<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rats-runtime-tpr-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title>Extending Trusted Path Routed: Issues in Runtime Trust Assessment and Monitoring</title>
    <seriesInfo name="Internet-Draft" value="draft-rats-runtime-tpr-00"/>
    <author initials="I." surname="Krontiris" fullname="Ioannis Krontiris">
      <organization>Ubitech Ltd.</organization>
      <address>
        <email>ikrontiris@ubitech.eu</email>
      </address>
    </author>
    <author initials="T." surname="Giannetsos" fullname="Thanassis Giannetsos">
      <organization>Ubitech Ltd.</organization>
      <address>
        <email>agiannetsos@ubitech.eu</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <abstract>
      <?line 22?>

<t>This document outlines architectural challenges and open issues in extending the Trusted Path Routing model to include runtime trust assessment and monitoring. It is intended as input to ongoing discussions within the RATS and Trusted Path Routing work.</t>
    </abstract>
  </front>
  <middle>
    <?line 27?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Trusted Path Routing (TPR) architecture ensures that only attested and trustworthy network devices are included in routing decisions. In this model, each forwarding element is evaluated by a Verifier prior to its inclusion in a trusted network domain. Evidence about the device's integrity is assessed to determine its eligibility for participation in the routing topology. While this enrollment-time verification establishes a baseline of trust, it does not account for the fact that a device's trustworthiness may change over time. If a device becomes misconfigured, compromised, or enters a degraded trust state after initial enrollment, this change should be reflected in the trusted path routing decisions. The TPR model, as currently defined, provides no mechanism to detect or respond to such changes. Extending it with a runtime trust assessment phase raises several open issues that we need to resolve.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="motivation-for-runtime-assessment-in-routing-environments">
        <name>Motivation for Runtime Assessment in Routing Environments</name>
        <t>Routing elements are admitted into a trusted network domain based on integrity evidence collected at enrollment time. However, operational state may change after admission, potentially impacting a device's trustworthiness. Without a runtime model, the Verifier cannot detect such changes or update routing decisions accordingly. This creates a need for mechanisms that enable continuous trust assessment and define how Verifiers or orchestrators interact with routing elements beyond initial attestation.</t>
      </section>
    </section>
    <section anchor="open-questions-for-runtime-trust-monitoring">
      <name>Open Questions for Runtime Trust Monitoring</name>
      <t>Existing attestation flows assume a relatively stable model in which the Verifier initiates evidence collection, evaluates it against a fixed set of reference values, and produces an Attestation Result. This model presumes a single moment of assessment, uniform evidence semantics, and a clear Verifier-Attester separation. Introducing runtime trust monitoring exposes a broader space of design questions that challenge these assumptions.</t>
      <section anchor="heterogeneous-and-weighted-evidence">
        <name>Heterogeneous and Weighted Evidence</name>
        <t>One unresolved issue concerns the nature and diversity of evidence during runtime. Devices may include multiple sources of evidence related to runtime state, including integrity monitors, process isolation mechanisms, or configuration compliance checkers. These sources may differ in reliability, frequency or precision. Therefore it cannot be assumed that all evidence is of equal weight. Some measurements may be conclusive, while others may be advisory or context-dependent. So we need to extend current attestation frameworks to represent or process such weighted, multi-source evidence over time.</t>
      </section>
      <section anchor="evidence-change-and-notification-models">
        <name>Evidence Change and Notification Models</name>
        <t>Dynamic trust monitoring also means that we need to address how changes in evidence during runtime should be handled. Devices may transition between trust-relevant states, and a model, where the Verifier initiates attestation on demand, offers no way to detect or respond to such transitions in a timely manner. A way forward is to define a mechanism for an Attester to track internal evidence changes, determine when a new trust assessment is needed and notify a Verifier accordingly. This also raises architectural questions about how notifications are structured and secured, and how Verifiers might subscribe to receive updates tied to evolving evidence. In scenarios such as Trusted Path Routing, the Verifier might even reside at the orchestration layer in order to receive notifications from multiple routers and dynamically recompute trusted forwarding paths when device trust conditions change.</t>
      </section>
      <section anchor="source-level-validation-and-binding">
        <name>Source-Level Validation and Binding</name>
        <t>We also need to define how a Verifier should validate the origin and binding of individual evidence components when they are collected from multiple sources within an Attester. Each evidence source may operate under different trust boundaries and may require individual validation with respect to its provenance, protection domain, and association with the Attester's identity. This creates a need for mechanisms that allow internal components to be explicitly and securely bound to the attestation process. In practice, this implies cryptographic binding between evidence sources and the attestation function, supported by key management and endorsement models that enable composability and structured verification.</t>
      </section>
    </section>
    <section anchor="next-steps">
      <name>Next Steps</name>
      <t>The challenges outlined in this document suggest that the current attestation architecture is insufficient to support systems where trust must be monitored and acted upon continuously. In particular, trusted path routing requires timely and granular insight into the operational state of forwarding elements, which cannot be achieved through static or one-time attestation flows. As a next step, the concepts discussed here should be developed further as an architectural extension to the existing Trusted Path Routing draft in order to cover runtime trust assessment. Advancing this work within the context of trusted path routing will also provide a concrete use case for addressing more general limitations in the RATS architecture.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="BCP" value="14"/>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="BCP" value="14"/>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAMCta2gAA41Z224cxxF9n6/oUC9JsLswEwFxCMM2JdEhEVKUScqCEeSh
d6Z3t8HZ7nF3z642hgH/Q57ylm/Jp/hLcqqq57IXOREEaOfWXZdTp061ptNp
sblQfyyKZFNtLtTZ1cdkXGXdUj2FNiZTqXc6rdSDb/H7Qt3E2JqorFMPrUt2
beQ1dRmjiXFtXFLaVerOO5t8wDJnReVLp9dYuwp6kaZBpzgN8vE0NWH62WdF
qdMF1lz4otBtWvlwUSj+M8XdiF1n6q/B45NgY36ilCx647VzNp547sPyQr2f
22TKlbpN1ax/Ytba1tjwufvm68bDVT+rzP6+TzP1F4v1TYr+cOOnlXY6Rmx9
4pX/ubde9h993cp7M9Pu7349U69seF75+h8He18b93z8jDf9JujWrfzCBPV4
83S47Qofzub5w6+tSYtZiRjoMhXFdDpVeh5T4KunFTxD6lrOKbJfW4fE61Cu
yNrUBl2rcqXr2rglPUDWfWOcsj1CTA+ltDLHcKIHa1+ZWiWP18u6rYzKwFCJ
UaX3UbXuUTVTNwk74TPaAqtq+t20idbybulp8crGskWGvItqa9MKJpEhD5dP
j7zcSYu2PjzPConG2lZVbYrihbpxKfiqLRMWo9h8wp3fPr17+N04RkYZF/FP
xM4aYXT1TumUDH9KNrCf2DOtdgpwoN1VZTa25FibLi4VxTPkXSpTWvYKUSCX
EAeO40QZDbgtfNjqwHE3teHg4Q2z0XWrads5TFDfmWAXFiBpgvWBM5Ci7EZL
03ZajMMXvWEeKHIzdbWxlXGlAVw8hRzhEJt/+flfkpNlsGlH20oGsQZ2qEwy
YQ0Y8V6mtks7tzW9CJNVo0OypW10yvvTsp3LyTe+9svdTH1Y2dqI08YFX9fk
4JQxs2GfSlkAIdbz2sYVBVLNdTQEYOUX4tUENsAfPHQe4CpLD+CxHbTtAiUg
GdNjz4ZkUS0g6npHJQD8K4/NFVmBnCz6r9TclH6NTdaAoncLuwQWqonCzSZ4
3KQL7AkXTIj82TJoSrfgHz4kRHmBp4iITRY1N3g9kTBkC+LKtzWyi6CZRQ30
CWjInS6PDWH1BIoYz+8eOhShlso2BOwAtFZmAWdhJgymtFPA1NrQpjauu7Qi
XHADOG+841zHFkgUy7DB0FQQdSpFuPrJSm9WSJYKGtGJKhoEFl6PqYUTszWA
peAK2/p6Y1C1L16o195tsAoXPRXYG7Lf8rUU7rPZUZFXUZ3dvX98OpvIv+rt
Pf9+uPr2/c3D1Rv6/Xh9eXvb/yjyG4/X9+9v3wy/hi9f39/dXb19Ix/jrtq7
VZzdXX6PJ2TV2f27p5v7t5e3Z5KjMddS2cOrueFKCk0wTBaxQPDLYOeS11ev
3/3n3+cv1Y8//ubhm9d/OD//808/5YvPz//0EhdbkL3sxrQjl4DDrtBNY3Tg
Gq9B4rqxSdeREw8UbR3aRKBw/v5vFJm/X6gv5mVz/vLLfIMc3rvZxWzvJsfs
+M7RxxLEE7dObNNHc+/+QaT37b38fu+6i/vo5hdfMTNMzz//6suCMXTnk90I
jRAjdEpnpHFI/+Q6unIbCx1Bt4Gw7m5mXiFxXa1tknpEYj/Fq0xSlKwRg5qO
aUvUvNQ0sD9QQKaca7+lOplQmQQ2HCUj5DHiKOERMoabIkraJyoVgABcvW5A
emT6r1Ee+BfVS6Q/FHBmDSKavquUEDfg1UwNYzIgnmibikw7YiLmYe5c9Y5Y
icgtGLxK1MjVTunoySczgXEgeooQzHGtb+Np8SBEpoDv3kw2xqNbG1I9UBbS
vEgACUuFw2zOzY4IruNiaeUccGIfdU8s9S04SvhnDB6RyYMuLoqrjzZKwIdV
1KL2W+6a4AKKsalxf2OQIO5nOdqEv+3KIqp7URezKFyHuOF0dxIgEgvrJSBH
UVIL+xGRjSZRc0TvQO3Tl/SyiUIgDYsfVnnqcmTtg4ltnXKqxDLQFdlOGYuU
SLJYJORilJGJap1FeNaDpRESFaEq85ZalTWRVOfcLz//U3aGn9FALEjUe2VG
gdxvKYNahBKFwBchEDz6K5YA2lkNgFTt0qkf+qQxpnphSwFGN+KENPyCtJlr
0jJ+aZwhwJHBH4xdrqhAO3VUFPfAW+tye6qkfRFOSxN4I7QwzSKR8Yk0h0hF
D6v6qFRtGHk2QzsTbUhl3WnmNXJgG0Q6+jbQw/ECjKDcJ3N4mBgm+XNuyj3f
5JhFbvclaRwL4yXZQ92xZun0jDwkRVNjpCHIrUz5DFdYV8TBKjK5sosFA5Xs
slrk30QtgkECXLmjhYEg4QNeAID0pINTxynznA3yiRUaWljvrRXnf2hRnFtO
yEw9eiIpo0mHSxWTJXPJBMndDYKxZVnpkZPQP9fVBt6HXfY2YZ6ZVqahgcPx
umMRIsNOJ5z2azpgaCOij6JWqES4IkIfZWbIbUbQRDI6lcANzo00pvSpXoe/
zgQPA96id/Ui+I5KEl3pzQ5zoy2PCwNtn9ScdseqSldVINOIMDvupqHuNDJH
8hPvYmqq9rEKfnWRZRheSVsDnmRjpsABeMllrdsXf24qWwLAp0huHGP8rYhA
SE8TxFimbmnjXxOog1UxTzxwBVy7ptk8zNQlL5EHKgIXr8Z9RI9EMPF8z4yG
pymaop+lm1AvHvhYIjkZDUMkzLi/bY8bF7akfORh0VFu96a344bJGc3ieX9Y
HyhOxjZKrBuhRbQKOmHLk6tsGU0pIwtd7PfONaEVcZyLKhVslwbllBs8wmVz
cWzAgEzEOQ48ucYSrRvjZ4Y/1OepofpAWciuUDtEIRGrkSCiN4Y+Tnio9U54
BuGRjHS27bu8wBg2ECj1ex7EiI+lZlgcBRrjGjzrpdtoyKapKkoW89QnaQRl
VBlbknXpHI9c1dNbuFCr73RtK7GY9nxleUoqig9GEtkV40i8jLKfa24ji5gc
BozVstpcViNGpF8IfbsHRbjkHRMiG0+jAUNg0Jr70emIPJ+ljBCPCY9OHoZe
LsxFhS+KlPog5UH4n4UrxwhAdBUwkA+Q6ANqBZZPPnqTN0OURJahjKmi86kF
TaZAEjbmtpVE72RVnQklRl/a0RIUqs56ObUgUkcz+v91J5CBdPQlPgqnTG8Q
HbUtLQ3RQyXhgn1mjliZPQ7LzYBroyERaskjHg4tdVdDZu2a5JdBN1B/fYI7
Rj2Iv8T0cJdF67IejG3TQNnLkRCNxaA9vTS9YkY/gxSQa+bjQ8ENh2Pu4eLi
wB3jsxhqVy/UW3RI9ZhMk+fw0dlhPl2sjmfh2C7xQj6LIU9O9de98zY+FIzt
Aptbxpnv/FRxh2yvY9dUpBcyCk3XEzPraUZ/27Cw6cYKoljKDJ9TtbXGuHXy
YCUDOHbNhBZExhx9QrYxgfEkyPV6NLGhXI+P8OIkC/6RCoLXZsMyCFsvV/w5
UEEzjTNyJHY0WqCnCag/Usc1jbAra9IGyM1HpliUYzQ09YroCraiFNpAKono
WruDFsMiiM8Ps3emm3FOHpfyfwjskXTJGudTR0MwvoJWKOVIGZnm6Xl0tJtV
Wn/Kd5iarYVYZGLNp1k0ZsB3OmJRLbRqSUdP3M5F/cgZNSJBSp88rC1Ged0r
huE8eYTBmZwez6EAiv8CiHpJNGEZAAA=

-->

</rfc>
