claims regarding the platform used by the end entity to generate the key pair for which a certificate is sought. At the time of writing, the most pressing example of the need for remote attestation in certificate enrollment is the Code-Signing Baseline Requirements (CSBR) document maintained by the CA/Browser Forum <xref target="CSBR"/>. The <xref target="CSBR"/> requires compliant CAs to "ensure that a Subscriber's Private Key is generated, stored, and used in a secure environment that has controls to prevent theft or misuse". This requirement is a natural fit to enforce via remote attestation.</t>
      <t>This specification defines an attribute and an extension that allow for conveyance of verifiable attestations in several Certificate Signing Request (CSR) formats, including PKCS#10 <xref target="RFC2986"/> or Certificate Request Message Format (CRMF) <xref target="RFC4211"/> messages. Given several standard and proprietary remote attestation technologies are in use, this specification is intended to be as technology-agnostic as is feasible with respect to implemented and future remote attestation technologies. This aligns with the fact that a CA may wish to provide support for a variety of types of devices but cannot dictate what format a device uses to represent attestations.</t>
      <t>While CSRs are defined using Abstract Syntax Notation One (ASN.1), attestations may be defined using any data description language, i.e., ASN.1 or Concise Data Description Language (CDDL), or represented using any type of encoding, including Distinguished Encoding Rules (DER), Concise Binary Object Representation (CBOR), JavaScript Object Notation (JSON). This specification RECOMMENDS that attestations that are not encoded using the Basic Encoding Rules (BER) or Distinguished Encoding Rules (DER) be wrapped in an ASN.1 OCTET STRING.</t>
    </section>
    <section anchor="relationship-to-the-ietf-rats-working-group">
      <name>Relationship to the IETF RATS Working Group</name>
      <t>As noted, attestation-related technologies have existed for many years, albeit with no standard format and no standard means of conveying attestation statements to a CA. This draft addresses the latter, and is equally applicable to standard and proprietary attestation formats. The IETF Remote Attestation Procedures (RATS) working group is addressing the former. In <xref target="RFC9334"/>, RATS defined vocabulary, architecture, and usage patterns related to the practice of generating and verifying attestations.</t>
      <t>In its simplest topological model, attestations are generated by the certificate requester and verified by the CA/RA. Section 5 of <xref target="RFC9334"/> defines topological patterns that are more complex,
including the background check model and the passport model.  This
document may be applied to instantiating any of these topological
models for CSR processing, provided the required security
requirements specific to the context of certificate issuance are
satisfied.</t>
      <t><xref section="4.2" sectionFormat="of" target="RFC9334"/> defines several roles that originate, forward or process attestation statements (also see <xref section="1.2" sectionFormat="of" target="RFC9683"/>): the Attester; Endorser; Relying Party; and Verifier. Attestation statements, such as Evidence, may be directed to an entity taking at least one of these roles, including to an RA/CA acting as a Verifier.
An RA/CA may also forward attestation statements to a Verifier for appraisal. Each attestation statements may contain one or more claims, including claims that may be required by an RA or CA. Attestation statements transmitted by these parties are defined in <xref section="8" sectionFormat="of" target="RFC9334"/> as the "conceptual messages" Evidence, Endorsement, and Attestation Results. The structure defined in this specification may be used by any of the roles that originate attestation statements, and is equally applicable to these three conceptual messages.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document re-uses the terms defined in <xref target="RFC9334"/> related to remote
attestation. Readers of this document are assumed to be familiar with
the following terms defined in <xref target="RFC9334"/>: Evidence, Endorsement, Claim, Attestation Result (AR), Attester, Relying Party, and Verifier.
Per <xref target="RFC9334"/>, the RA/CA is the Relying Party with respect to remote attestation. This use of the term "relying party" differs from the traditional PKIX use of the term.
This specification uses RA/CA to refer to an <xref target="RFC9334"/> Relying Party, which may or may not include an integrated Verifier.</t>
      <t>The term "Certification Request" message is defined in <xref target="RFC2986"/>.
Specifications, such as <xref target="RFC7030"/>, later introduced the term
"Certificate Signing Request (CSR)" to refer to the Certification
Request message. While the term "Certification Request"
would have been correct, the mistake was unnoticed. In the meanwhile
CSR is an abbreviation used beyond PKCS#10. Hence, it is equally
applicable to other protocols that use a different syntax and
even a different encoding, in particular this document also
considers messages in the Certificate Request Message Format (CRMF) <xref target="RFC4211"/>
to be "CSRs". In this document, the terms "CSR" and Certificate Request
message are used interchangeably.</t>
      <t>The term "hardware security module (HSM)" is used generically to refer to the
combination of hardware and software designed to protect keys from unauthorized
access. Other commonly used terms include Secure Element, Trusted Platform Module, and Trusted Execution
Environment.</t>
      <t>Since this document combines terminology from two domains, Remote Attestation (RATS) and X.509 PKI, it follows a naming convention to avoid ambiguity.
RATS terminology is written in uppercase (e.g., Verifier), while X.509/PKI terminology is written in lowercase (e.g., certification authority (CA)).
This distinction clarifies terms that exist in both domains; for instance, a Verifier refers to the RATS entity that processes Evidence, whereas a verifier refers to the PKI entity that validates certificates.
This convention is distinct from camel-case identifiers like "AttestationStatement", which denote ASN.1 types.</t>
    </section>
    <section anchor="sec-attestationAttr">
      <name>Conveying Attestations in CSRs</name>
      <t>The focus of this specification is the conveyance of attestations to a CA/RA as part of a CSR.
The following sub-sections define formats to support this conveyance, an optional mechanism to limit support to specific attestation types at the ASN.1 level, and bindings to the attribute and extension mechanisms used in certificate managment protocols.</t>
      <section anchor="attestationstatement-and-attestationbundle">
        <name>AttestationStatement and AttestationBundle</name>
        <t>The <tt>AttestationStatement</tt> structure (as shown in <xref target="code-AttestationStatement"/>) facilitates the representation of Evidence, Endorsements,
and Attestation Results generated by an Attester, Endorser, or Verifier for processing by a Verifier or Relying Party, such as verification by a CA/RA.</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>type</tt> field is an OBJECT IDENTIFIER that identifies the format of the <tt>stmt</tt> field.</t>
          </li>
          <li>
            <t>The <tt>bindsPublicKey</tt> field indicates whether the attestation in the <tt>stmt</tt> field is cryptographically bound to the public key included in the CSR.</t>
          </li>
          <li>
            <t>The <tt>stmt</tt> field contains the attestation for processing, constrained by the <tt>type</tt> field. Formats that are not defined using ASN.1 <bcp14>MUST</bcp14> define an ASN.1 wrapper for use with the <tt>AttestationStatement</tt> structure.
For example, a CBOR-encoded format may be defined as an OCTET STRING for <tt>AttestationStatement</tt> purposes, where the contents of the OCTET STRING are the CBOR-encoded data.</t>
          </li>
          <li>
            <t>The <tt>attrs</tt> field enables the inclusion of <tt>Attribute</tt> values that may inform the verification of the <tt>stmt</tt>. This specification does not define any <tt>Attribute</tt> instances.</t>
          </li>
          <li>
            <t>The <tt>attrs</tt> field is not bound to the <tt>type</tt> of attestation to facilitate reuse of attribute types across attestation statement types and to allow for parsing of an <tt>AttestationStatement</tt> with no knowledge of the details of a specific <tt>type</tt>.</t>
          </li>
        </ul>
        <figure anchor="code-AttestationStatement">
          <name>Definition of AttestationStatement</name>
          <artwork><![CDATA[
ATTESTATION-STATEMENT ::= TYPE-IDENTIFIER

AttestAttrSet ATTRIBUTE ::= { ... }

AttestationStatement ::= SEQUENCE {
   type   ATTESTATION-STATEMENT.&id({AttestationStatementSet}),
   bindsPublicKey [0] BOOLEAN DEFAULT TRUE,
   stmt   ATTESTATION-STATEMENT.&Type({AttestationStatementSet}{@type}),
   attrs  [1] Attributes {{AttestAttrSet}} OPTIONAL
}
]]></artwork>
        </figure>
        <t>In some cases, a CA may require CSRs to include a variety of claims, which may require the cooperation of more than one Attester.
Similarly, a RA/CA may outsource verification of claims from different Attesters to a single Verifier.
The <tt>AttestationBundle</tt> structure, <xref target="code-AttestationBundle"/>, facilitates the representation of one or more <tt>AttestationStatement</tt> structures along with an <bcp14>OPTIONAL</bcp14> collection of certificates that may be useful for certification path building and validation to verify each <tt>AttestationStatement</tt>. <tt>AttestationBundle</tt> is the structure included in a CSR attribute or extension.</t>
        <figure anchor="code-AttestationBundle">
          <name>Definition of AttestationBundle</name>
          <artwork><![CDATA[
AttestationBundle ::= SEQUENCE {
   attestations SEQUENCE SIZE (1..MAX) OF AttestationStatement,
   certs SEQUENCE SIZE (1..MAX) OF LimitedCertChoices OPTIONAL,
}
]]></artwork>
        </figure>
        <t>At least one element in the <tt>attestations</tt> field <bcp14>SHOULD</bcp14> contain an attestation that is cryptographically bound to the public key that is the subject of the CSR containing the <tt>AttestationBundle</tt>.</t>
        <t>The <tt>CertificateChoices</tt> structure defined in <xref target="RFC6268"/>, and reproduced below along with <tt>OtherCertificateFormat</tt>, allows for carrying certificates in the default X.509 <xref target="RFC5280"/> format, or in other non-X.509 certificate formats. <tt>CertificateChoices</tt> <bcp14>MUST</bcp14> only contain certificate or other. In this context, <tt>CertificateChoices</tt> <bcp14>MUST NOT</bcp14> contain <tt>extendedCertificate</tt>, <tt>v1AttrCert</tt>, or <tt>v2AttrCert</tt>. Note that for non-ASN.1 certificate formats, the <tt>CertificateChoices</tt> <bcp14>MUST</bcp14> contain <tt>other</tt> with an <tt>OTHER-CERT-FMT.Type</tt> of <tt>OCTET STRING</tt> and data consistent with <tt>OTHER-CERT-FMT.id</tt>. <tt>LimitedCertChoices</tt> is defined to limit the available options to <tt>certificate</tt> and <tt>other</tt>.</t>
        <artwork><![CDATA[
   CertificateChoices ::= CHOICE {
     certificate Certificate,
     extendedCertificate [0] IMPLICIT ExtendedCertificate,
          -- Obsolete
     ...,
     [[3: v1AttrCert [1] IMPLICIT AttributeCertificateV1]],
          -- Obsolete
     [[4: v2AttrCert [2] IMPLICIT AttributeCertificateV2]],
     [[5: other      [3] IMPLICIT OtherCertificateFormat]] }
   OTHER-CERT-FMT ::= TYPE-IDENTIFIER

   OtherCertificateFormat ::= SEQUENCE {
     otherCertFormat OTHER-CERT-FMT.
             &id({SupportedCertFormats}),
     otherCert       OTHER-CERT-FMT.
             &Type({SupportedCertFormats}{@otherCertFormat})}

LimitedCertChoices ::= CertificateChoices (WITH COMPONENTS {\
                                                 certificate, other})
]]></artwork>
        <t>The <tt>certs</tt> field contains a set of certificates that
may be used to validate an <tt>AttestationStatement</tt>
contained in <tt>attestations</tt>. For each <tt>AttestationStatement</tt>, the set of certificates <bcp14>SHOULD</bcp14> contain
the certificate that contains the public key needed to directly validate the
<tt>AttestationStatement</tt>, unless the signing key is expected to be known to the Verifier or is embedded within the <tt>AttestationStatement</tt>. Additional certificates <bcp14>MAY</bcp14> be provided, for example, to chain the
attestation key back to a trust anchor. No specific order of the certificates in <tt>certs</tt> should be expected because certificates contained in <tt>certs</tt> may be needed to validate different <tt>AttestationStatement</tt> instances.</t>
        <t>This specification places no restriction on mixing certificate types within the <tt>certs</tt> field. For example a non-X.509 attestation signer certificate <bcp14>MAY</bcp14> chain to a trust anchor via a chain of X.509 certificates. It is up to the Attester and its Verifier to agree on supported certificate formats.</t>
      </section>
      <section anchor="attestationstatementset">
        <name>AttestationStatementSet</name>
        <figure anchor="code-AttestationStatementSet">
          <name>Definition of AttestationStatementSet</name>
          <artwork><![CDATA[
AttestationStatementSet ATTESTATION-STATEMENT ::= {
   ... -- None defined in this document --
}
]]></artwork>
        </figure>
        <t>The expression illustrated in <xref target="code-AttestationStatementSet"/> maps ASN.1 Types
for attestation statements to the OIDs
that identify them. These mappings are used to construct
or parse <tt>AttestationStatement</tt> objects that appear in an <tt>AttestationBundle</tt>. Attestation statements are typically
defined in other IETF standards, in standards produced by other standards bodies,
or as vendor proprietary formats along with corresponding OIDs that identify them.
<tt>AttestationStatementSet</tt> is left unconstrained in this document. However, implementers <bcp14>MAY</bcp14>
populate it with the formats that they wish to support.</t>
      </section>
      <section anchor="csr-attribute-and-extension">
        <name>CSR Attribute and Extension</name>
        <t>By definition, attributes within a PKCS#10 CSR are typed as ATTRIBUTE and within a CRMF CSR are typed as EXTENSION.</t>
        <figure anchor="code-extensions">
          <name>Definitions of CSR attribute and extension</name>
          <artwork><![CDATA[
id-aa-attestation OBJECT IDENTIFIER ::= { id-aa 59 }

-- For PKCS#10
attr-attestations ATTRIBUTE ::= {
  TYPE AttestationBundle
  COUNTS MAX 1
  IDENTIFIED BY id-aa-attestation
}

-- For CRMF
ext-attestations EXTENSION ::= {
  SYNTAX AttestationBundle
  IDENTIFIED BY id-aa-attestation
}
]]></artwork>
        </figure>
        <t>The Extension variant illustrated in <xref target="code-extensions"/> is intended only for use within CRMF CSRs and is <bcp14>NOT RECOMMENDED</bcp14> to be used within X.509 certificates due to the privacy implications of publishing information about the end entity's hardware environment.</t>
        <t>Due to the nature of the PKIX ASN.1 classes <xref target="RFC5912"/>, there are multiple ways to convey multiple attestation statements: by including multiple copies of <tt>attr-attestations</tt> or <tt>ext-attestations</tt>, multiple values within the attribute or extension, and finally, by including multiple <tt>AttestationStatement</tt> structures within an <tt>AttestationBundle</tt>. The latter is the preferred way to carry multiple Attestations statements. Implementations <bcp14>MUST NOT</bcp14> place multiple copies of <tt>attr-attestations</tt> into a PKCS#10 CSR due to the <tt>COUNTS MAX 1</tt> declaration. In a CRMF CSR, implementers <bcp14>SHOULD NOT</bcp14> place multiple <tt>AttestationBundle</tt> instances in <tt>ext-attestations</tt>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to allocate a value
from the "SMI Security for PKIX Module Identifier" registry for the
included ASN.1 module, allocate a value from "SMI Security for
S/MIME Attributes" to identify an attribute defined within, and open a new registry.</t>
      <section anchor="module-registration-smi-security-for-pkix-module-identifier">
        <name>Module Registration - SMI Security for PKIX Module Identifier</name>
        <t>IANA is asked to register the following within the registry id-mod
SMI Security for PKIX Module Identifier (1.3.6.1.5.5.7.0).</t>
        <ul spacing="normal">
          <li>
            <t>Decimal: IANA Assigned - <strong>Replace TBDMOD</strong></t>
          </li>
          <li>
            <t>Description: CSR-ATTESTATION-2025 - id-mod-pkix-attest-01</t>
          </li>
          <li>
            <t>References: This Document</t>
          </li>
        </ul>
      </section>
      <section anchor="object-identifier-registrations-smi-security-for-smime-attributes">
        <name>Object Identifier Registrations - SMI Security for S/MIME Attributes</name>
        <t>IANA is asked to register the following within the registry id-aa
SMI Security for S/MIME Attributes (1.2.840.113549.1.9.16.2).</t>
        <ul spacing="normal">
          <li>
            <t>Attestation Statement</t>
          </li>
          <li>
            <t>Decimal: IANA Assigned - This was early-allocated as <tt>59</tt> so that we could generate the sample data.</t>
          </li>
          <li>
            <t>Description: id-aa-attestation</t>
          </li>
          <li>
            <t>References: This Document</t>
          </li>
        </ul>
      </section>
      <section anchor="attestation-oid-registry">
        <name>Attestation OID Registry</name>
        <t>IANA is asked to create a registry that helps developers to find
OID/Attestation mappings that may be encountered in the wild, as well as
a link to their specification document and an indication as to whether the attestation is cryptographically bound to a public key.
This registry should follow the rules for
"Specification Required" as laid out in <xref target="RFC8126"/>.</t>
        <t>Each row includes an OID and ASN.1 type that could appear in an <tt>AttestationStatement</tt>, and references to find the full specification.</t>
        <t>Registration requests should be formatted as per
the registration template below, and receive a three-week review period on
the <eref target="mailto:spasm@ietf.org">spasm</eref> mailing list, with the advice of one or more Designated
Experts <xref target="RFC8126"/>.  However, to allow for the allocation of values
prior to publication, the Designated Experts may approve registration
once they are satisfied that such a specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use
an appropriate subject (e.g., "Request to register attestation
attestation: example").</t>
        <t>IANA must only accept registry updates from the Designated Experts
and should direct all requests for registration to the review mailing
list.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>The registry has the following columns:</t>
          <ul spacing="normal">
            <li>
              <t>OID: The OID number, which has already been allocated. IANA does
not allocate OID numbers for use with this registry.</t>
            </li>
            <li>
              <t>Type: The ASN.1 type corresponding to the given OID.</t>
            </li>
            <li>
              <t>Description: Brief description of the use of the Attestation and the
registration of the OID.</t>
            </li>
            <li>
              <t>Reference(s): Reference to the document or documents that register
the OID and define the ASN.1 type for use with a specific attestation technology, preferably
including URIs that can be used to retrieve copies of the documents.
An indication of the relevant sections may also be included but is not
required.</t>
            </li>
            <li>
              <t>Change Controller: The entity that controls the listed data format.
For data formats specified in Standards Track RFCs, list the "IESG".
For others, give the name of the responsible party.
This does not necessarily have to be a standards body, for example
in the case of proprietary data formats the Reference may be to a company or a
publicly-available reference implementation.  In most cases the
third party requesting registration in this registry will also be the
party that registered the OID. As the intention is for this registry to be a
helpful reference, rather than a normative list, a fair amount of
discretion is left to the Designated Expert.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <t>The initial registry contents is shown in the table below.
It lists entries for several attestation encoding OIDs including an entry for the Conceptual Message Wrapper (CMW) <xref target="I-D.ietf-rats-msg-wrap"/>.</t>
          <ul spacing="normal">
            <li>
              <t>CMW
              </t>
              <ul spacing="normal">
                <li>
                  <t>OID: 1 3 6 1 5 5 7 1 35</t>
                </li>
                <li>
                  <t>Type: CMW</t>
                </li>
                <li>
                  <t>Description: id-pe-cmw</t>
                </li>
                <li>
                  <t>Reference(s): <xref target="I-D.ietf-rats-msg-wrap"/></t>
                </li>
                <li>
                  <t>Change Controller: IETF</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>The current registry values can be retrieved from the IANA online website.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document defines a structure to convey
attestations as additional information in CSRs, as well as an extension to convey that structure in the
Certification Request Message defined in {<xref target="RFC2986"/>} and an attribute to convey that structure in the
Certificate Request Message Format defined in {<xref target="RFC4211"/>}.
The CA/RA that receives the CSR may choose to verify the attestation(s) to determine if an issuance policy is met, or which of a suite of policies is satisfied. The CA/RA is also free to discard the additional information without processing.</t>
      <t>The remainder of this section identifies security considerations that apply when the CA/RA chooses to verify the attestation as part of the evaluation of a CSR.</t>
      <section anchor="binding-attestations-to-the-csrs-public-key">
        <name>Binding Attestations to the CSR's Public Key</name>
        <t>Regardless of the topological model, the CA/RA is ultimately responsible for validating the binding between the public key and the attestation(s) in the CSR. For CAs issuing in conformance with the CA/Browser Forum’s Code Signing Baseline Requirements, this means verifying the attestation of HSM generation pertains to the public key in the CSR.</t>
        <t>Multiple attestations from multiple sources, as envisioned in <xref target="RFC9334"/>, can introduce additional complications as shown in the following example.</t>
        <t>For example, a CA may have an issuance policy that requires key generation in an HSM on a company-owned platform in a known good state.
The CSR might contain three AttestationStatements originated by three different attesters:</t>
        <ol spacing="normal" type="1"><li>
            <t>an Evidence that a key pair was generated in an HSM;</t>
          </li>
          <li>
            <t>an Endorsement that states a particular platform is company-owned; and</t>
          </li>
          <li>
            <t>an Attestation Result stating a particular platform was in a known good state (e.g, up to date on patches, etc.).</t>
          </li>
        </ol>
        <t>While each of these attestations may be independently correct, the CA/RA is responsible for confirming the attestations apply in concert to the public key in the CSR. That is, the CA/RA must analyze the attestations to ensure that:</t>
        <ol spacing="normal" type="1"><li>
            <t>the attestation of HSM generation in AttestationStatement 1 applies to the public key in the CSR;</t>
          </li>
          <li>
            <t>the attestation of company ownership in AttestationStatement 2 applies to the platform that contains the HSM; and</t>
          </li>
          <li>
            <t>the attestation that a platform was in a known good state in AttestationStatement 3 applies to the platform that contains the HSM.</t>
          </li>
        </ol>
      </section>
      <section anchor="freshness">
        <name>Freshness</name>
        <t>To avoid replay attacks, the CA/RA may choose to ignore attestations that are stale, or whose freshness cannot be determined. Mechanisms to address freshness and their application to the RATS topological models are discussed in <xref target="RFC9334"/>. Other mechanisms for determining freshness may be used as the CA/RA deems appropriate.</t>
      </section>
      <section anchor="relationship-of-attestations-and-certificate-extensions">
        <name>Relationship of Attestations and Certificate Extensions</name>
        <t>Attestations are intended as additional information in the issuance process, and may include sensitive information about the platform, such as hardware details or patch levels, or device ownership. It is <bcp14>NOT RECOMMENDED</bcp14> for a CA to copy attestations into the published certificate. CAs that choose to republish attestations in certificates <bcp14>SHOULD</bcp14> review the contents and delete any sensitive information.</t>
      </section>
      <section anchor="additional-security-considerations">
        <name>Additional Security Considerations</name>
        <t>In addition to the security considerations listed here, implementers should be familiar with the security considerations of the specifications on which this specification depends: PKCS#10 <xref target="RFC2986"/>, CRMF <xref target="RFC4211"/>, as well as general security concepts relating to remote attestation; many of these concepts are discussed in <xref section="6" sectionFormat="of" target="RFC9334"/>, <xref section="7" sectionFormat="of" target="RFC9334"/>, <xref section="9" sectionFormat="of" target="RFC9334"/>, <xref section="11" sectionFormat="of" target="RFC9334"/>, and <xref section="12" sectionFormat="of" target="RFC9334"/>. Implementers should also be aware of any security considerations relating to the specific attestation formats being carried within the CSR.
 </t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="I-D.ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Independent</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="11" month="December" year="2025"/>
            <abstract>
              <t>   The Conceptual Messages introduced by the RATS architecture (RFC
   9334) are protocol-agnostic data units that are conveyed between RATS
   roles during remote attestation procedures.  Conceptual Messages
   describe the meaning and function of such data units within RATS data
   flows without specifying a wire format, encoding, transport
   mechanism, or processing details.  The initial set of Conceptual
   Messages is defined in Section 8 of RFC 9334 and includes Evidence,
   Attestation Results, Endorsements, Reference Values, and Appraisal
   Policies.

   This document introduces the Conceptual Message Wrapper (CMW) that
   provides a common structure to encapsulate these messages.  It
   defines a dedicated CBOR tag, corresponding JSON Web Token (JWT) and
   CBOR Web Token (CWT) claims, and an X.509 extension.

   This allows CMWs to be used in CBOR-based protocols, web APIs using
   JWTs and CWTs, and PKIX artifacts like X.509 certificates.
   Additionally, the draft defines a media type and a CoAP content
   format to transport CMWs over protocols like HTTP, MIME, and CoAP.

   The goal is to improve the interoperability and flexibility of remote
   attestation protocols.  Introducing a shared message format such as
   CMW enables consistent support for different attestation message
   types, evolving message serialization formats without breaking
   compatibility, and avoiding the need to redefine how messages are
   handled within each protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-23"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC9683">
          <front>
            <title>Remote Integrity Verification of Network Devices Containing Trusted Platform Modules</title>
            <author fullname="G. C. Fedorkow" initials="G. C." role="editor" surname="Fedorkow"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <date month="December" year="2024"/>
            <abstract>
              <t>This document describes a workflow for remote attestation of the integrity of firmware and software installed on network devices that contain Trusted Platform Modules (TPMs), as defined by the Trusted Computing Group (TCG), or equivalent hardware implementations that include the protected capabilities, as provided by TPMs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9683"/>
          <seriesInfo name="DOI" value="10.17487/RFC9683"/>
        </reference>
        <reference anchor="CSBR" target="https://cabforum.org/uploads/Baseline-Requirements-for-the-Issuance-and-Management-of-Code-Signing.v3.7.pdf">
          <front>
            <title>Baseline Requirements for Code-Signing Certificates, v.3.7</title>
            <author>
              <organization>CA/Browser Forum</organization>
            </author>
            <date year="2024" month="February"/>
          </front>
        </reference>
        <reference anchor="SampleData" target="https://github.com/lamps-wg/csr-attestation-examples">
          <front>
            <title>CSR Attestation Sample Data</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 429?>

<section anchor="examples">
      <name>Examples</name>
      <t>Examples and sample data will be collected in the "CSR Attestation Sample Data" GitHub repository <xref target="SampleData"/>.</t>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

CSR-ATTESTATION-2025
  { iso(1) identified-organization(3) dod(6) internet(1) security(5)
  mechanisms(5) pkix(7) id-mod(0) id-mod-pkix-attest-01(TBDMOD) }

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS

Certificate, id-pkix
FROM PKIX1Explicit-2009 -- from [RFC5912]
{ iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) pkix(7) id-mod(0)
id-mod-pkix1-explicit-02(51) }

CertificateChoices, Attributes{}
  FROM CryptographicMessageSyntax-2010 -- from [RFC6268]
    { iso(1) member-body(2) us(840) rsadsi(113549)
    pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) }

EXTENSION, ATTRIBUTE, AttributeSet{}, SingleAttribute{}
FROM PKIX-CommonTypes-2009 -- from [RFC5912]
{ iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) pkix(7) id-mod(0)
id-mod-pkixCommon-02(57) }

id-aa
  FROM SecureMimeMessageV3dot1-2009
    { iso(1) member-body(2) us(840) rsadsi(113549)
    pkcs(1) pkcs-9(9) smime(16) modules(0) msg-v3dot1-02(39) }
  ;

ATTESTATION-STATEMENT ::= TYPE-IDENTIFIER

AttestationStatementSet ATTESTATION-STATEMENT ::= {
   ... -- None defined in this document --
}

AttestAttrSet ATTRIBUTE ::= { ... }

AttestationStatement ::= SEQUENCE {
   type   ATTESTATION-STATEMENT.&id({AttestationStatementSet}),
   bindsPublicKey [0] BOOLEAN DEFAULT TRUE,
   stmt   ATTESTATION-STATEMENT.&Type(
              {AttestationStatementSet}{@type}),
   attrs  [1] Attributes {{AttestAttrSet}} OPTIONAL
}

-- Arc for Attestation types
id-aa-attestation OBJECT IDENTIFIER ::= { id-aa 59 }

-- For PKCS#10 (Attestation)
attr-attestation ATTRIBUTE ::= {
  TYPE AttestationBundle
  COUNTS MAX 1
  IDENTIFIED BY id-aa-attestation
}

-- For CRMF (Attestation)
ext-attestation EXTENSION ::= {
  SYNTAX AttestationBundle
  IDENTIFIED BY id-aa-attestation
}

LimitedCertChoices ::= CertificateChoices (WITH COMPONENTS {\
                                                 certificate, other})

AttestationBundle ::= SEQUENCE {
   attestations SEQUENCE SIZE (1..MAX) OF AttestationStatement,
   certs SEQUENCE SIZE (1..MAX) OF LimitedCertChoices OPTIONAL
}

END
]]></artwork>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This specification is the work of a design team created by the chairs of the
LAMPS working group. The following persons, in no specific order,
contributed to the work directly, participated in design team meetings, or provided review of the document.</t>
      <t>Richard Kettlewell, Chris Trufan, Bruno Couillard,
Jean-Pierre Fiset, Sander Temme, Jethro Beekman, Zsolt Rózsahegyi, Ferenc
Pető, Mike Agrenius Kushner, Tomas Gustavsson, Dieter Bong, Christopher Meyer, Carl Wallace, Michael Richardson, Tomofumi Okubo, Olivier
Couillard, John Gray, Eric Amador, Giri Mandyam, Darren Johnson, Herman Slatman, Tiru Reddy, James Hagborg, A.J. Stein, John Kemp, Daniel Migault and Russ Housley.</t>
      <t>We would like to specifically thank Mike StJohns for his work on an initial
version of this draft. Additionally, we would like to thank Andreas Kretschmer, Hendrik Brockhaus,
David von Oheimb, Corey Bonnell, and Thomas Fossati for their feedback based on implementation
experience.</t>
      <t>Close to the end of the specification development process, the working group chairs, Russ Housley and Tim Hollebeek, reached out to Steve Hanna, Tim Polk, and Carl Wallace to help improve the document and resolve contentious issues. Their contributions substantially impacted the final outcome of the document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
