<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-labiod-rats-attester-groups-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Attester Groups">Attester Groups for Remote Attestation</title>
    <seriesInfo name="Internet-Draft" value="draft-labiod-rats-attester-groups-04"/>
    <author initials="H." surname="Labiod" fullname="Houda Labiod">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>houda.labiod@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Lamouchi" fullname="Amine Lamouchi">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>aminelamouchi@huawei-partners.com</email>
      </address>
    </author>
    <author initials="J." surname="Zhang" fullname="Jun Zhang">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>junzhang1@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Duda" fullname="Andrzej Duda">
      <organization>Grenoble INP - Ensimag, LIG Lab</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>Andrzej.Duda@imag.fr</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <date year="2026" month="January" day="05"/>
    <area>Security</area>
    <workgroup>RATS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 55?>

<t>This document proposes an extension to the Remote Attestation
Procedures architecture by introducing the
concept of Attester Groups. This extension aims to reduce computational
and communication overhead by enabling collective Evidence appraisal
of high number of homogeneous devices with similar characteristics, thereby improving the scalability
of attestation processes.</t>
    </abstract>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC9334"/> defines Attesters as entities comprising at least one Attesting Environment and one Target Environment
co-located in one entity. It also presents different ways to compose the Attesting and Target Environments,
such as Composite Devices and Layered Attesters. Layered Attester reflects a cascade of staged Environments. It
is more related to one device with different layers and there is a relationship between them.
However, mechanisms for efficiently managing multiple, independent Attesters are missing.
Assessing the trustworthiness of large numbers of independent devices individually can result in high conveyance and processing overhead.
This comes into effect particularly when these devices share identical hardware or firmware components, which can lead to redundancy between all individual remote attestation procedures.
One example would be a smart factory scenario where numerous sensors of the same model monitor different parts of the manufacturing process.
These sensors share identical hardware and firmware configurations.
This document proposes a model by which these separate sensors devices can be grouped into a single Attester Group and a shared remote attestation procedure can appraise their authenticity collectively rather than individually.
Direct Anonymous Attestation (DAA) <xref target="I-D.ietf-rats-daa"/> has a similar concept of using one unique ID for one group of Attesters, but its goal is to mitigate the issue of uniquely (re-)identifiable Attesting Environments, while scalability is the major concern in this document.</t>
    </section>
    <section anchor="terminology">
      <name> Terminology</name>
      <t>The following terms are imported from <xref target="RFC9334"/>: Attester, Composite Device, Evidence, Layered Attester, Verifier.</t>
      <t>Newly defined terms for this document:</t>
      <dl>
        <dt>Attester Group:</dt>
        <dd>
          <t>A role performed by a group of Attesters whose Evidence must be appraised in order to infer the extent to which the individual Attesters comprising the group are considered trustworthy.</t>
        </dd>
        <dt>group-id:</dt>
        <dd>
          <t>A new Attester Identity type (see <xref section="2.2.1." sectionFormat="of" target="I-D.ietf-rats-ar4si"/>).
It is a unique identifier assigned to each Attester Group, allowing the group to dynamically adjust its membership without redefining its fundamental identity.</t>
        </dd>
      </dl>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="attester-group-and-comparison-to-composite-devices">
      <name>Attester Group and Comparison to Composite Devices</name>
      <t>We should be able to leverage the similarities between Attesters to avoid redundant attestations.
An Attester Group is by definition a dynamic entity.
Attesters can join or leave the group, in contrast to Composite Devices that have a static composition with a pre-defined set of Attesting Environments and fixed parameters.
The dynamic nature of an Attester Group allows for the flexibility to tailor group parameters.
This kind of flexibility facilitates the implementation of various group attestation schemes that can optimize the resources required to conduct remote attestation procedures for large device groups.
 A composite device is an entity composed of
multiple sub entities. Each sub entity is an Attester. In a composite device we can have multiple Attesters with a Lead
Attester. The Attesters are appraised via the main Lead Attester's help.
The lead Attester generates Evidence about the layout of the whole composite device, while sub-Attesters generate Evidence about their respective (sub-)modules.
Composite device model is not enough flexible to  represent our definition of Attester Group where we do need a leader Attester nor a composition of evidences of the Attesters.</t>
      <t>The table below summarizes the key differences between the Group Attester concept and the Composite Device concept.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Composite Device</th>
            <th align="left">Attester Group</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Lead Attester</td>
            <td align="left">No Lead Attester</td>
          </tr>
          <tr>
            <td align="left">The Composite Device is identifiable by the Lead Attester</td>
            <td align="left">The Attester Group is identifiable by a group-id a unique identifier</td>
          </tr>
          <tr>
            <td align="left">Composition of Evidence of sub-modules (Attesters)</td>
            <td align="left">No composition</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="attester-group-extension">
      <name>Attester Group Extension</name>
      <t>In Section 3 (Architectural Overview) of <xref target="RFC9334"/>: we could add a subsection 3.4 titled "Attester Groups". In addition, in <xref section="2.2" sectionFormat="of" target="I-D.ietf-rats-ar4si"/> about Non-repudiable Identity,
we could add an Identity Type "group-id" (i.e add another row in the Table 1 in <xref target="I-D.ietf-rats-ar4si"/>).</t>
    </section>
    <section anchor="use-case-scenarios-with-a-large-scale-network">
      <name>Use Case Scenarios with a large scale network</name>
      <t>In this section, we provide three examples of applications where all devices are homogeneous with similar characteristics.</t>
      <t>Use Case 1: Remote maintenance in the aerospace domain</t>
      <t>Context: EU ASSURED H2020 Project.
Once an aircraft lands, there is the need for the physical presence of an engineer to go and connect to the "head unit" (in the cockpit) for extracting log data so as to check whether something needs to be checked/maintained.
We need attestation of all core PLCs and embedded systems responsible for the core functionalities of the aircraft. All attestation reports are remotely sent (in a secure manner) to the control station once landed. We can group the attested elements into different Attester Groups.</t>
      <t>Approach: We can consider an Attester Group of 1000 aircrafts (same manufacturing brand).</t>
      <t>Use Case 2: Automotive domain, a Vehicle with embedded Electronic Control Units (ECUs)</t>
      <t>Context: CONNECT EU H2020 project.
The automotive industry is moving to a more hierarchical in-vehicle architecture where ECUs are monitored by Zonal Controllers and these in turn communicate with the Vehicle Computer. This is, for instance, how kinematic data are extracted from the sensors all the way up to the vehicle computer to be encoded into a V2X message. This data need to be associated with Evidence on the integrity of the sensor as a data source and this is where group attestation is an interesting capability. The Attester Group can be formed for hierarchical-based attestation,
like Attester Group of all in-vehicle ECUs or attested group of vehicles within an intersection.</t>
      <t>Approach: we can consider an Attester Group of a fleet of 70000 vehicles (same brand). We can also consider an Attester Group of similar ECUs.</t>
      <t>Use Case 3: AI computing cluster</t>
      <t>Context: An AI computing cluster is a composite computing environment composed of a group of computing nodes/chips on which one or more computing tasks are executed.
A user or an application/large model provider needs to verify the integrity of the collected measurement/evidence information from the composite computing environment.</t>
      <t>Challenge: The cluster may contain heterogeneous trusted roots, and the composition may be dynamically updated. Repeated attestation is not efficient if done without context and can be very expensive.</t>
      <t>Approach: We can consider a large group of Attesters or a set of group Attesters. An Attester group that maps to the nodes of a cluster that executes a specific task may be dynamically created or dissolved according to the requirements of the computing task. One or more remote attestation server/Verifier appraise collected evidence/measurements for the entire composite computing environment. The intend of remote group attestation is to hide the complexity of that back-end computing node interaction from customers (the Relying Parties), while still being able to assess its trustworthiness. Generally, a master node in the group is responsible for communicating with the Verifiers (or indirectly with the customer if they triggered remote attestation as a Relying Party), responding to the remote attestation challenge request of the client, collecting evidence claims of all group nodes as a whole, and sending the evidence to the Verifier for appraisal.</t>
      <t>When all computing nodes/chips in a computing Attester group are provided by the same vendor or deployed by the same cloud vendor, using a unified and centralized dedicated hardware root of trust can be considered (e.g., hardware security chip, centralized hardware DIE, or BMC) to offload important security functions (secure storage, security monitoring, etc.) to this independent root of trust module. The trusted boot and other related evidence claims of the group are securely stored on that unified root of trust. During the remote attestation procedure, the master node of the group collects claims aggregated and signed already as evidence by the centralized module. If a single root of trust manages multiple chips, a single point of failure (such as malicious intrusion and system breakdown) of the root of trust affects the security of the entire Attester group managed by the root of trust. The unified trusted root should support distributed and pooled design. Multiple roots of trust may work together to enhance overall security and reliability.</t>
      <t>In heterogeneous interconnection scenarios where all computing nodes and chips in a computing cluster are provided by different vendors, it might not be possible to deploy a unified root of trust. During the group remote attestation procedure, the master node needs to communicate with each group node to collect its individual evidence claims. The node evidence is signed by the private attestation key of each node. The master node collects the information, packs the information, and sends it to the remote Verifier for appraisal.
The dynamicity of the computing attested group is reflected through the following aspects:
* Creation and dissolving of groups is dynamically triggered by the life cycle management of computing tasks the groups execute. The member scale, type, and quantity of evidence claims to be collected are dynamically generated and dynamically change. Before performing remote attestation, customers are required to dynamically obtain all related information through a management system interface. Based on this management information, a template-based remote attestation request message is defined and sent to the master node.
* According to the dynamic requirements of computing task functions, performance, and to the trustworthy state changes of member nodes, the overall state of the group (including the state change of each existing node, the exit of the existing node from the group, the addition of a new node to the group, the replacement of the existing node by the new node, etc.) is dynamic. These dynamic changes lead to the need for real-time dynamic update of group remote attestation. Incremental update should also be supported to reduce communication and computing load in large groups.
In the process of Attester group, the client can not only integrate the communication key negotiation with the master node, but also support the communication key negotiation with other nodes in the group. Therefore, the key negotiation material is required to be generated by the client and different nodes separately. In addition, each group node that need to communicate can calculate the session key for mutual communication, so as to implement the subsequent establishment of the security channel.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>[TBD]</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="15" month="August" year="2025"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-09"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-daa">
          <front>
            <title>Direct Anonymous Attestation for the Remote Attestation Procedures Architecture</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Christopher Newton" initials="C." surname="Newton">
              <organization>University of Surrey</organization>
            </author>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization>University of Surrey</organization>
            </author>
            <author fullname="Thanassis Giannetsos" initials="T." surname="Giannetsos">
              <organization>Ubitech</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <date day="3" month="September" year="2025"/>
            <abstract>
              <t>   This document maps the concept of Direct Anonymous Attestation (DAA)
   to the Remote Attestation Procedures (RATS) Architecture.  The
   protocol entity DAA Issuer is introduced and its mapping with
   existing RATS roles in DAA protocol steps is specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-daa-08"/>
        </reference>
      </references>
    </references>
    <?line 191?>

<section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>Details on creating and maintaining Attester Groups, choosing the number of Lead Attesters, and methods for evidence collection and signing are left to the implementer's discretion, allowing for tailored security measures.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
