<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-labiod-rats-attester-groups-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="Attester Groups">Attester Groups for Remote Attestation</title>
    <seriesInfo name="Internet-Draft" value="draft-labiod-rats-attester-groups-01"/>
    <author initials="H." surname="Labiod" fullname="Houda Labiod">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>houda.labiod@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Lamouchi" fullname="Amine Lamouchi">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
      </address>
    </author>
    <author initials="J." surname="Zhang" fullname="Jun Zhang">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>junzhang1@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Duda" fullname="Andrzej Duda">
      <organization>Grenoble INP - Ensimag, LIG Lab</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>Andrzej.Duda@imag.fr</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Security</area>
    <workgroup>RATS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 54?>

<t>This document proposes an extension to the Remote Attestation 
Procedures architecture as defined in <xref target="RFC9334"/> by introducing the 
concept of Attester Groups. This extension aims to reduce computational 
and communication overhead by enabling collective Evidence appraisal
of high number of homogeneous devices with similar characteristics, thereby improving the scalability 
of attestation processes.</t>
    </abstract>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC9334"/> defines Attesters as entities comprising at least one Attesting Environment and one Target Environment
co-located in one entity. It also presents different ways to compose the Attesting and Target Environemtns, 
such as Composite Devices and Layered Attesters. Layed Attester reflects a cascade of staged Environments. It
is more related to one device with different layers and there is a relationship between them. 
However, mechanisms for efficiently managing multiple, independent Attesters are missing.
Assessing the trustworthiness of large numbers of independent devices individually can result in high conveyance and processing overhead.
This comes into effect particularly when these devices share identical hardware or firmware components, which can lead to redundancy between all individual remote attestation procedures.
One example would be a smart factory scenario where numerous sensors of the same model monitor different parts of the manufacturing process.
These sensors share identical hardware and firmware configurations.
This document proposes a model by which these separate sensors devices can be grouped into a single Attester Group and a shared remote attestation procedure can appraise their authenticity collectively rather than individually.
Direct Anonymous Attestation (DAA) <xref target="I-D.ietf-rats-daa"/> has a similar concept of using one unique ID for one group of Attesters, but its goal is to mitigate the issue of uniquely (re-)identifiable Attesting Environments, while scalability is the major concern in this document.</t>
    </section>
    <section anchor="terminology">
      <name> Terminology</name>
      <t>The following terms are imported from <xref target="RFC9334"/>: Attester, Composite Device, Evidence, Layered Attester, Verifier.</t>
      <t>Newly defined terms for this document:</t>
      <dl>
        <dt>Attester Group:</dt>
        <dd>
          <t>A role performed by a group of Attesters whose Evidence must be appraised in order to infer the extent to which the individual Attesters comprising the group are considered trustworthy.</t>
        </dd>
        <dt>group-id:</dt>
        <dd>
          <t>A new Attester Identity type (see <xref section="2.2.1." sectionFormat="of" target="I-D.ietf-rats-ar4si"/>).
It is a unique identifier assigned to each Attester Group, allowing the group to dynamically adjust its membership without redefining its fundamental identity.</t>
        </dd>
      </dl>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="attester-group-and-comparison-to-composite-devices">
      <name>Attester Group and Comparison to Composite Devices</name>
      <t>We should be able to leverage the similarities between attesters to avoid redundant attestations.
An Attester Group is by definition a dynamic entity.
Attesters can join or leave the group, in contrast to Composite Devices that have a static composition with a pre-defined set of Attesting Environments and fixed parameters.
The dynamic nature of an Attester Group allows for the flexibility to tailor group parameters.
This kind of flexibility facilitates the implementation of various group attestation schemes that can optimize the resources required to conduct remote attestation procedures for large device groups.
 A composite device is an entity composed of
multiple sub entities. Each sub entity is an Attester. In a composite device we can have multiple Attesters with a Lead
Attester. The Attesters are appraised via the main Lead Attester's help. 
The lead Attester generates Evidence about the layout of the whole composite device, while sub-Attesters generate Evidence about their respective (sub-)modules. 
Composite device model is not enough flexible to  represent our definition of attester group where we do need a leader attester nor a composition of evidences of the attesters.</t>
      <t>The table below summarizes the key differences between the Group Attester concept and the Composite Device concept.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Composite Device</th>
            <th align="left">Attester Group</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Lead Attester</td>
            <td align="left">No Lead Attester</td>
          </tr>
          <tr>
            <td align="left">The Composite Device is identifiable by the Lead Attester</td>
            <td align="left">The Attester Group is identifiable by a group-id a unique identifier</td>
          </tr>
          <tr>
            <td align="left">Composition of Evidence of sub-modules (attesters)</td>
            <td align="left">No composition</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="attester-group-extension">
      <name>Attester Group Extension</name>
      <t>In Section 3 (Architectural Overview) of <xref target="RFC9334"/>: we could add a subsection 3.4 titled "Attester Groups". In addidion, Section 2.2 (Non-repudiable Identitythe) of the draft <xref target="I-D.ietf-rats-ar4si"/>, 
we could add an Identity Type "group-id" (i.e add another row in the Table 1 in <xref target="I-D.ietf-rats-ar4si"/>).</t>
    </section>
    <section anchor="use-case-scenarios-with-a-large-scale-network">
      <name>Use Case Scenarios with a large scale network</name>
      <t>In this section, we provide two examples of applications where all devices are homogeneous with similar characteristics.</t>
      <t>Use Case 1: Remote maintenance in the aerospace domain</t>
      <t>Context: EU ASSURED H2020 Project.<br/>
Once an aircraft lands, there is the need for the physical presence of an engineer to go and connect to the "head unit" (in the cockpit) for extracting log data so as to check whether something needs to be checked/maintained.
We need attestation of all core PLCs and embedded systems responsible for the core functionalities of the aircraft. All attestation reports are remotely sent (in a secure manner) to the control station once landed. We can group the attested elements into different attester groups.</t>
      <t>Approach: We can consider an attester group of 1000 aircrafts (same manufacturing brand)</t>
      <t>Use Case 2: Automotive domain, a Vehicle with embedded Electronic Control Units (ECUs)</t>
      <t>Context: CONNECT EU H2020 project.<br/>
The automotive industry is moving to a more hierarchical in-vehicle architecture where ECUs are monitored by Zonal Controllers and these in turn communicate with the Vehicle Computer. This is, for instance, how kinematic data are extracted from the sensors all the way up to the vehicle computer to be encoded into a V2X message. This data need to be associated with Evidence on the integrity of the sensor as a data source and this is where group attestation is an interesting capability. The attester group can be formed for hierarchical-based attestation,
like attester group of all in-vehicle ECUs or attested group of vehicles within an intersection.</t>
      <t>Approach: we can consider an attester group of a fleet of 70000 vehicles (same brand). We can also consider an attester group of similar ECUs.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="2" month="September" year="2024"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-07"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-daa">
          <front>
            <title>Direct Anonymous Attestation for the Remote Attestation Procedures Architecture</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Christopher Newton" initials="C." surname="Newton">
              <organization>University of Surrey</organization>
            </author>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization>University of Surrey</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="September" year="2024"/>
            <abstract>
              <t>   This document maps the concept of Direct Anonymous Attestation (DAA)
   to the Remote Attestation Procedures (RATS) Architecture.  The
   protocol entity DAA Issuer is introduced and its mapping with
   existing RATS roles in DAA protocol steps is specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-daa-06"/>
        </reference>
      </references>
    </references>
    <?line 169?>

<section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>Details on creating and maintaining Attester Groups, choosing the number of Lead Attesters, and methods for evidence collection and signing are left to the implementer's discretion, allowing for tailored security measures.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
