<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jpfiset-lamps-attestationkey-eku-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EKU for Attestation Keys">X.509 Certificate Extended Key Usage (EKU) for Attestation Keys</title>
    <seriesInfo name="Internet-Draft" value="draft-jpfiset-lamps-attestationkey-eku-02"/>
    <author initials="J.-P." surname="Fiset" fullname="Jean-Pierre Fiset">
      <organization abbrev="Crypto4A">Crypto4A Inc.</organization>
      <address>
        <postal>
          <street>1550A Laperriere Ave</street>
          <city>Ottawa, Ontario</city>
          <code>K1Z 7T2</code>
          <country>Canada</country>
        </postal>
        <email>jp@crypto4a.com</email>
      </address>
    </author>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Cryptic Forest">Cryptic Forest Software</organization>
      <address>
        <postal>
          <city>Sioux Lookout</city>
          <country>Canada</country>
        </postal>
        <email>mike@ounsworth.ca</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization/>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>montywiseman32@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 47?>

<t>X.509 certificates (<xref target="RFC5280"/>) defines the Extended Key Usage (EKU) extension and specifies several key purpose
identifiers (KeyPurposeIds) for use with that extension.
This document defines a KeyPurposeId for the purpose of signing Evidence to provide remote attestation functions
as defined in the RATS Architecture (<xref target="RFC9334"/>).</t>
    </abstract>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Key purpose identifiers (KeyPurposeId) are added to the Extended Key Usage (EKU) extension of X.509 certificates to express
the intent of the certified key. It is used to further define the basic purpose indicated in the key usage (KU) extension.</t>
      <t>This specification introduces the KeyPurposeId <tt>id-kp-attestationKey</tt> for X.509 certificates that endorse Attestation Keys
for the purpose of validating Evidence.</t>
      <t>Attesters, as defined in RATS <xref target="RFC9334"/>, can use cryptographic private keys to identify
the origin of generated Evidence and to protect its integrity. Those private keys are referred to as
Attestation Keys.</t>
      <t>Attestation Keys can be endorsed by a Certification Authority (CA) by issuing X.509 certificates (see <xref target="RFC5280"/>). Those
certificates <bcp14>SHOULD</bcp14> include an extended key usage to indicate that the certified key is dedicated to the purpose of signing
Evidence.</t>
      <t>Verifiers responsible of validating Evidence generated by an Attester use the CA's endorsement (X.509 certificate) to support
the appraisal process.</t>
      <t>The KeyPurposeId <tt>id-kp-attestationKey</tt> allows the Verifier to trust that the associated key is controlled according to the
guidance proposed in this specification.</t>
      <section anchor="example">
        <name>Example</name>
        <t>A Hardware Security Module (HSM) is designed to generate Evidence about itself and cryptographic keys that it hosts. For the purpose
of generating Evidence, an Attestation Key is dedicated for this purpose and endorsed by the manufacturing CA.</t>
        <t>The Attestation Key is not the only key endorsed by the manufacturing CA as many cryptographic signing keys are necessary to manage
a HSM. As a result, there are many X.509 certificates issued to the HSM by the manufacturing CA.</t>
        <t>A Verifier responsible of appraising Evidence generated by the HSM must ensure that the Attestation Key was used. Evidence signed
by a different key, even if endorsed by the same manufacturing CA, can not be trusted. The key purpose introduced in this
specification allows Verifiers to determine during validation if a cryptographic key was intended to be used for signing
Evidence.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Much of the terms used in this specification are borrowed from RATS (<xref target="RFC9334"/>).
Readers of this specification should review the RATS Architecture and its terminology
to put in context the text presented in this specification.</t>
      <dl>
        <dt>Attestation Key:</dt>
        <dd>
          <t>A key under the control of the Attester and reserved for the purpose of signing Evidence.</t>
        </dd>
        <dt>Attester:</dt>
        <dd>
          <t>Role defined in <xref target="RFC9334"/> and assigned to entities responsible of generating Evidence.</t>
        </dd>
        <dt>Evidence:</dt>
        <dd>
          <t>The term Evidence respects the definition offered in <xref target="RFC9334"/>. Evidence is composed of
claims and may include information such as configuration data, measurements and telemetry.</t>
        </dd>
        <dt>RATS:</dt>
        <dd>
          <t>Remote ATtestation procedureS. Refers to a working group within IETF and all the documents developed
under this umbrella of effort. This specification is developed to support concepts developed in RATS but more
particularly refers to the RATS Architecture as introduced in <xref target="RFC9334"/>.</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>Role defined in <xref target="RFC9334"/> and assigned to entities responsible of appraising the Evidence
generated by an Attester.</t>
        </dd>
      </dl>
    </section>
    <section anchor="extended-key-usage-for-attestation-keys">
      <name>Extended Key Usage for Attestation Keys</name>
      <t>This specification defines the KeyPurposeId <tt>id-kp-attestationKey</tt>. This KeyPurposeId
is reserved for endorsement of Attestation Keys. In other words, the intent of the certified key is
to be dedicated to the signing of Evidence.</t>
      <t>As described in <xref target="RFC5280"/>, the EKU extension "<bcp14>MAY</bcp14>, at the option of the certificate issuer, be either
critical or non-critical". Selecting to identify the EKU extension as critical might have significant
impacts on the overall system performance and this decision is left to the issuing authority.</t>
      <t>Also specified in <xref target="RFC5280"/>, "[i]f multiple purposes are indicated the application need not recognize
all purposes indicated, as long as the intended purpose is present". Since Attestation Keys should be
dedicated to the purpose of signing Evidence, this specification RECOMMENDS that EKUs with the
KeyPurposeId <tt>id-kp-attestationKey</tt> not include any other key purpose.</t>
      <t>This specification RECOMMENDS that the extension Key Usage (KU) be included for the endorsement of Attestation
Keys. Furthermore, if the KU extension is included, it <bcp14>SHOULD</bcp14> be set to "digital signature".</t>
      <section anchor="implication-for-a-certificate-authority">
        <name>Implication for a Certificate Authority</name>
        <t>When a Certificate Authority issues a X.509 certificate that includes the extended key
usage defined in this specification, certain additional considerations <bcp14>MUST</bcp14> be taken to ensure
that the constraints defined in this document are respected.</t>
        <t>Issuing a X.509 certificate with the extended key usage id-kp-attestationKey
equates to providing an endorsement of the identified Attester as defined in the RATS Architecture.
Therefore, the procedures and practices employed by a Certificate Authority <bcp14>MUST</bcp14> take into account
the security considerations relating to the Attestation Key as outlined in the RATS architecture.</t>
        <t>In particular, it is not sufficient for a CA to verify that the subject of the certificate,
the Attester, has possession of the subject key. It <bcp14>MUST</bcp14> also ensure that the Attester is the only
entity that controls the key. This can be accomplished (but not restricted to) by using
a key confined to specialized hardware under the control of the Attester.</t>
      </section>
      <section anchor="implication-for-the-rats-verifier">
        <name>Implication for the RATS Verifier</name>
        <t>In <xref target="RFC9334"/>, the Verifier is the role that appraises the Evidence produced by an
Attester. As part of the verification process, the Verifier assesses endorsements. A X.509
certificate containing the EKU <tt>id-kp-attestationKey</tt> is an endorsement of the Attester by the issuing authority.</t>
        <t>A Verifier <bcp14>MAY</bcp14> reject Evidence if the X.509 certificate issued to the signing key does not contain an EKU
extension specifying the key purpose <tt>id-kp-attestationKey</tt>.</t>
        <t>A Verifier <bcp14>MAY</bcp14> reject Evidence if the X.509 certificate issued to the signing key contains an EKU extension with
a key purpose other than <tt>id-kp-attestationKey</tt>.</t>
        <t>A Verifier <bcp14>SHOULD</bcp14> reject Evidence if the X.509 certificate issued to the signing key contains a KU extension
with a basic purpose other than "digital signature".</t>
      </section>
      <section anchor="implication-for-attesters">
        <name>Implication for Attesters</name>
        <t>An Attestation Key <bcp14>SHOULD</bcp14> be used by an Attester only to digitally sign evidence that
the Attester can observe in the target environment. The Attester <bcp14>SHOULD NOT</bcp14> use the
Attestation Key for any other purpose (dedication).</t>
        <t>An Attestation Key <bcp14>SHOULD</bcp14> be under the sole control of the Attester identified in the X.509 certificate.
This constraint is to ensure that another entity can not impersonate the Attester (non-repudiation).</t>
      </section>
      <section anchor="implication-for-cryptographic-modules">
        <name>Implication for Cryptographic Modules</name>
        <t>Attestation Keys are instantiated and operated on by cryptographic modules. These modules
<bcp14>MUST</bcp14> provide the services required to accomplish the recommendations proposed in this specification.</t>
        <t>The mechanisms used to perform those restrictions are out of scope for this specification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref target="RFC5280"/> introduces security considerations that are applicable to this specification.
The EKU purpose <tt>id-kp-attestationKey</tt> does not introduce additional security risks.
On the other hand, the adoption of this extended key purpose mitigates specific cross-protocol attacks in
relation to use of Attestation Keys.</t>
      <t>The RATS Architecture (<xref target="RFC9334"/>) offers many security considerations that should be reviewed
by implementers of this specification.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>For the ASN.1 module found in Appendix A, IANA is requested to assign
an object identifier for the module identifier (TBD0) with a
description of "id-mod-attestation-eku-2025". This should be allocated in the
"SMI Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
      <t>For the ASN.1 module found in Appendix A, IANA is requested to assign
an object identifier for the extended key usage value (XX) with a
description of "id-kp-attestationKey". This should be allocated in the
"SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
        <front>
          <title>Remote ATtestation procedureS (RATS) Architecture</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <author fullname="N. Smith" initials="N." surname="Smith"/>
          <author fullname="W. Pan" initials="W." surname="Pan"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9334"/>
        <seriesInfo name="DOI" value="10.17487/RFC9334"/>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 228?>

<section numbered="false" anchor="appendix-a-asn1-module">
      <name>Appendix A. ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications [X.680] and [X.690].
It defines the OID used for Attestation Key Extended Key Usage.</t>
      <artwork><![CDATA[
  AttestationEKU-2025 { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-mod-attestation-eku-2025(TBD0) }

  DEFINITIONS EXPLICIT TAGS ::=

  BEGIN

  -- EXPORTS ALL --

  -- IMPORTS NOTHING --

  -- OID Arc --

  id-kp  OBJECT IDENTIFIER  ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

  -- Attestation Key Extended Key Usage --

  id-kp-attestationKey OBJECT IDENTIFIER ::= { id-kp XX }

  END
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
