<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-ar4si-07" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="Attestation Results">Attestation Results for Secure Interactions</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-07"/>
    <author initials="E." surname="Voit" fullname="Eric Voit">
      <organization abbrev="Cisco">Cisco Systems</organization>
      <address>
        <email>evoit@cisco.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Hardjono" fullname="Thomas Hardjono">
      <organization>MIT</organization>
      <address>
        <email>hardjono@mit.edu</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="V." surname="Scarlata" fullname="Vincent Scarlata">
      <organization>Intel</organization>
      <address>
        <email>vincent.r.scarlata@intel.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="02"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 94?>

<t>This document defines reusable Attestation Result information elements.
When these elements are offered to Relying Parties as Evidence, different aspects of Attester trustworthiness can be evaluated.
Additionally, where the Relying Party is interfacing with a heterogeneous mix of Attesting Environment and Verifier types, consistent policies can be applied to subsequent information exchange between each Attester and the Relying Party.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-ar4si"/>.</t>
    </note>
  </front>
  <middle>
    <?line 101?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The first paragraph of the May 2021 US Presidential Executive Order on Improving the Nation's Cybersecurity <xref target="US-Executive-Order"/> ends with the statement "the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is."
Later this order explores aspects of trustworthiness such as an auditable trust relationship, which it defines as an "agreed-upon relationship between two or more system elements that is governed by criteria for secure interaction, behavior, and outcomes."</t>
      <t>The Remote ATtestation procedureS (RATS) architecture <xref target="RFC9334"/> provides a useful context for programmatically establishing and maintaining such auditable trust relationships.
Specifically, the architecture defines conceptual messages conveyed between architectural subsystems to support trustworthiness appraisal.
The RATS conceptual message used to convey evidence of trustworthiness is the Attestation Results.
The Attestation Results includes Verifier generated appraisals of an Attester including such information as the identity of the Attester, the security mechanisms employed on this Attester, and the Attester's current state of trustworthiness.</t>
      <t>Generated Attestation Results are ultimately conveyed to one or more Relying Parties.
Reception of an Attestation Result enables a Relying Party to determine what action to take with regards to an Attester.
Frequently, this action will be to choose whether to allow the Attester to securely interact with the Relying Party over some connection between the two.</t>
      <t>When determining whether to allow secure interactions with an Attester, a Relying Party is challenged with a number of difficult problems which it must be able to handle successfully.
These problems include:</t>
      <ul spacing="normal">
        <li>
          <t>What Attestation Results (AR) might a Relying Party be willing to trust from a specific Verifier?</t>
        </li>
        <li>
          <t>What information does a Relying Party need before allowing interactions or choosing policies to apply to a connection?</t>
        </li>
        <li>
          <t>What are the operating/environmental realities of the Attesting Environment where a Relying Party should only be able to associate a certain confidence regarding Attestation Results out of the Verifier?  (In other words, different types of Trusted Execution Environments (TEE) need not be treated as equivalent.)</t>
        </li>
        <li>
          <t>How to make direct comparisons where there is a heterogeneous mix of Attesting Environments and Verifier types.</t>
        </li>
      </ul>
      <t>To address these problems, it is important that specific Attestation Result information elements are framed independently of Attesting Environment specific constraints.
If they are not, a Relying Party would be forced to adapt to the syntax and semantics of many vendor specific environments.
This is not a reasonable ask as there can be many types of Attesters interacting with or connecting to a Relying Party.</t>
      <t>The business need therefore is for common Attestation Result information element definitions.
With these definitions, consistent interaction or connectivity decisions can be made by a Relying Party where there is a heterogenous mix of Attesting Environment types and Verifier types.</t>
      <t>This document defines information elements for Attestation Results in a way which normalizes the trustworthiness assertions that can be made from a diverse set of Attesters.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The following terms are imported from <xref target="RFC9334"/>:
Appraisal Policy for Attestation Results, Attester, Attesting Environment, Claims, Evidence, Relying Party, Target Environment and Verifier.</t>
        <t><xref target="RFC9334"/> also describes topological patterns that illustrate the need for interoperable conceptual messages.
The two patterns called "background-check model" and "passport model" are imported from the RATS architecture and used in this document as a reference to the architectural concepts:
Background-Check Model and Passport Model.</t>
        <t>Newly defined terms for this document:</t>
        <dl>
          <dt>AR-augmented Evidence:</dt>
          <dd>
            <t>a bundle of Evidence which includes at least the following:
</t>
            <ol spacing="normal" type="1"><li>
                <t>Verifier signed Attestation Results.
These Attestation Results must include Identity Evidence for the Attester, a Trustworthiness Vector describing a Verifier's most recent appraisal of an Attester, and some Verifier Proof-of-Freshness (PoF).</t>
              </li>
              <li>
                <t>A Relying Party PoF which is bound to the Attestation Results of (1) by the Attester's Attesting Environment signature.</t>
              </li>
              <li>
                <t>Sufficient information to determine the elapsed interval between the Verifier PoF and Relying Party PoF.</t>
              </li>
            </ol>
          </dd>
          <dt>Identity Evidence:</dt>
          <dd>
            <t>Evidence which unambiguously identifies an identity.
Identity Evidence could take different forms, such as a certificate, or a signature which can be appraised to have only been generated by a specific private/public key pair.</t>
          </dd>
          <dt>Trustworthiness Claim:</dt>
          <dd>
            <t>a specific quanta of trustworthiness which can be assigned by a Verifier based on its appraisal policy.</t>
          </dd>
          <dt>Trustworthiness Tier:</dt>
          <dd>
            <t>a categorization of the levels of trustworthiness which may be assigned by a Verifier to a specific Trustworthiness Claim.
These enumerated categories are: Affirming, Warning, Contraindicated, and None.</t>
          </dd>
          <dt>Trustworthiness Vector:</dt>
          <dd>
            <t>a set of zero to many Trustworthiness Claims assigned during a single appraisal procedure by a Verifier using Evidence generated by an Attester.
The vector is included within Attestation Results.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="attestation-results-for-secure-interactions">
      <name>Attestation Results for Secure Interactions</name>
      <t>A Verifier generates the Attestation Results used by a Relying Party.
When a Relying Party needs to determine whether to permit communications with an Attester, these Attestation Results must contain a specific set of information elements.
This section defines those information elements, and in some cases encodings for information elements.</t>
      <section anchor="information-driving-a-relying-party-action">
        <name>Information driving a Relying Party Action</name>
        <t>When the action is a communication establishment attempt with an Attester, there is only a limited set of actions which a Relying Party might take.
These actions include:</t>
        <ul spacing="normal">
          <li>
            <t>Allow or deny information exchange with the Attester.
When there is a deny, reasons should be returned to the Attester.</t>
          </li>
          <li>
            <t>Establish a transport connection between an Attester and a specific context within a Relying Party (e.g., a TEE, or Virtual Routing Function (VRF).)</t>
          </li>
          <li>
            <t>Apply policies on this connection (e.g., rate limits).</t>
          </li>
        </ul>
        <t>There are three categories of information which must be conveyed to the Relying Party (which also is integrated with a Verifier) before it determines which of these actions to take.</t>
        <ol spacing="normal" type="1"><li>
            <t>Non-repudiable Identity Evidence – Evidence which undoubtably identifies one or more entities involved with a communication.</t>
          </li>
          <li>
            <t>Trustworthiness Claims – Specifics a Verifier asserts with regards to its trustworthiness findings about an Attester.</t>
          </li>
          <li>
            <t>Claim Freshness – Establishes the time of last update (or refresh) of Trustworthiness Claims.</t>
          </li>
        </ol>
        <t>The following sections detail requirements for these three categories.</t>
      </section>
      <section anchor="identity-section">
        <name>Non-repudiable Identity</name>
        <t>Identity Evidence must be conveyed during the establishment of any trust-based relationship.
Specific use cases will define the minimum types of identities required by a particular Relying Party as it evaluates Attestation Results, and perhaps additional associated Evidence.
At a bare minimum, a Relying Party MUST start with the ability to verify the identity of a Verifier it chooses to trust.
Attester identities may then be acquired through signed or encrypted communications with the Verifier identity and/or the pre-provisioning Attester public keys in the Attester.</t>
        <t>During the Remote Attestation process, the Verifier's identity must be established with a Relying Party, often via a Verifier signature across recent Attestation Results.
This Verifier identity could only have come from a key pair maintained by a trusted developer or operator of the Verifier.</t>
        <t>Additionally, each set of Attestation Results must be provably and non-reputably bound to the identity of the original Attesting Environment which was evaluated by the Verifier.
This is accomplished via satisfying two requirements.
First the Verifier signed Attestation Results MUST include sufficient Identity Evidence to ensure that this Attesting Environment signature refers to the same Attesting Environment appraised by the Verifier.
Second, where the passport model is used as a subsystem, an Attesting Environment signature which spans the Verifier signature MUST also be included.
As the Verifier signature already spans the Attester Identity as well as the Attestation Results, this restricts the viability of spoofing attacks.</t>
        <t>In a subset of use cases, these two pieces of Identity Evidence may be sufficient for a Relying Party to successfully meet the criteria for its Appraisal Policy for Attestation Results.
If the use case is a connection request, a Relying Party may simply then establish a transport session with an Attester after a successful appraisal.
However an Appraisal Policy for Attestation Results will often be more nuanced, and the Relying Party may need additional information.
Some Identity Evidence related policy questions which the Relying Party may consider include:</t>
        <ul spacing="normal">
          <li>
            <t>Does the Relying Party only trust this Verifier to make Trustworthiness Claims on behalf a specific type of Attesting Environment?  Might a mix of Verifiers be necessary to cover all mandatory Trustworthiness Claims?</t>
          </li>
          <li>
            <t>Does the Relying Party only accept connections from a verified-authentic software build from a specific software developer?</t>
          </li>
          <li>
            <t>Does the Relying Party only accept connections from specific preconfigured list of Attesters?</t>
          </li>
        </ul>
        <t>For any of these more nuanced appraisals, additional Identity Evidence or other policy related information must be conveyed or pre-provisioned during the formation of a trust context between the Relying Party, the Attester, the Attester's Attesting Environment, and the Verifier.</t>
        <section anchor="attester-and-attesting-environment">
          <name>Attester and Attesting Environment</name>
          <t>Per <xref target="RFC9334"/> Figure 2, an Attester and a corresponding Attesting Environment might not share common code or even hardware boundaries.
Consequently, an Attester implementation needs to ensure that any Evidence which originates from outside the Attesting Environment MUST have been collected and delivered securely before any Attesting Environment signing may occur.
After the Verifier performs its appraisal, it will include sufficient information in the Attestation Results to enable a Relying Party to have confidence that the Attester's trustworthiness is represented via Trustworthiness Claims signed by the appropriate Attesting Environment.</t>
          <t>This document recognizes three general categories of Attesters.</t>
          <ol spacing="normal" type="1"><li>
              <t>HSM-based: A Hardware Security Module (HSM) based cryptoprocessor which hashes one or more streams of security measurements from an Attester within the Attesting Environment. Maintenance of this hash enables detection of an Attester which is not reporting the exact set of security measurements (such as log entries) taken within the Attesting Environment. An example of a HSM is a TPM2.0 <xref target="TPM2.0"/>.</t>
            </li>
            <li>
              <t>Process-based: An individual process which has its runtime memory encrypted by an Attesting Environment in a way that no other processes can read and decrypt that memory (e.g., <xref target="SGX"/> or <xref target="I-D.tschofenig-rats-psa-token"/>.)</t>
            </li>
            <li>
              <t>VM-based: An entire Guest VM (or a set of containers within a host) have been encrypted as a walled-garden unit by an Attesting Environment.  The result is that the host operating system cannot read and decrypt what is executing within that VM (e.g., <xref target="SEV-SNP"/> or <xref target="TDX"/>.)</t>
            </li>
          </ol>
          <t>Each of these categories of Attesters above will be capable of generating Evidence which is protected using private keys / certificates which are not accessible outside of the corresponding Attesting Environment.
The owner of these secrets is the owner of the identity which is bound within the Attesting Environment.
Effectively this means that for any Attester identity, there will exist a chain of trust ultimately bound to a hardware-based root of trust in the Attesting Environment.
It is upon this root of trust that unique, non-repudiable Attester identities may be founded.</t>
          <t>There are several types of Attester identities defined in this document.  This list is extensible:</t>
          <ul spacing="normal">
            <li>
              <t>chip-vendor: the vendor of the hardware chip used for the Attesting Environment (e.g., a primary Endorsement Key from a TPM)</t>
            </li>
            <li>
              <t>chip-hardware: specific hardware with specific firmware from an 'chip-vendor'</t>
            </li>
            <li>
              <t>target-environment: a unique instance of a software build running in an Attester (e.g., MRENCLAVE <xref target="SGX"/>, an Instance ID <xref target="I-D.tschofenig-rats-psa-token"/>, an Identity Block <xref target="SEV-SNP"/>, or a hash which represents a set of software loaded since boot (e.g., TPM based integrity verification.))</t>
            </li>
            <li>
              <t>target-developer: the organizational unit responsible for a particular 'target-environment' (e.g., MRSIGNER <xref target="SGX"/>)</t>
            </li>
            <li>
              <t>instance: a unique instantiated instance of an Attesting Environment running on 'chip-hardware' (e.g., an LDevID <xref target="IEEE802.1AR"/>)</t>
            </li>
          </ul>
          <t>Based on the category of the Attesting Environment, different types of identities might be exposed by an Attester.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Attester Identity type</th>
                <th align="left">Process-based</th>
                <th align="left">VM-based</th>
                <th align="left">HSM-based</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">chip-vendor</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
              </tr>
              <tr>
                <td align="left">chip-hardware</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
              </tr>
              <tr>
                <td align="left">target-environment</td>
                <td align="left">Mandatory</td>
                <td align="left">Mandatory</td>
                <td align="left">Optional</td>
              </tr>
              <tr>
                <td align="left">target-developer</td>
                <td align="left">Mandatory</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
              </tr>
              <tr>
                <td align="left">instance</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
                <td align="left">Optional</td>
              </tr>
            </tbody>
          </table>
          <t>It is expected that drafts subsequent to this specification will provide the definitions and value domains for specific identities, each of which falling within the Attester identity types listed above.
In some cases the actual unique identities might encoded as complex structures.
An example complex structure might be a 'target-environment' encoded as a Software Bill of Materials (SBOM).</t>
          <t>With the identity definitions and value domains, a Relying Party will have sufficient information to ensure that the Attester identities and Trustworthiness Claims asserted are actually capable of being supported by the underlying type of Attesting Environment.
Consequently, the Relying Party SHOULD require Identity Evidence which indicates of the type of Attesting Environment when it considers its Appraisal Policy for Attestation Results.</t>
        </section>
        <section anchor="verifier">
          <name>Verifier</name>
          <t>For the Verifier identity, it is critical for a Relying Party to review the certificate and chain of trust for that Verifier.
Additionally, the Relying Party must have confidence that the Trustworthiness Claims being relied upon from the Verifier considered the chain of trust for the Attesting Environment.</t>
          <t>There are two categorizations of Verifier identities defined in this document:</t>
          <ul spacing="normal">
            <li>
              <t>verifier build: a unique instance of a software build running as a Verifier.</t>
            </li>
            <li>
              <t>verifier developer: the organizational unit responsible for a particular 'verifier build'.</t>
            </li>
          </ul>
          <t>Within each category, communicating the identity can be accomplished via a variety of objects and encodings.</t>
        </section>
        <section anchor="communicating-identity">
          <name>Communicating Identity</name>
          <t>Any of the above identities used by the Appraisal Policy for Attestation Results needed to be pre-established by the Relying Party before, or provided during, the exchange of Attestation Results.
When provided during this exchange, the identity may be communicated either implicitly or explicitly.</t>
          <t>An example of explicit communication would be to include the following Identity Evidence directly within the Attestation Results: a unique identifier for an Attesting Environment, the name of a key which can be provably associated with that unique identifier, and the set of Attestation Results which are signed using that key.
As these Attestation Results are signed by the Verifier, it is the Verifier which is explicitly asserting the credentials it believes are trustworthy.</t>
          <t>An example of implicit communication would be to include Identity Evidence in the form of a signature which has been placed over the Attestation Results asserted by a Verifier.
It would be then up to the Relying Party's Appraisal Policy for Attestation Results to extract this signature and confirm that it only could have been generated by an Attesting Environment having access to a specific private key.
This implicit identity communication is only viable if the Attesting Environment's public key is already known by the Relying Party.</t>
          <t>One final step in communicating identity is proving the freshness of the Attestation Results to the degree needed by the Relying Party.
A typical way to accomplish this is to include an element of freshness be embedded within a signed portion of the Attestation Results.
This element of freshness reduces the identity spoofing risks from a replay attack.
For more on this, see <xref target="freshness-section"/>.</t>
        </section>
      </section>
      <section anchor="vector-section">
        <name>Trustworthiness Claims</name>
        <section anchor="design-principles">
          <name>Design Principles</name>
          <t>Trust is not absolute.
Trust is a belief in some aspect about an entity (in this case an Attester), and that this aspect is something which can be depended upon (in this case by a Relying Party.)
Within the context of Remote Attestation, believability of this aspect is facilitated by a Verifier.
This facilitation depends on the Verifier's ability to parse detailed Evidence from an Attester and then to assert conclusions about this aspect in a way interpretable by a Relying Party.</t>
          <t>Specific aspects for which a Verifier will assert trustworthiness are defined in this section.
These are known as Trustworthiness Claims.
These claims have been designed to enable a common understanding between a broad array of Attesters, Verifiers, and Relying Parties.
The following set of design principles have been applied in the Trustworthiness Claim definitions:</t>
          <ol spacing="normal" type="1"><li>
              <t>Expose a small number of Trustworthiness Claims.  </t>
              <t>
Reason: a plethora of similar Trustworthiness Claims will result in divergent choices made on which to support between different Verifiers.  This would place a lot of complexity in the Relying Party as it would be up to the Relying Party (and its policy language) to enable normalization across rich but incompatible Verifier object definitions.</t>
            </li>
            <li>
              <t>Each Trustworthiness Claim enumerates only the specific states that could viably result in a different outcome after the Policy for Attestation Results has been applied.  </t>
              <t>
Reason: by explicitly disallowing the standardization of enumerated states which cannot easily be connected to a use case, we avoid forcing implementers from making incompatible guesses on what these states might mean.</t>
            </li>
            <li>
              <t>Verifier and RP developers need explicit definitions of each state in order to accomplish the goals of (1) and (2).  </t>
              <t>
Reason: without such guidance, the Verifier will append plenty of raw supporting info.  This relieves the Verifier of making the hard decisions.  Of course, this raw info will be mostly non-interpretable and therefore non-actionable by the Relying Party.</t>
            </li>
            <li>
              <t>Support standards and non-standard extensibility for (1) and (2).  </t>
              <t>
Reason: standard types of Verifier generated Trustworthiness Claims should be vetted by the full RATS working group, rather than being maintained in a repository which doesn't follow the RFC process.  This will keep a tight lid on extensions which must be considered by the Relying Party's policy language.  Because this process takes time, non-standard extensions will be needed for implementation speed and flexibility.</t>
            </li>
          </ol>
          <t>These design principles are important to keep the number of Verifier generated claims low, and to retain the complexity in the Verifier rather than the Relying Party.</t>
        </section>
        <section anchor="enumeration-encoding">
          <name>Enumeration Encoding</name>
          <t>Per design principle (2), each Trustworthiness Claim will only expose specific encoded values.
To simplify the processing of these enumerations by the Relying Party, the enumeration will be encoded as a single signed 8 bit integer.  These value assignments for this integer will be in four Trustworthiness Tiers which follow these guidelines:</t>
          <t>None: The Verifier makes no assertions regarding this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>
              <t>Value 0: The Evidence received is insufficient to make a conclusion. Note: this should always be always treated equivalently by the Relying Party as no claim being made. I.e., the RP's Appraisal Policy for Attestation Results SHOULD NOT make any distinction between a Trustworthiness Claim with enumeration '0', and no Trustworthiness Claim being provided.</t>
            </li>
            <li>
              <t>Value 1: The Evidence received contains unknown elements which the Verifier is unable to evaluate. An example might be that the wrong type of Evidence has been delivered.  Another  case is that of Evidence coming from a composite Attester: a Verifier may understand only part of it and leave as "unknown" the Trustworthiness claims related to features it can't appraise.</t>
            </li>
            <li>
              <t>Value -1: A verifier malfunction occurred during the Verifier's appraisal processing.</t>
            </li>
          </ul>
          <t>Affirming: The Verifier affirms the Attester support for this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>
              <t>Values 2 to 31: A standards enumerated reason for affirming.</t>
            </li>
            <li>
              <t>Values -2 to -32: A non-standard reason for affirming.</t>
            </li>
          </ul>
          <t>Warning: The Verifier warns about this aspect of trustworthiness.</t>
          <ul spacing="normal">
            <li>
              <t>Values 32 to 95: A standards enumerated reason for the warning.</t>
            </li>
            <li>
              <t>Values -33 to -96: A non-standard reason for the warning.</t>
            </li>
          </ul>
          <t>Contraindicated: The Verifier asserts the Attester is explicitly untrustworthy in regard to this aspect.</t>
          <ul spacing="normal">
            <li>
              <t>Values 96 to 127: A standards enumerated reason for the contraindication.</t>
            </li>
            <li>
              <t>Values -97 to -128: A non-standard reason for the contraindication.</t>
            </li>
          </ul>
          <t>This enumerated encoding listed above will simplify the Appraisal Policy for Attestation Results.
Such a policies may be as simple as saying that a specific Verifier has recently asserted Trustworthiness Claims, all of which are Affirming.</t>
        </section>
        <section anchor="assigning-a-trustworthiness-claim-value">
          <name>Assigning a Trustworthiness Claim value</name>
          <t>In order to simplify design, only a single encoded value is asserted by a Verifier for any Trustworthiness Claim within a using the following process.</t>
          <ol spacing="normal" type="1"><li>
              <t>If applicable, a Verifier MUST assign a standardized value from the Contraindicated tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a non-standardized value from the Contraindicated tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a standardized value from the Warning tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a non-standardized value from the Warning tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a standardized value from the Affirming tier.</t>
            </li>
            <li>
              <t>Else if applicable, a Verifier MUST assign a non-standardized value from the Affirming tier.</t>
            </li>
            <li>
              <t>Else a Verifier MAY assign a 0 or -1.</t>
            </li>
          </ol>
        </section>
        <section anchor="specific-claims">
          <name>Specific Claims</name>
          <t>Following are the Trustworthiness Claims and their supported enumerations which may be asserted by a Verifier:</t>
          <dl>
            <dt>configuration:</dt>
            <dd>
              <t>A Verifier has appraised an Attester's configuration, and is able to make conclusions regarding the exposure of known vulnerabilities
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>The configuration is a known and approved config.</t>
                </dd>
                <dt>3:</dt>
                <dd>
                  <t>The configuration includes or exposes no known vulnerabilities.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>The configuration includes or exposes known vulnerabilities.</t>
                </dd>
                <dt>36:</dt>
                <dd>
                  <t>Elements of the configuration relevant to security are unavailable to the Verifier.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The configuration is unsupportable as it exposes unacceptable security vulnerabilities.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>executables:</dt>
            <dd>
              <t>A Verifier has appraised and evaluated relevant runtime files, scripts, and/or other objects which have been loaded into the Target environment's memory.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>Only a recognized genuine set of approved executables, scripts, files, and/or objects have been loaded during and after the boot process.</t>
                </dd>
                <dt>3:</dt>
                <dd>
                  <t>Only a recognized genuine set of approved executables have been loaded during the boot process.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>Only a recognized genuine set of executables, scripts, files, and/or objects have been loaded.  However the Verifier cannot vouch for a subset of these due to known bugs or other known vulnerabilities.</t>
                </dd>
                <dt>33:</dt>
                <dd>
                  <t>Runtime memory includes executables, scripts, files, and/or objects which are not recognized.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>Runtime memory includes executables, scripts, files, and/or object which are contraindicated.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>file-system:</dt>
            <dd>
              <t>A Verifier has evaluated a specific set of directories within the Attester's file system.  (Note: the Verifier may or may not indicate what these directory and expected files are via an unspecified management interface.)
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>Only a recognized set of approved files are found.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>The file system includes unrecognized executables, scripts, or files.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The file system includes contraindicated executables, scripts, or files.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>hardware:</dt>
            <dd>
              <t>A Verifier has appraised any Attester hardware and firmware which are able to expose fingerprints of their identity and running code.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>An Attester has passed its hardware and/or firmware verifications needed to demonstrate that these are genuine/supported.</t>
                </dd>
              </dl>
              <t>32: An Attester contains only genuine/supported hardware and/or firmware, but there are known security vulnerabilities.</t>
              <dl>
                <dt>96:</dt>
                <dd>
                  <t>Attester hardware and/or firmware is recognized, but its trustworthiness is contraindicated.</t>
                </dd>
                <dt>97:</dt>
                <dd>
                  <t>A Verifier does not recognize an Attester's hardware or firmware, but it should be recognized.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>instance-identity:</dt>
            <dd>
              <t>A Verifier has appraised an Attesting Environment's unique identity based upon private key signed Evidence which can be correlated to a unique instantiated instance of the Attester.  (Note: this Trustworthiness Claim should only be generated if the Verifier actually expects to recognize the unique identity of the Attester.)
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>The Attesting Environment is recognized, and the associated instance of the Attester is not known to be compromised.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The Attesting Environment is recognized, and but its unique private key indicates a device which is not trustworthy.</t>
                </dd>
                <dt>97:</dt>
                <dd>
                  <t>The Attesting Environment is not recognized; however the Verifier believes it should be.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>runtime-opaque:</dt>
            <dd>
              <t>A Verifier has appraised the visibility of Attester objects in memory from perspectives outside the Attester.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>the Attester's executing Target Environment and Attesting Environments are encrypted and within Trusted Execution Environment(s) opaque to the operating system, virtual machine manager, and peer  applications.  (Note: This value corresponds to the protections asserted by O.RUNTIME_CONFIDENTIALITY from <xref target="GP-TEE-PP"/>)</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>the Attester's executing Target Environment and Attesting Environments inaccessible from any other parallel application or Guest VM running on the Attester's physical device.  (Note that unlike "1" these environments are not encrypted in a way which restricts the Attester's root operator visibility. See O.TA_ISOLATION from <xref target="GP-TEE-PP"/>.)</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>The Verifier has concluded that in memory objects are unacceptably visible within the physical host that supports the Attester.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>sourced-data:</dt>
            <dd>
              <t>A Verifier has evaluated of the integrity of data objects from external systems used by the Attester.
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>All essential Attester source data objects have been provided by other Attester(s) whose most recent appraisal(s) had both no Trustworthiness Claims of "0" where the current Trustworthiness Claim is "Affirming", as well as no "Warning" or "Contraindicated" Trustworthiness Claims.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>Attester source data objects come from unattested sources, or attested sources with "Warning" type Trustworthiness Claims.</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>Attester source data objects come from contraindicated sources.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
            <dt>storage-opaque:</dt>
            <dd>
              <t>A Verifier has appraised that an Attester is capable of encrypting persistent storage. (Note: Protections must meet the capabilities of <xref target="OMTP-ATE"/> Section 5, but need not be hardware tamper resistant.)
</t>
              <dl>
                <dt>0:</dt>
                <dd>
                  <t>No assertion</t>
                </dd>
                <dt>1:</dt>
                <dd>
                  <t>Evidence contains unknown elements which inhibit Verifer evaluation.</t>
                </dd>
                <dt>-1:</dt>
                <dd>
                  <t>Verifier malfunction</t>
                </dd>
                <dt>2:</dt>
                <dd>
                  <t>the Attester encrypts all secrets in persistent storage via using keys which are never visible outside an HSM or the Trusted Execution Environment hardware.</t>
                </dd>
                <dt>32:</dt>
                <dd>
                  <t>the Attester encrypts all persistently stored secrets, but without using hardware backed keys</t>
                </dd>
                <dt>96:</dt>
                <dd>
                  <t>There are persistent secrets which are stored unencrypted in an Attester.</t>
                </dd>
                <dt>99:</dt>
                <dd>
                  <t>Cryptographic validation of the Evidence has failed.</t>
                </dd>
              </dl>
            </dd>
          </dl>
          <t>It is possible for additonal Trustworthiness Claims and enumerated values to be defined in subsequent documents.
At the same time, the standardized Trustworthiness Claim values listed above have been designed so there is no overlap within a Trustworthiness Tier.
As a result, it is possible to imagine a future where overlapping Trustworthiness Claims within a single Trustworthiness Tier may be defined.
Wherever possible, the Verifier SHOULD assign the best fitting standardized value.</t>
          <t>Where a Relying Party doesn't know how to handle a particular Trustworthiness Claim, it MAY choose an appropriate action based on the Trustworthiness Tier under which the enumerated value fits.</t>
          <t>It is up to the Verifier to publish the types of evaluations it performs when determining how Trustworthiness Claims are derived for a type of any particular type of Attester.
It is out of the scope of this document for the Verifier to provide proof or specific logic on how a particular Trustworthiness Claim which it is asserting was derived.</t>
        </section>
        <section anchor="trustworthiness-vector">
          <name>Trustworthiness Vector</name>
          <t>Multiple Trustworthiness Claims may be asserted about an Attesting Environment at single point in time.
The set of Trustworthiness Claims inserted into an instance of Attestation Results by a Verifier is known as a Trustworthiness Vector.
The order of Claims in the vector is NOT meaningful.
A Trustworthiness Vector with no Trustworthiness Claims (i.e., a null Trustworthiness Vector) is a valid construct.
In this case, the Verifier is making no Trustworthiness Claims but is confirming that an appraisal has been made.</t>
        </section>
        <section anchor="trustworthiness-vector-for-a-type-of-attesting-environment">
          <name>Trustworthiness Vector for a type of Attesting Environment</name>
          <t>Some Trustworthiness Claims are implicit based on the underlying type of Attesting Environment.
For example, a validated MRSIGNER identity can be present where the underlying <xref target="SGX"/> hardware is 'hw-authentic'.
Where such implicit Trustworthiness Claims exist, they do not have to be explicitly included in the Trustworthiness Vector.
However, these implicit Trustworthiness Claims SHOULD be considered as being present by the Relying Party.
Another way of saying this is if a Trustworthiness Claim is automatically supported as a result of coming from a specific type of TEE, that claim need not be redundantly articulated. Such implicit Trustworthiness Claims can be seen in the tables within <xref target="process-based-claims"/> and <xref target="VM-based-claims"/>.</t>
          <t>Additionally, there are some Trustworthiness Claims which cannot be adequately supported by an Attesting Environment.
For example, it would be difficult for an Attester that includes only a TPM (and no other TEE) from ever having a Verifier appraise support for 'runtime-opaque'.
As such, a Relying Party would be acting properly if it rejects any non-supportable Trustworthiness Claims asserted from a Verifier.</t>
          <t>As a result, the need for the ability to carry a specific Trustworthiness Claim will vary by the type of Attesting Environment.
Example mappings can be seen in <xref target="claim-for-TEE-types"/>.</t>
        </section>
      </section>
      <section anchor="freshness-section">
        <name>Freshness</name>
        <t>A Relying Party will care about the recentness of the Attestation Results, and the specific Trustworthiness Claims which are embedded.
All freshness mechanisms of <xref target="RFC9334"/>, Section 10 are supportable by this specification.</t>
        <t>Additionally, a Relying Party may track when a Verifier expires its confidence for the Trustworthiness Claims or the Trustworthiness Vector as a whole.  Mechanisms for such expiry are not defined within this document.</t>
        <t>There is a subset of secure interactions where the freshness of Trustworthiness Claims may need to be revisited asynchronously.
This subset is when trustworthiness depends on the continuous availability of a transport session between the Attester and Relying Party.
With such connectivity dependent Attestation Results, if there is a reboot which resets transport connectivity, all established Trustworthiness Claims should be cleared.
Subsequent connection re-establishment will allow fresh new Trustworthiness Claims to be delivered.</t>
      </section>
    </section>
    <section anchor="secure-interactions-models">
      <name>Secure Interactions Models</name>
      <t>There are multiple ways of providing a Trustworthiness Vector to a Relying Party.
This section describes two alternatives.</t>
      <section anchor="background-check">
        <name>Background-Check</name>
        <section anchor="verifier-retrieval">
          <name>Verifier Retrieval</name>
          <t>It is possible to for a Relying Party to follow the Background-Check Model defined in Section 5.2 of <xref target="RFC9334"/>.
In this case, a Relying Party will receive Attestation Results containing the Trustworthiness Vector directly from a Verifier.
These Attestation Results can then be used by the Relying Party in determining the appropriate treatment for interactions with the Attester.</t>
          <t>While applicable in some cases, the utilization of the Background-Check Model without modification has potential drawbacks in other cases.
These include:</t>
          <ul spacing="normal">
            <li>
              <t>Verifier scale: if the Attester has many Relying Parties, a Verifier appraising that Attester could be frequently be queried based on the same Evidence.</t>
            </li>
            <li>
              <t>Information leak: Evidence which the Attester might consider private can be visible to the Relying Party.  Hiding that Evidence could devalue any resulting appraisal.</t>
            </li>
            <li>
              <t>Latency: a Relying Party will need to wait for the Verifier to return Attestation Results before proceeding with secure interactions with the Attester.</t>
            </li>
          </ul>
          <t>An implementer should examine these potential drawbacks before selecting this alternative.</t>
        </section>
        <section anchor="co-resident-verifier">
          <name>Co-resident Verifier</name>
          <t>A simplified Background-Check Model may exist in a very specific case.
This is where the Relying Party and Verifier functions are co-resident.
This model is appropriate when:</t>
          <ul spacing="normal">
            <li>
              <t>Some hardware-based private key is used by an Attester while proving its identity as part of a mutually authenticated secure channel establishment with the Relying Party, and</t>
            </li>
            <li>
              <t>this Attester identity is accepted as sufficient proof of Attester integrity.</t>
            </li>
          </ul>
          <t>Effectively this means that detailed forensic capabilities of a robust Verifier are unnecessary because it is accepted that the code and operational behavior of the Attester cannot be manipulated after TEE initialization.</t>
          <t>An example of such a scenario may be when an SGX's MRENCLAVE and MRSIGNER values have been associated with a known QUOTE value.
And the code running within the TEE is not modifiable after launch.</t>
        </section>
      </section>
      <section anchor="below-zero-trust">
        <name>Below Zero Trust</name>
        <t>Zero Trust Architectures are referenced in <xref target="US-Executive-Order"/> eleven times.
However despite this high profile, there is an architectural gap with Zero Trust.
The credentials used for authentication and admission control can be manipulated on the endpoint.
Attestation can fill this gap through the generation of a compound credential called AR-augmented Evidence.
This compound credential is rooted in the hardware based Attesting Environment of an endpoint, plus the trustworthiness of a Verifier.
The overall solution is known as "Below Zero Trust" as the compound credential cannot be manipulated or spoofed by an administrator of an endpoint with root access.
This solution is not adversely impacted by the potential drawbacks with pure background-check described above.</t>
        <t>To kick-off the "Below Zero Trust" compound credential creation sequence, a Verifier evaluates an Attester and returns signed Attestation Results back to this original Attester no less frequently than a well-known interval.
This interval may also be asynchronous, based on the changing of certain Evidence as described in <xref target="I-D.ietf-rats-network-device-subscription"/>.</t>
        <t>When a Relying Party is to receive information about the Attester's trustworthiness, the Attesting Environment assembles the minimal set of Evidence which can be used to confirm or refute whether the Attester remains in the state of trustworthiness represented by the AR.
To this Evidence, the Attesting Environment appends the signature from the most recent AR as well as a Relying Party Proof-of-Freshness.
The Attesting Environment then signs the combination.</t>
        <t>The Attester then assembles AR Augmented Evidence by taking the signed combination and appending the full AR. The assembly now consists of two independent but semantically bound sets of signed Evidence.</t>
        <t>The AR Augmented Evidence is then sent to the Relying Party.
The Relying Party then can appraise these semantically bound sets of signed Evidence by applying an Appraisal Policy for Attestation Results as described below.
This policy will consider both the AR as well as additional information about the Attester within the AR Augmented Evidence the when determining what action to take.</t>
        <t>This alternative combines the <xref target="RFC9334"/> Sections 5.1 Passport Model and Section 5.2 Background-Check Model.
<xref target="interactions"/> describes this flow of information.
The flows within this combined model are mapped to <xref target="RFC9334"/> in the following way.
"Verifier A" below corresponds to the "Verifier" Figure 5 within <xref target="RFC9334"/>.
And "Relying Party/Verifier B" below corresponds to the union of the "Relying Party" and "Verifier" boxes within Figure 6 of <xref target="RFC9334"/>.
This union is possible because Verifier B can be implemented as a simple, self-contained process.
The resulting combined process can appraise the AR-augmented Evidence to determine whether an Attester qualifies for secure interactions with the Relying Party.
The specific steps of this process are defined later in this section.</t>
        <figure anchor="interactions">
          <name>Below Zero Trust</name>
          <artwork><![CDATA[
  .----------------.
  | Attester       |
  | .-------------.|
  | | Attesting   ||             .----------.    .---------------.
  | | Environment ||             | Verifier |    | Relying Party |
  | '-------------'|             |     A    |    |  / Verifier B |
  '----------------'             '----------'    '---------------'
        time(VG)                       |                 |
          |<------Verifier PoF-------time(NS)            |
          |                            |                 |
 time(EG)(1)------Evidence------------>|                 |
          |                          time(RG)            |
          |<------Attestation Results-(2)                |
          ~                            ~                 ~
        time(VG')?                     |                 |
          ~                            ~                 ~
          |<------Relying Party PoF-----------------(3)time(NS')
          |                            |                 |
time(EG')(4)------AR-augmented Evidence----------------->|
          |                            |   time(RG',RA')(5)
                                                        (6)
                                                         ~
                                                      time(RX')
]]></artwork>
        </figure>
        <t>The interaction model depicted above includes specific time related events from Appendix A of <xref target="RFC9334"/>.
With the identification of these time related events, time duration/interval tracking becomes possible.
Such duration/interval tracking can become important if the Relying Party cares if too much time has elapsed between the Verifier PoF and Relying Party PoF.
If too much time has elapsed, perhaps the Attestation Results themselves are no longer trustworthy.</t>
        <t>Note that while time intervals will often be relevant, there is a simplified case that does not require a Relying Party's PoF in step (3).
In this simplified case, the Relying Party trusts that the Attester cannot be meaningfully changed from the outside during any reportable interval.
Based on that assumption, and when this is the case then the step of the Relying Party PoF can be safely omitted.</t>
        <t>In all cases, appraisal policies define the conditions and prerequisites for when an Attester does qualify for secure interactions.
To qualify, an Attester has to be able to provide all of the mandatory affirming Trustworthiness Claims and identities needed by a Relying Party's Appraisal Policy for Attestation Results, and none of the disqualifying detracting Trustworthiness Claims.</t>
        <t>More details on each interaction step of Below Zero Trust are as follows.
The numbers used in this sequence match to the numbered steps in <xref target="interactions"/>:</t>
        <ol spacing="normal" type="1"><li>
            <t>An Attester sends Evidence which is provably fresh to Verifier A at time(EG).
Freshness from the perspective of Verifier A MAY be established with Verifier PoF such as a nonce.</t>
          </li>
          <li>
            <t>Verifier A appraises (1), then sends the following items back to that Attester within Attestation Results:  </t>
            <ol spacing="normal" type="1"><li>
                <t>the verified identity of the Attesting Environment,</t>
              </li>
              <li>
                <t>the Verifier A appraised Trustworthiness Vector of an Attester,</t>
              </li>
              <li>
                <t>a freshness proof associated with the Attestation Results,</t>
              </li>
              <li>
                <t>a Verifier signature across (2.1) though (2.3).</t>
              </li>
            </ol>
          </li>
          <li>
            <t>At time(EG') a Relying Party PoF (such as a nonce) known to the Relying Party is sent to the Attester.</t>
          </li>
          <li>
            <t>The Attester generates and sends AR-augmented Evidence to the Relying Party/Verifier B.
This AR-augmented Evidence includes:  </t>
            <ol spacing="normal" type="1"><li>
                <t>The Attestation Results from (2)</t>
              </li>
              <li>
                <t>Any (optionally) new incremental Evidence from the Attesting Environment</t>
              </li>
              <li>
                <t>Attestation Environment signature which spans a hash of the Attestation Results (such as the signature of (2.4)), the proof-of-freshness from (3), and (4.2).  Note: this construct allows the delta of time between (2.3) and (3) to be definitively calculated by the Relying Party.</t>
              </li>
            </ol>
          </li>
          <li>
            <t>On receipt of (4), the Relying Party applies its Appraisal Policy for Attestation Results.
At minimum, this appraisal policy process must include the following:  </t>
            <ol spacing="normal" type="1"><li>
                <t>Verify that (4.3) includes the nonce from (3).</t>
              </li>
              <li>
                <t>Use a local certificate to validate the signature (4.1).</t>
              </li>
              <li>
                <t>Verify that the hash from (4.3) matches (4.1)</t>
              </li>
              <li>
                <t>Use the identity of (2.1) to validate the signature of (4.3).</t>
              </li>
              <li>
                <t>Failure of any steps (5.1) through (5.4) means the link does not meet minimum validation criteria, therefore appraise the link as having a null Verifier B Trustworthiness Vector.
Jump to step (6.1).</t>
              </li>
              <li>
                <t>When there is large or uncertain time gap between time(EG) and time(EG'), the link should be assigned a null Verifier B Trustworthiness Vector.
Jump to step (6.1).</t>
              </li>
              <li>
                <t>Assemble the Verifier B Trustworthiness Vector
                </t>
                <ol spacing="normal" type="1"><li>
                    <t>Copy Verifier A Trustworthiness Vector to Verifier B Trustworthiness Vector</t>
                  </li>
                  <li>
                    <t>Add implicit Trustworthiness Claims inherent to the type of TEE.</t>
                  </li>
                  <li>
                    <t>Prune any Trustworthiness Claims unsupportable by the Attesting Environment.</t>
                  </li>
                  <li>
                    <t>Prune any Trustworthiness Claims the Relying Party doesn't accept from this Verifier.</t>
                  </li>
                </ol>
              </li>
            </ol>
          </li>
          <li>
            <t>The Relying Party takes action based on Verifier B's appraised Trustworthiness Vector, and applies the Appraisal Policy for Attestation Results.  Following is a reasonable process for such evaluation:  </t>
            <ol spacing="normal" type="1"><li>
                <t>Prune any Trustworthiness Claims from the Trustworthiness Vector not used in the Appraisal Policy for Attestation Results.</t>
              </li>
              <li>
                <t>Allow the information exchange from the Attester into a Relying Party context in the Appraisal Policy for Attestation Results where the Verifier B appraised Trustworthiness Vector includes all the mandatory Trustworthiness Claims are in the "Affirming" value range, and none of the disqualifying Trustworthiness Claims are in the "Contraindicated" value range.</t>
              </li>
              <li>
                <t>Disallow any information exchange into a Relying Party context for which that Verifier B appraised Trustworthiness Vector is not qualified.</t>
              </li>
            </ol>
          </li>
        </ol>
        <t>As link layer protocols re-authenticate, steps (1) to (2) and steps (3) to (6) will independently refresh.
This allows the Trustworthiness of Attester to be continuously re-appraised.
There are only specific event triggers which will drive the refresh of Evidence generation (1), Attestation Result generation (2), or AR-augmented Evidence generation (4):</t>
        <ul spacing="normal">
          <li>
            <t>life-cycle events, e.g. a change to an Authentication Secret of the Attester or an update of a software component.</t>
          </li>
          <li>
            <t>uptime-cycle events, e.g. a hard reset or a re-initialization of an Attester.</t>
          </li>
          <li>
            <t>authentication-cycle events, e.g. a link-layer interface reset could result in a new (4).</t>
          </li>
        </ul>
      </section>
      <section anchor="mutual-attestation">
        <name>Mutual Attestation</name>
        <t>In the interaction models described above, each device on either side of a secure interaction may require remote attestation of its peer.
This process is known as mutual-attestation.
To support mutual-attestation, the interaction models listed above may be run independently on either side of the connection.</t>
      </section>
      <section anchor="transport-protocol-integration">
        <name>Transport Protocol Integration</name>
        <t>Either unidirectional attestation or mutual attestation may be supported within the protocol interactions needed for the establishment of a single transport session.
While this document does not mandate specific transport protocols, messages containing the Attestation Results and AR Augmented Evidence can be passed within an authentication framework such the EAP protocol <xref target="RFC5247"/> over TLS <xref target="RFC8446"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Privacy Considerations Text</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security Considerations Text</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>See Body.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="OMTP-ATE" target="https://www.gsma.com/newsroom/wp-content/uploads/2012/03/omtpadvancedtrustedenvironmentomtptr1v11.pdf">
          <front>
            <title>Open Mobile Terminal Platform - Advanced Trusted Environment</title>
            <author>
              <organization/>
            </author>
            <date year="2009" month="May"/>
          </front>
        </reference>
        <reference anchor="GP-TEE-PP" target="https://globalplatform.org/specs-library/tee-protection-profile-v1-3/">
          <front>
            <title>Global Platform TEE Protection Profile v1.3</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="September"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5247">
          <front>
            <title>Extensible Authentication Protocol (EAP) Key Management Framework</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, enables extensible network access authentication. This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material and parameters generated by EAP authentication algorithms, known as "methods". It also provides a detailed system-level security analysis, describing the conditions under which the key management guidelines described in RFC 4962 can be satisfied. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5247"/>
          <seriesInfo name="DOI" value="10.17487/RFC5247"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TPM-ID" target="https://www.trustedcomputinggroup.org/wp-content/uploads/TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf">
          <front>
            <title>TPM Keys for Platform Identity for TPM 1.2</title>
            <author>
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="SEV-SNP" target="https://www.amd.com/system/files/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf">
          <front>
            <title>AMD SEV-SNP: Stregthening VM Isolation with Integrity Protection and More</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="SGX" target="https://software.intel.com/content/dam/develop/external/us/en/documents/intel-sgx-support-for-third-party-attestation-801017.pdf">
          <front>
            <title>Supporting Third Party Attestation for Intel SGX with Intel Data Center Attestation Primitives</title>
            <author>
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="TDX" target="https://software.intel.com/content/dam/develop/external/us/en/documents/tdx-whitepaper-final9-17.pdf">
          <front>
            <title>Intel Trust Domain Extensions</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AR" target="https://ieeexplore.ieee.org/document/8423794">
          <front>
            <title>802.1AR: Secure Device Identity</title>
            <author>
              <organization/>
            </author>
            <date year="2018" month="August" day="02"/>
          </front>
        </reference>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="24" month="June" year="2024"/>
            <abstract>
              <t>   The Arm Platform Security Architecture (PSA) is a family of hardware
   and firmware security specifications, as well as open-source
   reference implementations, to help device makers and chip
   manufacturers build best-practice security into products.  Devices
   that are PSA compliant can produce attestation tokens as described in
   this memo, which are the basis for many different protocols,
   including secure provisioning and network access control.  This
   document specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by PSA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with Arm's architecture.  It is not a
   standard nor a product of the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-23"/>
        </reference>
        <reference anchor="I-D.ietf-rats-network-device-subscription">
          <front>
            <title>Attestation Event Stream Subscription</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document defines how to subscribe to YANG Event Streams for
   Remote Attestation Procedures (RATS).  In RATS, the Conceptional
   Messages defined can potentially be subscribed to.  Specifically, the
   YANG module defined in this document augments the YANG module for
   TPM-based Challenge-Response based Remote Attestation (CHARRA) to
   allow for subscription to the Conceptual Message type Evidence.
   Additionally, this memo provides the methods and means to define
   additional Event Streams for other Conceptual Messages than Evidence
   as illustrated in the RATS Architecture, e.g., Attestation Results,
   Reference Values, or Endorsements.  The module defined requires at
   least one TPM 1.2, TPM 2.0, or equivalent hardware implementation
   providing the same protected capabilities as TPMs to be available in
   the Attester the YANG server is running on.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-network-device-subscription-05"/>
        </reference>
        <reference anchor="TPM2.0" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-1-Architecture-01.07-2014-03-13.pdf">
          <front>
            <title>Trusted Platform Module Library - Part 1: Architecture</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="US-Executive-Order" target="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">
          <front>
            <title>Executive Order on Improving the Nation's Cybersecurity</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="May" day="12"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 823?>

<section anchor="implementation-guidance">
      <name>Implementation Guidance</name>
      <section anchor="supplementing-trustworthiness-claims">
        <name>Supplementing Trustworthiness Claims</name>
        <t>What has been encoded into each Trustworthiness Claim is the domain of integer values which is likely to drive a different programmatic decision in the Relying Party's Appraisal Policy for Attestation Results.
This will not be the only thing a Relying Party's Operations team might care to track for measurement or debugging purposes.</t>
        <t>There is also the opportunity for the Verifier to include supplementary Evidence beyond a set of asserted Trustworthiness Claims.
It is recommended that if supplementary Evidence is provided by the Verifier within the Attestation Results, that this supplementary Evidence includes a reference to a specific Trustworthiness Claim.
This will allow a deeper understanding of some of the reasoning behind the integer value assigned.</t>
      </section>
    </section>
    <section anchor="claim-for-TEE-types">
      <name>Supportable Trustworthiness Claims</name>
      <t>The following is a table which shows what Claims are supportable by different Attesting Environment types.
Note that claims MAY BE implicit to an Attesting Environment type, and therefore do not have to be included in the Trustworthiness Vector to be considered as set by the Relying Party.</t>
      <section anchor="supportable-trustworthiness-claims-for-hsm-based-cc">
        <name>Supportable Trustworthiness Claims for HSM-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a HSM-based Confidential Computing Attester. (Such as a TPM <xref target="TPM-ID"/>.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">Verifier evaluation of Attester reveals no configuration lines which expose the Attester to known security vulnerabilities.  This may be done with or without the involvement of a TPM PCR.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Yes</td>
              <td align="left">Checks the TPM PCRs for the static operating system, and for any tracked files subsequently loaded</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">No</td>
              <td align="left">Can be supported, but TPM tracking is unlikely</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Yes</td>
              <td align="left">If TPM PCR check ok from BIOS checks, through Master Boot Record configuration</td>
            </tr>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Check IDevID</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">n/a</td>
              <td align="left">TPMs are not recommended to provide a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">n/a</td>
              <td align="left">TPMs are not recommended to provide a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Minimal</td>
              <td align="left">With a TPM, secure storage space exists and is writeable by external applications. But the space is so limited that it often is used just be used to store keys.</td>
            </tr>
          </tbody>
        </table>
        <t>Setting the Trustworthiness Claims may follow the following logic at the Verifier A within (2) of <xref target="interactions"/>:</t>
        <artwork><![CDATA[
Start: Evidence received starts the generation of a new
Trustworthiness Vector.  (e.g.,  TPM Quote Received, log received,
or appraisal timer expired)

Step 0: set Trustworthiness Vector = Null

Step 1: Is there sufficient fresh signed evidence to appraise?
  (yes) - No Action
  (no) -  Goto Step 6

Step 2: Appraise Hardware Integrity PCRs
   if (hardware NOT "0") - push onto vector
   if (hardware NOT affirming or warning), go to Step 6

Step 3: Appraise Attesting Environment identity
   if (instance-identity <> "0") - push onto vector

Step 4: Appraise executable loaded and filesystem integrity
   if (executables NOT "0") - push onto vector
   if (executables NOT affirming or warning), go to Step 6

Step 5: Appraise all remaining Trustworthiness Claims
        Independently and set as appropriate.

Step 6: Assemble Attestation Results, and push to Attester

End

]]></artwork>
      </section>
      <section anchor="process-based-claims">
        <name>Supportable Trustworthiness Claims for process-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a process-based Confidential Computing based Attester. (Such as a SGX Enclaves and TrustZone.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">If done, this is at the Application Layer.  Plus each process needs it own protection mechanism as the protection is limited to the process itself.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">Optional</td>
              <td align="left">Can be supported by application, but process-based CC is not a sufficient technology base for this Trustworthiness Claim.</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Implicit in signature</td>
              <td align="left">At least the TEE is protected here. Other elements of the system outside of the TEE might need additional protections is used by the application process.</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">From the TEE</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">Although the application must assert that this function is used by the code itself.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">Optional</td>
              <td align="left">Will need to be supported by application code</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="VM-based-claims">
        <name>Supportable Trustworthiness Claims for VM-based CC</name>
        <t>Following are Trustworthiness Claims which MAY be set for a VM-based Confidential Computing based Attester. (Such as SEV, TDX, ACCA, SEV-SNP.)</t>
        <table>
          <thead>
            <tr>
              <th align="left">Trustworthiness Claim</th>
              <th align="left">Required?</th>
              <th align="left">Appraisal Method</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">instance-identity</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">configuration</td>
              <td align="left">Optional</td>
              <td align="left">Requires application integration.  Easier than with process-based solution, as the whole protected machine can be evaluated.</td>
            </tr>
            <tr>
              <td align="left">executables</td>
              <td align="left">Optional</td>
              <td align="left">Internally available in TEE.  But keys might not be known/exposed to the Relying Party by the Attesting Environment.</td>
            </tr>
            <tr>
              <td align="left">file-system</td>
              <td align="left">Optional</td>
              <td align="left">Can be supported by application</td>
            </tr>
            <tr>
              <td align="left">hardware</td>
              <td align="left">Chip dependent</td>
              <td align="left">At least the TEE is protected here. Other elements of the system outside of the TEE might need additional protections is used by the application process.</td>
            </tr>
            <tr>
              <td align="left">runtime-opaque</td>
              <td align="left">Implicit in signature</td>
              <td align="left">From the TEE</td>
            </tr>
            <tr>
              <td align="left">storage-opaque</td>
              <td align="left">Chip dependent</td>
              <td align="left">Although the application must assert that this function is used by the code itself.</td>
            </tr>
            <tr>
              <td align="left">sourced-data</td>
              <td align="left">Optional</td>
              <td align="left">Will need to be supported by application code</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="some-issues-being-worked">
      <name>Some issues being worked</name>
      <t>It is possible for a cluster/hierarchy of Verifiers to have aggregate AR which are perhaps signed/endorsed by a lead Verifier.
What should be the Proof-of-Freshness or Verifier associated with any of the aggregate set of Trustworthiness Claims?</t>
      <t>There will need to be a subsequent document which documents how these objects which will be translated into a protocol on a wire (e.g. EAP on TLS).
Some breakpoint between what is in this draft, and what is in specific drafts for wire encoding will need to be determined.
Questions like architecting the cluster/hierarchy of Verifiers fall into this breakdown.</t>
      <t>For some Trustworthiness Claims, there could be value in identifying a specific Appraisal Policy for Attestation Results applied within the Attester.
One way this could be done would be a URI which identifies the policy used at Verifier A, and this URI would reference a specific Trustworthiness Claim.
As the URI also could encode the version of the software, it might also act as a mechanism to signal the Relying Party to refresh/re-evaluate its view of Verifier A.
Do we need this type of structure to be included here?
Should it be in subsequent documents?</t>
      <t>Expand the variant of <xref target="interactions"/> which requires no Relying Party PoF into its own picture.</t>
      <t>In what document (if any) do we attempt normalization of the identity claims between different types of TEE.   E.g., does MRSIGNER plus extra loaded software = the sum of TrustZone Signer IDs for loaded components?</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Guy Fedorkow</t>
      <t>Email: gfedorkow@juniper.net</t>
      <t>Dave Thaler</t>
      <t>Email: dthaler@microsoft.com</t>
      <t>Ned Smith</t>
      <t>Email: ned.smith@intel.com</t>
      <t>Lawrence Lundblade</t>
      <t>Email: lgl@island-resort.com</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
