<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-t2trg-taxonomy-manufacturer-anchors-16" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="manufacturer keys">A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-taxonomy-manufacturer-anchors-16"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2026" month="April" day="22"/>
    <workgroup>T2TRG Research Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 209?>

<t>This document provides a taxonomy of methods used by manufacturers of silicon and devices
to secure private keys and public trust anchors.
This deals with two related activities: how trust anchors and private keys
are installed into devices during manufacturing, and how the related
manufacturer held private keys are secured against disclosure.</t>
      <t>This document does not evaluate the different mechanisms, but rather just
serves to name them in a consistent manner in order to aid in communication.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-irtf-t2trg-taxonomy-manufacturer-anchors/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        t2trg Research Group mailing list (<eref target="mailto:t2trg@irtf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/t2trg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/t2trg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/t2trg/draft-irtf-t2trg-taxonomy-manufacturer-anchors"/>.</t>
    </note>
  </front>
  <middle>
    <?line 221?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>An increasing number of protocols derive a significant part of their security by using trust anchors <xref target="RFC4949"/> that are installed by manufacturers into a device during manufacturing.
Disclosure of the list of trust anchors does not usually cause a problem, but changing them in any way does.
This includes adding, replacing or deleting anchors.</t>
      <t>The document <xref target="RFC6024"/> deals with how trust anchors are managed in the device which uses them.
This document deals with how the PKI associated with such a trust anchor is managed.</t>
      <t>Many protocols also leverage manufacturer installed identities.
These identities are usually in the form of <xref target="ieee802-1AR"/> Initial Device Identity certificates (IDevID).
The 3GPP Vendor Base Station Certificate <xref target="_3GPP.33.310"/> is another form that uses a similiar design pattern.
The identity has two components: a private key that must remain under the strict control of a trusted part of the device, and a public part (the certificate), which (ignoring, for the moment, personal privacy concerns) may be freely disclosed.</t>
      <t>There also situations where identities are tied up in the provision of symmetric shared secrets.
A common example is the SIM card <xref target="_3GPP.51.011"/>.
Provisioning of a physical SIM card is generally considered a one-touch operation.
A virtual SIM (an eSIM) could be factory provisioned.</t>
      <t>It is further not unusual for many devices (particularly smartphones) to also have one or more group identity keys.
This is used, for instance, in <xref target="fidotechnote"/> to make claims about being a particular model of phone.
The key pair that does this is loaded into large batches of phones for privacy reasons:
If a single key was used, then this would allow tracking.
The shared key pair can not be used to identify a specific device.</t>
      <t>The trust anchors are used for a variety of purposes.
For instance, trust anchors are used to verify:</t>
      <ul spacing="normal">
        <li>
          <t>the signature on a software update (as per <xref target="RFC9019"/>),</t>
        </li>
        <li>
          <t>a TLS Server Certificate, such as when setting up an HTTPS connection,</t>
        </li>
        <li>
          <t>the <xref target="RFC8366"/> format voucher that provides proof of an ownership change.</t>
        </li>
      </ul>
      <t>Device identity keys are used when performing enrollment requests (in <xref target="RFC8995"/>, and in some uses of <xref target="RFC9140"/>.)
The device identity certificate is also used to sign Evidence by an Attesting Environment (see <xref target="RFC9334"/>).</t>
      <t>These security artifacts are used to anchor other chains of information such as: an
Entity Attestation Token (EAT) <xref target="RFC9711"/> Claim as to the version of software/firmware running on a device <xref target="I-D.birkholz-suit-coswid-manifest"/>, an EAT claim about legitimate network activity (via <xref target="I-D.ietf-iotops-mud-rats"/>, or embedded in the IDevID in <xref target="RFC8520"/>).</t>
      <t>Known software versions lead directly to vendor/distributor signed Software Bill of Materials (SBOM), such as those described by <xref target="RFC9393"/> and the NTIA/SBOM work <xref target="ntiasbom"/> and CISQ/OMG SBOM work underway <xref target="cisqsbom"/>.</t>
      <t>In order to manage risks and assess vulnerabilities in a Supply Chain, it is necessary to determine a degree of trustworthiness in each device.
A device may mislead audit systems as to its provenance, about its software load or even about what kind of device it is (see <xref target="RFC7168"/> for a humorous example).</t>
      <t>In order to properly assess the security of a Supply Chain it is necessary to understand the kinds and severity of the threats which a device has been designed to resist.
To do this, it is necessary to understand the ways in which the different trust anchors and identities are initially provisioned, are protected, and are updated.</t>
      <t>To do this, this document details the different trust anchors (TrAnc) and identities (IDs) found in typical devices.
The privacy and integrity of the TrAncs and IDs is often provided by a different, superior artifact.
This relationship is examined.</t>
      <t>While many might desire to assign numerical values to different mitigation techniques in order to be able to rank them, this document does not attempt to do that, as there are too many other (mostly human) factors that would come into play.
Such an effort is more properly in the purview of a formal processes such as <xref target="ISO27001"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document is not a standards track document, and it does not make use of formal requirements language.</t>
        <t>This document defines a number of hyphenated terms, and they are summarized here:</t>
        <dl>
          <dt>birth-certificates:</dt>
          <dd>
            <t>another term for IDevID</t>
          </dd>
          <dt>device-generated:</dt>
          <dd>
            <t>a private or symmetric key that is generated on the device</t>
          </dd>
          <dt>infrastructure-generated:</dt>
          <dd>
            <t>a private or symmetric key that is generated by some system, likely
located at the factory that built the device</t>
          </dd>
          <dt>IDevID-certificates:</dt>
          <dd>
            <t>an initial device identity certificate as per <xref target="ieee802-1AR"/></t>
          </dd>
          <dt>key-executives:</dt>
          <dd>
            <t>the people who are entrusted with pieces (shares) of a split secret <xref target="splittingnumbers"/></t>
          </dd>
          <dt>pkilevel:</dt>
          <dd>
            <t>the number of Certification Authorities in a public key infrastructure, counting the root, or trust-anchor as the first level, and not counting the End-Entity certificates <xref target="pkilevel"/></t>
          </dd>
          <dt>manufacturer-installed-certificates:</dt>
          <dd>
            <t>or MIC, see idevid</t>
          </dd>
          <dt>mechanically-installed:</dt>
          <dd>
            <t>when a key or certificate is programmed directly into non-volatile storage by
an out-of-band mechanism such as JTAG <xref target="JTAG"/></t>
          </dd>
          <dt>network-transferred:</dt>
          <dd>
            <t>when a key or certificate is transferred into a system via private interface, such as serial console, JTAG managed mailbox, or other physically private interface</t>
          </dd>
          <dt>network-transferred:</dt>
          <dd>
            <t>when a key or certificate is transferred into a system using a network interface which would be available after the device has shipped.  This applies even if the network is physically attached using a bed-of-nails <xref target="BedOfNails"/>.</t>
          </dd>
          <dt>device/infrastructure-co-generated:</dt>
          <dd>
            <t>when a private or symmetric key is derived from a secret previously synchronized between the silicon vendor and the factory using a common algorithm.</t>
          </dd>
          <dt>TPM:</dt>
          <dd>
            <t>a Trusted Platform Module, such as the set of devices standardized by the Trusted Computing Group (TCG). See <xref target="TPM20spec"/>.</t>
          </dd>
        </dl>
        <t>In addition, <xref target="keygen"/> introduces three primary private key generation techniques named <em>arbitrarily</em> after three vegetables (avocado, brocolli, and carrot) and two secondary ones named after two fruits (salak and sapodilla).
The two secondary ones refer to methods where a secure element is involved, and mnemonically start with the same letter: S.</t>
      </section>
    </section>
    <section anchor="applicability-model">
      <name>Applicability Model</name>
      <t>There is a wide variety of devices to which this analysis can apply (see <xref target="I-D.ietf-iotops-7228bis"/>.)
This document will use a J-group processor as a sample.
This class is sufficiently large to experience complex issues among multiple CPUs, packages and operating systems, but at the same time, small enough that this class is often deployed in single-purpose IoT-like uses.
Devices in this class often have Secure Enclaves, and can include silicon manufacturer controlled processors in the boot process.
Note that access to the secure enclave is often not available to system integrators.
A very common IoT platform, the Raspberry PI, has a secure enclave with the GPU, but access to it is not available.</t>
      <t>Almost all larger systems (servers, laptops, desktops) include a Baseboard Management Controller (BMC), which ranges from an M-Group Class 3 MCU, to a J-Group Class 10 CPU (see, for instance <xref target="openbmc"/> which uses a Linux kernel and system inside the BMC).
As the BMC usually has complete access to the main CPU's memory, I/O hardware and disk, the boot path security of such a system needs to be understood first as being about the security of the BMC.</t>
      <section anchor="a-reference-manufacturingboot-process">
        <name>A reference manufacturing/boot process</name>
        <t>In order to provide for immutability and privacy of the critical TrAnc and IDs, many CPU manufacturers will provide for some kind of private memory area which is only accessible when the CPU is in certain privileged states.
See the Terminology and Architecture sections of <xref target="RFC9397"/>, notably Trusted Execution Environment (TEE), Rich Execution Environment (REE), and Trusted Application Manager (TAM).</t>
        <t>The private memory that is important is usually non-volatile and rather small.
It may be located inside the CPU silicon die, or it may be located externally.
If the memory is external, then it is usually encrypted by a hardware mechanism on the CPU, with only the key kept inside the CPU.</t>
        <t>The entire mechanism may be external to the CPU in the form of a hardware-TPM module, or it may be entirely internal to the CPU in the form of a firmware-TPM.
It may use a custom interface to the rest of the system, or it may implement the TPM 1.2 or TPM 2.0 specifications (see <xref target="TPM20spec"/>.)
Those details are important to performing a full evaluation, but do not matter much to this model (see initial-enclave-location below).</t>
        <t>During the manufacturing process, once the components have been soldered to the board, the system is usually put through a system-level test.
This is often done as a "bed-of-nails" test <xref target="BedOfNails"/>, where the board has key points attached mechanically to a test system.
A <xref target="JTAG"/> process tests the System Under Test, and then initializes some firmware into the still empty flash storage.</t>
        <t>It is now common for a factory test image to be loaded first: this image will include code to initialize the private memory key described above, and will include a first-stage bootloader and some kind of (primitive) Trusted Application Manager (TAM).
The TAM is a piece of software that lives within the trusted execution environment.</t>
        <t>Embedded in the first-stage bootloader will be a Trust Anchor that is able to verify the second-stage bootloader image.</t>
        <t>After the system has undergone testing, the factory test image is erased, leaving the first-stage bootloader.
One or more second-stage bootloader images are installed.
The production image may be installed at that time, or if the second-stage bootloader is able to install it over the network, it may be done that way instead.</t>
        <t>There are many variations of the above process, and this section is not attempting to be prescriptive, but to provide enough illustration to motivate subsequent terminology.</t>
        <t>The process may be entirely automated, or it may be entirely driven by humans working in the factory, or a combination of the above.</t>
        <t>These steps may all occur on an access-controlled assembly line, or the system boards may be shipped from one place to another (maybe another country) before undergoing testing.</t>
        <t>Some systems are intended to be shipped in a tamper-proof state, but it is usually not desirable that bed-of-nails testing be possible without tampering, so the initialization process is usually done prior to rendering the system tamper-proof.
An example of a one-way tamper-proof, weather resistant treatment might to mount the system board in a case and fill the case with resin.</t>
        <t>Quality control testing may be done prior to, as well as after, the application of tamper-proofing, as systems which do not pass inspection may be reworked to fix flaws, and this should ideally be impossible once the system has been made tamper-proof.</t>
      </section>
    </section>
    <section anchor="types-of-trust-anchors">
      <name>Types of Trust Anchors</name>
      <t>Trust Anchors are fundamentally public keys with authorizations implicitly attached through the code that references them.</t>
      <t>They are used to validate other digitally signed artifacts.
Typically, these are chains of PKIX certificates leading to an End-Entity certificate (EE).</t>
      <t>The chains are usually presented as part of an externally provided object, with the term "externally" to be understood as being as close as untrusted flash, to as far as objects retrieved over a network.</t>
      <t>There is no requirement that there be any chain at all: the trust anchor can be used to validate a signature over a target object directly.</t>
      <t>The trust anchors are often stored in the form of self-signed certificates.
The self-signature does not offer any cryptographic assurance, but it does provide a form of error detection, providing verification against non-malicious forms of data corruption.
If storage is at a premium (such as inside-CPU non-volatile storage) then only the public key itself need to be stored.
For a 256-bit ECDSA key, this is 32 bytes of space.</t>
      <t>The following subsections explain a number of different kinds of trust anchors that a manufacturer can include into a device.
Each kind of trust anchor has different kinds of trust associated with it based on what authorization is associated with the key.
That is, these different anchors do different things, and so the risk associated with the anchor depends upon what those things that can be done are.</t>
      <t>There are some characteristics associated with each trust anchor that depend upon the associated risk.</t>
      <ol spacing="normal" type="1"><li>
          <t>There is a risk around whether or not a trust anchor can be replaced or modified so that it's a different anchor, (with the associated private key) controlled by a different entity.  This is not a risk associated with loss of the original manufacturer's private key, but with integrity of the public key.</t>
        </li>
        <li>
          <t>There is a risk that multiple trust anchors could be added to the device.  This would not replace the manufacturer's anchor, but augment it with additional trust anchors not authorized by the manufacturer.</t>
        </li>
        <li>
          <t>There is a risk that a trust anchor could be removed from the device, or rendered unusable. For instance, it might be impractical to replace a trust anchor, but it might be possible via fault injection or high-energy radiation for an attacker to corrupt one or two bytes of a trust anchor, rendering the anchor useless.</t>
        </li>
        <li>
          <t>There is a risk associated with compromise of the associated private key that goes with the (public key) of the trust anchor.  While this is the most obvious concern expressed: that an attacker gets control of the key, the above three risks may be more practical for some attackers.</t>
        </li>
        <li>
          <t>There is a risk that the manufacturer will lose access to the private key, without the private key being compromised.  No attacker possesses the private key, but neither can the manufacturer use the key anymore.</t>
        </li>
      </ol>
      <t>Should any of the above things occur, the manufacturer will be in a position where they might have to deploy new trust anchors to every device.
For some trust anchors, they may be safely replaced with an over-the-air update.
For the trust anchor that authorizes over-the-air updates, the manufacturer might be in a position where every single device has to be recalled and serviced with specialized hardware capable of updating the firmware.
For some devices, the hardware will have to be entirely replaced, typically at great cost.</t>
      <t>This has already happened, see for example: <xref target="leakedmsikey"/> and <xref target="hyundaiexample"/>.</t>
      <section anchor="first-stage-bootloader-trust-anchor">
        <name>First-Stage Bootloader Trust Anchor</name>
        <t>This anchor is part of the first-stage bootloader, and it is used to validate a second-stage bootloader which may be stored in external flash.</t>
        <t>This is called the first-stage bootloader trust anchor.
In most cases this trust anchor is burnt into fuses in the CPU, often within the die along with the first-stage bootloader itself.
It can not be changed without replacement of the entire device.
Replacement, removal or modification of this trust anchor is improbable.</t>
        <t>The anchor could be rendered unusable if additional fuses can be blown.
Some fuse implementations allow for bits to be changed from 1 (unblown), to 0 (blown).
Access to blow the fuses is usually restricted.
On some devices, it requires voltages not normally present, making this impossible to do by software.
However, it might be possible for an attacker to blow fuses using an external high voltage probe or via injection of gamma ray.   The likely result however is that the device would no longer boot.</t>
      </section>
      <section anchor="software-update-trust-anchor">
        <name>Software Update Trust Anchor</name>
        <t>This anchor is used to validate the main application (or operating system) load for the device.</t>
        <t>It can be stored in a number of places.
First, it may be identical to the First Bootloader Trust Anchor.</t>
        <t>Second, it may be stored in the second-stage bootloader, and therefore its integrity is protected by the First Bootloader Trust Anchor.</t>
        <t>Third, it may be stored in the application code itself, where the application validates updates to the application directly (update in place), or via a double-buffer arrangement.
The initial (factory) load of the application code initializes the trust arrangement.</t>
        <t>In this situation the application code is not started in a secured boot path.
The second-stage bootloader does not validate the application/operating system before starting it, but it may still provide measured boot mechanism (see <xref target="measuredboot"/>, section 2.3.)</t>
      </section>
      <section anchor="trusted-application-manager-anchor">
        <name>Trusted Application Manager Anchor</name>
        <t>This anchor is the key used by the <xref target="RFC9397"/> Trusted Application Manager (TAM).
Code which is signed by this anchor will be given execution privileges as described by the manifest which accompanies the code.</t>
        <t>The TAM software <em>itself</em> will typically be verified by the first-stage bootloader, so it needs to be signed by the First Bootloader Trust Anchor.
The TAM could also be a component of the first or second stage bootloader.</t>
        <t>This privilege may include updating anchors that are present within the TAM, or elsewhere in the Trusted Execution Environment.</t>
      </section>
      <section anchor="public-webpki-anchors">
        <name>Public WebPKI Anchors</name>
        <t>These anchors are used to authenticate HTTPS certificates from web sites.
These anchors are typically distributed as part of desktop browsers, and via desktop operating systems.
On IoT devices with specific purposes <xref target="RFC8520"/>, a limited number of connections is expected, so a limited number of trust anchors is usually distributed.</t>
        <t>The exact set of these anchors is not precisely defined: it is usually determined by the browser vendor (e.g., Mozilla, Google, Apple, Microsoft), or the operating system vendor (e.g., Apple, Google, Microsoft, Ubuntu).
In most cases these vendors look to the CA/Browser Forum <xref target="CABFORUM"/> for inclusion criteria.</t>
      </section>
      <section anchor="dnssec-root">
        <name>DNSSEC root</name>
        <t>This anchor is part of the DNS Security extensions.
It provides an anchor for integrity protection of DNS lookups.
Secure DNS lookups may be important in order to get access to software updates.
This anchor is now scheduled to change approximately every 3 years, with the new key announced several years before it is used, making it possible to embed keys that will be valid for up to five years.</t>
        <t>This trust anchor is typically part of the application/operating system code and is usually updated by the manufacturer when they do updates.
However, a system that is connected to the Internet may update the DNSSEC anchor itself through the mechanism described in <xref target="RFC5011"/>.</t>
        <t>There are concerns that there may be a chicken-and-egg situation for devices that have remained in a powered off state (or disconnected from the Internet) for a period of many years.
Upon being reconnected, the device would be unable to do DNSSEC validation because the trust anchor within the device would be too old.</t>
        <t>This could be fixed with a software/firmware update.
However, it could also be that in such a situation, that the device would be unable to validate the DNSSEC names required in order to obtain the operating system update.</t>
      </section>
      <section anchor="privatecloud-pki-anchors">
        <name>Private/Cloud PKI anchors</name>
        <t>It is common for many IoT and network appliances to have links to vendor provided services.
For instance, the IoT device that calls home for control purposes, or the network appliance that needs to validate a license key before it can operate.
(This may be identical to, or distinct from a Software Update anchor.  In particular, the device might call home over HTTPS to learn if there is a software update that needs to be done, but the update is signed by another key.)</t>
        <t>Such vendor services can be provided with public certificates, but the very short lifetime for public certificates <xref target="CABForum90day"/> precludes their use in many operational environments.
Instead, a private PKI anchor is included.
This can be in the form a multi-level PKI (as described in <xref target="pkilevel"/>), or degenerate to a level-1 PKI: a self-signed certificate.</t>
        <t>A level-1 PKI is very simple to create and operate, and there are innumerable situations where there is just a call to the "curl" utility <xref target="curl"/>, with a "--pinnedpubkey" option to specify the anchor.</t>
      </section>
      <section anchor="onboarding-and-other-enrollment-anchors">
        <name>Onboarding and other Enrollment anchors</name>
        <t><xref target="RFC8995"/>, <xref target="RFC8572"/>, and <xref target="RFC8366"/> specify mechanisms for onboarding of new devices.
The voucher artifact is transferred to the device by various means, and the device must verify the signature on it.
This requires a trust anchor to be built-in to the device, and some kind of private PKI be maintained by the vendor (or its authorized signing designate).
<xref target="I-D.ietf-anima-masa-considerations"/> provides some advice on choices in PKI design for a MASA.
The taxonomy presented in this document applies to describing how this PKI has been designed.</t>
      </section>
      <section anchor="onboarded-network-local-anchors">
        <name>Onboarded network-local anchors</name>
        <t><xref target="RFC7030"/>, <xref target="RFC8995"/> and <xref target="RFC9641"/> provide mechanisms by which new trust anchors may be loaded by a device during an onboarding process.
The trust anchors involved are typically local to an enterprise and are used to validate connections to other devices in the network.</t>
        <t>This typically includes connections to network management systems that may also load or modify other trust anchors in the system.
<xref target="I-D.ietf-anima-masa-considerations"/> provides some advice in the BRSKI <xref target="RFC8995"/> case for appropriate PKI complexity for such local PKIs.</t>
        <t>Note that this trust anchor is that of the network operator, and it is not related to the trust anchor described in the previous section that is used to validate an ownership transfer.</t>
      </section>
    </section>
    <section anchor="types-of-device-identities">
      <name>Types of Device Identities</name>
      <t>Device identities are installed during manufacturing time for a variety of purposes.</t>
      <t>Identities require some private component.
Asymmetric identities (e.g., RSA, ECDSA, EdDSA systems) require a corresponding public component, usually in the form of a certificate signed by a trusted third party.</t>
      <t>This certificate associates the identity with attributes.</t>
      <t>The process of making this coordinated key pair and then installing it into the device is called identity provisioning.</t>
      <section anchor="keygen">
        <name>Manufacturer installed IDevID certificates</name>
        <t><xref target="ieee802-1AR"/> defines a category of certificates that are installed by the manufacturer which contain a device unique serial number.</t>
        <t>A number of protocols depend upon this certificate.</t>
        <ul spacing="normal">
          <li>
            <t><xref target="RFC8572"/> and <xref target="RFC8995"/> introduce mechanisms for new devices (called pledges) to be onboarded into a network without intervention from an operator. A number of derived protocols such as <xref target="RFC9733"/>, <xref target="I-D.ietf-anima-constrained-voucher"/>, <xref target="I-D.ietf-anima-brski-cloud"/> extend this in a number of ways.</t>
          </li>
          <li>
            <t><xref target="RFC9334"/> depends upon a key provisioned into the Attesting Environment to sign Evidence. The IDevID may be used for this.</t>
          </li>
          <li>
            <t><xref target="RFC9019"/> depends upon a key provisioned into the
device in order to decrypt software updates.
Both symmetric and asymmetric keys are possible.
In both cases, the decrypt operation depends upon the device having access to
a private key provisioned in advance.
The IDevID can be used for this if algorithm choices permit.
ECDSA keys do not directly support encryption in the same way that RSA does, for
instance, but the addition of HPKE <xref target="RFC9180"/> allows for use of other key types.
There may be other legal considerations why the IDevID might not be used, and
a second key provisioned.</t>
          </li>
        </ul>
        <t>The manufacturer has the responsibility to provision a key pair into each
device as part of the manufacturing process.
There are a variety of mechanisms to accomplish this, which this section details.</t>
        <t>There are three fundamental ways to generate IDevID certificates for devices:</t>
        <ol spacing="normal" type="1"><li>
            <t>generating a private key on the device, creating a Certificate Signing
Request (or equivalent), and then returning a certificate to the device.</t>
          </li>
          <li>
            <t>generating a private key outside the device, signing the certificate, and
the installing both into the device.</t>
          </li>
          <li>
            <t>deriving the private key from a previously installed secret seed, that is shared with only the manufacturer.</t>
          </li>
        </ol>
        <t>There are additional variations where the IDevID is provided as part of a Trusted Platform Module (TPM) or Secure Element (SE).
The vendor may purchase such devices from another vendor, and that vendor often offers provisioning of a key pair into the device as a service.</t>
        <t>The document <xref target="I-D.moskowitz-ecdsa-pki"/> provides some practical instructions
on setting up a reference implementation for ECDSA keys using a three-tier
mechanism.</t>
        <t>The names of the five methods below are intended to be mnemonic.</t>
        <ul spacing="normal">
          <li>
            <t>Avocados have big seeds inside of them.</t>
          </li>
          <li>
            <t>Broccoli has a seed on the top (which is eaten).</t>
          </li>
          <li>
            <t>Carrots have a complicated seed process involving multiple years and many leaves.</t>
          </li>
          <li>
            <t>The two methods involving Secure Elements are named with the letter S.</t>
          </li>
        </ul>
        <section anchor="avocado">
          <name>Avocado method: On-device private key generation</name>
          <t>In this method, the device generates a private key on the device.
This is done within some very secure aspect of the device, such as in a Trusted Execution Environment, and the resulting private key is then stored in a secure and permanent way.
The permanency may extend beyond use of on-CPU flash, and could even involve blowing of one-time fuses.</t>
          <t>Generating the key on-device has the advantage that the private key never leaves the device.
The disadvantage is that the device may not have a verifiable random number generator.
The use of a pseudo-random number generator needs to be well seeded as explained in <xref target="RFC4086"/>.
<xref target="factoringrsa"/> is an example of a random number generation failure that was visible through survey of public keys, and led to a successful attack on the private keys.</t>
          <t>There are a number of options of how to get the public key from the device to the certification authority.
As it is a public key, privacy is less of a concern, and the focus is on integrity.
(However, disclosing the public key may have impacts on trackability of the device.)</t>
          <t>So, transmission must be done in an integral manner, and must be securely associated with an assigned serial number.
The serial number goes into the certificate, and the resulting certificate needs to be loaded into the manufacturer's asset database, and returned to the device to be stored as the IDevID certificate.</t>
          <t>One way to do the transmission is during a factory Bed of Nails test (see <xref target="BedOfNails"/>) or JTAG Boundary Scan.
There are two ways this can be done.  In the <em>device-generated</em> / <em>mechanically-installed</em> method, the public key or certificate signing request (CSR) is retrieved by doing a JTAG operations directly with an eeprom or RAM.
The CPU is not involved, and the memory accessed is likely not encrypted.
(The private key might be in the same place, or it could be safely elsewhere).</t>
          <t>A different JTAG mechanism would involve reading/writing to some other area of the CPU, such as an on-CPU static RAM or debug area.  In this case, the CPU is involved.
When done via this a physical connection like this, then this is referred to as a <em>device-generated</em> / <em>mechanically-tranferred</em> method.
The key difference is that CPUs usually have much better defenses against JTAG use after manufacturing, often via one time fuses that can blown.</t>
          <t>There are other ways that could be used where a certificate signing request is sent over a special network channel when the device is powered up in the factory.
This is referred to as the <em>avocado device-generated</em> / <em>network-transferred</em> method.</t>
          <t>Regardless of how the certificate signing request is sent from the device to the factory, and how the certificate is returned to the device, a concern from production line managers is that the assembly line may have to wait for the certification authority to respond with the certificate.
This is inherently a synchronous process, as the process can not start until the private key is generated and stored.</t>
          <t>After the key generation, the device needs to set a flag such that it no longer will generate a new key, and will not accept a new IDevID via the factory network connection.
This may be a software setting, or could involve blowing a one-time fuse.</t>
          <t>Devices are typically constructed in a fashion such that the device is unable to ever disclose the private key via an external interface.
This is usually done using a secure-enclave provided by the CPU architecture in combination with on-chip non-volatile memory.</t>
          <t>The risk is that if an attacker with physical access is able to put the device back into an unconfigured mode, then the attacker may be able to substitute a new certificate into the device.
It is difficult to construct a rationale for doing this as the attacker would not be able to forge a certificate from the manufacturer's CA.
Other parties that rely on the IDevID would see the device as an imposter if another CA was used.
However, if the goal is theft of the device itself (without regard to having access to firmware updates), then use of another manufacturer identity may be profitable.
Stealing a very low value item, such as a light bulb, makes very little sense.
Stealing medium value items, such as appliances, or high-value items such as cars, yachts or even airplanes, would make sense.
Replacing the manufacturer IDevID permits the attacker to also replace the authority to transfer ownership in protocols like <xref target="RFC8995"/>.</t>
        </section>
        <section anchor="broccoli">
          <name>Broccoli method: Off-device private key generation</name>
          <t>In this method, a key pair is generated in the factory, outside of the device.
The factory keeps the private key in a restricted area, but uses it to form a Certificate Signing Request (CSR).
The CSR is passed to the manufacturer's Certification Authority (CA), and a certificate is returned.
Other meta-data is often also returned, such as a serial number.</t>
          <t>Generating the key off-device has the advantage that the randomness of the private key can be better ensured.
As the private key is available to the manufacturing infrastructure, the authenticity of the public key is well known ahead of time.</t>
          <t>The private key and certificate can be programmed into the device along with the initial bootloader firmware in a single step.</t>
          <t>As the private key can be known to the factory in advance of the device being ready for it, the certificate can also be generated in advance.
This hides the latency to talk to the CA, and allows for the connectivity to the CA to be less reliable without shutting down the assembly line.
A single write to the flash of the device can contain the entire firmware of the device, including configuration of trust anchors and private keys.</t>
          <t>The major downside to generating the private key off-device is that it could be seen by the manufacturing infrastructure.
It could be compromised by humans in the factory, or the equipment could be compromised.
The use of this method increases the value of attacking the manufacturing infrastructure.</t>
          <t>If private keys are generated by the manufacturing plant, and are immediately installed, but never stored, then the window in which an attacker can gain access to the private key is immensely reduced.
But, the process then becomes more synchronous, negating much of the advantage of such a system.</t>
          <t>As in the previous case, the transfer may be done via physical interfaces such as bed-of-nails, giving the <em>brocolli infrastructure-generated</em> / <em>mechanically-transferred</em> method.</t>
          <t>There is also the possibility of having a <em>brocolli infrastructure-generated</em> / <em>network-transferred</em>
key.
There is a support for "server-generated" keys in <xref target="RFC7030"/>, <xref target="RFC8894"/>, and <xref target="RFC4210"/>.
All methods strongly recommend encrypting the private key for transfer.
This is difficult to comply with here as there is not yet any private key material in the device, so in many cases it will not be possible to encrypt the private key.
Still, it may be acceptable if the device is connected directly by a wired network and unroutable addresses are used.
A private wired network can often be made as secure as a bed-of-nails interface.</t>
        </section>
        <section anchor="carrot">
          <name>Carrot method: Key setup based on secret seed</name>
          <t>In this method, a random symmetric seed is generated by a component manufacturer.
This is typically the manufacturer of the CPU, often a system on a chip (SOC).
In this section there are two suppliers involved: the first is the familiar one that is responsible for the entire device (the device supplier), and the second one is the vendor of silicon chip.
This silicon chip is where a symmetric seed key has been provisioned.</t>
          <t>In this process, the silicon chip supplier provisions a unique secret into each device shipped.
This is typically at least 256 bits in size, but often is larger.
Note that the silicon chip supplier has to create an inventory specific for each client.</t>
          <t>This can be via fuses blown in a CPU's Trusted Execution Environment <xref target="RFC9397"/>, a TPM, or a Secure Element that is provisioned at its fabrication time.</t>
          <t>This seed value is revealed to the board/system manufacturer only via a secure channel.
Upon first boot, the system (within a TEE, a TPM, or Secure Element) will generate a key pair using this seed to initialize a Pseudo-Random-Number-Generator (PRNG).
The manufacturer, in a separate system, will initialize the same PRNG and, thus generate the same key pair.
The manufacturer then derives the public key part, and signs it with their certification authority (CA), which inserts this public key into a certificate.
The private part is then destroyed by the manufacturer, ideally never stored or seen by anyone.
This same mechanism is used by the TCG for manufacturer provisioning of EK certificates in TPMs, as explained by Section 2.1.1 of <xref target="TPMEK"/>.</t>
          <t>The certificate (being public information) is placed into a database, in some cases it is loaded by the device as its IDevID certificate, in other cases, it is retrieved during the onboarding process based upon a unique serial number asserted by the device.</t>
          <t>In some ways, this method appears to have all the tradeoffs of the previous two methods: the device must correctly derive its own private key, and the manufacturer has access to the private key, making it also vulnerable.
But, the device does not depend upon any internal source of random numbers to derive its key.</t>
          <t>The manufacturer does all the private key manipulation in a secure place, probably offline, and need never involve the actual physical factory.
The manufacturer can even do this in a different country.</t>
          <t>The security of the process rests upon the difficulty in extracting the seed provided by the silicon chip supplier.
While the silicon chip supplier must operate their factory in a much more secure fashion, which has a much higher cost, the exposure for this facility can be much better controlled.
The device manufacturing factory, which has many more components as input, including device testing, can operate at a much lower risk level as a result.</t>
          <t>Additionally, there are some other advantages to the device manufacturer: The private keys and certificates may be calculated by the manufacturer asynchronously to the manufacturing process, either done in batches in advance of actual manufacturing, or on demand when an IDevID is requested.</t>
          <t>There are, however, additional downsides of this method for manufacturer: the cost of the silicon is often higher, and may involve additional discrete parts.
The higher cost is the result of outsourcing the security risk to the silicon manufacturer supplier.</t>
          <t>The weakest link in this process is that the resulting seeds must be communicated to the device manufacturer securely, usually in batches.
This will often by done by physical courier, but other arrangements are possible.
The device manufacturer must store and care for these seeds very carefully, but as soon as a certificate has been generated, the seeds can be destroyed.</t>
        </section>
        <section anchor="squash">
          <name>Squash method: on-device generation with Secure Element</name>
          <t>In this method, a key-pair is generated by the device using a secure element.
(It may be a discrete TPM, but when TPM is used to generate keys, that method is considered to fall into the <tt>avocado</tt> category)</t>
          <t>The secure element provides additional assurance that the private key was properly generated.
Secure elements are designed specifically so that private keys can not be extracted from the device, so even if the device is attacked in a sophisticated way, using hardware, the private key will not be disclosed.</t>
        </section>
        <section anchor="spinach">
          <name>Spinach method: Secure Element factory generation</name>
          <t>In this method, a key-pair is generated by a Secure Element silicon chip supplier in their factory.
This method is essentially identical to the carrot method, but it occurs in a different factory!</t>
          <t>As a result the choice of which certification authority (CA) gets used may be very different.
It is typical for the silicon chip supplier to operate a CA themselves.
There are a few options:</t>
          <ol spacing="normal" type="1"><li>
              <t>they may put IDevIDs into the device which are generic to the silicon chip supplier</t>
            </li>
            <li>
              <t>they may operate a CA on behalf of the device manufacturer,</t>
            </li>
            <li>
              <t>they may even connect over a network to the device manufacturer's CA.</t>
            </li>
          </ol>
          <t>The device manufacturer receives the secure element devices in batches in a similar way that they receive other parts.
The secure elements are placed by the device manufacturer's plant into the devices.</t>
          <t>Upon first boot the device manufacturer firmware can read the IDevID certificate that has been placed into the secure elements, and can ask the secure element to perform signing operations using the private key contained in the secure element.
However, the private key can not be extracted!</t>
          <t>Despite the increased convenience of this method, there may be a risk if the secure elements are stolen in transport.
A thief could use them to generate signatures that would appear to be from device manufacurer devices.
To deal with this, there is often a simple activation password that the device manufacturer firmware must provide to the secure element in order to activate it.
Note that this password is probably stored in the clear in the device manufacturer's firmware: it can't be encrypted, because the secure source of decryption keys would be in the secure element, creating a cyclic dependancy.</t>
          <t>Note that the Secure Element silicon vendor has to create an inventory specific for each client.</t>
        </section>
      </section>
    </section>
    <section anchor="public-key-infrastructures-pki">
      <name>Public Key Infrastructures (PKI)</name>
      <t>This section covers the attributes of the Public Key Infrastructure that a manufacturer must operate in order to provision IDevID certificates to devices.</t>
      <t><xref target="RFC5280"/> describes the format for PKIX certificates.
Numerous mechanisms of enrollment have been defined (including: EST <xref target="RFC7030"/>, CMP <xref target="RFC4210"/>, SCEP <xref target="RFC8894"/>).</t>
      <t><xref target="RFC5280"/> provides mechanisms to deal with multi-level certification
authorities, but it is not always clear what operating rules apply.</t>
      <t>The certification authority (CA) that is central to <xref target="RFC5280"/>-style public key infrastructures can suffer three kinds of failures:</t>
      <ol spacing="normal" type="1"><li>
          <t>disclosure of the private key,</t>
        </li>
        <li>
          <t>loss of access to the private key,</t>
        </li>
        <li>
          <t>inappropriate/unauthorized signing of a certificate or artifact by an unauthorized actor.</t>
        </li>
      </ol>
      <t>A PKI which discloses one or more private certification authority keys is no
longer secure.</t>
      <t>An attacker can create new identities, and forge certificates connecting
existing identities to attacker controlled public/private key pairs.
This can permit the attacker to impersonate any specific device.</t>
      <t>In case 3, a failure occurs if the CA is convinced to sign (or issue) a certificate which it is not authorized to sign.
See for instance <xref target="ComodoGate"/>.
This is an authorization failure, and while a significant event, it does not result in the CA having to be re-initialized from scratch as no private keys were disclosed.
In ecosystems where CRLs or OCSP is used, then the unauthorized certificate can be revoked.</t>
      <t>This is distinguished from when access to the private key is lost, but the key has not been disclosed.
Any signatures that have already been made continue to be trustworthy, however, no new signature can be made.
This renders the CA useless.
If this the firmware signing key, it likely results in a recall of all products that need to use this trust anchor.
(Note: that there are some situations where a trust anchor will be created, it will then be used to sign a number of subordinate CAs, enough for the anticipated lifespan of the anchor, and then the private key intentionally destroyed.)</t>
      <t>If the PKI uses Certificate Revocation Lists (CRL), then an attacker that has access to the private key can also revoke existing identities.</t>
      <t>In the other direction, a PKI which loses access to a private key can no
longer function.
This does not immediately result in a failure, as existing identities remain valid until their expiry time (notAfter).
However, if CRLs or OCSP are in use, then the inability to sign a fresh CRL or OCSP response will result in all identities becoming invalid once the existing CRLs or OCSP statements expire.</t>
      <t>This section details some nomenclature about the structure of certification
authorities.</t>
      <section anchor="pkilevel">
        <name>Number of levels of certification authorities (pkilevel)</name>
        <t><xref section="6.1" sectionFormat="of" target="RFC5280"/> provides a Basic Path Validation.
In the formula, the certificates are arranged into a list.</t>
        <t>The certification authority (CA) starts with a Trust Anchor.
This is counted as the first level of the authority.</t>
        <t>In the degenerate case of a self-signed certificate, this a one level PKI.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="128" viewBox="0 0 128 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
              <path d="M 120,48 L 120,80" fill="none" stroke="black"/>
              <path d="M 8,32 L 96,32" fill="none" stroke="black"/>
              <path d="M 104,80 L 120,80" fill="none" stroke="black"/>
              <path d="M 8,96 L 96,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="108" y="52">&lt;-</text>
                <text x="40" y="68">Issuer=</text>
                <text x="80" y="68">X</text>
                <text x="48" y="84">Subject=X</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
.----------.
|          |<-.
|Issuer= X |  |
|Subject=X |--'
'----------'
]]></artwork>
        </artset>
        <t>The private key associated with the Trust Anchor signs one or more certificates.
When this first level authority signs only End-Entity (EE) certificates,
then this is a two level PKI.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="232" viewBox="0 0 232 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 8,176 L 8,224" fill="none" stroke="black"/>
              <path d="M 32,96 L 32,168" fill="none" stroke="black"/>
              <path d="M 80,96 L 80,128" fill="none" stroke="black"/>
              <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
              <path d="M 96,176 L 96,224" fill="none" stroke="black"/>
              <path d="M 120,48 L 120,80" fill="none" stroke="black"/>
              <path d="M 136,176 L 136,224" fill="none" stroke="black"/>
              <path d="M 144,128 L 144,168" fill="none" stroke="black"/>
              <path d="M 224,176 L 224,224" fill="none" stroke="black"/>
              <path d="M 8,32 L 96,32" fill="none" stroke="black"/>
              <path d="M 96,80 L 120,80" fill="none" stroke="black"/>
              <path d="M 8,96 L 96,96" fill="none" stroke="black"/>
              <path d="M 80,128 L 144,128" fill="none" stroke="black"/>
              <path d="M 8,176 L 40,176" fill="none" stroke="black"/>
              <path d="M 64,176 L 96,176" fill="none" stroke="black"/>
              <path d="M 136,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 192,176 L 224,176" fill="none" stroke="black"/>
              <path d="M 8,224 L 96,224" fill="none" stroke="black"/>
              <path d="M 136,224 L 224,224" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="152,168 140,162.4 140,173.6 " fill="black" transform="rotate(90,144,168)"/>
              <polygon class="arrowhead" points="40,168 28,162.4 28,173.6 " fill="black" transform="rotate(90,32,168)"/>
              <g class="text">
                <text x="108" y="52">&lt;-</text>
                <text x="40" y="68">Issuer=</text>
                <text x="80" y="68">X</text>
                <text x="164" y="68">root</text>
                <text x="48" y="84">Subject=X</text>
                <text x="164" y="84">CA</text>
                <text x="52" y="180">EE</text>
                <text x="180" y="180">EE</text>
                <text x="40" y="196">Issuer=</text>
                <text x="80" y="196">X</text>
                <text x="168" y="196">Issuer=</text>
                <text x="208" y="196">X</text>
                <text x="52" y="212">Subject=Y1</text>
                <text x="180" y="212">Subject=Y2</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
.----------.
|          |<-.
|Issuer= X |  |   root
|Subject=X +--'    CA
'--+-----+-'
   |     |
   |     '-------.
   |             |
   v             v
.----EE----.    .----EE----.
|Issuer= X |    |Issuer= X |
|Subject=Y1|    |Subject=Y2|
'----------'    '----------'


]]></artwork>
        </artset>
        <t>When this first level authority signs subordinate certification authorities,
and those certification authorities sign End-Entity certificates, then
this is a three level PKI.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="448" width="480" viewBox="0 0 480 448" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,304 L 8,352" fill="none" stroke="black"/>
              <path d="M 32,176 L 32,224" fill="none" stroke="black"/>
              <path d="M 32,256 L 32,296" fill="none" stroke="black"/>
              <path d="M 56,128 L 56,168" fill="none" stroke="black"/>
              <path d="M 56,224 L 56,256" fill="none" stroke="black"/>
              <path d="M 88,224 L 88,256" fill="none" stroke="black"/>
              <path d="M 96,304 L 96,352" fill="none" stroke="black"/>
              <path d="M 120,176 L 120,224" fill="none" stroke="black"/>
              <path d="M 128,32 L 128,96" fill="none" stroke="black"/>
              <path d="M 136,304 L 136,352" fill="none" stroke="black"/>
              <path d="M 152,96 L 152,128" fill="none" stroke="black"/>
              <path d="M 152,256 L 152,296" fill="none" stroke="black"/>
              <path d="M 200,96 L 200,128" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,96" fill="none" stroke="black"/>
              <path d="M 224,304 L 224,352" fill="none" stroke="black"/>
              <path d="M 240,48 L 240,80" fill="none" stroke="black"/>
              <path d="M 256,304 L 256,352" fill="none" stroke="black"/>
              <path d="M 272,256 L 272,296" fill="none" stroke="black"/>
              <path d="M 280,176 L 280,224" fill="none" stroke="black"/>
              <path d="M 304,128 L 304,168" fill="none" stroke="black"/>
              <path d="M 304,224 L 304,256" fill="none" stroke="black"/>
              <path d="M 344,224 L 344,256" fill="none" stroke="black"/>
              <path d="M 344,304 L 344,352" fill="none" stroke="black"/>
              <path d="M 368,176 L 368,224" fill="none" stroke="black"/>
              <path d="M 384,304 L 384,352" fill="none" stroke="black"/>
              <path d="M 400,256 L 400,296" fill="none" stroke="black"/>
              <path d="M 472,304 L 472,352" fill="none" stroke="black"/>
              <path d="M 128,32 L 216,32" fill="none" stroke="black"/>
              <path d="M 216,80 L 240,80" fill="none" stroke="black"/>
              <path d="M 128,96 L 216,96" fill="none" stroke="black"/>
              <path d="M 56,128 L 152,128" fill="none" stroke="black"/>
              <path d="M 200,128 L 304,128" fill="none" stroke="black"/>
              <path d="M 32,176 L 120,176" fill="none" stroke="black"/>
              <path d="M 280,176 L 368,176" fill="none" stroke="black"/>
              <path d="M 32,224 L 120,224" fill="none" stroke="black"/>
              <path d="M 280,224 L 368,224" fill="none" stroke="black"/>
              <path d="M 32,256 L 56,256" fill="none" stroke="black"/>
              <path d="M 88,256 L 152,256" fill="none" stroke="black"/>
              <path d="M 272,256 L 304,256" fill="none" stroke="black"/>
              <path d="M 344,256 L 400,256" fill="none" stroke="black"/>
              <path d="M 8,304 L 40,304" fill="none" stroke="black"/>
              <path d="M 64,304 L 96,304" fill="none" stroke="black"/>
              <path d="M 136,304 L 168,304" fill="none" stroke="black"/>
              <path d="M 192,304 L 224,304" fill="none" stroke="black"/>
              <path d="M 256,304 L 288,304" fill="none" stroke="black"/>
              <path d="M 312,304 L 344,304" fill="none" stroke="black"/>
              <path d="M 384,304 L 416,304" fill="none" stroke="black"/>
              <path d="M 440,304 L 472,304" fill="none" stroke="black"/>
              <path d="M 8,352 L 96,352" fill="none" stroke="black"/>
              <path d="M 136,352 L 224,352" fill="none" stroke="black"/>
              <path d="M 256,352 L 344,352" fill="none" stroke="black"/>
              <path d="M 384,352 L 472,352" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="408,296 396,290.4 396,301.6 " fill="black" transform="rotate(90,400,296)"/>
              <polygon class="arrowhead" points="312,168 300,162.4 300,173.6 " fill="black" transform="rotate(90,304,168)"/>
              <polygon class="arrowhead" points="280,296 268,290.4 268,301.6 " fill="black" transform="rotate(90,272,296)"/>
              <polygon class="arrowhead" points="160,296 148,290.4 148,301.6 " fill="black" transform="rotate(90,152,296)"/>
              <polygon class="arrowhead" points="64,168 52,162.4 52,173.6 " fill="black" transform="rotate(90,56,168)"/>
              <polygon class="arrowhead" points="40,296 28,290.4 28,301.6 " fill="black" transform="rotate(90,32,296)"/>
              <g class="text">
                <text x="228" y="52">&lt;-</text>
                <text x="44" y="68">root</text>
                <text x="160" y="68">Issuer=</text>
                <text x="200" y="68">X</text>
                <text x="44" y="84">CA</text>
                <text x="168" y="84">Subject=X</text>
                <text x="64" y="196">Issuer=</text>
                <text x="104" y="196">X</text>
                <text x="200" y="196">subordinate</text>
                <text x="312" y="196">Issuer=</text>
                <text x="352" y="196">X</text>
                <text x="76" y="212">Subject=Y1</text>
                <text x="196" y="212">CA</text>
                <text x="324" y="212">Subject=Y2</text>
                <text x="52" y="308">EE</text>
                <text x="180" y="308">EE</text>
                <text x="300" y="308">EE</text>
                <text x="428" y="308">EE</text>
                <text x="40" y="324">Issuer=</text>
                <text x="84" y="324">Y1</text>
                <text x="168" y="324">Issuer=</text>
                <text x="212" y="324">Y1</text>
                <text x="288" y="324">Issuer=</text>
                <text x="332" y="324">Y2</text>
                <text x="416" y="324">Issuer=</text>
                <text x="460" y="324">Y2</text>
                <text x="52" y="340">Subject=Z1</text>
                <text x="180" y="340">Subject=Z1</text>
                <text x="300" y="340">Subject=Z3</text>
                <text x="428" y="340">Subject=Z4</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
               .----------.
               |          |<-.
   root        |Issuer= X |  |
    CA         |Subject=X +--'
               '--+-----+-'
                  |     |
      .-----------'     '------------.
      |                              |
      v                              v
   .----------.                   .----------.
   |Issuer= X |    subordinate    |Issuer= X |
   |Subject=Y1|        CA         |Subject=Y2|
   '--+---+---'                   '--+----+--'
      |   |                          |    |
   .--'   '-------.              .---'    '------.
   |              |              |               |
   v              v              v               v
.----EE----.    .----EE----.   .----EE----.    .----EE----.
|Issuer= Y1|    |Issuer= Y1|   |Issuer= Y2|    |Issuer= Y2|
|Subject=Z1|    |Subject=Z1|   |Subject=Z3|    |Subject=Z4|
'----------'    '----------'   '----------'    '----------'





]]></artwork>
        </artset>
        <t>In general, when arranged as a tree, with the End-Entity certificates at the
bottom, and the Trust Anchor at the top, then the pkilevel is defined to be where the deepest EE
certificates are, counting from one.</t>
        <t>It is quite common to have a three-level PKI, where the root (level one) of the CA is
stored in a Hardware Security Module (HSM) in a way that it cannot be continuously accessed ("offline"), while the level two subordinate CA can sign certificates at any time ("online").</t>
      </section>
      <section anchor="protectCA">
        <name>Protection of CA private keys</name>
        <t>The private key for the certification authorities must be protected from
disclosure.
The strongest protection is afforded by keeping them in an offline device,
passing Certificate Signing Requests (CSRs) to the offline device by human
process.</t>
        <t>For examples of extreme measures, see <xref target="kskceremony"/>.
There is however a wide spectrum of needs, as exampled in <xref target="rootkeyceremony"/>.
The SAS70 audit standard is usually used as a basis for the ceremony, see <xref target="keyceremony2"/>.</t>
        <t>This is inconvenient, and may involve latencies of days, possibly even weeks
to months if the offline device is kept in a locked environment that requires
multiple keys to be present.</t>
        <t>There is therefore a tension between protection and availability.
Convenient and timely access to sign new artifacts is not something that is just nice to have.
If access is inconvenient then it may cause delays for signing of new code releases,
or it may incentivize technical staff to build in workarounds in order that they can get their job done faster.
To address the conflicting needs, some levels of the PKI be offline, and some levels of the PKI be online.</t>
      </section>
      <section anchor="preservation-of-operationally-critical-private-keys">
        <name>Preservation of operationally critical private keys</name>
        <t>A public key (or certificate) is installed into target device(s) as a trust anchor.
It is there in order to verify further artifacts, and it represents a significant investment.
Trust anchors must not be easily replaced by attackers, and securing the trust anchor against such tampering may involve burning the trust anchor into unchangeable fuses inside a CPU.</t>
        <t>Replacement of the anchor can involve a physical recall of every single device.
It is therefore important that the trust anchor is usable for the entire lifetime of every single one of the devices.</t>
        <t>The protections discussed in the previous section aim to thwart attacks.
The attacker wants to get access to the private key material, or to convince the infrastructure to use the private key material to their bidding.
Such an event, if it was undetected, would be catastrophic.
It would render almost every device useless (or potentially dangerous) until the anchor could be replaced.</t>
        <t>There is a different situation, however, which would lead to a similar result.
If the legitimate owner of the trust anchor infrastructure loses access to the private keys, then an equally catastrophic situation occurs.</t>
        <t>Code signing is usually done with a keypair that is attached to an End-Entity (EE) Certificate, from a trust anchor that has been assigned code signing authorization.
The private key of this EE also needs to be treated with significant care.
However, as long as the code signing CA's trust anchor and private key are preserved, it is usually preferable to lose access to the code signing EE certificate private key rather than risk disclosure.
A new code signing EE certificate can be created if needed.
This loss is not hassle-free; access to the code signing key can be critical path to getting fixes deployed.</t>
        <t>There are many situations that could lead to this.
The most typical situation would seem to be some kind of physical damage: a flood, a fire.
Less obvious situations could occur if CA key staff lose access to authentication secrets, such as a password, or if the human with the password(s) dies, or becomes incapacitated.</t>
        <t>Backups of critical material are routinely done.
Storage of backups offsite addresses the risk of physical damage, and in many cases the organization maintains an entire set of equipment at another location.</t>
        <t>The question then becomes how the backups are unlocked or activated.
Why attack the primary site physically if an attacker can target the backup site, or the people whose job it is to activate the backup site?</t>
        <t>Consider the situation where a hurricane or earthquake takes out all power and communications at an organizations' primary location, and it becomes necessary to activate the backup site.
What does it take to do that?</t>
        <t>Typically, the secrets will be split using <xref target="shamir79"/> into multiple pieces, each piece being carried with a different trusted employee.</t>
        <t>In <xref target="kskceremony"/>, the pieces are stored on smartcards that are kept in a vault, and the trusted people carry keys to the vault.</t>
        <t>One advantage of this mechanism is that if necessary, the doors to the vault can be drilled out.
This takes some significant time and leaves significant evidence, so it can not be done quietly by an attacker.
In the case of the DNSSEC Root, a failure of the vault to open actually required this to be done.</t>
        <t>In other systems the digital pieces are carried on the person themselves, ideally encrypted with a password known only to that person.</t>
        <t><xref target="shamir79"/> allows for keys to be split up into many components (n of them), where only some smaller number of them, k, need to be present to reconstruct the secret.
This is known as a (k, n) threshold scheme.</t>
        <section anchor="splittingnumbers">
          <name>Secret sharing, k-of-n</name>
          <t>In this document, each of the people who hold a piece of the secret are referred to as Key-Executives.</t>
          <t>The choice of n, and the choice of k is therefore of critical concern.
It seems unwise for an organization to publish them, as it provides some evidence as to how many Key-Executives would need to be coerced.</t>
          <t>The identities of the n Key-Executives should also be confidential.
The list of who they are should probably be limited to the members of the board and executive.
There does not seem to be any particular reason for the Key-Executives to be members of the board, but having a long term relationship with the enterprise seems reasonable, and a clear understanding of when to use the piece.</t>
          <t>The use of secret sharing, as opposed to providing each Key-Executive a complete backup copy (k=1), is that it means that no individual  Key-Executive can perform operations on their own.
Instead, of a minimum of k Key-Executives is needed to do any operation.
This protects the organization against corruption and coercion of any one Key-Executive.
As the Key-Executives can not operate on their own, there is also a lower risk to them.</t>
          <t>The minimum number of people (k) needed should also remain confidential.</t>
          <t>A number that can be published is the difference between k and n, which represents the number of redundant Key-Executives that exist.
The publication of this number is an assurance to the organizations' customers that there is a business continuity plan.</t>
          <t>An enterprise that has operations in multiple places may be better positioned to survive incidents that disrupt travel.
For instance, an earthquake, tsunami, or pandemic not only has the possibility to incapacitate Key-Executives but it could also damage smartcards or USB key that the shares are stored on.
<xref target="shamir79"/> suggests that <tt>n=2k-1</tt>, which implies that a simple majority of Key-Executives are needed to reconstruct the secret.</t>
          <t>However, there are other values of k with some different tradeoffs: requiring a majority of Key-Executives might be difficult when travel is impossible.
For instance, a value of k set to be less than a simple majority.
This enables the situation where Key-Executives are split between two or more continents (with each continent having at least k Key-Executives) would allow either continent to continue operations without the other group.</t>
          <t>Secret sharing may also be a good way to manage a code signing or firmware update signing key, even when that is an End-Entity Certificate.
Split it among development groups in three time zones (eight hours apart), such that any of those development groups have enough shares, and can therefore issue an emergency security patch.
Another way would be to have three End-Entity certificates that can sign code, and have each time zone sign their own code.  That implies that there is at least a level two PKI around the code signing process, and that any bootloaders that need to verify the code being starting it are able to do PKI path operations.</t>
        </section>
      </section>
      <section anchor="supporting-provisioned-anchors-in-devices">
        <name>Supporting provisioned anchors in devices</name>
        <t>IDevID-type Identity (or Birth) Certificates which are provisioned into
devices need to be signed by a certification authority maintained by the manufacturer.
During the period of manufacture of new product, the manufacturer needs to be able to sign new Identity Certificates.</t>
        <t>During the anticipated lifespan of the devices the manufacturer needs to maintain the ability for third parties to validate the Identity Certificates.
If there are Certificate Revocation Lists (CRLs) involved, then they will need to re-signed during this period.
Even for devices with a short active lifetime, the lifespan of the device could be very long if devices are kept in a warehouse for many decades before being activated.</t>
        <t>Trust anchors which are provisioned in the devices will have corresponding
private keys maintained by the manufacturer.
The trust anchors will often anchor a PKI which is going to be used for a
particular purpose.
There will be End-Entity (EE) certificates of this PKI which will be used to sign
particular artifacts (such as software updates), or messages in communications protocols
(such as TLS connections).
The private keys associated with these EE certificates are not stored in the
device, but are maintained by the manufacturer.
These need even more care than the private keys stored in the devices, as
compromise of the software update key compromises all the devices, not
just a single device.</t>
      </section>
    </section>
    <section anchor="evaluation-questions">
      <name>Evaluation Questions</name>
      <t>This section recaps the set of questions that may need to be answered.
This document does not assign valuation to the answers.</t>
      <section anchor="integrity-and-confidentiality-of-on-device-data">
        <name>Integrity and Confidentiality of on-device data</name>
        <dl>
          <dt>initial-enclave-location:</dt>
          <dd>
            <t>Is the location of the initial software trust anchor internal to the CPU package?
Some systems have a software verification public key which is built into the CPU package, while other systems store that initial key in a non-volatile device external to the CPU.</t>
          </dd>
          <dt>initial-enclave-integrity-key:</dt>
          <dd>
            <t>If the first-stage bootloader is external to the CPU, it will often need integrity protection. To verify that, another key is needed.  It could be a keyed hash.   Where is the key for this hash located?</t>
          </dd>
          <dt>initial-enclave-confidentiality-key:</dt>
          <dd>
            <t>If the first-stage data is external to the CPU, is it kept confidential by use of encryption?</t>
          </dd>
          <dt>first-stage-exposure:</dt>
          <dd>
            <t>The number of people involved in the first stage initialization.
An entirely automated system would have a number zero.
A factory with three 8 hour shifts might have a number that is a multiple of three.
A system with humans involved may be subject to bribery attacks, while a system with no humans may be subject to attacks on the system which are hard to notice.</t>
          </dd>
          <dt>first-second-stage-gap:</dt>
          <dd>
            <t>how far and long does a board travel between being initialized with a first-stage bootloader to where it is locked down so that changes to the bootloader can no longer be made.
For many situations, there is no distance at all as they occur in the same factory, but for other situations boards are manufactured and tested in one location, but are initialized elsewhere.</t>
          </dd>
        </dl>
      </section>
      <section anchor="integrity-and-privacy-of-device-identity-infrastructure">
        <name>Integrity and Privacy of device identity infrastructure</name>
        <t>For IDevID provisioning, which includes a private key and matching
certificate installed into the device, the associated public key
infrastructure that anchors this identity must be maintained by the
manufacturer.</t>
        <dl>
          <dt>identity-pki-level:</dt>
          <dd>
            <t>referring to <xref target="pkilevel"/>, the level number at which End-Entity certificates are present.</t>
          </dd>
          <dt>identity-time-limits-per-subordinate:</dt>
          <dd>
            <t>how long is each subordinate CA maintained before a new
subordinate CA key is generated?  There may be no time limit, only a device
count limit.</t>
          </dd>
          <dt>identity-number-per-subordinate:</dt>
          <dd>
            <t>how many identities are signed by a particular subordinate CA before it is
retired?  There may be no numeric limit, only a time limit.</t>
          </dd>
          <dt>identity-anchor-storage:</dt>
          <dd>
            <t>how is the root CA key stored? An open description that might include whether an HSM is used, or not, or even the model of it.</t>
          </dd>
          <dt>identity-shared-split-extra:</dt>
          <dd>
            <t>referring to <xref target="splittingnumbers"/>, where a private key is split up into n components, of which k are required to recover the key, this number is equal to n-k.
This is the number of spare shares.
Publishing this provides a measure of how much redundancy is present while not actually revealing either k or n.</t>
          </dd>
          <dt>identity-shared-split-continents:</dt>
          <dd>
            <t>the number of continents on which the private key can be recovered without trans-continental travel by any of the secret shareholders.</t>
          </dd>
        </dl>
      </section>
      <section anchor="integrity-and-privacy-of-included-trust-anchors">
        <name>Integrity and Privacy of included trust anchors</name>
        <t>For each trust anchor (public key) stored in the device, there will be an
associated PKI.
For each of those PKI the following questions need to be answered.</t>
        <dl>
          <dt>pki-level:</dt>
          <dd>
            <t>how deep is the EE that will be evaluated, based upon the criteria in <xref target="pkilevel"/></t>
          </dd>
          <dt>pki-algorithms:</dt>
          <dd>
            <t>what kind of algorithms and key sizes can actively be used with the device.</t>
          </dd>
          <dt>pki-lifespan:</dt>
          <dd>
            <t>what is the timespan for this anchor.  Does it get replaced at some interval, and if so, by what means is this done?</t>
          </dd>
          <dt>pki-level-locked:</dt>
          <dd>
            <t>(a Boolean) the level where the EE cert will be found locked by the device, or can
levels be added or deleted by the PKI operator without code changes to the
device.</t>
          </dd>
          <dt>pki-breadth:</dt>
          <dd>
            <t>how many different non-expired EE certificates is the PKI designed to manage?</t>
          </dd>
          <dt>pki-lock-policy:</dt>
          <dd>
            <t>can any EE certificate be used with this trust anchor to sign?  Or, is there
some kind of policy OID or Subject restriction?  Are specific subordinate
CAs needed that lead to the EE?</t>
          </dd>
          <dt>pki-anchor-storage:</dt>
          <dd>
            <t>how is the private key associated with this trust anchor stored? How many people are needed to recover it?</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is about security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no IANA requests.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Robert Martin of MITRE provided some guidance about citing the SBOM efforts.
Carsten Bormann and Sini Ruohomaa provided many editorial suggestions.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <displayreference target="_3GPP.33.310" to="3GPP.33.310"/>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="ieee802-1AR" target="https://standards.ieee.org/ieee/802.1AR/6995/">
          <front>
            <title>IEEE 802.1AR Secure Device Identifier</title>
            <author>
              <organization>IEEE Standard</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC9019">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="B. Moran" initials="B." surname="Moran"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="M. Meriac" initials="M." surname="Meriac"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
              <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9019"/>
          <seriesInfo name="DOI" value="10.17487/RFC9019"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9393">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="RFC9733">
          <front>
            <title>BRSKI with Alternative Enrollment (BRSKI-AE)</title>
            <author fullname="D. von Oheimb" initials="D." role="editor" surname="von Oheimb"/>
            <author fullname="S. Fries" initials="S." surname="Fries"/>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document defines enhancements to the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol, known as BRSKI with Alternative Enrollment (BRSKI-AE). BRSKI-AE extends BRSKI to support certificate enrollment mechanisms instead of the originally specified use of Enrollment over Secure Transport (EST). It supports certificate enrollment protocols such as the Certificate Management Protocol (CMP) that use authenticated self-contained signed objects for certification messages, allowing for flexibility in network device onboarding scenarios. The enhancements address use cases where the existing enrollment mechanism may not be feasible or optimal, providing a framework for integrating suitable alternative enrollment protocols. This document also updates the BRSKI reference architecture to accommodate these alternative methods, ensuring secure and scalable deployment across a range of network environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9733"/>
          <seriesInfo name="DOI" value="10.17487/RFC9733"/>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-cloud">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI) Cloud Registrar</title>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="Rifaat Shekh-Yusef" initials="R." surname="Shekh-Yusef">
              <organization>Ciena</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="9" month="September" year="2025"/>
            <abstract>
              <t>   Bootstrapping Remote Secure Key Infrastructures (BRSKI) defines how
   to onboard a device securely into an operator-maintained
   infrastructure.  It assumes that there is local network
   infrastructure for the device to discover.  On networks without that,
   there is nothing present to help onboard the device.

   This document extends BRSKI and defines behavior for bootstrapping
   devices for deployments where no local infrastructure is available,
   such as in a home or remote office.  This document defines how the
   device can use a well-defined "call-home" mechanism to find the
   operator-maintained infrastructure.

   This document defines how to contact a well-known Cloud Registrar,
   and two ways in which the device may be redirected towards the
   operator-maintained infrastructure.  The Cloud Registrar enables
   discovery of the operator-maintained infrastructure, and may enable
   establishment of trust with operator-maintained infrastructure that
   does not support BRSKI mechanisms.

   This document updates RFC 8995 (BRSKI).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-cloud-19"/>
        </reference>
        <reference anchor="I-D.ietf-iotops-7228bis">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Mehmet Ersue" initials="M." surname="Ersue">
         </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Carles Gomez" initials="C." surname="Gomez">
              <organization>Universitat Politecnica de Catalunya</organization>
            </author>
            <date day="18" month="April" year="2026"/>
            <abstract>
              <t>   The Internet Protocol Suite is increasingly used on small devices
   with severe constraints on power, memory, and processing resources,
   creating constrained-node networks.  This document provides a number
   of basic terms that have been useful in research and standardization
   work for constrained-node networks.

   This document obsoletes RFC 7228.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-7228bis-06"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-30"/>
        </reference>
        <reference anchor="I-D.ietf-anima-masa-considerations">
          <front>
            <title>Operational Considerations for Voucher infrastructure for BRSKI MASA</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Peter Chunchi Liu" initials="P. C." surname="Liu">
              <organization>Huawei</organization>
            </author>
            <date day="26" month="March" year="2026"/>
            <abstract>
              <t>   This document describes a number of operational modes that a BRSKI
   Manufacturer Authorized Signing Authority (MASA) may take on.

   Each mode is defined, and then each mode is given a relevance within
   an over applicability of what kind of organization the MASA is
   deployed into.  This document does not change any protocol
   mechanisms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-masa-considerations-02"/>
        </reference>
        <reference anchor="I-D.moskowitz-ecdsa-pki">
          <front>
            <title>Guide for building an ECC pki</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Liang Xia" initials="L." surname="Xia">
              <organization>Huawei</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="31" month="January" year="2021"/>
            <abstract>
              <t>   This memo provides a guide for building a PKI (Public Key
   Infrastructure) using openSSL.  All certificates in this guide are
   ECDSA, P-256, with SHA256 certificates.  Along with common End Entity
   certificates, this guide provides instructions for creating IEEE
   802.1AR iDevID Secure Device certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-ecdsa-pki-10"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC5011">
          <front>
            <title>Automated Updates of DNS Security (DNSSEC) Trust Anchors</title>
            <author fullname="M. StJohns" initials="M." surname="StJohns"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes a means for automated, authenticated, and authorized updating of DNSSEC "trust anchors". The method provides protection against N-1 key compromises of N keys in the trust point key set. Based on the trust established by the presence of a current anchor, other anchors may be added at the same place in the hierarchy, and, ultimately, supplant the existing anchor(s).</t>
              <t>This mechanism will require changes to resolver management behavior (but not resolver resolution behavior), and the addition of a single flag bit to the DNSKEY record. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="74"/>
          <seriesInfo name="RFC" value="5011"/>
          <seriesInfo name="DOI" value="10.17487/RFC5011"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8572">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8894">
          <front>
            <title>Simple Certificate Enrolment Protocol</title>
            <author fullname="P. Gutmann" initials="P." surname="Gutmann"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies the Simple Certificate Enrolment Protocol (SCEP), a PKI protocol that leverages existing technology by using Cryptographic Message Syntax (CMS, formerly known as PKCS #7) and PKCS #10 over HTTP. SCEP is the evolution of the enrolment protocol sponsored by Cisco Systems, which enjoys wide support in both client and server implementations, as well as being relied upon by numerous other industry standards that work with certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8894"/>
          <seriesInfo name="DOI" value="10.17487/RFC8894"/>
        </reference>
        <reference anchor="RFC4210">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="T. Kause" initials="T." surname="Kause"/>
            <author fullname="T. Mononen" initials="T." surname="Mononen"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides on-line interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4210"/>
          <seriesInfo name="DOI" value="10.17487/RFC4210"/>
        </reference>
        <reference anchor="_3GPP.51.011" target="http://www.3gpp.org/ftp/Specs/archive/51_series/51.011/51011-4f0.zip">
          <front>
            <title>Specification of the Subscriber Identity Module - Mobile Equipment (SIM-ME) interface</title>
            <author>
              <organization abbrev="3GPP">3rd Generation Partnership Project</organization>
              <address>
                <postal>
                  <country>France</country>
                  <city>Sophia Antipolis Cedex</city>
                </postal>
              </address>
            </author>
            <author fullname="PHAN, Ly Thanh">
              <organization>Gemalto N.V.</organization>
            </author>
            <date day="15" month="June" year="2005"/>
          </front>
        </reference>
        <reference anchor="RFC6024">
          <front>
            <title>Trust Anchor Management Requirements</title>
            <author fullname="R. Reddy" initials="R." surname="Reddy"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>A trust anchor represents an authoritative entity via a public key and associated data. The public key is used to verify digital signatures, and the associated data is used to constrain the types of information for which the trust anchor is authoritative. A relying party uses trust anchors to determine if a digitally signed object is valid by verifying a digital signature using the trust anchor's public key, and by enforcing the constraints expressed in the associated data for the trust anchor. This document describes some of the problems associated with the lack of a standard trust anchor management mechanism and defines requirements for data formats and push-based protocols designed to address these problems. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6024"/>
          <seriesInfo name="DOI" value="10.17487/RFC6024"/>
        </reference>
        <reference anchor="CABForum90day" target="   https://cabforum.org/working-groups/server/baseline-requirements/requirements/">
          <front>
            <title>CA/Browser Forum Latest Baseline Requirements, version 2.1.5</title>
            <author>
              <organization>CA/Browser Forum</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="factoringrsa" target="https://eprint.iacr.org/2013/599">
          <front>
            <title>Factoring RSA keys from certified smart cards: Coppersmith in the wild</title>
            <author initials="D. J." surname="Bernstein" fullname="Daniel J. Bernstein">
              <organization/>
            </author>
            <author initials="Y.-A." surname="Chang" fullname="Yun-An Chang">
              <organization/>
            </author>
            <author initials="C.-M." surname="Cheng" fullname="Chen-Mou Cheng">
              <organization/>
            </author>
            <author initials="L.-P." surname="Chou" fullname="Li-Ping Chou">
              <organization/>
            </author>
            <author initials="N." surname="Heninger" fullname="Nadia Heninger">
              <organization/>
            </author>
            <author initials="T." surname="Lange" fullname="Tanja Lange">
              <organization/>
            </author>
            <author initials="N. van" surname="Someren" fullname="Nicko van Someren">
              <organization/>
            </author>
            <date year="2013" month="September" day="16"/>
          </front>
        </reference>
        <reference anchor="kskceremony" target="https://www.iana.org/dnssec/procedures">
          <front>
            <title>DNSSEC Practice Statement for the Root Zone ZSK Operator</title>
            <author>
              <organization>Verisign</organization>
            </author>
            <date year="2024" month="July" day="18"/>
          </front>
        </reference>
        <reference anchor="rootkeyceremony" target="https://cryptography.fandom.com/wiki/Root_Key_Ceremony">
          <front>
            <title>Root Key Ceremony, Cryptography Wiki</title>
            <author>
              <organization>Community</organization>
            </author>
            <date year="2020" month="April" day="04"/>
          </front>
        </reference>
        <reference anchor="keyceremony2" target="http://www.digi-sign.com/compliance/key%20ceremony/index">
          <front>
            <title>SAS 70 Key Ceremony</title>
            <author>
              <organization>Digi-Sign</organization>
            </author>
            <date year="2020" month="April" day="04"/>
          </front>
        </reference>
        <reference anchor="shamir79" target="http://web.mit.edu/6.857/OldStuff/Fall03/ref/Shamir-HowToShareASecret.pdf">
          <front>
            <title>How to share a secret.</title>
            <author initials="A." surname="Shamir" fullname="Adi Shamir">
              <organization/>
            </author>
            <date year="1979"/>
          </front>
        </reference>
        <reference anchor="fidotechnote" target="https://fidoalliance.org/fido-technotes-the-truth-about-attestation/">
          <front>
            <title>FIDO TechNotes: The Truth about Attestation</title>
            <author>
              <organization>FIDO Alliance</organization>
            </author>
            <date year="2018" month="July" day="19"/>
          </front>
        </reference>
        <reference anchor="ntiasbom" target="https://www.ntia.doc.gov/SoftwareTransparency">
          <front>
            <title>NTIA Software Component Transparency</title>
            <author>
              <organization>NTIA</organization>
            </author>
            <date year="2020" month="July" day="01"/>
          </front>
        </reference>
        <reference anchor="cisqsbom" target="https://www.it-cisq.org/software-bill-of-materials/index.htm">
          <front>
            <title>TOOL-TO-TOOL SOFTWARE BILL OF MATERIALS EXCHANGE</title>
            <author>
              <organization>CISQ/Object Management Group</organization>
            </author>
            <date year="2020" month="July" day="01"/>
          </front>
        </reference>
        <reference anchor="ComodoGate" target="https://www.theregister.com/2011/03/28/comodo_gate_hacker_breaks_cover/">
          <front>
            <title>Comodo-gate hacker brags about forged certificate exploit</title>
            <author>
              <organization/>
            </author>
            <date year="2011" month="March" day="28"/>
          </front>
        </reference>
        <reference anchor="openbmc" target="https://www.openbmc.org/">
          <front>
            <title>Defining a Standard Baseboard Management Controller Firmware Stack</title>
            <author>
              <organization>Linux Foundation/OpenBMC Group</organization>
            </author>
            <date year="2020" month="July" day="01"/>
          </front>
        </reference>
        <reference anchor="JTAG" target="https://en.wikipedia.org/wiki/JTAG">
          <front>
            <title>Joint Test Action Group</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="August" day="26"/>
          </front>
        </reference>
        <reference anchor="BedOfNails" target="https://en.wikipedia.org/wiki/Bed_of_nails_tester">
          <front>
            <title>Bed of nails tester</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2024" month="December" day="30"/>
          </front>
        </reference>
        <reference anchor="leakedmsikey" target="https://www.binarly.io/blog/leaked-msi-source-code-with-intel-oem-keys-how-does-this-affect-industry-wide-software-supply-chain">
          <front>
            <title>Leaked MSI Source Code with Intel OEM Keys: How Does This Affect Industry-wide Software Supply Chain?</title>
            <author>
              <organization>Binarly efiXplorer Team</organization>
            </author>
            <date year="2025" month="May" day="27"/>
          </front>
        </reference>
        <reference anchor="CABFORUM" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.7.3.pdf">
          <front>
            <title>CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, v.1.7.3</title>
            <author>
              <organization>CA/Browser Forum</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="TPMEK" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-EK-Credential-Profile-for-TPM-Family-2.0-Level-0-Version-2.6_pub.pdf">
          <front>
            <title>TCG Credential Profile EK 2.0</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2024" month="December" day="04"/>
          </front>
        </reference>
        <reference anchor="curl" target="https://curl.se/download.html">
          <front>
            <title>CURL</title>
            <author initials="D." surname="Stenberg" fullname="Daniel Stenberg">
              <organization/>
            </author>
            <date year="2025" month="May" day="28"/>
          </front>
        </reference>
        <reference anchor="measuredboot" target="https://trustedcomputinggroup.org/resource/pc-client-specific-platform-firmware-profile-specification/">
          <front>
            <title>TCG PC Client Specific Platform Firmware Profile Specification</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2023" month="December" day="04"/>
          </front>
        </reference>
        <reference anchor="TPM20spec" target="https://trustedcomputinggroup.org/resource/tpm-library-specification/">
          <front>
            <title>TPM 2.0 Library</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="ISO27001">
          <front>
            <title>ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection -- Information security management systems -- Requirements</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="hyundaiexample" target="https://www.theregister.com/2022/08/17/software_developer_cracks_hyundai_encryption/">
          <front>
            <title>Software developer cracks Hyundai car security with Google search</title>
            <author>
              <organization>The Register</organization>
            </author>
            <date year="2022" month="August" day="17"/>
          </front>
        </reference>
        <reference anchor="_3GPP.33.310" target="http://www.3gpp.org/ftp/Specs/archive/33_series/33.310/33310-970.zip">
          <front>
            <title>Network Domain Security (NDS); Authentication Framework (AF)</title>
            <author>
              <organization abbrev="3GPP">3rd Generation Partnership Project</organization>
              <address>
                <postal>
                  <country>France</country>
                  <city>Sophia Antipolis Cedex</city>
                </postal>
              </address>
            </author>
            <author fullname="JERICHOW, Anja">
              <organization>Nokia Germany</organization>
            </author>
            <date day="30" month="September" year="2011"/>
          </front>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="I-D.birkholz-suit-coswid-manifest">
          <front>
            <title>A SUIT Manifest Extension for Concise Software Identifiers</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="17" month="July" year="2018"/>
            <abstract>
              <t>   This document defines a resource extension for Concise Software
   Identifiers (CoSWID) that represents a SUIT firmware manifest.  This
   extension combines the information elements of the SUIT information
   model with the semantic expressiveness of Software Identifiers.  In
   consequence, this composite enables the integration of Firmware
   Updates for the Internet of Things (SUIT) in existing work-flows for
   updates of software components in general.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-birkholz-suit-coswid-manifest-00"/>
        </reference>
        <reference anchor="I-D.ietf-iotops-mud-rats">
          <front>
            <title>MUD-Based RATS Resources Discovery</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Chunchi Liu" initials="P. C." surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="November" year="2025"/>
            <abstract>
              <t>   Manufacturer Usage Description (MUD) files and the MUD URIs that
   point to them are defined in RFC 8520.  This document introduces a
   new type of MUD file to be delivered in conjunction with a MUD file
   signature and/or to be referenced via a MUD URI embedded in other
   documents or messages, such as an IEEE 802.1AR Secure Device
   Identifier (DevID) or a CBOR Web Token (CWT).  These signed documents
   can be presented to other entities, e.g., a network management system
   or network path orchestrator.  If this entity also takes on the role
   of a verifier as defined by the IETF Remote ATtestation procedureS
   (RATS) architecture, this verifier can use the references included in
   the MUD file specified in this document to discover, for example,
   appropriate reference value providers, endorsement documents or
   endorsement distribution APIs, trust anchor stores, remote verifier
   services (sometimes referred to as Attestation Verification
   Services), or transparency logs.  All theses references in the MUD
   file pointing to resources and auxiliary RATS services can satisfy
   general RATS prerequisite by enabling discovery or improve discovery
   resilience of corresponding resources or services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-mud-rats-02"/>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC7168">
          <front>
            <title>The Hyper Text Coffee Pot Control Protocol for Tea Efflux Appliances (HTCPCP-TEA)</title>
            <author fullname="I. Nazar" initials="I." surname="Nazar"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>The Hyper Text Coffee Pot Control Protocol (HTCPCP) specification does not allow for the brewing of tea, in all its variety and complexity. This paper outlines an extension to HTCPCP to allow for pots to provide networked tea-brewing facilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7168"/>
          <seriesInfo name="DOI" value="10.17487/RFC7168"/>
        </reference>
        <reference anchor="RFC9641">
          <front>
            <title>A YANG Data Model for a Truststore</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document presents a YANG module for configuring bags of certificates and bags of public keys that can be referenced by other data models for trust. Notifications are sent when certificates are about to expire.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9641"/>
          <seriesInfo name="DOI" value="10.17487/RFC9641"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="RFC9397">
          <front>
            <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
            <author fullname="M. Pei" initials="M." surname="Pei"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="D. Wheeler" initials="D." surname="Wheeler"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>A Trusted Execution Environment (TEE) is an environment that enforces the following: any code within the environment cannot be tampered with, and any data used by such code cannot be read or tampered with by any code outside the environment. This architecture document discusses the motivation for designing and standardizing a protocol for managing the lifecycle of Trusted Applications running inside such a TEE.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9397"/>
          <seriesInfo name="DOI" value="10.17487/RFC9397"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
