<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-daa-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="DAA for RATS">Direct Anonymous Attestation for the Remote Attestation Procedures Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-daa-03"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="C." surname="Newton" fullname="Christopher Newton">
      <organization>University of Surrey</organization>
      <address>
        <email>cn0016@surrey.ac.uk</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Liqun Chen">
      <organization>University of Surrey</organization>
      <address>
        <email>liqun.chen@surrey.ac.uk</email>
      </address>
    </author>
    <author initials="D." surname="Thaler" fullname="Dave Thaler">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>dthaler@microsoft.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="10"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document maps the concept of Direct Anonymous Attestation (DAA) to the Remote Attestation Procedures (RATS) Architecture.
The protocol entity DAA Issuer is introduced and its mapping with existing RATS roles in DAA protocol steps is specified.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-daa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-daa"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Remote ATtestation procedureS (RATS, <xref target="I-D.ietf-rats-architecture"/>) describe interactions between well-defined architectural constituents in support of Relying Parties that require an understanding about the trustworthiness of a remote peer.
The identity of an Attester and its corresponding Attesting Environments play a vital role in RATS.
A common way to refer to such an identity is the Authentication Secret ID as defined in the Reference Interaction Models for RATS <xref target="I-D.ietf-rats-reference-interaction-models"/>.
The fact that every Attesting Environment can be uniquely identified in the context of the RATS architecture is not suitable for every application of remote attestation.
Additional issues may arise when Personally identifiable information (PII) -- whether obfuscated or in clear text -- are included in attestation Evidence or even corresponding Attestation Results.
This document illustrates how Direct Anonymous Attestation (DAA) can mitigate the issue of uniquely (re-)identifiable Attesting Environments.
To accomplish that goal, the protocol entity DAA Issuer as described in <xref target="DAA"/> is introduced and its duties as well as its mappings with other RATS roles are specified.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the following set of terms, roles, and concepts as defined in <xref target="I-D.ietf-rats-architecture"/>:
Attester, Verifier, Relying Party, Endorser, Conceptual Message, Evidence, Attestation Result, Attesting Environment.</t>
      <t>Additionally, this document uses and adapts, as necessary, the following concepts and information elements as defined in <xref target="I-D.ietf-rats-reference-interaction-models"/>:
Attester Identity, Authentication Secret, Authentication Secret ID</t>
      <t>A PKIX Certificate is an X.509v3 format certificate as specified by <xref target="RFC5280"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="direct-anonymous-attestation">
      <name>Direct Anonymous Attestation</name>
      <t>Two protocols as described in <xref target="DAA"/> are illustrated: the Join Protocol and the DAA-Signing Protocol. This section specifies the mapping of the protocol entity DAA Issuer described in <xref target="DAA"/> as an actor in the Join Protocol as well as an actor in the corresponding DAA-Signing Protocol to roles specified in the RATS Architecture.</t>
      <t>In the Join Protocol, the protocol entity DAA Issuer takes on the RATS roles of Verifier and associated Relying Party. The mapping is illustrated in Figure <xref target="join-mapping"/>.</t>
      <figure anchor="join-mapping">
        <name>RATS Architecture for the Join Protocol</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="464" width="568" viewBox="0 0 568 464" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,384 L 8,416" fill="none" stroke="black"/>
              <path d="M 40,64 L 40,160" fill="none" stroke="black"/>
              <path d="M 56,288 L 56,384" fill="none" stroke="black"/>
              <path d="M 96,384 L 96,416" fill="none" stroke="black"/>
              <path d="M 112,208 L 112,264" fill="none" stroke="black"/>
              <path d="M 112,280 L 112,304" fill="none" stroke="black"/>
              <path d="M 112,336 L 112,432" fill="none" stroke="black"/>
              <path d="M 136,48 L 136,80" fill="none" stroke="black"/>
              <path d="M 136,256 L 136,288" fill="none" stroke="black"/>
              <path d="M 152,192 L 152,248" fill="none" stroke="black"/>
              <path d="M 192,96 L 192,248" fill="none" stroke="black"/>
              <path d="M 232,48 L 232,80" fill="none" stroke="black"/>
              <path d="M 280,48 L 280,64" fill="none" stroke="black"/>
              <path d="M 320,80 L 320,248" fill="none" stroke="black"/>
              <path d="M 344,256 L 344,288" fill="none" stroke="black"/>
              <path d="M 368,48 L 368,64" fill="none" stroke="black"/>
              <path d="M 368,384 L 368,416" fill="none" stroke="black"/>
              <path d="M 400,288 L 400,376" fill="none" stroke="black"/>
              <path d="M 416,48 L 416,64" fill="none" stroke="black"/>
              <path d="M 464,80 L 464,376" fill="none" stroke="black"/>
              <path d="M 496,384 L 496,416" fill="none" stroke="black"/>
              <path d="M 520,208 L 520,432" fill="none" stroke="black"/>
              <path d="M 544,48 L 544,64" fill="none" stroke="black"/>
              <path d="M 32,32 L 88,32" fill="none" stroke="black"/>
              <path d="M 152,32 L 216,32" fill="none" stroke="black"/>
              <path d="M 296,32 L 352,32" fill="none" stroke="black"/>
              <path d="M 432,32 L 528,32" fill="none" stroke="black"/>
              <path d="M 32,64 L 88,64" fill="none" stroke="black"/>
              <path d="M 296,80 L 352,80" fill="none" stroke="black"/>
              <path d="M 432,80 L 528,80" fill="none" stroke="black"/>
              <path d="M 152,96 L 216,96" fill="none" stroke="black"/>
              <path d="M 56,176 L 136,176" fill="none" stroke="black"/>
              <path d="M 112,208 L 144,208" fill="none" stroke="black"/>
              <path d="M 160,208 L 184,208" fill="none" stroke="black"/>
              <path d="M 200,208 L 312,208" fill="none" stroke="black"/>
              <path d="M 328,208 L 456,208" fill="none" stroke="black"/>
              <path d="M 472,208 L 520,208" fill="none" stroke="black"/>
              <path d="M 136,256 L 344,256" fill="none" stroke="black"/>
              <path d="M 72,272 L 128,272" fill="none" stroke="black"/>
              <path d="M 344,272 L 384,272" fill="none" stroke="black"/>
              <path d="M 136,288 L 344,288" fill="none" stroke="black"/>
              <path d="M 8,384 L 96,384" fill="none" stroke="black"/>
              <path d="M 368,384 L 496,384" fill="none" stroke="black"/>
              <path d="M 8,416 L 96,416" fill="none" stroke="black"/>
              <path d="M 368,416 L 496,416" fill="none" stroke="black"/>
              <path d="M 112,432 L 520,432" fill="none" stroke="black"/>
              <path d="M 32,32 C 23.16936,32 16,39.16936 16,48" fill="none" stroke="black"/>
              <path d="M 88,32 C 96.83064,32 104,39.16936 104,48" fill="none" stroke="black"/>
              <path d="M 152,32 C 143.16936,32 136,39.16936 136,48" fill="none" stroke="black"/>
              <path d="M 216,32 C 224.83064,32 232,39.16936 232,48" fill="none" stroke="black"/>
              <path d="M 296,32 C 287.16936,32 280,39.16936 280,48" fill="none" stroke="black"/>
              <path d="M 352,32 C 360.83064,32 368,39.16936 368,48" fill="none" stroke="black"/>
              <path d="M 432,32 C 423.16936,32 416,39.16936 416,48" fill="none" stroke="black"/>
              <path d="M 528,32 C 536.83064,32 544,39.16936 544,48" fill="none" stroke="black"/>
              <path d="M 32,64 C 23.16936,64 16,56.83064 16,48" fill="none" stroke="black"/>
              <path d="M 88,64 C 96.83064,64 104,56.83064 104,48" fill="none" stroke="black"/>
              <path d="M 296,80 C 287.16936,80 280,72.83064 280,64" fill="none" stroke="black"/>
              <path d="M 352,80 C 360.83064,80 368,72.83064 368,64" fill="none" stroke="black"/>
              <path d="M 432,80 C 423.16936,80 416,72.83064 416,64" fill="none" stroke="black"/>
              <path d="M 528,80 C 536.83064,80 544,72.83064 544,64" fill="none" stroke="black"/>
              <path d="M 152,96 C 143.16936,96 136,88.83064 136,80" fill="none" stroke="black"/>
              <path d="M 216,96 C 224.83064,96 232,88.83064 232,80" fill="none" stroke="black"/>
              <path d="M 56,176 C 47.16936,176 40,168.83064 40,160" fill="none" stroke="black"/>
              <path d="M 136,176 C 144.83064,176 152,183.16936 152,192" fill="none" stroke="black"/>
              <path d="M 72,272 C 63.16936,272 56,279.16936 56,288" fill="none" stroke="black"/>
              <path d="M 384,272 C 392.83064,272 400,279.16936 400,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="472,376 460,370.4 460,381.6 " fill="black" transform="rotate(90,464,376)"/>
              <polygon class="arrowhead" points="408,376 396,370.4 396,381.6 " fill="black" transform="rotate(90,400,376)"/>
              <polygon class="arrowhead" points="328,248 316,242.4 316,253.6 " fill="black" transform="rotate(90,320,248)"/>
              <polygon class="arrowhead" points="200,248 188,242.4 188,253.6 " fill="black" transform="rotate(90,192,248)"/>
              <polygon class="arrowhead" points="160,248 148,242.4 148,253.6 " fill="black" transform="rotate(90,152,248)"/>
              <polygon class="arrowhead" points="136,272 124,266.4 124,277.6 " fill="black" transform="rotate(0,128,272)"/>
              <g class="text">
                <text x="60" y="52">Endorser</text>
                <text x="184" y="52">Reference</text>
                <text x="324" y="52">Verifier</text>
                <text x="456" y="52">Relying</text>
                <text x="512" y="52">Party</text>
                <text x="168" y="68">Value</text>
                <text x="312" y="68">Owner</text>
                <text x="448" y="68">Owner</text>
                <text x="180" y="84">Provider</text>
                <text x="100" y="132">Endorsements</text>
                <text x="240" y="132">Reference</text>
                <text x="368" y="132">Appraisal</text>
                <text x="512" y="132">Appraisal</text>
                <text x="228" y="148">Values</text>
                <text x="356" y="148">Policy</text>
                <text x="400" y="148">for</text>
                <text x="500" y="148">Policy</text>
                <text x="544" y="148">for</text>
                <text x="364" y="164">Evidence</text>
                <text x="520" y="164">Attestation</text>
                <text x="504" y="180">Results</text>
                <text x="244" y="276">Verifier</text>
                <text x="108" y="324">Evidence</text>
                <text x="344" y="324">Attestation</text>
                <text x="328" y="340">Results</text>
                <text x="52" y="404">Attester</text>
                <text x="408" y="404">Relying</text>
                <text x="464" y="404">Party</text>
                <text x="160" y="420">DAA</text>
                <text x="204" y="420">Issuer</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
    .--------.     .---------.       .--------.       .-------------.
   | Endorser |   | Reference |     | Verifier |     | Relying Party |
    '-+------'    | Value     |     | Owner    |     | Owner         |
      |           | Provider  |      '---+----'       '----+--------'
      |            '-----+---'           |                 |
      |                  |               |                 |
      | Endorsements     | Reference     | Appraisal       | Appraisal
      |                  | Values        | Policy for      | Policy for
      |                  |               | Evidence        | Attestation
       '-----------.     |               |                 | Results
                    |    |               |                 |
               .----|----|---------------|-----------------|------.
               |    |    |               |                 |      |
               |    v    v               v                 |      |
               |  .-------------------------.              |      |
         .------->|         Verifier        +-----.        |      |
        |      |  '-------------------------'      |       |      |
        |      |                                   |       |      |
        |  Evidence                    Attestation |       |      |
        |      |                       Results     |       |      |
        |      |                                   |       |      |
        |      |                                   v       v      |
  .-----+----. |                               .---------------.  |
  | Attester | |                               | Relying Party |  |
  '----------' |    DAA Issuer                 '---------------'  |
               '--------------------------------------------------'
]]></artwork>
        </artset>
      </figure>
      <t>The Join Protocol is essentially an enrollment protocol that consumes Evidence from the Attester (therefore the mapping to the Verifier role). Corresponding Appraisal Policies for Evidence specific to the Join Protocol are used to produce Attestation Results to decide whether to issue a DAA credential to an Attester or not (therefore the mapping to the Relying Party role).</t>
      <t>In the DAA-Signing Protocol, the RATS role Endorser is then taken on by the DAA Issuer protocol entity. The mapping is illustrated in Figure <xref target="sign-mapping"/>.</t>
      <figure anchor="sign-mapping">
        <name>RATS Architecture for the DAA-Signing Protocol</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="432" width="584" viewBox="0 0 584 432" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
              <path d="M 32,384 L 32,416" fill="none" stroke="black"/>
              <path d="M 56,96 L 56,192" fill="none" stroke="black"/>
              <path d="M 80,288 L 80,384" fill="none" stroke="black"/>
              <path d="M 120,384 L 120,416" fill="none" stroke="black"/>
              <path d="M 136,32 L 136,128" fill="none" stroke="black"/>
              <path d="M 152,80 L 152,112" fill="none" stroke="black"/>
              <path d="M 152,256 L 152,288" fill="none" stroke="black"/>
              <path d="M 168,224 L 168,248" fill="none" stroke="black"/>
              <path d="M 208,128 L 208,248" fill="none" stroke="black"/>
              <path d="M 248,80 L 248,112" fill="none" stroke="black"/>
              <path d="M 296,80 L 296,96" fill="none" stroke="black"/>
              <path d="M 336,112 L 336,248" fill="none" stroke="black"/>
              <path d="M 360,256 L 360,288" fill="none" stroke="black"/>
              <path d="M 384,80 L 384,96" fill="none" stroke="black"/>
              <path d="M 384,384 L 384,416" fill="none" stroke="black"/>
              <path d="M 416,288 L 416,376" fill="none" stroke="black"/>
              <path d="M 432,80 L 432,96" fill="none" stroke="black"/>
              <path d="M 480,112 L 480,376" fill="none" stroke="black"/>
              <path d="M 512,384 L 512,416" fill="none" stroke="black"/>
              <path d="M 560,80 L 560,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 136,32" fill="none" stroke="black"/>
              <path d="M 48,64 L 104,64" fill="none" stroke="black"/>
              <path d="M 168,64 L 232,64" fill="none" stroke="black"/>
              <path d="M 312,64 L 368,64" fill="none" stroke="black"/>
              <path d="M 448,64 L 544,64" fill="none" stroke="black"/>
              <path d="M 48,96 L 104,96" fill="none" stroke="black"/>
              <path d="M 312,112 L 368,112" fill="none" stroke="black"/>
              <path d="M 448,112 L 544,112" fill="none" stroke="black"/>
              <path d="M 8,128 L 48,128" fill="none" stroke="black"/>
              <path d="M 64,128 L 136,128" fill="none" stroke="black"/>
              <path d="M 168,128 L 232,128" fill="none" stroke="black"/>
              <path d="M 72,208 L 152,208" fill="none" stroke="black"/>
              <path d="M 152,256 L 360,256" fill="none" stroke="black"/>
              <path d="M 96,272 L 144,272" fill="none" stroke="black"/>
              <path d="M 360,272 L 400,272" fill="none" stroke="black"/>
              <path d="M 152,288 L 360,288" fill="none" stroke="black"/>
              <path d="M 32,384 L 120,384" fill="none" stroke="black"/>
              <path d="M 384,384 L 512,384" fill="none" stroke="black"/>
              <path d="M 32,416 L 120,416" fill="none" stroke="black"/>
              <path d="M 384,416 L 512,416" fill="none" stroke="black"/>
              <path d="M 48,64 C 39.16936,64 32,71.16936 32,80" fill="none" stroke="black"/>
              <path d="M 104,64 C 112.83064,64 120,71.16936 120,80" fill="none" stroke="black"/>
              <path d="M 168,64 C 159.16936,64 152,71.16936 152,80" fill="none" stroke="black"/>
              <path d="M 232,64 C 240.83064,64 248,71.16936 248,80" fill="none" stroke="black"/>
              <path d="M 312,64 C 303.16936,64 296,71.16936 296,80" fill="none" stroke="black"/>
              <path d="M 368,64 C 376.83064,64 384,71.16936 384,80" fill="none" stroke="black"/>
              <path d="M 448,64 C 439.16936,64 432,71.16936 432,80" fill="none" stroke="black"/>
              <path d="M 544,64 C 552.83064,64 560,71.16936 560,80" fill="none" stroke="black"/>
              <path d="M 48,96 C 39.16936,96 32,88.83064 32,80" fill="none" stroke="black"/>
              <path d="M 104,96 C 112.83064,96 120,88.83064 120,80" fill="none" stroke="black"/>
              <path d="M 312,112 C 303.16936,112 296,104.83064 296,96" fill="none" stroke="black"/>
              <path d="M 368,112 C 376.83064,112 384,104.83064 384,96" fill="none" stroke="black"/>
              <path d="M 448,112 C 439.16936,112 432,104.83064 432,96" fill="none" stroke="black"/>
              <path d="M 544,112 C 552.83064,112 560,104.83064 560,96" fill="none" stroke="black"/>
              <path d="M 168,128 C 159.16936,128 152,120.83064 152,112" fill="none" stroke="black"/>
              <path d="M 232,128 C 240.83064,128 248,120.83064 248,112" fill="none" stroke="black"/>
              <path d="M 72,208 C 63.16936,208 56,200.83064 56,192" fill="none" stroke="black"/>
              <path d="M 152,208 C 160.83064,208 168,215.16936 168,224" fill="none" stroke="black"/>
              <path d="M 96,272 C 87.16936,272 80,279.16936 80,288" fill="none" stroke="black"/>
              <path d="M 400,272 C 408.83064,272 416,279.16936 416,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="488,376 476,370.4 476,381.6 " fill="black" transform="rotate(90,480,376)"/>
              <polygon class="arrowhead" points="424,376 412,370.4 412,381.6 " fill="black" transform="rotate(90,416,376)"/>
              <polygon class="arrowhead" points="344,248 332,242.4 332,253.6 " fill="black" transform="rotate(90,336,248)"/>
              <polygon class="arrowhead" points="216,248 204,242.4 204,253.6 " fill="black" transform="rotate(90,208,248)"/>
              <polygon class="arrowhead" points="176,248 164,242.4 164,253.6 " fill="black" transform="rotate(90,168,248)"/>
              <polygon class="arrowhead" points="152,272 140,266.4 140,277.6 " fill="black" transform="rotate(0,144,272)"/>
              <g class="text">
                <text x="32" y="52">DAA</text>
                <text x="76" y="52">Issuer</text>
                <text x="76" y="84">Endorser</text>
                <text x="200" y="84">Reference</text>
                <text x="340" y="84">Verifier</text>
                <text x="472" y="84">Relying</text>
                <text x="528" y="84">Party</text>
                <text x="184" y="100">Value</text>
                <text x="328" y="100">Owner</text>
                <text x="464" y="100">Owner</text>
                <text x="196" y="116">Provider</text>
                <text x="116" y="164">Endorsements</text>
                <text x="256" y="164">Reference</text>
                <text x="384" y="164">Appraisal</text>
                <text x="528" y="164">Appraisal</text>
                <text x="244" y="180">Values</text>
                <text x="372" y="180">Policy</text>
                <text x="416" y="180">for</text>
                <text x="516" y="180">Policy</text>
                <text x="560" y="180">for</text>
                <text x="380" y="196">Evidence</text>
                <text x="536" y="196">Attestation</text>
                <text x="520" y="212">Results</text>
                <text x="260" y="276">Verifier</text>
                <text x="124" y="324">Evidence</text>
                <text x="360" y="324">Attestation</text>
                <text x="344" y="340">Results</text>
                <text x="76" y="404">Attester</text>
                <text x="424" y="404">Relying</text>
                <text x="480" y="404">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
.---------------.
| DAA Issuer    |
|   .--------.  |  .---------.       .--------.       .-------------.
|  | Endorser | | | Reference |     | Verifier |     | Relying Party |
|   '-+------'  | | Value     |     | Owner    |     | Owner         |
|     |         | | Provider  |      '---+----'       '----+--------'
'-----|---------'  '-----+---'           |                 |
      |                  |               |                 |
      | Endorsements     | Reference     | Appraisal       | Appraisal
      |                  | Values        | Policy for      | Policy for
      |                  |               | Evidence        | Attestation
       '-----------.     |               |                 | Results
                    |    |               |                 |
                    v    v               v                 |
                  .-------------------------.              |
          .------>|         Verifier        +-----.        |
         |        '-------------------------'      |       |
         |                                         |       |
         | Evidence                    Attestation |       |
         |                             Results     |       |
         |                                         |       |
         |                                         v       v
   .-----+----.                                .---------------.
   | Attester |                                | Relying Party |
   '----------'                                '---------------'
]]></artwork>
        </artset>
      </figure>
      <t>The DAA Issuer acts as the Endorser for the Group Public Key that is used by the Verifier for the appraisal of evidence of anonymized Attesters that use the DAA credentials and associated key material to produce Evidence.</t>
      <t>In consequence, DAA provides a signature scheme that allows the privacy of users that are associated with an Attester (e.g., its owner) to be maintained.
Essentially, DAA can be seen as a group signature scheme with the feature that given a DAA signature no-one can find out who the signer is, i.e., the anonymity is not revocable.
To be able to sign anonymously, an Attester has to obtain a credential from a DAA Issuer.
The DAA Issuer uses a private/public key pair to generate credentials for a group of Attesters <!-- this could be phrased a bit confusing as below it is stated that the key-pair is used for a group of Attesters --> and makes the public key (in the form of a public key certificate) available to the Verifier in order to enable it to validate the Evidence received.</t>
      <t>In order to support these DAA signatures, the DAA Issuer <bcp14>MUST</bcp14> associate a single key pair with a group of Attesters <!-- is it clear enough what exactly "a group of Attesters" means? --> and use the same key pair when creating the credentials for all of the Attesters in this group.
The DAA Issuer's group public key certificate replaces the individual Attester Identity documents during authenticity validation as a part of the appraisal of Evidence conducted by a Verifier.
This is in contrast to intuition that there has to be a unique Attester Identity per device.</t>
      <t>For DAA, the role of the Endorser is essentially the same, but it now provides Endorsements to the DAA Issuer rather than directly to the Verifier. These Endorsements enable the Attester to obtain a credential from the DAA Issuer.</t>
    </section>
    <section anchor="daa-changes-to-the-rats-architecture">
      <name>DAA changes to the RATS Architecture</name>
      <t>In order to enable the use of DAA, a new conceptual message, the Credential Request, is defined and a new role, the DAA Issuer role, is added to the roles defined in the RATS Architecture.</t>
      <dl>
        <dt>Credential Request:</dt>
        <dd>
          <t>An Attester sends a Credential Request to the DAA Issuer to obtain a credential. This request contains information about the DAA key that the Attester will use to create evidence and, together with Attester endorsement information that is provided by the Endorser, to confirm that the request came from a valid Attester.</t>
        </dd>
        <dt>DAA Issuer:</dt>
        <dd>
          <t>A RATS role that offers zero-knowledge proofs based on public-key certificates used for a group of Attesters (Group Public Keys) <xref target="DAA"/>. How this group of Attesters is defined is not specified here, but the group must be large enough for the necessary anonymity to be assured.</t>
        </dd>
      </dl>
      <t>Effectively, these certificates share the semantics of Endorsements, with the following exceptions:</t>
      <ul spacing="normal">
        <li>Upon receiving a Credential Request from an Attester, the associated group private key is used by the DAA Issuer to provide the Attester with a credential that it can use to convince the Verifier that its Evidence is valid.
To keep their anonymity, the Attester randomizes this credential each time that it is used. Although the DAA Issuer knows the Attester Identity and can associate this with the credential issued, randomization ensures that the Attester's identity cannot be revealed to anyone, including the DAA Issuer.</li>
        <li>The Verifier can use the DAA Issuer's group public key certificate, together with the randomized credential from the Attester, to confirm that the Evidence comes from a valid Attester without revealing the Attester's identity.</li>
        <li>A credential is conveyed from a DAA Issuer to an Attester in combination with the conveyance of the group public key certificate from DAA Issuer to Verifier.</li>
      </ul>
    </section>
    <section anchor="additions-to-remote-attestation-principles">
      <name>Additions to Remote Attestation principles</name>
      <t>In order to ensure an appropriate conveyance of Evidence via interaction models in general, the following prerequisite considering Attester Identity <bcp14>MUST</bcp14> be in place to support the implementation of interaction models.
<!-- This is a weird MUST: It is not clear who MUST do what here. -->
      </t>
      <dl>
        <dt>Attestation Evidence Authenticity:</dt>
        <dd>
          <t>Attestation Evidence <bcp14>MUST</bcp14> be correct and authentic.</t>
        </dd>
        <dt/>
        <dd>
          <t>In order to provide proofs of authenticity, Attestation Evidence <bcp14>SHOULD</bcp14> be cryptographically associated with an identity document that is a randomized DAA credential.</t>
        </dd>
      </dl>
      <t>The following information elements define extensions for corresponding information elements defined in <xref target="I-D.ietf-rats-reference-interaction-models"/>, which are vital to all types of reference interaction models.
Varying from solution to solution, generic information elements can be either included in the scope of protocol messages (instantiating Conceptual Messages defined by the RATS architecture) or can be included in additional protocol parameters of protocols that facilitate the conveyance of RATS Conceptual Messages.
Ultimately, the following information elements are required by any kind of scalable remote attestation procedure using DAA with one of RATS's reference interaction models.</t>
      <dl>
        <dt>Attester Identity ('attesterIdentity'):</dt>
        <dd>
          <t><em>mandatory</em></t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, the Attester's identity is not revealed to the Verifier. The Attester is issued with a credential by the DAA Issuer that is randomized and then used to anonymously confirm the validity of their evidence.
The evidence is verified using the DAA Issuer's group public key.</t>
        </dd>
        <dt>Authentication Secret IDs ('authSecID'):</dt>
        <dd>
          <t><em>mandatory</em></t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, Authentication Secret IDs are represented by the DAA Issuer's group public key that <bcp14>MUST</bcp14> be used to create DAA credentials for the corresponding Authentication Secrets used to protect Evidence.</t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, an Authentication Secret ID does not identify a unique Attesting Environment but is associated with a group of Attesting Environments.
This is because an Attesting Environment should not be distinguishable and the DAA credential which represents the Attesting Environment is randomized each time it used.</t>
        </dd>
      </dl>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>As outlined above, for DAA to provide privacy for the Attester, the DAA group must be large enough to stop the Verifier identifying the Attester.</t>
      <t>Randomization of the DAA credential by the Attester means that collusion between the DAA Issuer and Verifier, will not give them any advantage when trying to identify the Attester.</t>
      <t>For DAA, the Attestation Evidence conveyed to the Verifier <bcp14>MUST</bcp14> not uniquely identify the Attester. If the Attestation Evidence is unique to an Attester other cryptographic techniques can be used, for example, property based attestation <xref target="PBA"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The anonymity property of DAA makes revocation difficult. Well known solutions include:</t>
      <ol spacing="normal" type="1">
        <li>Rogue Attester revocation -- if an Attester's private key is compromised and known by the Verifier then any DAA signature from that Attester can be revoked.</li>
        <li>EPID - Intel's Enhanced Privacy ID -- this requires the Attester to prove (as part of their Attestation) that their credential was not used to generate any signature in a signature revocation list.</li>
      </ol>
      <t>There are no other special security considerations for DAA over and above those specified in the RATS architecture document <xref target="I-D.ietf-rats-architecture"/>.</t>
    </section>
    <section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>The new DAA Issuer role can be implemented in a number of ways, for example:</t>
      <ol spacing="normal" type="1">
        <li>As a stand-alone service like a Certificate Authority, a Privacy CA.</li>
        <li>As a part of the Attester's manufacture. The Endorser and the DAA Issuer could be the same entity and the manufacturer would then provide a certificate for the group public key to the Verifier.</li>
      </ol>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <seriesInfo name="DOI" value="10.17487/RFC5280"/>
            <seriesInfo name="RFC" value="5280"/>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="DAA">
          <front>
            <title>Direct anonymous attestation</title>
            <seriesInfo name="DOI" value="10.1145/1030083.1030103"/>
            <seriesInfo name="Proceedings of the 11th ACM conference on Computer and communications" value="security"/>
            <author fullname="Ernie Brickell" initials="E." surname="Brickell">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Jan Camenisch" initials="J." surname="Camenisch">
              <organization>IBM Research</organization>
            </author>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization>HP Laboratories</organization>
            </author>
            <date month="October" year="2004"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-architecture">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-22"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="September" year="2022"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state.  This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.
              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-06"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="7" month="September" year="2022"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="PBA">
          <front>
            <title>Property-Based Attestation without a Trusted Third Party</title>
            <seriesInfo name="DOI" value="10.1007/978-3-540-85886-7_3"/>
            <seriesInfo name="Lecture Notes in Computer Science" value="pp. 31-46"/>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Hans Löhr" initials="H." surname="Löhr">
              <organization/>
            </author>
            <author fullname="Mark Manulis" initials="M." surname="Manulis">
              <organization/>
            </author>
            <author fullname="Ahmad-Reza Sadeghi" initials="A." surname="Sadeghi">
              <organization/>
            </author>
            <date month="September" year="2008"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
