<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sardar-rats-sec-cons-03" category="info" consensus="true" submissionType="IETF" updates="9334" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="RATS Security Considerations">Guidelines for Security Considerations of RATS</title>
    <seriesInfo name="Internet-Draft" value="draft-sardar-rats-sec-cons-03"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="April" day="29"/>
    <workgroup>RATS Working Group</workgroup>
    <keyword>security considerations</keyword>
    <keyword>remote attestation</keyword>
    <abstract>
      <?line 139?>

<t>This document aims to provide guidelines and best practices for writing
   security considerations for technical specifications for RATS
   targeting the needs of implementers, researchers, and protocol
   designers. This is a work-in-progress, and the current version mainly presents an outline of the topics that future versions
   will cover in more detail.</t>
      <ul spacing="normal">
        <li>
          <t>Corrections in published RATS RFCs</t>
        </li>
        <li>
          <t>Security concerns in two RATS drafts</t>
        </li>
        <li>
          <t>General security guidelines, baseline, or template for RATS</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/rats-sec-cons/draft-sardar-rats-sec-cons.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sardar-rats-sec-cons/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/rats-sec-cons"/>.</t>
    </note>
  </front>
  <middle>
    <?line 151?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="need-for-specialized-guidance-in-rats">
        <name>Need for Specialized Guidance in RATS</name>
        <t>Every Internet Draft needs to have a "Security Considerations" section.
While general guidelines such as <xref target="RFC3552"/> exist, the underlying threat model is that
the endpoint is fully trusted (i.e., all software and hardware components in the device may access the keys).
RATS <xref target="RFC9334"/> has a primarily different threat model in the sense that only parts of the endpoint (called Attester) are trusted (i.e., only specific software and hardware components in the device may access the keys), and the goal is to establish the trustworthiness of the endpoint.
In other words, <xref target="RFC3552"/> deals with a network adversary, whereas RATS deals with an endpoint adversary, which may have root access or physical control over the device with which it can extract keys from software or hardware.</t>
        <t>Moreover, remote attestation has several distinguishing features that necessitate a separate document.
One specific example of such a feature is the architectural complexity of the endpoint.
While network protocols typically have 2 roles, RATS has additional roles, which complicates
the picture.
Unfortunately, no guidelines currently exist for remote attestation <xref target="RFC9334"/> in RATS.
This document aims to fill this gap.</t>
      </section>
      <section anchor="needs-of-the-target-audience-of-rats">
        <name>Needs of the Target Audience of RATS</name>
        <t>Moreover, while the target audience of Internet Drafts is implementers, researchers, and protocol designers <xref target="I-D.irtf-cfrg-cryptography-specification"/>, RATS drafts generally do not fulfill these needs, in particular the needs of researchers and protocol designers.
On the other hand, in our observation, implementers generally find it hard to relate the abstract concepts of RATS to the real-world systems. In general, implementers and protocol designers of RATS are thus left with little or no guidance.</t>
      </section>
      <section anchor="inaccuracies-in-published-rats-rfcs">
        <name>Inaccuracies in Published RATS RFCs</name>
        <t>Unfortunately, many published RFCs of RATS provide inaccurate or ambiguous security and privacy considerations, which may lead to errors in design and implementation, and give a false
sense of security.
As an example, many proposed designs in <xref target="RFC9334"/> are broken.</t>
      </section>
      <section anchor="aggregator-in-coserv">
        <name>Aggregator in CoServ</name>
        <t>RATS has recently adopted <xref target="I-D.ietf-rats-coserv"/>, which has an ambiguous role Aggregator, for which -- in our assessment -- the authors have not yet provided a reasonable justification.
To the best of our knowledge and understanding, a malicious Aggregator breaks the security of the RATS ecosystem and invalidates the formal proofs for RATS primitives.
Surprisingly, during the three-week adoption call and one week discussion afterwards, one of the authors of the draft <xref target="I-D.ietf-rats-coserv"/> did not support adoption of the draft. Based on the above reasons, as researchers, we have genuine skepticism about this work. We request the authors to be transparent on this work and clarify the concerns raised at the adoption time (summarized to some extent in this draft).</t>
        <t>We will keep making good-faith attempts and requesting the authors to state the risks properly.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>To improve the situation, this draft presents an outline of three topics that future versions will cover in more detail:</t>
        <ul spacing="normal">
          <li>
            <t>Corrections in published RATS RFCs <xref target="RFC9334"/>, <xref target="RFC9781"/>, <xref target="RFC9783"/> and <xref target="RFC9711"/></t>
          </li>
          <li>
            <t>Security concerns in one currently adopted RATS draft <xref target="I-D.ietf-rats-coserv"/> and one proposed for
adoption RATS draft <xref target="I-D.deshpande-rats-multi-verifier"/></t>
          </li>
          <li>
            <t>General security baseline that other drafts can simply point to, or guidelines or template that other drafts can use</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="general-hierarchy-of-authentication">
      <name>General Hierarchy of Authentication</name>
      <t>Authentication is a term which is often ambiguous in RATS specifications. We propose general hierarchy of one-way authentication <xref target="Gen-Approach"/>, which can help precisely
state the intended level of authentication (in decreasing order):</t>
      <ul spacing="normal">
        <li>
          <t>One-way injective agreement</t>
        </li>
        <li>
          <t>One-way non-injective agreement</t>
        </li>
        <li>
          <t>Aliveness</t>
        </li>
      </ul>
      <t>Recentness can be added to each of these levels of authentication.
Details will be added in future versions.</t>
    </section>
    <section anchor="threat-modeling">
      <name>Threat Modeling</name>
      <t>This section describes "What can go wrong?" TODO.</t>
      <section anchor="system-model">
        <name>System Model</name>
        <t>TODO.</t>
      </section>
      <section anchor="actors">
        <name>Actors</name>
        <t>TODO.</t>
        <section anchor="legal-perspective">
          <name>Legal perspective</name>
          <ul spacing="normal">
            <li>
              <t>Data subject is an identifiable natural person (as defined in Article 4 (1) of GDPR <xref target="GDPR"/>).</t>
            </li>
            <li>
              <t>(Data) Controller (as defined in Article 4 (7) of GDPR <xref target="GDPR"/>) manages and controls what happens with personal data of data subject.</t>
            </li>
            <li>
              <t>(Data) Processor (as defined in Article 4 (8) of GDPR <xref target="GDPR"/>) performs data processing on behalf of the data controller.</t>
            </li>
          </ul>
          <t>TODO.</t>
        </section>
        <section anchor="technical-perspective">
          <name>Technical perspective</name>
          <ul spacing="normal">
            <li>
              <t>Infrastucture Provider is a role which refers to the Processor in GDPR. An example of this role is a cloud service provider (CSP).</t>
            </li>
          </ul>
          <t>TODO.</t>
        </section>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>TODO.</t>
      </section>
      <section anchor="typical-security-goals">
        <name>Typical Security Goals</name>
        <t>TODO.</t>
      </section>
    </section>
    <section anchor="attacks">
      <name>Attacks</name>
      <t>Security considerations in RATS specifications need to clarify how the following attacks are avoided or mitigated:</t>
      <section anchor="evidence-replay-attacks">
        <name>(Evidence) Replay Attacks</name>
        <t>In this attack, a network or endpoint adversary -- with access to older Evidence -- can replay Evidence with stale Claims which no longer represent the actual state of the Attester, potentially resulting in exposure of confidential data <xref target="RA-TLS"/>.</t>
        <t>Replay of stale Evidence may be within the same connection or across multiple connections.</t>
      </section>
      <section anchor="diversion-attacks">
        <name>Diversion Attacks</name>
        <t>In this attack, a network adversary -- with Dolev-Yao capabilities <xref target="Dolev-Yao"/> and access (e.g., via
Foreshadow <xref target="Foreshadow"/>) to the attestation key of any machine in the world -- can redirect a connection intended
for a specific Infrastructure Provider to the compromised machine, potentially resulting in exposure of
confidential data <xref target="ID-Crisis"/>.</t>
        <t>In the context of confidential computing and TLS as a transport protocol, we reported these attacks to the TLS WG in February 2025 <xref target="Usama-TLS-26Feb25"/>. A formal proof is available
<xref target="ID-Crisis-Repo"/> for further research and
development. Since reporting to TLS WG, these attacks have been practically
exploited in <eref target="https://tee.fail/">TEE.fail</eref>, <eref target="https://wiretap.fail/">Wiretap.fail</eref>, and <eref target="https://badram.eu/">BadRAM</eref>.</t>
      </section>
      <section anchor="relay-attacks">
        <name>Relay Attacks</name>
        <t>In this attack, a network or endpoint adversary -- with access to suitable binding material -- can relay an attestation request to a genuine Attester and present the genuine Evidence as its own,
potentially resulting in impersonation of genuine Attester <xref target="RelayAttacks-RATS"/>.</t>
        <t>Note that <em>replay</em> is about <em>same</em> Attester while <em>relay</em> attack is about <em>different</em> Attesters.</t>
      </section>
    </section>
    <section anchor="potential-mitigations">
      <name>Potential Mitigations</name>
      <t>This section describes the countermeasures and their evaluation.</t>
      <t>To mitigate the above attacks, we propose post-handshake attestation.
We are not aware of any attacks on post-handshake attestation. Post-handshake attestation
avoids replay attacks by using a fresh attestation nonce. Moreover, considering TLS as the transport protocol, it avoids diversion and relay attacks
by binding the Evidence to the underlying TLS connection, such as using Exported Keying Material (EKM)
<xref target="I-D.ietf-tls-rfc8446bis"/>, as proposed in Section 9.2 of <xref target="ID-Crisis"/>. <xref target="RFC9261"/> and <xref target="RFC9266"/> provide mechanisms for such bindings. Efforts for a formal proof
of security of post-handshake attestation are ongoing.</t>
    </section>
    <section anchor="examples-of-specifications-that-could-be-improved">
      <name>Examples of Specifications That Could Be Improved</name>
      <section anchor="rfc9334">
        <name>RFC9334</name>
        <section anchor="unprotected-evidence">
          <name>Unprotected Evidence</name>
          <t><xref section="7.4" sectionFormat="of" target="RFC9334"/> has:</t>
          <blockquote>
            <t>A conveyance protocol that provides authentication and integrity protection can be used to convey Evidence that is otherwise unprotected (e.g., not signed).</t>
          </blockquote>
          <t>Using a conveyance protocol that provides authentication and integrity protection, such as TLS 1.3 <xref target="RFC8446"/>,
to convey Evidence that is otherwise unprotected (e.g., not signed) undermines all security of remote attestation.
Essentially, this breaks the chain up to the trust anchor (such as hardware manufacturer) for remote attestation.
Hence, remote attestation effectively provides no protection in this case and the security guarantees are limited
to those of the conveyance protocol only. In order to benefit from remote attestation, Evidence <bcp14>MUST</bcp14> be protected
using dedicated keys chaining back to the trust anchor for remote attestation.</t>
        </section>
        <section anchor="missing-definitions">
          <name>Missing definitions</name>
          <t><xref target="RFC9334"/> uses the term Conceptual Messages in capitalization without proper definition.</t>
        </section>
        <section anchor="missing-roles-and-conceptual-messages">
          <name>Missing Roles and Conceptual Messages</name>
          <ul spacing="normal">
            <li>
              <t>Identity Supplier and its corresponding conceptual message Identity are missing and need to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
            <li>
              <t>Attestation Challenge as conceptual message needs to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="rfc9781">
        <name>RFC9781</name>
        <t>As argued above for RFC9334, security considerations in <xref target="RFC9781"/> are essentially insufficient.</t>
      </section>
      <section anchor="rfc9783">
        <name>RFC9783</name>
        <t><xref target="RFC9783"/> uses:</t>
        <ul spacing="normal">
          <li>
            <t>3x epoch handle (with reference to <xref section="10.2" sectionFormat="of" target="RFC9334"/> and
<xref section="10.3" sectionFormat="of" target="RFC9334"/>) whereas RFC9334 never uses epoch handle at all!</t>
          </li>
          <li>
            <t>1x epoch ID with no reference and no explanation of how it is
  different from epoch handle</t>
          </li>
        </ul>
      </section>
      <section anchor="rfc9711">
        <name>RFC9711</name>
        <section anchor="inaccurate-opinion">
          <name>Inaccurate opinion</name>
          <t><xref section="7.4" sectionFormat="of" target="RFC9711"/> has:</t>
          <blockquote>
            <t>For attestation, the keys are associated with specific devices and are configured by device manufacturers.</t>
          </blockquote>
          <t>The quoted text is inaccurate and just an opinion of the editors.
It should preferably be removed from the RFC.
For example, in SGX, the keys are not configured by the manufacturer alone.
The platform owner can provide a random value called OWNER_EPOCH.</t>
          <t>For technical details and proposed text, see <xref target="Clarifications-EAT"/>.</t>
        </section>
        <section anchor="inaccurate-privacy-considerations">
          <name>Inaccurate Privacy Considerations</name>
          <t><xref section="8.4" sectionFormat="of" target="RFC9711"/> has:</t>
          <blockquote>
            <t>The nonce claim is based on a value usually derived remotely (outside of the entity).</t>
          </blockquote>
          <t>Attester-generated nonce does not provide any replay protection since the Attester can pre-generate an Evidence
that might not reflect the actual system state, but a past one.</t>
          <t>See the attack trace for Attester-generated nonce at <xref target="Sec-Cons-RATS"/>.</t>
          <t>For replay protection, nonce should <em>always</em> be derived remotely (for example, by the Relying Party).</t>
        </section>
      </section>
    </section>
    <section anchor="examples-of-parts-of-specifications-that-are-detrimental-for-security">
      <name>Examples of Parts of Specifications That are Detrimental for Security</name>
      <t>We believe that the following parts of designs are detrimental for the RATS ecosystem and without proper security and privacy considerations, they put the community at risk.</t>
      <section anchor="multi-verifiers">
        <name>Multi-Verifiers</name>
        <t>We believe this draft <xref target="I-D.deshpande-rats-multi-verifier"/> in its current form is doing <strong>disservice</strong> to the community by substantially degrading <strong>both</strong> the security and privacy of the systems, and not properly highlighting the security and privacy risks, and by implicitly promoting the blind trust in vendors.</t>
        <t>In summary:</t>
        <ul spacing="normal">
          <li>
            <t>From a security perspective, if one of the Verifiers break, it breaks the whole system.</t>
          </li>
          <li>
            <t>From a privacy perspective, the current design also exposes Personally Identifiable Information (PII) to all the Verifiers.</t>
          </li>
        </ul>
        <section anchor="security-considerations">
          <name>Security Considerations</name>
          <t>What's important from the security standpoint is the TCB of the RP, and not the Attester. This is because it is the RP who has to make final trust decision, and not the Attester. Verifier is -- in any case -- in the TCB of RP.</t>
          <t>Hence, we believe the security considerations of multi-verifiers <xref target="I-D.deshpande-rats-multi-verifier"/> must say:</t>
          <t>Compared to a single verifier, the use of multi-verifiers increases security risks in terms of increasing the overall Trusted Computing Base (TCB) from the RP's perspective.</t>
        </section>
        <section anchor="privacy-considerations">
          <name>Privacy Considerations</name>
          <t>In addition to revealing the PII to the Lead Verifier (which say is kind of equivalent to monolithic verifier), the current proposal in draft reveals the PII to all those Component Verifiers as well.</t>
          <t>We believe the privacy considerations of multi-verifiers <xref target="I-D.deshpande-rats-multi-verifier"/> must say:</t>
          <t>Compared to a single verifier, the use of multi-verifiers may increase the privacy risks, as potentially sensitive information may be sent to multiple verifiers.</t>
        </section>
        <section anchor="open-source">
          <name>Open-source</name>
          <t>Besides, the rationale presented by the authors at meeting 124 -- appraisal policy being the intellectual property of the vendors -- breaks the
open-source nature of RATS ecosystem. This requires blindly trusting the vendors and increases the attack surface.</t>
        </section>
      </section>
      <section anchor="aggregator-based-design">
        <name>Aggregator-based design</name>
        <t>Aggregator in <xref target="I-D.ietf-rats-coserv"/> is an explicit trust anchor and the addition of new trust anchor needs to have a strong justification.
Having a malicious Aggregator in the design trivially breaks all the guarantees.
It should be clarified how trust is established between Aggregator and Verifier in the context of Confidential Computing threat model.</t>
        <t>The fact that Aggregator has collective information of Reference Values Providers and Endorsers
makes it a special target of attack, and thus a single point of failure. It increases security
risks because Aggregator can be compromised independent of the Reference Values Providers and
Endorsers. That is, even if Reference Values Providers and Endorsers are secure, the compromise
of Aggregator breaks the security of the system.
Moreover, if Aggregator is not running inside a TEE, it is relatively easy to compromise the secrets.</t>
      </section>
    </section>
    <section anchor="security-considerations-1">
      <name>Security Considerations</name>
      <t>All of this document is about security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9781">
          <front>
            <title>A Concise Binary Object Representation (CBOR) Tag for Unprotected CBOR Web Token Claims Sets (UCCS)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document defines the Unprotected CWT Claims Set (UCCS), a data format for representing a CBOR Web Token (CWT) Claims Set without protecting it by a signature, Message Authentication Code (MAC), or encryption. UCCS enables the use of CWT claims in environments where protection is provided by other means, such as secure communication channels or trusted execution environments. This specification defines a CBOR tag for UCCS and describes the UCCS format, its encoding, and its processing considerations. It also discusses security implications of using unprotected claims sets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9781"/>
          <seriesInfo name="DOI" value="10.17487/RFC9781"/>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="RFC9783">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="S. Frost" initials="S." surname="Frost"/>
            <author fullname="M. Brossard" initials="M." surname="Brossard"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Arm's Platform Security Architecture (PSA) is a family of hardware and firmware security specifications, along with open-source reference implementations, aimed at helping device makers and chip manufacturers integrate best-practice security into their products. Devices that comply with PSA can generate attestation tokens as described in this document, which serve as the foundation for various protocols, including secure provisioning and network access control. This document specifies the structure and semantics of the PSA attestation token.</t>
              <t>The PSA attestation token is a profile of the Entity Attestation Token (EAT). This specification describes the claims used in an attestation token generated by PSA-compliant systems, how these claims are serialized for transmission, and how they are cryptographically protected.</t>
              <t>This Informational document is published as an Independent Submission to improve interoperability with Arm's architecture. It is not a standard nor a product of the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9783"/>
          <seriesInfo name="DOI" value="10.17487/RFC9783"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="Tech-Concepts" target="https://www.researchgate.net/publication/396199290_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Technical_Concepts">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: Technical Concepts</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="Gen-Approach" target="https://www.researchgate.net/publication/396593308_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_General_Approach">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: General Approach</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="GDPR" target="https://eur-lex.europa.eu/eli/reg/2016/679/oj">
          <front>
            <title>Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the pro- cessing of personal data and on the free movement of such data, and repealing Direc- tive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance)</title>
            <author initials="" surname="European Commission">
              <organization/>
            </author>
            <date year="2016" month="May"/>
          </front>
        </reference>
        <reference anchor="Dolev-Yao">
          <front>
            <title>On the security of public key protocols</title>
            <author initials="D." surname="Dolev">
              <organization/>
            </author>
            <author initials="A." surname="Yao">
              <organization/>
            </author>
            <date year="1983" month="March"/>
          </front>
        </reference>
        <reference anchor="Foreshadow" target="https://foreshadowattack.eu/">
          <front>
            <title>Foreshadow</title>
            <author initials="" surname="Jo Van Bulck">
              <organization/>
            </author>
            <author initials="" surname="Marina Minkin">
              <organization/>
            </author>
            <author initials="" surname="Ofir Weisse">
              <organization/>
            </author>
            <author initials="" surname="Daniel Genkin">
              <organization/>
            </author>
            <author initials="" surname="Baris Kasikci">
              <organization/>
            </author>
            <author initials="" surname="Frank Piessens">
              <organization/>
            </author>
            <author initials="" surname="Mark Silberstein">
              <organization/>
            </author>
            <author initials="" surname="Thomas F Wenisch">
              <organization/>
            </author>
            <author initials="" surname="Yuval Yarom">
              <organization/>
            </author>
            <author initials="" surname="Raoul Strackx">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.deshpande-rats-multi-verifier">
          <front>
            <title>Remote Attestation with Multiple Verifiers</title>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Ltd</organization>
            </author>
            <author fullname="zhang jun" initials="Z." surname="jun">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Houda Labiod" initials="H." surname="Labiod">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="7" month="February" year="2026"/>
            <abstract>
              <t>   IETF RATS Architecture, defines the key role of a Verifier.  In a
   complex system, this role needs to be performed by multiple Verfiers
   coordinating together to assess the full trustworthiness of an
   Attester.  This document focuses on various topological patterns for
   a multiple Verifier system.  It only covers the architectural aspects
   introduced by the Multi Verifier concept, which is neutral with
   regard to specific wire formats, encoding, transport mechanisms, or
   processing details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-deshpande-rats-multi-verifier-04"/>
        </reference>
        <reference anchor="I-D.ietf-rats-coserv">
          <front>
            <title>Concise Selector for Endorsements and Reference Values</title>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Shefali Kamal" initials="S." surname="Kamal">
              <organization>Fujitsu</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>AMD</organization>
            </author>
            <author fullname="Ding Ma" initials="D." surname="Ma">
              <organization>Alibaba Cloud</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   In the Remote Attestation Procedures (RATS) architecture, Verifiers
   require Endorsements and Reference Values to assess the
   trustworthiness of Attesters.  This document specifies the Concise
   Selector for Endorsements and Reference Values (CoSERV), a structured
   query/result format designed to facilitate the discovery and
   retrieval of these artifacts from various providers.  CoSERV defines
   a query language and corresponding result structure using CDDL, which
   can be serialized in CBOR format, enabling efficient interoperability
   across diverse systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-coserv-05"/>
        </reference>
        <reference anchor="Clarifications-EAT" target="https://mailarchive.ietf.org/arch/msg/rats/4V2zZHhk5IuxwcUMNWpPBpnzpaM/">
          <front>
            <title>Clarifications in draft-ietf-rats-eat</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="April"/>
          </front>
        </reference>
        <reference anchor="Sec-Cons-RATS" target="https://mailarchive.ietf.org/arch/msg/rats/jcAv9FKbYSIVtUNQ8ggEHL8lrmM/">
          <front>
            <title>Security considerations of remote attestation (RFC9334)</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="RA-TLS" target="https://www.researchgate.net/publication/385384309_Towards_Validation_of_TLS_13_Formal_Model_and_Vulnerabilities_in_Intel's_RA-TLS_Protocol">
          <front>
            <title>Towards Validation of TLS 1.3 Formal Model and Vulnerabilities in Intel's RA-TLS Protocol</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="A." surname="Niemi">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author initials="T." surname="Fossati">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="RelayAttacks-RATS" target="https://mailarchive.ietf.org/arch/msg/rats/6gbqx0XY8WYrH3Mx4vO8n2-uKgY/">
          <front>
            <title>Relay Attacks in Intra-handshake Attestation for Confidential Agentic AI Systems</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2026" month="January"/>
          </front>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="ID-Crisis-Repo" target="https://github.com/CCC-Attestation/formal-spec-id-crisis">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal analysis of attested TLS protocols</title>
            <author initials="" surname="Muhammad Usama Sardar">
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Usama-TLS-26Feb25" target="https://mailarchive.ietf.org/arch/msg/tls/Jx_yPoYWMIKaqXmPsytKZBDq23o/">
          <front>
            <title>Impersonation attacks on protocol in draft-fossati-tls-attestation (Identity crisis in Attested TLS) for Confidential Computing</title>
            <author initials="" surname="Muhammad Usama Sardar">
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="RFC9261">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC9266">
          <front>
            <title>Channel Bindings for TLS 1.3</title>
            <author fullname="S. Whited" initials="S." surname="Whited"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document defines a channel binding type, tls-exporter, that is compatible with TLS 1.3 in accordance with RFC 5056, "On the Use of Channel Bindings to Secure Channels". Furthermore, it updates the default channel binding to the new binding for versions of TLS greater than 1.2. This document updates RFCs 5801, 5802, 5929, and 7677.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9266"/>
          <seriesInfo name="DOI" value="10.17487/RFC9266"/>
        </reference>
      </references>
    </references>
    <?line 413?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author wishes to thank Ira McDonald and Ivan Gudymenko for insightful discussions.
The author also wishes to thank the authors of <xref target="I-D.ietf-rats-coserv"/> (in particular Thomas
Fossati and Paul Howard) for several discussions, which unfortunately could not resolve the
above concerns, and hence led to this draft.</t>
    </section>
    <section numbered="false" anchor="history">
      <name>History</name>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Concrete text proposal for security and privacy considerations of multi-verifiers <xref target="I-D.deshpande-rats-multi-verifier"/></t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>Introduction and motivation</t>
        </li>
        <li>
          <t>Defined replay and relay attacks</t>
        </li>
        <li>
          <t>Added mitigations</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
