<?xml version="1.0" encoding="UTF-8"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     version="3"
     category="std"
     docName="draft-lu-rats-federated-attestation-infrastructure-00"
     ipr="trust200902"
     submissionType="IETF">

  <front>
    <title abbrev="Federated Attestation Infrastructure">
      Federated Infrastructure Layer for Cross-Platform
      Device and Application Attestation
    </title>

    <seriesInfo name="Internet-Draft" value="draft-lu-rats-federated-attestation-infrastructure-00"/>

    <author fullname="David Lu" initials="D." surname="Lu">
      <organization>Futurewei</organization>
      <address>
        <email>dlu@futurewei.com</email>
      </address>
    </author>

    <date year="2026" month="5"/>
    <keyword>RATS</keyword>
    <keyword>EAT</keyword>
    <keyword>attestation</keyword>
    <keyword>mobile security</keyword>
    <keyword>device integrity</keyword>

    <abstract>
      <t>
        This document defines a federated infrastructure layer for cross-platform device and application attestation.
      </t>

      <t>
        The proposed architecture extends the Remote ATtestation ProcedureS (RATS) architecture <xref target="RFC9334"/> by introducing privacy-preserving federation, decentralized endorsement distribution, decentralized normalization of attestation claims, and software supply-chain provenance integration.
      </t>

      <t>
        The architecture enables interoperable attestation across heterogeneous operating systems, application ecosystems, and trust providers without requiring centralized platform ownership.
      </t>

      <t>
        This document defines architectural roles, protocol interactions, endorsement distribution semantics, provenance integration models, and privacy requirements.
      </t>
    </abstract>

    <boilerplate>
      <section anchor="status">
        <name>Status of This Memo</name>

        <t>
          This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
        </t>

        <t>
          Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted at any time.
        </t>
      </section>
    </boilerplate>
  </front>

  <middle>

    <section anchor="intro">
      <name>Introduction</name>

      <t>
        Remote ATtestation procedureS (RATS) Architecture <xref target="RFC9334"/> defines a generalized architecture for remote attestation systems. However, existing attestation deployments remain highly platform-centric and rely on vertically integrated trust infrastructures.
      </t>

      <t>
        Examples include proprietary mobile integrity services, hardware vendor-specific endorsement chains, cloud-provider-specific attestation APIs, and disconnected software supply-chain verification systems.
      </t>

      <t>
        These models create several limitations including fragmentation across ecosystems, inability to interoperate across trust domains, centralized endorsement bottlenecks, privacy leakage, opaque claim semantics, and weak integration with software provenance systems.
      </t>

      <t>
        This document defines a Federated Infrastructure Layer for cross-platform attestation interoperability.
      </t>

      <t>
        The architecture enables interoperable attestation verification, decentralized trust distribution, portable claim semantics, composable trust evaluation, and provenance-aware application integrity assessment.
      </t>
    </section>

    <section anchor="terminology">
      <name>Terminology</name>

      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>.
      </t>

      <section anchor="term-fed-verifier">
        <name>Federated Verifier</name>

        <t>
          A verifier capable of consuming attestation evidence from multiple heterogeneous attestation providers.
        </t>
      </section>

      <section anchor="term-normalizer">
        <name>Claim Normalizer</name>

        <t>
          A logical role that transforms platform-specific attestation claims into normalized semantic claims.
        </t>
      </section>

      <section anchor="term-endorsement">
        <name>Endorsement Distributor</name>

        <t>
          A decentralized service responsible for distributing endorsements, reference values, and trust anchors.
        </t>
      </section>

      <section anchor="term-provenance">
        <name>Provenance Authority</name>

        <t>
          An authority responsible for validating software supply-chain provenance metadata.
        </t>
      </section>
    </section>

    <section anchor="requirements">
      <name>Requirements</name>

      <section anchor="r1">
        <name>R1: Cross-Platform Interoperability</name>

        <t>
          The system MUST support heterogeneous attestation providers and operating systems.
        </t>
      </section>

      <section anchor="r2">
        <name>R2: Decentralized Trust Distribution</name>

        <t>
          The architecture MUST avoid mandatory centralized endorsement authorities.
        </t>
      </section>

      <section anchor="r3">
        <name>R3: Privacy Preservation</name>

        <t>
          The architecture MUST minimize device-identifying information leakage.
        </t>
      </section>

      <section anchor="r4">
        <name>R4: Claim Portability</name>

        <t>
          The architecture MUST support normalized semantic claims across ecosystems.
        </t>
      </section>

      <section anchor="r5">
        <name>R5: Provenance Awareness</name>

        <t>
          The architecture MUST support integration with software supply-chain provenance systems.
        </t>
      </section>

      <section anchor="r6">
        <name>R6: Federated Extensibility</name>

        <t>
          The architecture MUST permit independently governed attestation domains.
        </t>
      </section>

      <section anchor="requirements-discussion">
        <name>Discussion</name>

        <t>
          The requirements defined in this section are motivated by increasing fragmentation in modern attestation ecosystems. Current industry deployments are typically vertically integrated and optimized for a single vendor trust domain.
        </t>

        <t>
          Mobile ecosystems commonly bind attestation semantics to proprietary platform APIs, cloud providers expose provider-specific confidential computing attestation formats, and enterprise endpoint systems frequently rely on closed posture-assessment protocols.
        </t>

        <t>
          Cross-platform interoperability is therefore required to support heterogeneous device fleets and multi-cloud execution environments.
        </t>

        <t>
          Decentralized trust distribution is motivated by operational and geopolitical concerns surrounding centralized trust anchors.
        </t>

        <t>
          Privacy preservation reflects growing industry movement toward minimizing globally correlatable identifiers.
        </t>

        <t>
          Claim portability is motivated by the operational burden created by incompatible attestation semantics.
        </t>

        <t>
          Provenance awareness reflects the growing importance of software supply-chain security following widespread adoption of SBOMs, SLSA, Sigstore, and in-toto frameworks.
        </t>
      </section>
    </section>

    <section anchor="architecture">
      <name>Architectural Overview</name>

      <section anchor="core-roles">
        <name>Core Roles</name>

        <ul>
          <li>Attester</li>
          <li>Verifier</li>
          <li>Relying Party</li>
          <li>Reference Value Provider</li>
        </ul>
      </section>

      <section anchor="extended-roles">
        <name>Extended Roles</name>

        <ul>
          <li>Federated Claim Normalizer</li>
          <li>Endorsement Distributor</li>
          <li>Provenance Authority</li>
          <li>Federation Coordinator</li>
        </ul>
      </section>
    </section>

    <section anchor="federation">
      <name>Federated Trust Architecture</name>

      <section anchor="trust-domains">
        <name>Trust Domains</name>

        <t>
          Each ecosystem MAY operate an independent trust domain.
        </t>

        <t>
          Examples include mobile platform vendors, cloud providers, enterprise PKIs, open-source foundations, and hardware manufacturers.
        </t>
      </section>

      <section anchor="cross-domain">
        <name>Cross-Domain Verification</name>

        <t>
          Federated verifiers MAY validate evidence originating from multiple trust domains.
        </t>

        <t>
          Trust relationships MAY be established through cross-signing, transparency logs, policy registries, threshold trust models, and decentralized trust registries.
        </t>
      </section>

      <section anchor="trust-portability">
        <name>Trust Portability</name>

        <t>
          A relying party SHOULD be able to evaluate trust equivalence between ecosystems using normalized semantic claims.
        </t>
      </section>

      <section anchor="federation-discussion">
        <name>Discussion</name>

        <t>
          The federated trust model defined in this section is motivated by the operational reality that modern computing environments are inherently multi-domain and multi-stakeholder.
        </t>

        <t>
          Current industry practice already demonstrates partial federation models in adjacent domains including federated identity systems, public key infrastructures, certificate transparency ecosystems, and software package trust systems.
        </t>

        <t>
          Trust domains are introduced to enable independently governed attestation ecosystems while still supporting interoperable verification.
        </t>

        <t>
          Cross-domain verification is motivated by real-world scenarios where relying parties must assess devices or workloads originating outside their direct ecosystem.
        </t>

        <t>
          Trust portability addresses one of the largest operational gaps in current attestation deployments: the inability to express security intent independently of vendor implementation.
        </t>
      </section>
    </section>

    <section anchor="privacy">
      <name>Privacy-Preserving Federation</name>

      <section anchor="selective-disclosure">
        <name>Selective Disclosure</name>

        <t>
          Attesters SHOULD support selective disclosure of claims.
        </t>
      </section>

      <section anchor="identifier-minimization">
        <name>Minimization of Persistent Identifiers</name>

        <t>
          Attestation evidence MUST NOT require globally stable device identifiers.
        </t>
      </section>

      <section anchor="verifier-isolation">
        <name>Verifier Isolation</name>

        <t>
          Federated verifiers SHOULD be isolated from ecosystem-global tracking systems.
        </t>
      </section>

      <section anchor="privacy-discussion">
        <name>Discussion</name>

        <t>
          Privacy-preserving federation is motivated by longstanding concerns that attestation systems can become de facto device tracking infrastructures.
        </t>

        <t>
          Industry practice increasingly recognizes that attestation must balance trust establishment with user privacy.
        </t>

        <t>
          Selective disclosure mechanisms are motivated by the principle of least privilege.
        </t>

        <t>
          Minimization of persistent identifiers reflects broader industry migration away from stable hardware identity exposure.
        </t>

        <t>
          Verifier isolation is motivated by concerns that centralized verification infrastructures can aggregate cross-service behavioral data.
        </t>
      </section>
    </section>

    <section anchor="endorsement">
      <name>Decentralized Endorsement Distribution</name>

      <section anchor="distributed-registries">
        <name>Distributed Endorsement Registries</name>

        <t>
          Endorsements MAY be distributed using transparency logs, content-addressable storage, distributed ledgers, and signed metadata registries.
        </t>
      </section>

      <section anchor="endorsement-objects">
        <name>Endorsement Objects</name>

        <t>
          An endorsement object MAY contain hardware model metadata, firmware measurements, OS build metadata, application signing metadata, revocation status, and provenance bindings.
        </t>
      </section>

      <section anchor="endorsement-discussion">
        <name>Discussion</name>

        <t>
          Decentralized endorsement distribution is motivated by operational scalability limitations and governance concerns associated with centralized endorsement infrastructures.
        </t>

        <t>
          Industry practice increasingly favors distributed trust metadata systems such as certificate transparency logs, decentralized software repositories, and software transparency systems.
        </t>

        <t>
          Distributed endorsement registries reduce single points of operational failure.
        </t>

        <t>
          Transparency requirements reflect industry movement toward verifiable infrastructure governance.
        </t>

        <t>
          Multi-authority endorsements recognize that no single entity fully controls modern computing stacks.
        </t>
      </section>
    </section>

    <section anchor="normalization">
      <name>Decentralized Claim Normalization</name>

      <section anchor="normalized-claims">
        <name>Normalized Semantic Claims</name>

        <t>
          Normalized claims abstract vendor-specific representations into interoperable semantics.
        </t>

        <table anchor="claim-table">
          <name>Example Normalized Claims</name>

          <thead>
            <tr>
              <th>Normalized Claim</th>
              <th>Vendor-Specific Sources</th>
            </tr>
          </thead>

          <tbody>
            <tr>
              <td>oemboot</td>
              <td>Android Verified Boot, Apple Secure Boot</td>
            </tr>

            <tr>
              <td>hw_backed_keys</td>
              <td>StrongBox, Secure Enclave</td>
            </tr>

            <tr>
              <td>app_integrity</td>
              <td>Play Integrity, App Attest</td>
            </tr>
          </tbody>
        </table>
      </section>

      <section anchor="normalization-discussion">
        <name>Discussion</name>

        <t>
          Decentralized claim normalization is motivated by incompatible claim semantics across vendors and ecosystems.
        </t>

        <t>
          Different ecosystems expose similar security properties using incompatible terminology, evidence structures, confidence models, and verification semantics.
        </t>

        <t>
          Normalized semantic claims abstract implementation details into policy-relevant security properties.
        </t>

        <t>
          Layered confidence models reflect the operational reality that attestation strength varies significantly depending on implementation characteristics.
        </t>
      </section>
    </section>

    <section anchor="provenance">
      <name>Supply Chain Provenance Integration</name>

      <section anchor="motivation">
        <name>Motivation</name>

        <t>
          Traditional attestation systems validate runtime integrity but often ignore software provenance.
        </t>
      </section>

      <section anchor="provenance-sources">
        <name>Provenance Sources</name>

        <t>
          The architecture MAY integrate SBOM systems, SLSA provenance, in-toto attestations, Sigstore transparency records, reproducible build verification, and package registry signatures.
        </t>
      </section>

      <section anchor="provenance-discussion">
        <name>Discussion</name>

        <t>
          Supply-chain provenance integration is motivated by the growing recognition that runtime integrity alone is insufficient for establishing trustworthy software execution.
        </t>

        <t>
          Recent industry incidents involving compromised build systems, malicious dependencies, package repository attacks, and signed malware have demonstrated that valid runtime attestation may coexist with compromised software provenance.
        </t>

        <t>
          Industry practice has increasingly shifted toward end-to-end software supply-chain verification.
        </t>

        <t>
          Provenance binding enables attestation systems to connect runtime measurements with software lifecycle evidence.
        </t>

        <t>
          Composite trust evaluation reflects common enterprise security practice where trust decisions incorporate multiple dimensions simultaneously.
        </t>
      </section>
    </section>

    <section anchor="composite">
      <name>Composite Attestation Results</name>

      <section anchor="aggregation">
        <name>Multi-Source Aggregation</name>

        <t>
          Composite results MAY combine hardware attestation, OS attestation, application integrity, provenance verification, and enterprise posture assessment.
        </t>
      </section>

      <section anchor="policy-evaluation">
        <name>Policy Evaluation</name>

        <t>
          Relying parties MAY define policies over normalized claims.
        </t>
      </section>

      <section anchor="composite-discussion">
        <name>Discussion</name>

        <t>
          Composite attestation results are motivated by the operational reality that modern trust evaluation is inherently multi-dimensional and risk-based.
        </t>

        <t>
          Current industry practice increasingly combines multiple security signals into unified policy engines.
        </t>

        <t>
          Multi-source aggregation recognizes that no individual attestation mechanism provides complete assurance.
        </t>

        <t>
          Federated trust scoring reflects broader industry adoption of probabilistic and weighted trust models.
        </t>
      </section>
    </section>

    <section anchor="security">
      <name>Security Considerations</name>

      <t>
        The architecture introduces security considerations including federation poisoning, normalization ambiguity, transparency log compromise, and provenance forgery.
      </t>
    </section>

    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>

      <t>
        The architecture prioritizes correlation resistance, unlinkability, metadata minimization, and privacy-preserving transparency mechanisms.
      </t>
    </section>

    <section anchor="iana">
      <name>IANA Considerations</name>

      <t>
        This document requests no IANA actions.
      </t>
    </section>

  </middle>

<back>

<references>
  <name>Normative References</name>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9711.xml"/>
</references>

<section anchor="appendix-normalization">
  <name>Example Claim Normalization Schema</name>

  <sourcecode type="json"><![CDATA[
{
"normalized_claim": "oemboot",
"confidence_level": 3,
"source_claims": [
{
"vendor": "android",
"claim": "verifiedBootState",
"value": "TRUE"
}
]
}
]]></sourcecode>
</section>

<section anchor="appendix-provenance">
  <name>Example Provenance Binding</name>

  <sourcecode type="json"><![CDATA[
{
"artifact_hash": "sha256:abcd...",
"sbom_reference": "urn:sbom:12345",
"slsa_attestation": "urn:slsa:67890",
"transparency_log_entry": "urn:tlog:99999"
}
]]></sourcecode>
</section>

<section anchor="appendix-threat-model">
  <name>Threat Model</name>

  <t>
    The architecture assumes adversaries MAY attempt endorsement forgery, verifier compromise, federation poisoning, provenance tampering, privacy correlation attacks, and semantic claim manipulation.
  </t>

  <t>
    The architecture is specifically designed to reduce centralized trust concentration, ecosystem lock-in, opaque trust semantics, verifier overreach, and provenance fragmentation.
  </t>
</section>

</back>
</rfc>