<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-rats-key-binding-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="EAT Key Attestation">Key Attestation for Entity Attestation Tokens (EAT)</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-rats-key-binding-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization abbrev="UniBw M.">University of the Bundeswehr Munich</organization>
      <address>
        <postal>
          <city>Neubiberg</city>
          <region>Bavaria</region>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2026" month="March" day="15"/>
    <area>Security</area>
    <workgroup>RATS</workgroup>
    <keyword>PQC</keyword>
    <keyword>COSE</keyword>
    <keyword>Hybrid</keyword>
    <keyword>HPKE</keyword>
    <keyword>Post-Quantum</keyword>
    <abstract>
      <?line 56?>

<t>This document defines a CWT-based Entity Attestation Token (EAT) profile and a new EAT claim that cryptographically bind a private key used to sign a certificate signing request (CSR), or the private key corresponding to an end-entity certificate used for TLS authentication, to an attested execution environment.</t>
      <t>The subject public key is conveyed using the EAT <tt>cnf</tt> claim defined in <xref target="RFC8747"/>, and freshness uses the EAT <tt>nonce</tt> claim defined in <xref target="RFC9711"/>. The proof of possession of the subject key is obtained from the surrounding protocol, such as TLS certificate-based authentication or CSR signature verification. Because the EAT is signed by a hardware-backed Attestation Key (AK), successful verification of the EAT signature together with protocol-level proof of possession establishes a cryptographic binding between the private key and the attested platform state. This mechanism addresses key substitution attacks that arise when attestation evidence and the certificate private keys are validated independently.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-rats-key-binding/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RATS Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Remote attestation enables an entity to produce attestation evidence that a verifier can use to assess whether the entity’s platform state satisfies a required policy. In certificate enrollment and authentication protocols (e.g., TLS), a common security policy requirement is that a private key used by an endpoint must be generated, stored, and protected within a trusted execution environment (TEE) or comparable hardware root of trust.</t>
      <t>In certificate enrollment workflows, a Certification Authority (CA) may require attestation evidence demonstrating that the private key corresponding to the public key in a certificate signing request (CSR) is protected by a hardware-backed environment. The LAMPS CSR Attestation specification <xref target="I-D.ietf-lamps-csr-attestation"/> defines mechanisms for including attestation evidence alongside a CSR. In this model, the CA verifies the CSR signature using the public key contained in the request and independently verifies the attestation evidence according to the RATS architecture, using applicable endorsements and trust anchors.
However, attestation evidence does not inherently provide a cryptographic proof that the private key used to sign the CSR is the same key that is generated, stored, or protected within the attested environment. The CSR signature demonstrates possession of a private key, and the attestation demonstrates properties of a platform state, but there is no standardized mechanism that cryptographically binds these two validations together. An endpoint could present valid attestation evidence from a protected environment while submitting a certificate signing request (CSR) that is signed with a private key not generated or stored within that environment. In this case, the Certification Authority has no intrinsic cryptographic assurance that the private key corresponding to the CSR public key benefits from the protections described in the attestation evidence.</t>
      <t>A similar problem exists in TLS-based scenarios. The TLS Exported Attestation specification <xref target="I-D.fossati-tls-exported-attestation"/> and the TLS Early Attestation specification <xref target="I-D.fossati-seat-early-attestation"/> define mechanisms for conveying attestation evidence within a TLS connection. While the attestation evidence is bound to the TLS connection in these approaches, it does not intrinsically bind the attested environment to the private key corresponding to the end-entity certificate used for TLS authentication. An endpoint could therefore obtain valid attestation evidence from a protected environment while performing certificate-based TLS authentication using a private key that is not confined to that environment. For example, the TLS private key may reside outside the trusted execution environment and lack the protections claimed by the attestation evidence.</t>
      <t>This separation between validation of attestation evidence and validation of certificate private key creates a class of key substitution attacks. In such an attack:</t>
      <ul spacing="normal">
        <li>
          <t>A valid attestation produced by a genuine hardware-protected environment is presented to the verifier; and</t>
        </li>
        <li>
          <t>A private key that is not generated or protected within that environment is used in the CSR or TLS authentication flow.</t>
        </li>
      </ul>
      <t>Because the attestation evidence and the certificate private key are validated independently, the verifier has no intrinsic cryptographic assurance that the operational private key benefits from the protections described in the attestation evidence. This undermines security policy objectives that require the certificate private key to be generated and constrained within the attested environment.</t>
      <t>Addressing this problem requires a mechanism that provides both proof of possession of the private key and a cryptographic binding between that key and the attested platform state.</t>
      <t>A relying party will also require additional claims describing key protection properties, such as non-exportability or hardware-level protection. For example, <xref target="I-D.ietf-rats-pkix-key-attestation"/> defines an evidence format for reporting properties of cryptographic modules and managed keys in PKIX environments. The PKIX Key Attestation specification <xref target="I-D.ietf-rats-pkix-key-attestation"/> defines attributes including extractable, never-extractable, sensitive, and local that describe protection properties of keys managed by cryptographic modules. These attributes can be conveyed using the <tt>key-attributes</tt> claim defined in this document while key confirmation itself is conveyed using <tt>cnf</tt> (<xref target="RFC8747"/>) and protocol-level proof of possession.</t>
      <t>Appendix A.1.4 of <xref target="RFC9711"/> illustrates how a key and key store may be represented in evidence. However, the example uses private-use claim labels and does not define standardized key-protection claims. This specification uses the standardized <tt>cnf</tt> claim from <xref target="RFC8747"/> and defines a new claim for key-protection attributes and usage constraints, while relying on protocol-level proof of possession.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The reader is assumed to be familiar with the vocabulary and concepts defined in the RATS Architecture (<xref target="RFC9334"/>) such as Attester, Relying Party, Verifier.</t>
      <t>The reader is assumed to be familiar with common vocabulary and concepts defined in <xref target="RFC5280"/> such as certificate, signature, attribute, verification and validation.</t>
      <t>The following terms are used in this document:</t>
      <t>Attestation Key (AK): A cryptographic key, typically hardware-backed, used to sign attestation evidence that conveys claims about the state of a platform or trusted execution environment.</t>
      <t>Attestation Evidence: Claims about a platform's state, signed by an Attestation Key, and conveyed in an Entity Attestation Token (EAT).</t>
      <t>Entity Attestation Token (EAT): A token format that conveys attestation claims, as defined in <xref target="RFC9711"/></t>
      <t>Subject Key: An asymmetric key pair for which the protection of the private component within an attested execution environment is being asserted. The corresponding public component is conveyed in the EAT <tt>cnf</tt> claim and compared with the key used in a CSR or TLS end-entity certificate.</t>
      <t>Proof of Possession (PoP): Evidence that demonstrates control of the private component of the Subject Key at a given point in time. In this profile, PoP is obtained from the surrounding protocol (for example, TLS certificate-based authentication or CSR signature verification).</t>
      <t>Verifier: The entity that validates attestation evidence and evaluates whether the platform state and associated keys satisfy its policy.</t>
      <t>Certification Authority (CA): An entity that issues certificates and may require attestation evidence during certificate enrollment.</t>
      <t>Trusted Execution Environment (TEE): An isolated execution context that provides confidentiality and integrity protections for code and data, including cryptographic key material.</t>
      <t>Key Substitution Attack: An attack in which valid attestation evidence from a protected execution environment is presented to a verifier, while a private key used in a CSR or authentication protocol is not generated or protected within that environment. Because attestation evidence and certificate private key are validated independently, the verifier may lack cryptographic assurance that the certificate private key benefits from the protections claimed in the attestation.</t>
    </section>
    <section anchor="key-confirmation-and-binding-profile">
      <name>Key Confirmation and Binding Profile</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>This document defines a CWT-based EAT profile and a new EAT claim that establish a cryptographic binding between a Subject Key and an attested execution environment.
The profile is defined for EAT conveyed as a CWT Claims Set in a <tt>COSE_Sign1</tt> message.</t>
        <t>The profile provides two properties:</t>
        <ol spacing="normal" type="1"><li>
            <t>Proof of Possession : Demonstration that the entity presenting the attestation controls the private component of the Subject Key.</t>
          </li>
          <li>
            <t>Key-to-Platform Binding : Cryptographic association between the private component of the Subject Key and the attested platform state.</t>
          </li>
        </ol>
        <t>The mechanism combines:</t>
        <ul spacing="normal">
          <li>
            <t>an EAT signature generated by the Attestation Key (AK); and</t>
          </li>
          <li>
            <t>protocol-level proof of possession for the Subject Key.</t>
          </li>
        </ul>
        <t>The subject public key used for protocol-level PoP verification is carried in the EAT <tt>cnf</tt> claim as a <tt>COSE_Key</tt>, following <xref target="RFC8747"/>. Because the attestation evidence is authenticated by the AK, and PoP is verified in the surrounding protocol, successful verification establishes that:</t>
        <ul spacing="normal">
          <li>
            <t>The attested platform state is authentic; and</t>
          </li>
          <li>
            <t>The entity participating in the surrounding protocol demonstrates control of the private component of the Subject Key during protocol execution.</t>
          </li>
        </ul>
        <t>This construction creates a cryptographic linkage between the Subject Key and the attested platform state, mitigating Key Substitution Attacks.</t>
        <t>The <tt>key-attributes</tt> claim conveys attributes describing key protection properties and permitted usage of the Subject Key. The <tt>key-attributes</tt> claim <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain at least one member. When present, attributes such as extractable, never-extractable, sensitive, and local <bcp14>MUST</bcp14> follow the semantics defined in <xref target="I-D.ietf-rats-pkix-key-attestation"/>. These attributes enable relying parties to enforce policies such as requiring keys to be generated within the attested environment and prohibiting extraction of private key material.</t>
      </section>
      <section anchor="high-level-construction">
        <name>High-Level Construction</name>
        <t>At a high level, the mechanism binds a certificate private key to an attested execution environment by combining AK-signed attestation evidence and protocol-level proof of possession.</t>
        <t>First, the attester constructs an EAT Claims Set including:</t>
        <ul spacing="normal">
          <li>
            <t>the verifier-provided <tt>nonce</tt> claim from <xref target="RFC9711"/>;</t>
          </li>
          <li>
            <t>the <tt>cnf</tt> claim from <xref target="RFC8747"/> containing the Subject Public Key as <tt>COSE_Key</tt>;</t>
          </li>
          <li>
            <t>the <tt>key-attributes</tt> claim defined in this document.</t>
          </li>
        </ul>
        <t>Second, the EAT is signed using the Attestation Key.</t>
        <t>During verification, three relationships are checked:</t>
        <ul spacing="normal">
          <li>
            <t>The digitally signed and protected EAT establishes that the platform state is authentic.</t>
          </li>
          <li>
            <t>The protocol-level PoP check establishes control of the private component of the Subject Key.</t>
          </li>
          <li>
            <t>The public key in <tt>cnf</tt> is compared with the public key in the CSR or TLS end-entity certificate to ensure they refer to the same operational key.</t>
          </li>
        </ul>
        <t>When these checks succeed, the verifier gains assurance that the certificate private key used in the protocol is the same key whose protection within the attested execution environment is being asserted.</t>
      </section>
    </section>
    <section anchor="proof-of-possession">
      <name>Proof-of-Possession</name>
      <t>The Proof of Possession (PoP) demonstrates control of the private component of the Subject Key.</t>
      <t>In this profile, PoP <bcp14>MUST</bcp14> be verified by the surrounding protocol:</t>
      <ul spacing="normal">
        <li>
          <t>In certificate enrollment workflows, by validating the CSR signature.</t>
        </li>
        <li>
          <t>In TLS workflows, by validating certificate-based TLS authentication.</t>
        </li>
      </ul>
      <t>The public key used for protocol-level PoP verification <bcp14>MUST</bcp14> correspond to the Subject Public Key in EAT <tt>cnf</tt>.</t>
      <t>For this profile, the EAT <tt>nonce</tt> claim defined in <xref target="RFC9711"/> is the mandatory freshness mechanism. The EAT <tt>nonce</tt> claim <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain a single nonce value supplied by the verifier.</t>
      <t>The nonce <bcp14>MUST</bcp14> be supplied by the verifier and <bcp14>MUST</bcp14> be unpredictable and unique within the verifier's replay window.</t>
      <t>The validity period of the key attestation evidence is determined by the lifetime of the enclosing EAT. Verifiers <bcp14>MUST</bcp14> enforce the <tt>iat</tt>, <tt>nbf</tt>, and <tt>exp</tt> claims defined in <xref target="RFC9711"/> to ensure that attestation evidence is not used outside its intended validity window.</t>
      <section anchor="freshness-requirements">
        <name>Freshness Requirements</name>
        <t>The verifier <bcp14>MUST</bcp14> provide a nonce with sufficient entropy to prevent replay. The nonce is conveyed to the Attester by the Relying Party through the surrounding protocol.
The nonce <bcp14>MUST</bcp14> be unpredictable and unique within the verifier's replay window. The verifier <bcp14>MUST</bcp14> validate that the nonce claim in the EAT matches the nonce it supplied. Failure to include verifier-provided freshness renders the mechanism vulnerable to replay of previously valid attestation evidence. Mechanisms for obtaining and conveying such nonces in certificate enrollment protocols are described in <xref target="I-D.ietf-lamps-attestation-freshness"/>.</t>
        <t>The verifier-provided nonce is the primary mechanism for ensuring freshness of the attestation evidence. The EAT time-based claims (<tt>iat</tt>, <tt>nbf</tt>, and <tt>exp</tt>) provide an additional validity window for the attestation evidence but do not replace the requirement for a verifier-provided nonce. Verifiers <bcp14>MUST</bcp14> validate both the nonce and the applicable time-based claims when evaluating this profile.</t>
      </section>
      <section anchor="verification-procedure">
        <name>Verification Procedure</name>
        <t>Upon receipt of attestation evidence for this profile, the Verifier <bcp14>MUST</bcp14> perform the following checks:</t>
        <ol spacing="normal" type="1"><li>
            <t>Validate the signature on the EAT using the applicable trust anchors and endorsements for the Attestation Key. If this validation fails, the attestation evidence <bcp14>MUST</bcp14> be rejected.</t>
          </li>
          <li>
            <t>Validate the <tt>key-attributes</tt> claim. The <tt>key-attributes</tt> claim <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain at least one member.</t>
          </li>
          <li>
            <t>Validate the EAT <tt>nonce</tt> claim. The EAT <tt>nonce</tt> claim <bcp14>MUST</bcp14> be present, <bcp14>MUST</bcp14> contain a single nonce value, and <bcp14>MUST</bcp14> match the verifier-supplied nonce.</t>
          </li>
          <li>
            <t>Extract the Subject Public Key from the EAT <tt>cnf</tt> claim. This profile requires the <tt>cnf</tt> claim defined in <xref target="RFC8747"/> and requires <tt>cnf</tt> to contain <tt>COSE_Key</tt>. Use of <tt>Encrypted_COSE_Key</tt> or a <tt>kid</tt>-only representation is outside the scope of this profile.</t>
          </li>
          <li>
            <t>Compare the Subject Public Key contained in <tt>cnf</tt> with the public key used for protocol-level PoP verification. This public key is either obtained directly from the  protocol or supplied to the Verifier by the Relying Party.  </t>
            <ul spacing="normal">
              <li>
                <t>In certificate enrollment, the public key is obtained from the CSR.</t>
              </li>
              <li>
                <t>In TLS, the public key is obtained from the end-entity certificate used for TLS authentication.</t>
              </li>
            </ul>
          </li>
        </ol>
        <t>The public key provided to the Verifier <bcp14>MUST</bcp14> correspond to the same key for which protocol-level PoP verification was performed. If the public key parameters do not match, the binding verification <bcp14>MUST</bcp14> fail.</t>
        <t>Successful completion of all checks establishes a cryptographic binding between the private component corresponding to the public key used in the CSR or TLS end-entity certificate and the attested execution environment at the time the evidence was generated.</t>
        <t>The Verifier conveys the result of the binding verification to the Relying Party as part of the attestation result.</t>
      </section>
    </section>
    <section anchor="claim-definition">
      <name>Claim Definition</name>
      <t>This document defines a new EAT claim named <tt>key-attributes</tt> that conveys key protection attributes and key-usage constraints for the Subject Key.</t>
      <section anchor="claim-structure">
        <name>Claim Structure</name>
        <t>The claim is defined using CDDL as follows:</t>
        <artwork><![CDATA[
key-attributes = {
; Optional key protection attributes
? extractable: bool,
? never-extractable: bool,
? sensitive: bool,
? local: bool,

; Optional cryptographic usage constraints
? purpose: [* oid]

}

oid = tstr  ; dotted-decimal OID string

]]></artwork>
        <t>The <tt>key-attributes</tt> claim <bcp14>MUST</bcp14> contain at least one member.</t>
      </section>
      <section anchor="subject-key-in-cnf">
        <name>Subject Key in cnf</name>
        <t>This profile uses the EAT <tt>cnf</tt> claim defined in <xref target="RFC8747"/> to carry the Subject Public Key. The <tt>cnf</tt> claim <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain a <tt>COSE_Key</tt> member.</t>
        <t>When comparing the Subject Public Key contained in <tt>cnf</tt> with the public key used in a CSR or TLS end-entity certificate, the comparison <bcp14>MUST</bcp14> be performed over the public key parameters rather than over their serialized encodings. This ensures that differences in encoding formats (e.g., ASN.1 DER versus CBOR) do not cause two equivalent public keys to be incorrectly treated as unequal.</t>
        <t>For example:</t>
        <ul spacing="normal">
          <li>
            <t>For RSA keys: The modulus (n) and public exponent (e) <bcp14>MUST</bcp14> match.</t>
          </li>
          <li>
            <t>For elliptic curve keys: The curve identifier and public key coordinates (e.g., x and y values) <bcp14>MUST</bcp14> match. If an implementation supports point compression, keys <bcp14>MUST</bcp14> be decompressed to a common format before the comparison is performed.</t>
          </li>
          <li>
            <t>For ML-DSA, SLH-DSA, and FN-DSA keys: The comparison <bcp14>MUST</bcp14> be performed over the raw public key byte string defined by the relevant algorithm specification (e.g., FIPS-204 for ML-DSA). In <tt>cnf</tt>, the Verifier <bcp14>MUST</bcp14> extract the raw public key bytes from the <tt>pub</tt> parameter of that structure. In an X.509 certificate <xref target="RFC5280"/>, the public key is carried in the SubjectPublicKeyInfo structure. The Verifier <bcp14>MUST</bcp14> extract the contents of the <tt>subjectPublicKey</tt> BIT STRING and obtain the contained public key byte string. The raw public key byte string extracted from <tt>cnf</tt> and the byte string extracted from the certificate <bcp14>MUST</bcp14> match exactly.</t>
          </li>
          <li>
            <t>For other key types: The public key parameters defined by the relevant cryptographic specification <bcp14>MUST</bcp14> match exactly. Comparison based solely on serialized encodings (e.g., raw CBOR, JSON, or DER byte sequences) is <bcp14>NOT RECOMMENDED</bcp14>, as differences in encoding rules may cause equivalent keys to appear unequal.</t>
          </li>
        </ul>
        <t>If the comparison fails, the key-to-platform binding is not established.</t>
      </section>
      <section anchor="protocol-based-pop">
        <name>Protocol-Based PoP</name>
        <t>This profile relies on protocol-level proof of possession for the Subject Key. This document does not define a new in-token PoP container or signature format.</t>
      </section>
      <section anchor="key-protection-attributes">
        <name>Key Protection Attributes</name>
        <t>The <tt>key-attributes</tt> claim includes attributes describing key protection properties of the private component of the Subject Key.</t>
        <t>When present, the attributes <tt>extractable</tt>, <tt>never-extractable</tt>, <tt>sensitive</tt>, and <tt>local</tt> <bcp14>MUST</bcp14> follow the definitions and semantics specified in <xref target="I-D.ietf-rats-pkix-key-attestation"/>.</t>
        <t>This document does not redefine these attributes. Their interpretation and security semantics are defined in <xref target="I-D.ietf-rats-pkix-key-attestation"/>.</t>
        <t>A Verifier will evaluate these attributes as part of its security policy when determining whether the Subject Key satisfies requirements for key generation, storage, or exportability.</t>
      </section>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>The <tt>purpose</tt> parameter identifies the key capabilities associated with the Subject Key.</t>
        <t>The value of this parameter is a list of object identifiers (OIDs) identifying the key capabilities defined in <xref target="I-D.ietf-rats-pkix-key-attestation"/>.</t>
        <t>These OIDs correspond to the key capability identifiers defined in Section 5.2.5 of <xref target="I-D.ietf-rats-pkix-key-attestation"/>.</t>
        <t>When the <tt>key-attributes</tt> claim is used in certificate enrollment workflows, the reported key capabilities <bcp14>MUST</bcp14> be compatible with the KeyUsage extensions requested in the CSR and included in the issued certificate.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>This document addresses Key Substitution Attacks. In such attacks, valid attestation evidence from a protected execution environment is presented to a verifier while a private key used in certificate enrollment or TLS authentication is not generated or protected within that environment.</t>
        <t>The mechanism defined in this document assumes:</t>
        <ul spacing="normal">
          <li>
            <t>The AK is securely provisioned and protected.</t>
          </li>
          <li>
            <t>The AK correctly signs attestation evidence reflecting the platform state.</t>
          </li>
          <li>
            <t>The surrounding protocol correctly verifies proof of possession of the Subject Key private component.</t>
          </li>
          <li>
            <t>The verifier provides an unpredictable nonce to ensure freshness.</t>
          </li>
        </ul>
        <t>If these assumptions do not hold, the security guarantees of this mechanism do not apply.</t>
      </section>
      <section anchor="proof-of-possession-rationale">
        <name>Proof-of-Possession Rationale</name>
        <t>The AK signature over the EAT provides evidence about the Subject Key and its asserted protection properties. Protocol-level PoP verification provides direct evidence of control of the Subject Key.</t>
        <t>By requiring both checks, the profile prevents reliance solely on self-reported claims about the presence of the Subject Key in the attested environment.</t>
      </section>
      <section anchor="key-protection-properties">
        <name>Key Protection Properties</name>
        <t>The <tt>cnf</tt> claim establishes a cryptographic binding between the Subject Key and the attestation evidence. However, the <tt>cnf</tt> claim alone does not convey information about the protection properties of the private component of that key.</t>
        <t>Some deployments require assurances regarding how the private key is generated, stored, and protected (for example, whether the key is non-exportable or generated within a hardware-protected environment). The <tt>key-attributes</tt> claim enables the Verifier to evaluate such properties and determine whether the Subject Key satisfies the security requirements of the deployment.</t>
      </section>
      <section anchor="key-substitution-attack-illustration">
        <name>Key Substitution Attack Illustration</name>
        <t>The following example illustrates how the mechanism detects a Key Substitution Attack.</t>
        <ol spacing="normal" type="1"><li>
            <t>An attacker generates a private key outside the trusted execution environment, denoted as K_bad.</t>
          </li>
          <li>
            <t>The attacker also possesses or obtains attestation evidence for a different key protected within the trusted execution environment, denoted as K_good.</t>
          </li>
          <li>
            <t>The attacker submits a certificate signing request (CSR) signed using K_bad while attaching an EAT containing <tt>cnf</tt> for K_good.</t>
          </li>
          <li>
            <t>During verification, the Subject Public Key contained in <tt>cnf</tt> (corresponding to K_good) is compared with the public key contained in the CSR (corresponding to K_bad).</t>
          </li>
        </ol>
        <t>Because the public keys do not match, the binding verification fails. Although the attestation evidence and the CSR signature may each be valid independently, the mismatch prevents the establishment of a cryptographic binding between the certificate private key and the attested execution environment.</t>
      </section>
      <section anchor="mitigation-of-key-substitution-attacks">
        <name>Mitigation of Key Substitution Attacks</name>
        <t>This mechanism mitigates Key Substitution Attacks by requiring cryptographic proof that the private key used in a CSR or TLS authentication flow corresponds to the key whose protection within the attested execution environment is being asserted.</t>
        <t>Because protocol-level proof of possession is validated together with the EAT signature, and because the claimed Subject Public Key in <tt>cnf</tt> must match the public key used in the protocol, substitution of a private key that is not generated or protected within the attested execution environment is detected.</t>
        <t>If any of these validations fail, the binding is not established.</t>
      </section>
      <section anchor="claim-omission-and-downgrade">
        <name>Claim Omission and Downgrade</name>
        <t>If a security policy requires that the private key corresponding to a certificate be generated or protected within an attested execution environment, the Relying Party <bcp14>MUST</bcp14> ensure that the <tt>key-attributes</tt> claim defined in this document is present, that the EAT <tt>nonce</tt> claim is present, that the <tt>cnf</tt> claim is present with <tt>COSE_Key</tt>, that protocol-level PoP verification succeeds, and that binding verification succeeds.</t>
        <t>In deployments using a separate Verifier, the Relying Party <bcp14>MUST</bcp14> require the Verifier to enforce the presence and successful validation of the <tt>key-attributes</tt> claim, EAT <tt>nonce</tt>, <tt>cnf</tt> with <tt>COSE_Key</tt>, and protocol-level PoP verification as part of attestation appraisal.</t>
      </section>
      <section anchor="scope-of-guarantees">
        <name>Scope of Guarantees</name>
        <t>This mechanism provides cryptographic evidence that the entity participating in the surrounding protocol demonstrated control of the private component of the Subject Key during protocol execution.</t>
        <t>It does not guarantee:</t>
        <ul spacing="normal">
          <li>
            <t>That the key remains protected after attestation;</t>
          </li>
          <li>
            <t>That the key cannot later be exported or migrated;</t>
          </li>
          <li>
            <t>That the platform remains in the same state after evidence generation.</t>
          </li>
        </ul>
        <t>Such guarantees depend on platform-specific properties and lifecycle management outside the scope of this document.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests registration of a new claim in the "CBOR Web Token (CWT) Claims" registry (established by <xref target="RFC8392"/>).</t>
      <t>The following value is to be added to this registry:</t>
      <ul spacing="normal">
        <li>
          <t>Claim Name: key-attributes</t>
        </li>
        <li>
          <t>CWT Claim Key: TBD</t>
        </li>
        <li>
          <t>Claim Description: Key protection attributes and key-usage constraints associated <br/>
with the Subject Key identified by the EAT <tt>cnf</tt> claim.</t>
        </li>
        <li>
          <t>Claim Value Type: CBOR map</t>
        </li>
        <li>
          <t>Change Controller: IETF</t>
        </li>
        <li>
          <t>Reference: RFCXXXX</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors thank Paul Walters for raising the relay attack threat considered in this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC8747">
        <front>
          <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="March" year="2020"/>
          <abstract>
            <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8747"/>
        <seriesInfo name="DOI" value="10.17487/RFC8747"/>
      </reference>
      <reference anchor="RFC9711">
        <front>
          <title>The Entity Attestation Token (EAT)</title>
          <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
          <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
          <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
          <author fullname="C. Wallace" initials="C." surname="Wallace"/>
          <date month="April" year="2025"/>
          <abstract>
            <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
            <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9711"/>
        <seriesInfo name="DOI" value="10.17487/RFC9711"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-csr-attestation">
        <front>
          <title>Use of Remote Attestation with Certification Signing Requests</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Cryptic Forest Software</organization>
          </author>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
            <organization>Siemens</organization>
          </author>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
          <author fullname="Ned Smith" initials="N." surname="Smith">
         </author>
          <date day="1" month="March" year="2026"/>
          <abstract>
            <t>   Certification Authorities (CAs) issuing certificates to Public Key
   Infrastructure (PKI) end entities may require a certificate signing
   request (CSR) to include additional verifiable information to confirm
   policy compliance.  For example, a CA may require an end entity to
   demonstrate that the private key corresponding to a CSR's public key
   is secured by a hardware security module (HSM), is not exportable,
   etc.  The process of generating, transmitting, and verifying
   additional information required by the CA is called remote
   attestation.  While work is currently underway to standardize various
   aspects of remote attestation, a variety of proprietary mechanisms
   have been in use for years, particularly regarding protection of
   private keys.

   This specification defines an ASN.1 structure for remote attestation
   that can accommodate proprietary and standardized attestation
   mechanisms, as well as an attribute and an extension to carry the
   structure in PKCS#10 and Certificate Request Message Format (CRMF)
   messages, respectively.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-23"/>
      </reference>
      <reference anchor="I-D.fossati-tls-exported-attestation">
        <front>
          <title>Remote Attestation with Exported Authenticators</title>
          <author fullname="Thomas Fossati" initials="T." surname="Fossati">
            <organization>Linaro</organization>
          </author>
          <author fullname="Muhammad Usama Sardar" initials="M. U." surname="Sardar">
            <organization>TU Dresden</organization>
          </author>
          <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
            <organization>Nokia</organization>
          </author>
          <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
            <organization>Intuit</organization>
          </author>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
            <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
          </author>
          <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
            <organization>Arm Limited</organization>
          </author>
          <date day="3" month="July" year="2025"/>
          <abstract>
            <t>   This specification defines a method for two parties in a
   communication interaction to exchange Evidence and Attestation
   Results using exported authenticators, as defined in RFC 9261.
   Additionally, it introduces the cmw_attestation extension, which
   allows attestation credentials to be included directly in the
   Certificate message sent during the Exported Authenticator-based
   post-handshake authentication.  The approach supports both the
   passport and background check models from the RATS architecture while
   ensuring that attestation remains bound to the underlying
   communication channel.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-fossati-tls-exported-attestation-02"/>
      </reference>
      <reference anchor="I-D.fossati-seat-early-attestation">
        <front>
          <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
          <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
            <organization>Intuit</organization>
          </author>
          <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
            <organization>Arm Limited</organization>
          </author>
          <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
            <organization>Arm Limited</organization>
          </author>
          <author fullname="Thomas Fossati" initials="T." surname="Fossati">
            <organization>Linaro</organization>
          </author>
          <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
            <organization>Nokia</organization>
          </author>
          <date day="1" month="March" year="2026"/>
          <abstract>
            <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using remote attestation
   which is a process by which an entity produces Evidence about itself
   that another party can use to appraise whether that entity is found
   in a secure state.  This document describes a series of TLS
   extensions that enable the binding of the TLS authentication key to a
   remote attestation session.  This enables an entity capable of
   producing attestation Evidence, such as a confidential workload
   running in a Trusted Execution Environment (TEE), or an IoT device
   that is trying to authenticate itself to a network access point, to
   present a more comprehensive set of security metrics to its peer.
   These extensions have been designed to allow the peers to use any
   attestation technology, in any remote attestation topology, and to
   use them mutually.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-fossati-seat-early-attestation-03"/>
      </reference>
      <reference anchor="I-D.ietf-rats-pkix-key-attestation">
        <front>
          <title>Evidence Encoding for Hardware Security Modules</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Cryptic Forest Software</organization>
          </author>
          <author fullname="Jean-Pierre Fiset" initials="J." surname="Fiset">
            <organization>Crypto4A Inc.</organization>
          </author>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
            <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
          </author>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
          <author fullname="Ned Smith" initials="N." surname="Smith">
            <organization>Intel Corporation</organization>
          </author>
          <date day="1" month="March" year="2026"/>
          <abstract>
            <t>   This document specifies a vendor-agnostic format for Evidence
   produced and verified within a PKIX context.  The Evidence produced
   this way includes claims collected about a cryptographic module, such
   as a Hardware Security Module (HSM), and elements found within it
   such as cryptographic keys.

   One scenario envisaged is that the state information about the
   cryptographic module can be securely presented to a remote operator
   or auditor in a vendor-agnostic verifiable format.  A more complex
   scenario would be to submit this Evidence to a Certification
   Authority to aid in determining whether the storage properties of
   this key meet the requirements of a given certificate profile.

   This specification also offers a format for requesting a
   cryptographic module to produce Evidence tailored for expected use.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-rats-pkix-key-attestation-03"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC9334">
        <front>
          <title>Remote ATtestation procedureS (RATS) Architecture</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <author fullname="N. Smith" initials="N." surname="Smith"/>
          <author fullname="W. Pan" initials="W." surname="Pan"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9334"/>
        <seriesInfo name="DOI" value="10.17487/RFC9334"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-attestation-freshness">
        <front>
          <title>Nonce-based Freshness for Remote Attestation in Certificate Signing Requests (CSRs) for the Certification Management Protocol (CMP), for Enrollment over Secure Transport (EST), and for Certificate Management over CMS (CMC)</title>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
            <organization>Siemens</organization>
          </author>
          <author fullname="Hendrik Brockhaus" initials="H." surname="Brockhaus">
            <organization>Siemens</organization>
          </author>
          <author fullname="Joe Mandel" initials="J." surname="Mandel">
            <organization>AKAYLA, Inc.</organization>
          </author>
          <author fullname="Sean Turner" initials="S." surname="Turner">
            <organization>sn3rd</organization>
          </author>
          <date day="19" month="October" year="2025"/>
          <abstract>
            <t>   When an end entity includes attestation Evidence in a Certificate
   Signing Request (CSR), it may be necessary to demonstrate the
   freshness of the provided Evidence.  Current attestation technology
   commonly achieves this using nonces.

   This document outlines the process through which nonces are supplied
   to the end entity by an RA/CA for inclusion in Evidence, leveraging
   the Certificate Management Protocol (CMP), Enrollment over Secure
   Transport (EST), and Certificate Management over CMS (CMC).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-attestation-freshness-05"/>
      </reference>
      <reference anchor="RFC8392">
        <front>
          <title>CBOR Web Token (CWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
          <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="May" year="2018"/>
          <abstract>
            <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8392"/>
        <seriesInfo name="DOI" value="10.17487/RFC8392"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
