| Internet-Draft | DRA | January 2026 |
| Wang, et al. | Expires 10 July 2026 | [Page] |
In many deployments, remote attestation is performed within separate administrative and trust domains. Each domain typically operates its own management plane and a Remote Attestation Service (RAS) to obtain verifier inputs (e.g., endorsement material and reference values) and produce attestation results. At scale, cross-domain scenarios face two recurring challenges: (1) enabling policy-controlled transparency so that verifiers or relying parties in one domain can discover and retrieve selected attestation artifacts from other domains; and (2) supporting many-to-many distribution and reuse of verifier inputs and verifier outputs without requiring point-to-point integrations.¶
This document describes Distributed Remote Attestation (DRA) patterns that use a shared publication channel for selected artifacts with provenance and access control in mind. A Distributed Ledger (DL) is discussed as one concrete instantiation of such a publication channel, including an option to host verification logic on the DL. The described patterns are intended to complement existing RATS procedures and conceptual messages, and can be realized by other tamper-evident publication channels with comparable properties.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 10 July 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Remote attestation is increasingly deployed in federated and multi-operator environments where devices, services, and management systems span multiple administrative and trust domains. In practice, each trust domain often operates its own Remote Attestation Service (RAS) integrated into that domain's management plane, and exposes attestation capabilities and artifacts according to local policies.¶
Cross-domain deployments expose a gap that is not primarily about the attestation evidence format or the appraisal function itself, but about how attestation artifacts are discovered, distributed, and reused across domains at scale. Two pain points are repeatedly observed:¶
Cross-domain attestation transparency: A verifier or relying party in domain-A may need to obtain endorsement material, reference values, or attestation results that originate in domain-B. Direct point-to-point integration between operational sites does not scale, and is often infeasible due to operational domains and policy constraints. Deployments therefore need a policy-consensus controlled channel to publish and retrieve selected artifacts with clear provenance.¶
Many-to-many distribution and reuse of security artifacts: Verifiers appraising heterogeneous attesters need to obtain endorser public keys, endorsements, and reference values from multiple providers. Conversely, providers need to distribute artifacts to multiple verifiers across domains. Similar many-to-many scaling issues apply when attestation results are shared for reuse by other verifiers or relying parties. Without a shared publication channel, each integration becomes a bespoke, brittle dependency.¶
This document proposes a set of DRA patterns that make selected attestation artifacts more reusable across multiple verifiers and domains by introducing a shared publication channel. The publication channel is used to distribute: (a) verifier inputs such as endorser public keys, endorsements, and reference values; and (b) verifier outputs such as attestation results (or pointers/digests).¶
A Distributed Ledger (DL) is discussed as one concrete instantiation of the publication channel. DLs provide tamper-evidence and append-only provenance, and can be deployed in permissioned settings with authenticated writes and controlled reads. Where appropriate, a DL can additionally host verification logic (e.g., smart contracts) to record appraisal outcomes in a shared, auditable manner. The patterns in this document are not limited to DLs and can also be realized using other tamper-evident publication channels with comparable integrity and availability properties.¶
The rest of this document is organized as follows: Section 3 defines terminology and abbreviations; Section 4 specifies two DRA patterns (off-chain attestation/verification with on-channel publication, and an option for on-channel verification); and Section 5 discusses freshness, access control, governance, and privacy considerations.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] .¶
This document uses roles and concepts defined by the RATS Architecture [RFC9334] (e.g., Attester, Verifier, Endorser, Reference Value Provider, and Relying Party).¶
This section describes two common patterns for using a DL-backed RAS as a publication channel for attestation artifacts. Both patterns assume that RVs and Endorser material (e.g., public keys and endorsement metadata) can be published to, and retrieved from, the DL under suitable access control policies.¶
+-------------------+ +-------------------+
| Reference | | Endorsers |
| value providers | | |
+-------------------+ +-------------------+
| |
| |
| (0) RV | (0)PK
| |
+--------v-------------------------------------------v-----------+
| |
| Distributed Ledger(Remote attestation service,RAS) |
| |
+-----------------------------------^----------------------------+
| | |
(3)RV,PK | | (5)AR |(6)AR
| | |
| | |
+----------------+ +--v-------------+ +-------v---+
| Attester | | Verifier | | Relying |
| (1) freshness |---------->| (4) AR | | party |
| proof | (2) AE | generation | | |
+----------------+ +----------------+ +-----------+
Figure 1 on-chain-based publication and off-chain-based attestation/verification
As shown in Figure 1, attestation evidence exchange and appraisal follow existing RATS flows, while the DL is used to publish and retrieve verifier inputs and verifier outputs:¶
+-------------------+ +-------------------+
| Reference | | Endorsers |
| value providers | | |
+-------------------+ +-------------------+
| |
| (0) RV | (0) PK(/endorsement)
| |
+--------v-------------------------------------------v-----------+
| |
| +----------------+ +----------------+ |
| | Registration | | Verification | |
| | smart | | smart | |
| | contract | | contract | |
| +----------------+ +----------------+ |
| |
| Distributed Ledger (Remote attestation service, RAS) |
| |
+-------------^--------------------------------------------------+
(2) AE | | (3) AR
| |
+---v----------+ +----v--------------+
| Attester | | Verifier/Relying |
| (1) PC | | party |
+--------------+ +-------------------+
Figure 2 on-chain-based publication/attestation/verification
As shown in Figure 2, it can be beneficial to verify and/or record appraisal outcomes in a shared, tamper-evident way. In this pattern, the DL is used for publication as in the previous pattern, and hosts verification logic (e.g., smart contracts) or record verifiers' appraisal outcomes.¶
For the DRA service, the blocks of the DL need to be generated at appropriate time intervals, such as every few seconds. The consensus rules trigger the new block generation process periodically through preset time parameters. Even if there is no transaction data within a specific period, nodes will still generate an empty block containing basic information like the hash of the previous block and timestamps according to established algorithms. This approach aims to maintain the continuity of the DL chain structure and the orderliness of timestamps, thereby ensuring the freshness and validity of PC.¶
Artifact Consumers evaluates whether retrieved artifacts are fresh enough for their own threat model and acceptable staleness window. When ARs are published for reuse, it is recommended that ARs include time-of-appraisal and a validity interval, so that downstream consumers can make an informed decision.¶
The publication channel enforces authorization for publication. Consumers validates provenance and integrity (e.g., signatures, trust anchors) for retrieved RVs, endorsement material, and ARs. Deployments further defines governance for artifact update/rollback and caching policies.¶
This document has no IANA considerations.¶
TODO¶