<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-labiod-rats-attester-groups-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Attester Groups">Attester Groups for Remote Attestation</title>
    <seriesInfo name="Internet-Draft" value="draft-labiod-rats-attester-groups-03"/>
    <author initials="H." surname="Labiod" fullname="Houda Labiod">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>houda.labiod@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Lamouchi" fullname="Amine Lamouchi">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>aminelamouchi@huawei-partners.com</email>
      </address>
    </author>
    <author initials="J." surname="Zhang" fullname="Jun Zhang">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>junzhang1@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Duda" fullname="Andrzej Duda">
      <organization>Grenoble INP - Ensimag, LIG Lab</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>Andrzej.Duda@imag.fr</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Security</area>
    <workgroup>RATS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 55?>

<t>This document proposes an extension to the Remote Attestation
Procedures architecture by introducing the
concept of Attester Groups. This extension aims to reduce computational
and communication overhead by enabling collective Evidence appraisal
of high number of homogeneous devices with similar characteristics, thereby improving the scalability
of attestation processes.</t>
    </abstract>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC9334"/> defines Attesters as entities comprising at least one Attesting Environment and one Target Environment
co-located in one entity. It also presents different ways to compose the Attesting and Target Environments,
such as Composite Devices and Layered Attesters. Layered Attester reflects a cascade of staged Environments. It
is more related to one device with different layers and there is a relationship between them.
However, mechanisms for efficiently managing multiple, independent Attesters are missing.
Assessing the trustworthiness of large numbers of independent devices individually can result in high conveyance and processing overhead.
This comes into effect particularly when these devices share identical hardware or firmware components, which can lead to redundancy between all individual remote attestation procedures.
One example would be a smart factory scenario where numerous sensors of the same model monitor different parts of the manufacturing process.
These sensors share identical hardware and firmware configurations.
This document proposes a model by which these separate sensors devices can be grouped into a single Attester Group and a shared remote attestation procedure can appraise their authenticity collectively rather than individually.
Direct Anonymous Attestation (DAA) <xref target="I-D.ietf-rats-daa"/> has a similar concept of using one unique ID for one group of Attesters, but its goal is to mitigate the issue of uniquely (re-)identifiable Attesting Environments, while scalability is the major concern in this document.</t>
    </section>
    <section anchor="terminology">
      <name>&nbsp;Terminology</name>
      <t>The following terms are imported from <xref target="RFC9334"/>: Attester, Composite Device, Evidence, Layered Attester, Verifier.</t>
      <t>Newly defined terms for this document:</t>
      <dl>
        <dt>Attester Group:</dt>
        <dd>
          <t>A role performed by a group of Attesters whose Evidence must be appraised in order to infer the extent to which the individual Attesters comprising the group are considered trustworthy.</t>
        </dd>
        <dt>group-id:</dt>
        <dd>
          <t>A new Attester Identity type (see <xref section="2.2.1." sectionFormat="of" target="I-D.ietf-rats-ar4si"/>).
It is a unique identifier assigned to each Attester Group, allowing the group to dynamically adjust its membership without redefining its fundamental identity.</t>
        </dd>
      </dl>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="attester-group-and-comparison-to-composite-devices">
      <name>Attester Group and Comparison to Composite Devices</name>
      <t>We should be able to leverage the similarities between Attesters to avoid redundant attestations.
An Attester Group is by definition a dynamic entity.
Attesters can join or leave the group, in contrast to Composite Devices that have a static composition with a pre-defined set of Attesting Environments and fixed parameters.
The dynamic nature of an Attester Group allows for the flexibility to tailor group parameters.
This kind of flexibility facilitates the implementation of various group attestation schemes that can optimize the resources required to conduct remote attestation procedures for large device groups.
 A composite device is an entity composed of
multiple sub entities. Each sub entity is an Attester. In a composite device we can have multiple Attesters with a Lead
Attester. The Attesters are appraised via the main Lead Attester's help.
The lead Attester generates Evidence about the layout of the whole composite device, while sub-Attesters generate Evidence about their respective (sub-)modules.
Composite device model is not enough flexible to  represent our definition of Attester Group where we do need a leader Attester nor a composition of evidences of the Attesters.</t>
      <t>The table below summarizes the key differences between the Group Attester concept and the Composite Device concept.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Composite Device</th>
            <th align="left">Attester Group</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Lead Attester</td>
            <td align="left">No Lead Attester</td>
          </tr>
          <tr>
            <td align="left">The Composite Device is identifiable by the Lead Attester</td>
            <td align="left">The Attester Group is identifiable by a group-id a unique identifier</td>
          </tr>
          <tr>
            <td align="left">Composition of Evidence of sub-modules (Attesters)</td>
            <td align="left">No composition</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="attester-group-extension">
      <name>Attester Group Extension</name>
      <t>In Section 3 (Architectural Overview) of <xref target="RFC9334"/>: we could add a subsection 3.4 titled "Attester Groups". In addition, in <xref section="2.2" sectionFormat="of" target="I-D.ietf-rats-ar4si"/> about Non-repudiable Identity,
we could add an Identity Type "group-id" (i.e add another row in the Table 1 in <xref target="I-D.ietf-rats-ar4si"/>).</t>
    </section>
    <section anchor="use-case-scenarios-with-a-large-scale-network">
      <name>Use Case Scenarios with a large scale network</name>
      <t>In this section, we provide three examples of applications where all devices are homogeneous with similar characteristics.</t>
      <t>Use Case 1: Remote maintenance in the aerospace domain</t>
      <t>Context: EU ASSURED H2020 Project.
Once an aircraft lands, there is the need for the physical presence of an engineer to go and connect to the "head unit" (in the cockpit) for extracting log data so as to check whether something needs to be checked/maintained.
We need attestation of all core PLCs and embedded systems responsible for the core functionalities of the aircraft. All attestation reports are remotely sent (in a secure manner) to the control station once landed. We can group the attested elements into different Attester Groups.</t>
      <t>Approach: We can consider an Attester Group of 1000 aircrafts (same manufacturing brand)</t>
      <t>Use Case 2: Automotive domain, a Vehicle with embedded Electronic Control Units (ECUs)</t>
      <t>Context: CONNECT EU H2020 project.
The automotive industry is moving to a more hierarchical in-vehicle architecture where ECUs are monitored by Zonal Controllers and these in turn communicate with the Vehicle Computer. This is, for instance, how kinematic data are extracted from the sensors all the way up to the vehicle computer to be encoded into a V2X message. This data need to be associated with Evidence on the integrity of the sensor as a data source and this is where group attestation is an interesting capability. The Attester Group can be formed for hierarchical-based attestation,
like Attester Group of all in-vehicle ECUs or attested group of vehicles within an intersection.</t>
      <t>Approach: we can consider an Attester Group of a fleet of 70000 vehicles (same brand). We can also consider an Attester Group of similar ECUs.</t>
      <t>Use Case 3: AI computing cluster</t>
      <t>Context: An AI computing cluster is a composite computing environment composed of a group of computing nodes/chips on which one ore more computing tasks are executed.
A user or an application/large model provider needs to verify the integrity of the collected measurement/evidence information from the composite computing environment.</t>
      <t>Challenge: The cluster may contain heterogeneous trusted roots, and the composition may be dynamically updated. Repeated attestation is not efficient if done without context and can be very expensive.</t>
      <t>Approach: We can consider a large group of Attesters or a set of group Attesters. An Attester group that maps to the nodes of a cluster that executes a specific task may be dynamically created or dissolved according to the requirements of the computing task. One ore more remote attestation server/Verifier appraise collected evidence/measurements for the entire composite computing environment. The intend of remote group attestation is to hide the complexity of that back-end computing node interaction from customers (the Relying Parties), while still being able to assess its trustworthiness. Generally, a master node in the group is responsible for communicating with the Verifiers (or indirectly with the customer if they triggered remote attestation as a Relying Party), responding to the remote attestation challenge request of the client, collecting evidence claims of all group nodes as a whole, and sending the evidence to the Verifier for appraisal.</t>
      <t>When all computing nodes/chips in a computing Attester group are provided by the same vendor or deployed by the same cloud vendor, using a unified and centralized dedicated hardware root of trust can be considered (e.g., hardware security chip, centralized hardware DIE, or BMC) to offload important security functions (secure storage, security monitoring, etc.) to this independent root of trust module. The trusted boot and other related evidence claims of the group are securely stored on that unified root of trust. During the remote attestation procedure, the master node of the group collects claims aggregated and signed already as evidence by the centralized module. If a single root of trust manages multiple chips, a single point of failure (such as malicious intrusion and system breakdown) of the root of trust affects the security of the entire Attester group managed by the root of trust. The unified trusted root should support distributed and pooled design. Multiple roots of trust may work together to enhance overall security and reliability.</t>
      <t>In heterogeneous interconnection scenarios where all computing nodes and chips in a computing cluster are provided by different vendors, it might not be possible to deploy a unified root of trust. During the group remote attestation procedure, the master node needs to communicate with each group node to collect its individual evidence claims. The node evidence is signed by the private attestation key of each node. The master node collects the information, packs the information, and sends it to the remote Verifier for appraisal.
The dynamicity of the computing attested group is reflected through the following aspects:
* Creation and dissolving of groups is dynamically triggered by the life cycle management of computing tasks the groups execute. The member scale, type, and quantity of evidence claims to be collected are dynamically generated and dynamically change. Before performing remote attestation, customers are required to dynamically obtain all related information through a management system interface. Based on this management information, a template-based remote attestation request message is defined and sent to the master node.
* According to the dynamic requirements of computing task functions, performance, and to the trustworthy state changes of member nodes, the overall state of the group (including the state change of each existing node, the exit of the existing node from the group, the addition of a new node to the group, the replacement of the existing node by the new node, etc.) is dynamic. These dynamic changes lead to the need for real-time dynamic update of group remote attestation. Incremental update should also be supported to reduce communication and computing load in large groups.
In the process of Attester group, the client can not only integrate the communication key negotiation with the master node, but also support the communication key negotiation with other nodes in the group. Therefore, the key negotiation material is required to be generated by the client and different nodes separately. In addition, each group node that need to communicate can calculate the session key for mutual communication, so as to implement the subsequent establishment of the security channel.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>[TBD]</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-08"/>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="6" month="February" year="2025"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-daa">
          <front>
            <title>Direct Anonymous Attestation for the Remote Attestation Procedures Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-daa-07"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Christopher Newton" initials="C." surname="Newton">
              <organization>University of Surrey</organization>
            </author>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization>University of Surrey</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document maps the concept of Direct Anonymous Attestation (DAA)
   to the Remote Attestation Procedures (RATS) Architecture.  The
   protocol entity DAA Issuer is introduced and its mapping with
   existing RATS roles in DAA protocol steps is specified.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 191?>

<section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>Details on creating and maintaining Attester Groups, choosing the number of Lead Attesters, and methods for evidence collection and signing are left to the implementer's discretion, allowing for tailored security measures.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
