<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-msg-wrap-19" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="RATS CMW">RATS Conceptual Messages Wrapper (CMW)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-19"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization>Independent</organization>
      <address>
        <email>ned.smith.ietf@outlook.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="D." surname="Glaze" fullname="Dionna Glaze">
      <organization>Google LLC</organization>
      <address>
        <email>dionnaglaze@google.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="17"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>evidence</keyword>
    <keyword>attestation results</keyword>
    <keyword>endorsements</keyword>
    <keyword>reference values</keyword>
    <abstract>
      <?line 96?>

<t>The Conceptual Messages introduced by the RATS architecture (RFC9334) are protocol-agnostic data units that are conveyed between RATS roles during remote attestation procedures.
Conceptual Messages describe the meaning and function of such data units within RATS data flows without specifying a wire format, encoding, transport mechanism, or processing details.
The initial set of Conceptual Messages is defined in Section 8 of RFC9334 and includes Evidence, Attestation Results, Endorsements, Reference Values, and Appraisal Policies.</t>
      <t>This document introduces the Conceptual Message Wrapper (CMW) that provides a common structure to encapsulate these messages.
It defines a dedicated CBOR tag, corresponding JSON Web Token (JWT) and CBOR Web Token (CWT) claims, and an X.509 extension.</t>
      <t>This allows CMWs to be used in CBOR-based protocols, web APIs using JWTs and CWTs, and PKIX artifacts like X.509 certificates.
Additionally, the draft defines a media type and a CoAP content format to transport CMWs over protocols like HTTP, MIME, and CoAP.</t>
      <t>The goal is to improve the interoperability and flexibility of remote attestation protocols.
By introducing a shared message format like the CMW, we can consistently support different attestation message types, evolve message
serialization formats without breaking compatibility, and avoid having to redefine how messages are handled in each protocol.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap"/>.</t>
    </note>
  </front>
  <middle>
    <?line 112?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Conceptual Messages introduced by the Remote ATtestation procedureS (RATS) architecture <xref target="RFC9334"/> are protocol-agnostic data units that are conveyed between RATS roles during remote attestation procedures.
Conceptual Messages describe the meaning and function of such data units within RATS data flows without specifying a wire format, encoding, transport mechanism, or processing details.
The initial set of Conceptual Messages is defined in <xref section="8" sectionFormat="of" target="RFC9334"/> and includes Evidence, Attestation Results, Endorsements, Reference Values, and Appraisal Policies.</t>
      <t>Each conceptual message can have multiple claims encoding and serialization
formats (<xref section="9" sectionFormat="of" target="RFC9334"/>). Throughout their lifetime, RATS
conceptual messages are typically transported over different protocols.
For example,</t>
      <ul spacing="normal">
        <li>
          <t>In a "background check" topology, Evidence (e.g., EAT <xref target="RFC9711"/>) first flows from
the Attester to the Relying Party and then from the Relying Party to the Verifier,
each leg following a separate protocol path.</t>
        </li>
        <li>
          <t>In a "passport" topology, an attestation result payload (e.g., Attestation Results for Secure Interactions (AR4SI) <xref target="I-D.ietf-rats-ar4si"/>)
is initially sent from the Verifier to the Attester, and later,
via a different channel, from the Attester to the Relying Party.</t>
        </li>
      </ul>
      <t>By using the CMW format outlined in this document, protocol designers can avoid the need
to update protocol specifications to accommodate different conceptual messages and
serialization formats used by various attestation technologies. This approach streamlines
the implementation process for developers, enabling easier support for diverse attestation
technologies. For instance, a Relying Party application implementer does not need to parse
attestation-related messages, such as Evidence from Attesters on IoT devices with Trusted
Platform Modules (TPM) or servers using confidential computing hardware like Intel Trust
Domain Extensions (TDX). Instead, they can leverage the CMW format, remaining agnostic
to the specific attestation technology.</t>
      <t>A further design goal is extensibility.
This means that adding support for new conceptual messages and new attestation technologies should not change the core of the processor, and that a CMW stack can be designed to offer a plug-in interface for both encoding and decoding.
To achieve this, the format must provide consistent message encapsulation and explicit typing.
These features allow for selecting the appropriate message handler based on its type identifier.
An opaque message can then be passed between the core and the handler.</t>
      <t>This document defines two encapsulation formats for RATS conceptual
messages that aim to achieve the goals stated above.</t>
      <t>These encapsulation formats have been specifically designed to possess the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>They are self-describing, which means that they can convey precise typing information without relying on the framing provided by the embedding protocol or the storage system.</t>
        </li>
        <li>
          <t>They are based on media types <xref target="RFC6838"/>, which allows the cost of their registration to be spread across numerous usage scenarios.</t>
        </li>
      </ul>
      <t>A protocol designer could use these formats, for example, to convey
Evidence, Endorsements and Reference Values in certificates and CRLs
extensions (<xref target="DICE-arch"/>), to embed Attestation Results or Evidence as
first-class authentication credentials in TLS handshake messages
<xref target="I-D.fossati-tls-attestation"/> <xref target="I-D.fossati-tls-exported-attestation"/>, to transport attestation-related payloads in RESTful APIs,
or for stable storage of Attestation Results in the form of file system
objects.</t>
      <t>This document also defines corresponding CBOR tag, JSON Web Tokens (JWT) and CBOR Web Tokens (CWT) claims, as well as an X.509 extension.
These allow embedding the wrapped conceptual messages into CBOR-based protocols, web APIs, and PKIX formats and protocols.
In addition, a Media Type and a CoAP Content-Format are defined for transporting CMWs in HTTP, MIME, CoAP and other Internet protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> is used to describe the
data formats.</t>
      <t>The reader is assumed to be familiar with the vocabulary and concepts
defined in <xref target="RFC9334"/>.</t>
      <t>This document reuses the terms defined in <xref section="2" sectionFormat="of" target="RFC9193"/>
(e.g., "Content-Type").</t>
    </section>
    <section anchor="conceptual-message-wrappers">
      <name>Conceptual Message Wrappers</name>
      <t>A RATS Conceptual Message Wrapper (CMW) has a tree structure.
Leaf nodes are of type "Record" (<xref target="type-n-val"/>), or "Tag" (<xref target="cbor-tag"/>).
Intermediate nodes are of type "Collection" (<xref target="cmw-coll"/>); they hold together multiple CMW items.</t>
      <t>The following snippet outlines the productions associated with the top-level types.</t>
      <sourcecode type="cddl"><![CDATA[
start = cmw

cmw = json-cmw / cbor-cmw

json-cmw = json-record / json-collection
cbor-cmw = cbor-record / cbor-collection / $cbor-tag
]]></sourcecode>
      <t>The complete CDDL can be found in <xref target="collected-cddl"/>.</t>
      <t><xref target="webtokens"/> and <xref target="x509"/> describe the transport of CMWs using CBOR and JSON Web Tokens and PKIX formats, including Certificate Signing Requests (CSRs), X.509 Certificates, and Certificate Revocation Lists (CRLs).</t>
      <t>This document only defines an encapsulation, not a security format.
It is the responsibility of the Attester to ensure that the CMW contents have the necessary security protection.
Security considerations are discussed in <xref target="seccons"/>.</t>
      <section anchor="type-n-val">
        <name>Record CMW</name>
        <t>The format of the Record CMW is shown in <xref target="fig-cddl-record"/>.
The JSON <xref target="STD90"/> and CBOR <xref target="STD94"/> representations are provided separately.
Both the <tt>json-record</tt> and <tt>cbor-record</tt> have the same fields except for slight differences in the types discussed below.</t>
        <figure anchor="fig-cddl-record">
          <name>CDDL definition of the Record CMW</name>
          <artwork type="cddl" align="left"><![CDATA[
json-record = [
  type: media-type
  value: base64url-string
  ? ind: uint .bits cm-type
]

cbor-record = [
  type: coap-content-format-type / media-type
  value: bytes
  ? ind: uint .bits cm-type
]
]]></artwork>
        </figure>
        <t>Each contains two or three members:</t>
        <dl newline="true">
          <dt><tt>type</tt>:</dt>
          <dd>
            <t>Either a text string representing a Content-Type (e.g., an EAT media type
<xref target="RFC9782"/>) or an unsigned integer corresponding to a CoAP Content-Format
ID (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
The latter is not used in the JSON serialization.</t>
          </dd>
          <dt><tt>value</tt>:</dt>
          <dd>
            <t>The RATS conceptual message serialized according to the
value defined in the type member.
When using JSON, the value field <bcp14>MUST</bcp14> be encoded as Base64 using the URL and
filename safe alphabet (<xref section="5" sectionFormat="of" target="RFC4648"/>) without padding.
This always applies, even if the conceptual message format is already textual (e.g., a JWT EAT).
When using CBOR, the value field <bcp14>MUST</bcp14> be encoded as a CBOR byte string.</t>
          </dd>
          <dt><tt>ind</tt>:</dt>
          <dd>
            <t>An optional bitmap with a maximum size of 4 bytes that indicates which conceptual message types are
carried in the <tt>value</tt> field.  Any combination (i.e., any value between
1 and 2<sup>32</sup>-1 included) is allowed.  Only five values are registered at the time of writing, so the acceptable values are currently limited to 1 to 31.  This is useful only if the <tt>type</tt> is
potentially ambiguous, and there is no further context available to the
CMW consumer to decide.  For example, this might be the case if the base
media type is not profiled (e.g., <tt>application/eat+cwt</tt>), if the <tt>value</tt>
field contains multiple conceptual messages with different types (e.g.,
both Reference Values and Endorsements within the same <tt>application/rim+cose</tt>), or if the same profile identifier is
shared by different conceptual messages.
The value <bcp14>MUST</bcp14> be non-zero. The absence of conceptual message indicator information is indicated by omitting the <tt>ind</tt> field entirely.
For further details, see <xref target="cm-type"/>.</t>
          </dd>
        </dl>
        <section anchor="cm-type">
          <name>CM Type</name>
          <t>The <tt>cm-type</tt> type is the control type for the <tt>ind</tt> field.
As such, it indicates which bits are allowed to be set in the <tt>ind</tt> byte string.</t>
          <figure anchor="fig-cddl-cm-type">
            <name>CDDL definition of the CM Type</name>
            <artwork type="cddl" align="left"><![CDATA[
cm-type = &(
  reference-values: 0
  endorsements: 1
  evidence: 2
  attestation-results: 3
  appraisal-policy: 4
)
]]></artwork>
          </figure>
          <t>The <tt>cm-type</tt> currently has five allowed values: Reference Values, Endorsements, Evidence, Attestation Results, and Appraisal Policy, as defined in <xref section="8" sectionFormat="of" target="RFC9334"/>.
Note that that an Appraisal Policy may refer to the appraisal of Evidence or Attestation Results, depending on whether the consumer of the conceptual message is a Verifier or a Relying Party.</t>
          <t>Future specifications that extend the RATS Conceptual Messages set can add new values to the <tt>cm-type</tt> using the process defined in <xref target="iana-ind-ext"/>.</t>
        </section>
      </section>
      <section anchor="cbor-tag">
        <name>Tag CMW</name>
        <t>Tag CMWs derive their tag numbers from a corresponding CoAP Content-Format ID using the <tt>TN()</tt> transform defined in <xref section="B" sectionFormat="of" target="RFC9277"/>.
Such CBOR tag numbers are in range [1668546817, 1668612095].</t>
        <t>The RATS conceptual message is first serialized according to the Content-Format ID and then encoded as a CBOR byte string, to which the TN-derived tag number is prepended.</t>
        <t>The Tag CMW is defined in <xref target="fig-cddl-cbor-tag"/> using two different macros.
One for CBOR-encoded types, the other for all other types.
Both macros take the CBOR tag number <tt>tn</tt> as a parameter.
The <tt>tag-cm-cbor</tt> macro takes the CDDL definition of the associated conceptual message <tt>fmt</tt> as a second parameter.</t>
        <figure anchor="fig-cddl-cbor-tag">
          <name>CDDL definition of the Tag CMW macros</name>
          <artwork type="cddl" align="left"><![CDATA[
tag-cm-cbor<tn, fmt> = #6.<tn>(bytes .cbor fmt)

tag-cm-data<tn> = #6.<tn>(bytes)
]]></artwork>
        </figure>
        <section anchor="how-to-plug-in-a-new-tag-cmw">
          <name>How To Plug in a New Tag CMW</name>
          <t>To plug a new Tag CMW into the CDDL defined in <xref target="collected-cddl"/>, the <tt>$cbor-tag</tt> type socket must be extended with a new instance of the Tag CMW macro (i.e., one of <tt>tag-cm-cbor</tt> or <tt>tag-cm-data</tt>).</t>
          <t>For instance, if a conceptual message of type <tt>my-evidence</tt> has a TN-derived CBOR tag <tt>1668576819</tt>, <tt>$cbor-tag</tt> would be extended as follows:</t>
          <sourcecode type="cddl"><![CDATA[
$cbor-tag /= tag-cm-cbor<1668576819, my-evidence>

my-evidence = {
  &(eat_nonce: 10) => bstr .size (8..64)
}
]]></sourcecode>
          <t>Instead, if a (non-CBOR) conceptual message has a TN-derived CBOR tag <tt>1668576935</tt>, <tt>$cbor-tag</tt> would be extended as follows:</t>
          <sourcecode type="cddl"><![CDATA[
$cbor-tag /= tag-cm-data<1668576935>
]]></sourcecode>
          <t>Note that since this specification defines no Tag CMW, the socket is currently empty.</t>
        </section>
      </section>
      <section anchor="cmw-coll">
        <name>Collection CMW</name>
        <t>Layered Attesters and composite devices (Sections <xref target="RFC9334" section="3.2" sectionFormat="bare"/> and <xref target="RFC9334" section="3.3" sectionFormat="bare"/> of <xref target="RFC9334"/>) generate Evidence that consists of multiple parts.
For example, in data center servers, it is not uncommon for separate attesting environments (AE) to serve a subsection of the entire machine.
One AE might measure and attest to what was booted on the main CPU, while another AE might measure and attest to what was booted on a SmartNIC plugged into a PCIe slot, and a third AE might measure and attest to what was booted on the machine's GPU.
To allow aggregation of multiple, potentially non-homogeneous evidence formats collected from different AEs, this document defines a Collection CMW as a container that holds several CMW items, each with a label that is unique within the scope of the Collection.</t>
        <t>Although originally designed to support layered Attester and composite device use cases, the Collection CMW can be adapted for other scenarios that require the aggregation of RATS conceptual messages.
For instance, Collections may be used to group Endorsements, Reference Values, Attestation Results, and more.
A single Collection CMW can contain a mix of different message types, and it can also be used to carry messages related to multiple devices simultaneously.</t>
        <t>The Collection CMW (<xref target="fig-cddl-collection"/>) is defined as a CBOR map or JSON object containing CMW values.
The position of a <tt>cmw</tt> entry in the <tt>cmw-collection</tt> is not significant.
Labels can be strings (or integers in the CBOR serialization) that serve as a mnemonic for different conceptual messages in the Collection.</t>
        <t>A Collection <bcp14>MUST</bcp14> have at least one CMW entry.</t>
        <t>The <tt>"__cmwc_t"</tt> key is reserved for associating an optional type with the overall Collection and <bcp14>MUST NOT</bcp14> be used for any purpose other than described here.</t>
        <t>The value of the <tt>"__cmwc_t"</tt> key is either a Uniform Resource Identifier (URI) or an object identifier (OID).
The OID is always absolute and never relative.
The URI <bcp14>MUST</bcp14> be in the absolute form (<xref section="4.3" sectionFormat="of" target="RFC3986"/>).</t>
        <t>The <tt>"__cmwc_t"</tt> key functions similar to an EAT profile claim (see <xref section="4.3.2" sectionFormat="of" target="RFC9711"/>), but at a higher level.
It can be used to indicate basics like CBOR serialization and COSE algorithms just as a profile in EAT does.
It provides a namespace in which the collection labels are interpreted.
At the higher level, it can be used to describe the allowed CMW collection assembly (this is somewhat parallel to the way EAT profiles indicate which claims are required and/or allowed).
For an example of a <tt>"__cmwc_t"</tt> that is defined for a bundle of endorsements and reference values, see <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-rats-corim"/>.</t>
        <t>Since the Collection CMW is recursive (a Collection CMW is itself a CMW), implementations <bcp14>MAY</bcp14> limit the allowed depth of nesting.</t>
        <figure anchor="fig-cddl-collection">
          <name>CDDL definition of the Collection CMW</name>
          <artwork type="cddl" align="left"><![CDATA[
json-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: text) => json-cmw
}

cbor-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: (int / text)) => cbor-cmw
}
]]></artwork>
        </figure>
      </section>
      <section anchor="demuxing">
        <name>Demuxing</name>
        <t>The split in the JSON/CBOR decoding path is expected to occur via the media type or content format (see <xref target="iana-mt"/> and <xref target="iana-cf"/>, respectively), or via the container context of the embedded CMW (see <xref target="iana-cwt"/> and <xref target="iana-jwt"/> for CWT/JWT, and <xref target="iana-smi"/> for X.509).</t>
        <t>The following pseudocode illustrates how a one-byte look-ahead is sufficient to determine how to decode the remaining byte buffer.</t>
        <artwork><![CDATA[
func CMWTypeDemux(b []byte) CMWType {
  if len(b) == 0 {
    return Unknown
  }

  switch b[0] {
  case 0x82: // 2-elements cbor-record (w/o ind field)
  case 0x83: // 3-elements cbor-record (w/ ind field)
  case 0x9f: // start of cbor-record using indefinite-length encoding
    return CBORRecord
  case 0xda: // tag-cm-cbor (CBOR Tag in the TN range)
    return CBORTag
  case 0x5b: // ASCII '[', start of json-record
    return JSONRecord
  case 0x7b: // ASCII '{', start of json-collection
    return JSONCollection
  case 0xa0..0xbb: // CBOR map start values, start of cbor-collection
  case 0xbf:       // ditto
    return CBORCollection
  }

  return Unknown
}
]]></artwork>
        <t>This code is provided for informational purposes only.
It is not expected that implementations will follow this demuxing strategy.</t>
      </section>
    </section>
    <section anchor="crypto">
      <name>Cryptographic Protection of CMWs</name>
      <t>This section highlights a number of mechanisms through which protocol designers can add data origin authentication, integrity and, if used with a challenge-response protocol, anti-replay protection when employing CMWs.
These properties must be evaluated carefully in the context of the overall security model of the protocol.</t>
      <section anchor="signed-cbor-cmw">
        <name>Signing CBOR CMW using COSE Sign1</name>
        <t>A CBOR CMW can be signed using COSE <xref target="STD96"/>.
A <tt>signed-cbor-cmw</tt> is a <tt>COSE_Sign1</tt> with the following layout:</t>
        <sourcecode type="cddl"><![CDATA[
signed-cbor-cmw = [
  protected: bytes .cbor signed-cbor-cmw-protected-hdr
  unprotected: signed-cbor-cmw-unprotected-hdr
  payload: bytes .cbor cbor-cmw
  signature: bytes
]
]]></sourcecode>
        <t>The payload <bcp14>MUST</bcp14> be the CBOR-encoded Tag, Record or Collection CMW.</t>
        <sourcecode type="cddl"><![CDATA[
signed-cbor-cmw-protected-hdr = {
  1 => int                            ; alg
  3 => "application/cmw+cbor" / 10000 ; cty
  * cose.label => cose.values
}

signed-cbor-cmw-unprotected-hdr = {
  * cose.label => cose.values
}

cose.label = int / text
cose.values = any

; Note: 10000 is a placeholder for the CoAP C-F codepoint corresponding
; to 'application/cmw+cbor'.  This CDDL fragment needs to be updated
; (and this note removed) once the relevant C-F codepoint has been
; assigned by IANA.
]]></sourcecode>
        <t>The protected header <bcp14>MUST</bcp14> include the signature algorithm identifier.
The protected header <bcp14>MUST</bcp14> include either the content type <tt>application/cmw+cbor</tt> or the CoAP Content-Format TBD1.
Other header parameters <bcp14>MAY</bcp14> be added to the header buckets, for example a <tt>kid</tt> that identifies the signing key.</t>
      </section>
      <section anchor="signed-json-cmw">
        <name>Signing JSON CMW using JWS</name>
        <t>A JSON CMW can be signed using JSON Web Signature (JWS) <xref target="RFC7515"/>.
A <tt>signed-json-cmw</tt> is a JWS object with the following layout:</t>
        <sourcecode type="cddl"><![CDATA[
signed-json-cmw = {
  "protected": text .b64u (text .json signed-json-cmw-protected-hdr)
  ? "header": text .b64u (text .json signed-json-cmw-unprotected-hdr)
  "payload": text .b64u (text .json json-cmw)
  "signature": text .b64u bytes
}
]]></sourcecode>
        <t>The payload <bcp14>MUST</bcp14> be the JSON-encoded Record or Collection CMW.</t>
        <sourcecode type="cddl"><![CDATA[
signed-json-cmw-protected-hdr = {
  "alg": text
  "cty": "application/cmw+json"
  * text => text
}

signed-json-cmw-unprotected-hdr = {
  * text => text
}
]]></sourcecode>
        <t>The protected header <bcp14>MUST</bcp14> include the signature algorithm identifier.
The protected header <bcp14>MUST</bcp14> include the content type <tt>application/cmw+json</tt>.
Other header parameters <bcp14>MAY</bcp14> be added to the header buckets, for example a <tt>kid</tt> that identifies the signing key.</t>
        <t>For clarity, the above uses the Flattened JSON Serialization (<xref section="7.2.2" sectionFormat="of" target="RFC7515"/>).
However, the Compact Serialization (<xref section="3.1" sectionFormat="of" target="RFC7515"/>) can also be used.</t>
      </section>
      <section anchor="webtokens">
        <name>Transporting CMW in COSE and JOSE Web Tokens</name>
        <t>To facilitate the embedding of CMWs in CBOR-based protocols and web APIs, this document defines two <tt>"cmw"</tt> claims for use with JSON Web Tokens (JWT) and CBOR Web Tokens (CWT).</t>
        <t>The definitions for these claims can be found in <xref target="iana-jwt"/> and <xref target="iana-cwt"/>, respectively.</t>
        <section anchor="encoding-requirements">
          <name>Encoding Requirements</name>
          <t>A Collection CMW carried in a <tt>"cmw"</tt> JWT claim <bcp14>MUST</bcp14> be a <tt>json-collection</tt>.
A Collection CMW carried in a <tt>"cmw"</tt> CWT claim <bcp14>MUST</bcp14> be a <tt>cbor-collection</tt>.</t>
          <t>A Record CMW carried in a <tt>"cmw"</tt> JWT claim <bcp14>MUST</bcp14> be a <tt>json-record</tt>.
A Record CMW carried in a <tt>"cmw"</tt> CWT claim <bcp14>MUST</bcp14> be a <tt>cbor-record</tt>.</t>
        </section>
      </section>
      <section anchor="x509">
        <name>Transporting CMW in PKIX Formats</name>
        <t>CMW may need to be transported in PKIX formats, such as Certificate Signing Requests (CSRs) or in X.509 Certificates and Certificate Revocation Lists (CRLs).</t>
        <t>The use of CMW in CSRs is documented in <xref target="I-D.ietf-lamps-csr-attestation"/>, while one of the possible applications in X.509 Certificates and CRLs is detailed in Section 6.1 of <xref target="DICE-arch"/>.</t>
        <t>This section outlines the CMW extension designed to carry CMW objects.
<xref target="privcons"/> discusses some privacy considerations related to the transport of CMW in X.509 formats.</t>
        <t>The CMW extension <bcp14>MAY</bcp14> be included in X.509 Certificates, CRLs <xref target="RFC5280"/>, and CSRs.</t>
        <t>The CMW extension <bcp14>MUST</bcp14> be identified by the following object identifier:</t>
        <sourcecode type="asn.1"><![CDATA[
id-pe-cmw  OBJECT IDENTIFIER ::=
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-pe(1) 35 }
]]></sourcecode>
        <t>This extension <bcp14>SHOULD NOT</bcp14> be marked critical.
In cases where the wrapped Conceptual Message is essential for granting resource access, and there is a risk that legacy relying parties would bypass crucial controls, it is acceptable to mark the extension as critical.</t>
        <t>The CMW extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <sourcecode type="asn.1"><![CDATA[
CMW ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING
}
]]></sourcecode>
        <t>The CMW <bcp14>MUST</bcp14> include the serialized CMW object in either JSON or CBOR format, utilizing the appropriate CHOICE entry.</t>
        <t>The DER-encoded CMW is the value of the OCTET STRING for the extnValue field of the extension.</t>
        <section anchor="asn1-x509">
          <name>ASN.1 Module</name>
          <t>This section provides an ASN.1 module <xref target="X.680"/> for the CMW extension, following the conventions established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
          <sourcecode type="asn.1"><![CDATA[
CMWExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-cmw-extn(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) } ;

-- CMW Extension

ext-CMW EXTENSION ::= {
  SYNTAX CMW
  IDENTIFIED BY id-pe-cmw }

-- CMW Extension OID

id-pe-cmw  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 35 }

-- CMW Extension Syntax

CMW ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING
}

END
]]></sourcecode>
        </section>
        <section anchor="compatibility-with-dice-conceptualmessagewrapper">
          <name>Compatibility with DICE <tt>ConceptualMessageWrapper</tt></name>
          <t>Section 6.1.8 of <xref target="DICE-arch"/> specifies the ConceptualMessageWrapper (CMW) format and its corresponding object identifier.
The CMW format outlined in <xref target="DICE-arch"/> permits only a subset of the CMW grammar defined in this document.
In particular, the Collection format cannot be encoded using DICE CMWs.</t>
        </section>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The (equivalent) examples in <xref target="ex-ja"/>, <xref target="ex-ca"/>, and <xref target="ex-ct"/> assume that
the Media-Type-Name <tt>application/vnd.example.rats-conceptual-msg</tt> has been
registered alongside a corresponding CoAP Content-Format ID <tt>30001</tt>.  The
CBOR tag <tt>1668576935</tt> is derived applying the <tt>TN()</tt> transform as described in
<xref target="cbor-tag"/>.</t>
      <t>All the examples focus on the wrapping aspects.
The wrapped messages are not instances of real Conceptual Messages.</t>
      <section anchor="ex-ja">
        <name>JSON-encoded Record</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  "I0faVQ"
]
]]></sourcecode>
      </section>
      <section anchor="ex-ca">
        <name>CBOR-encoded Record</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  30001,
  h'2347da55'
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
82             # array(2)
   19 7531     # unsigned(30001)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
        <t>Note that a Media-Type-Name can also be used with the CBOR-encoded Record form,
for example if it is known that the receiver cannot handle CoAP
Content-Formats, or (unlike the case in point) if a CoAP Content-Format
ID has not been registrered.</t>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  h'2347da55'
]
]]></sourcecode>
      </section>
      <section anchor="ex-ct">
        <name>CBOR-encoded Tag CMW</name>
        <sourcecode type="cbor-diag"><![CDATA[
1668576935(h'2347da55')
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
da 637476a7    # tag(1668576935)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
      </section>
      <section anchor="ex-ca-ind">
        <name>CBOR-encoded Record with explicit CM indicator</name>
        <t>This is an example of a signed CoRIM (Concise Reference Integrity Manifest) <xref target="I-D.ietf-rats-corim"/> with an explicit <tt>ind</tt> value of <tt>0b0000_0011</tt> (3), indicating that the wrapped message contains both Reference Values and Endorsements.</t>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/rim+cose",
  h'd28440a044d901f5a040',
  3
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

83                                      # array(3)
   74                                   # text(20)
      6170706c69636174696f6e2f72696d2b636f7365 # "application/rim+\
                                                                cose"
   4a                                   # bytes(10)
      d28440a044d901f5a040              # "҄@\xA0D\xD9\u0001\xF5\xA0\
                                                                   @"
   03                                   # unsigned(3)
]]></artwork>
      </section>
      <section anchor="cbor-encoded-collection">
        <name>CBOR-encoded Collection</name>
        <t>The following example is a CBOR-encoded Collection CMW that assembles conceptual messages from three attesters: Evidence for attesters A and B and Attestation Results for attester C.
It is given an explicit <tt>"__cmwc_t"</tt> using the URI form.</t>
        <artwork><![CDATA[
{
  "__cmwc_t": "tag:example.com,2024:composite-attester",
  / attester A / 0: [
    30001,
    h'2347da55',
    4
  ],
  / attester B / 1: 1668576935(h'2347da55'),
  / attester C / 2: [
    "application/eat+jwt",
    h'2e2e2e',
    8
  ]
}
]]></artwork>
      </section>
      <section anchor="json-encoded-collection">
        <name>JSON-encoded Collection</name>
        <t>The following example is a JSON-encoded Collection CMW that assembles Evidence from two attesters.</t>
        <artwork><![CDATA[
{
  "__cmwc_t": "tag:example.com,2024:another-composite-attester",
  "attester A": [
    "application/eat-ucs+json",
    "e30K",
    4
  ],
  "attester B": [
    "application/eat-ucs+cbor",
    "oA",
    4
  ]
}
]]></artwork>
      </section>
      <section anchor="use-in-jwt">
        <name>Use in JWT</name>
        <t>The following example shows the use of the <tt>"cmw"</tt> JWT claim to transport a Collection CMW in a JWT Claims Set <xref target="RFC7519"/>:</t>
        <artwork><![CDATA[
{
  "cmw": {
    "__cmwc_t": "tag:example.com,2024:another-composite-attester",
    "attester A": [
      "application/eat-ucs+json",
      "e30K",
      4
    ],
    "attester B": [
      "application/eat-ucs+cbor",
      "oA",
      4
    ]
  },
  "iss": "evidence collection daemon",
  "exp": 1300819380
}
]]></artwork>
      </section>
    </section>
    <section anchor="collected-cddl">
      <name>Collected CDDL</name>
      <sourcecode type="cddl"><![CDATA[
start = cmw

cmw = json-cmw / cbor-cmw

json-cmw = json-record / json-collection
cbor-cmw = cbor-record / cbor-collection / $cbor-tag

json-record = [
  type: media-type
  value: base64url-string
  ? ind: uint .bits cm-type
]

cbor-record = [
  type: coap-content-format-type / media-type
  value: bytes
  ? ind: uint .bits cm-type
]

tag-cm-cbor<tn, fmt> = #6.<tn>(bytes .cbor fmt)

tag-cm-data<tn> = #6.<tn>(bytes)

json-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: text) => json-cmw
}

cbor-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: (int / text)) => cbor-cmw
}

media-type = text .abnf ("Content-Type" .cat Content-Type-ABNF)
base64url-string = text .regexp "[A-Za-z0-9_-]+"

coap-content-format-type = uint .size 2

oid = text .regexp "([0-2])((\\.0)|(\\.[1-9][0-9]*))*"

cm-type = &(
  reference-values: 0
  endorsements: 1
  evidence: 2
  attestation-results: 3
  appraisal-policy: 4
)

Content-Type-ABNF = '

Content-Type   = Media-Type-Name *( *SP ";" *SP parameter )
parameter      = token "=" ( token / quoted-string )

token          = 1*tchar
tchar          = "!" / "#" / "$" / "%" / "&" / "\'" / "*"
               / "+" / "-" / "." / "^" / "_" / "`" / "|" / "~"
               / DIGIT / ALPHA
quoted-string  = %x22 *( qdtext / quoted-pair ) %x22
qdtext         = SP / %x21 / %x23-5B / %x5D-7E
quoted-pair    = "\\" ( SP / VCHAR )

Media-Type-Name = type-name "/" subtype-name

type-name = restricted-name
subtype-name = restricted-name

restricted-name = restricted-name-first *126restricted-name-chars
restricted-name-first  = ALPHA / DIGIT
restricted-name-chars  = ALPHA / DIGIT / "!" / "#" /
                         "$" / "&" / "-" / "^" / "_"
restricted-name-chars =/ "." ; Characters before first dot always
                             ; specify a facet name
restricted-name-chars =/ "+" ; Characters after last plus always
                             ; specify a structured syntax suffix

DIGIT     =  %x30-39           ; 0 - 9
POS-DIGIT =  %x31-39           ; 1 - 9
ALPHA     =  %x41-5A / %x61-7A ; A - Z / a - z
SP        =  %x20
VCHAR     =  %x21-7E           ; printable ASCII (no SP)
'

signed-cbor-cmw = [
  protected: bytes .cbor signed-cbor-cmw-protected-hdr
  unprotected: signed-cbor-cmw-unprotected-hdr
  payload: bytes .cbor cbor-cmw
  signature: bytes
]

signed-cbor-cmw-protected-hdr = {
  1 => int                            ; alg
  3 => "application/cmw+cbor" / 10000 ; cty
  * cose.label => cose.values
}

signed-cbor-cmw-unprotected-hdr = {
  * cose.label => cose.values
}

cose.label = int / text
cose.values = any


signed-json-cmw = {
  "protected": text .b64u (text .json signed-json-cmw-protected-hdr)
  ? "header": text .b64u (text .json signed-json-cmw-unprotected-hdr)
  "payload": text .b64u (text .json json-cmw)
  "signature": text .b64u bytes
}

signed-json-cmw-protected-hdr = {
  "alg": text
  "cty": "application/cmw+json"
  * text => text
}

signed-json-cmw-unprotected-hdr = {
  * text => text
}

]]></sourcecode>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><cref anchor="rfced">RFC Editor:</cref> Please remove the entire section before publication, as well as the reference to RFC 7942.</t>
      <t>This section records the status of known implementations of the protocol
defined by this specification at the time of posting of this Internet-Draft,
and is based on a proposal described in <xref target="RFC7942"/>.
The description of implementations in this section is intended to assist the
IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not
imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here
that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of
available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups to
assign due consideration to documents that have the benefit of running code,
which may serve as evidence of valuable experimentation and feedback that have
made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see
fit".</t>
      <section anchor="project-veraison">
        <name>Project Veraison</name>
        <t>The organization responsible for these implementations is Project Veraison, a
Linux Foundation project hosted at the Confidential Computing Consortium.</t>
        <t>The organisation hosts two libraries which allow encoding, decoding, and
manipulation of CMW payloads: one for the Golang ecosystem
(<eref target="https://github.com/veraison/cmw"/>), and one for Rust
(<eref target="https://github.com/veraison/rust-cmw"/>).
These implementations cover all the features presented in this draft.
The maturity level is alpha.
The license is Apache 2.0.
The developers can be contacted on the Zulip channel:
<eref target="https://veraison.zulipchat.com/#narrow/stream/383526-CMW/"/>.</t>
      </section>
    </section>
    <section anchor="privcons">
      <name>Privacy Considerations</name>
      <t>The privacy considerations outlined in <xref section="11" sectionFormat="of" target="RFC9334"/> are fully applicable.
In particular, when a CMW contains Personally Identifying Information (PII), which is the case for Evidence and sometimes for other conceptual messages as well, care must be taken to prevent unintended recipients from accessing it.
Generally, utilizing secure channels between the parties exchanging CMWs can help address or mitigate these concerns.
A specific scenario arises when a public key certificate is issued based on Evidence information provided by the certificate requestor to the issuing Certification Authority (CA).
For instance, an individual seeking a publicly-trusted code signing certificate may be willing to disclose the details of the hardware where their code signing keys are stored (e.g., HSM model, patch level, etc.).
However, they likely do not want this information to be publicly accessible.
Applications that intend to publicly "broadcast" Evidence claims received from a third party via X.509 Certificates should define a Certificate Practices Statement <xref target="RFC3647"/> that clearly specifies the circumstances under which the CA can include such data in the issued certificate.
Note that the aforementioned consideration does not apply to cases where X.509 Certificates are explicitly designed as a security envelope for Evidence claims, such as in DICE <xref target="DICE-arch"/>.</t>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>The security considerations discussed in <xref section="12.2" sectionFormat="of" target="RFC9334"/> concerning the protection of conceptual messages are fully applicable.
The following subsections provide further elaboration on these points, particularly in relation to Collection CMWs.</t>
      <section anchor="cmw-protection">
        <name>CMW Protection</name>
        <t>CMW Records, Tags and Collections alone do not offer authenticity, integrity protection, or confidentiality.
It is the responsibility of the designer for each use case to determine the necessary security properties and implement them accordingly.</t>
        <t>RATS conceptual messages are typically secured using cryptography.
If the messages are already protected, no additional security requirements are imposed by this encapsulation.
If an adversary attempts to modify the payload encapsulation, it will result in incorrect processing of the encapsulated message, leading to an error.
If the messages are not protected, additional security must be added at a different layer.
For example, a <tt>cbor-record</tt> containing an Unprotected CWT Claims Set (UCCS) <xref target="RFC9781"/> can be signed as described in <xref target="signed-cbor-cmw"/>.</t>
        <t><xref target="crypto"/> describes a number of methods that can be used to add cryptographic protection to CMW.</t>
      </section>
      <section anchor="seccons-coll">
        <name>Using Collection CMWs for Evidence of Composite or Layered Devices</name>
        <t>When a Collection CMW is used to encapsulate Evidence for composite or layered attestation of a single device, all Evidence messages within the CMW <bcp14>MUST</bcp14> be cryptographically bound together to prevent an attacker from replacing Evidence from a compromised device with that from a non-compromised device.
If the Collection CMW is not protected from tampering by external security measures (such as object security primitives) or internal mechanisms (such as intra-item binding), an attacker could manipulate the Collection's contents to deceive the Verifier into accepting bogus Evidence as genuine.</t>
        <t>Authenticity and integrity protection is expected to be provided by the underlying attestation technology.
For example, key material used to sign/bind an entire Collection CMW should be an attestation key, handled as described in <xref section="12.1" sectionFormat="of" target="RFC9334"/>.
The binding does not necessarily have to be a signature over the Collection CMW, it might also be achieved through identifiers, linking claims (e.g., nonces) across CMW collection items, signing or hashing between the members of the Collection.
It is the responsibility of the Attester who creates the Collection CMW to ensure that the contents of the Collection are integrity-protected.</t>
      </section>
      <section anchor="integrating-cmw-into-protocols">
        <name>Integrating CMW into Protocols</name>
        <t>When CMW is integrated into some hosting protocol (for example, attested CSR <xref target="I-D.ietf-lamps-csr-attestation"/> or attested TLS <xref target="I-D.fossati-tls-attestation"/> <xref target="I-D.fossati-tls-exported-attestation"/>), it is up to that hosting protocol to describe how CMW is intended to be used and how it fits into the overall security model.</t>
        <t>Such an analysis should consider the types of conceptual messages allowed, including the permitted combinations, the protection requirements, the interface with the hosting protocol, and any other security-relevant aspect arising from the interaction between the CMW assembly and the hosting protocol.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced_1">RFC Editor:</cref> Please replace "RFCthis" with the RFC number assigned to this document.</t>
      <t><cref anchor="rfced_2">RFC Editor:</cref> This document uses the CPA (code point allocation) convention described in <xref target="I-D.bormann-cbor-draft-numbers"/>. For each usage of the term "CPA", please remove the prefix "CPA" from the indicated value and replace the residue with the value assigned by IANA; perform an analogous substitution for all other occurrences of the prefix "CPA" in the document. Finally, please remove this note.</t>
      <section anchor="iana-cwt">
        <name>CWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>JWT Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Key: CPA299</t>
          </li>
          <li>
            <t>Claim Value Type(s): CBOR map, CBOR array, or CBOR tag</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/>, <xref target="cmw-coll"/> and <xref target="cbor-tag"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-jwt">
        <name>JWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "JSON Web Token Claims" registry of the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="jws-structured-syntax-suffix">
        <name><tt>+jws</tt> Structured Syntax Suffix</name>
        <t>IANA is requested to register the <tt>+jws</tt> structured syntax suffix in the "Structured Syntax Suffixes" registry <xref target="IANA.media-type-structured-suffix"/> in the manner described in <xref target="RFC6838"/>, which can be used to indicate that the media type is encoded as JSON Web Signature (JWS) <xref target="RFC7515"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <dl spacing="compact">
            <dt>Name:</dt>
            <dd>
              <t>JSON Web Signature (JWS)</t>
            </dd>
            <dt>+suffix:</dt>
            <dd>
              <t>+jws</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t><xref target="RFC7515"/></t>
            </dd>
            <dt>Encoding Considerations:</dt>
            <dd>
              <t>8bit; values are represented as a JSON Object or as a series of base64url-encoded values each separated from the next by a single period ('.') character.</t>
            </dd>
            <dt>Interoperability Considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Fragment Identifier Considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Security Considerations:</dt>
            <dd>
              <t>See <xref section="10" sectionFormat="of" target="RFC7515"/></t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org), or IETF Security Area (saag@ietf.org)</t>
            </dd>
            <dt>Author/Change Controller:</dt>
            <dd>
              <t>Remote ATtestation ProcedureS (RATS) Working Group.
The IETF has change control over this registration.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="iana-cbor-tag">
        <name>CBOR Tag Registration</name>
        <t>IANA is requested to add the following tag to the "CBOR Tags" <xref target="IANA.cbor-tags"/> registry.</t>
        <table>
          <thead>
            <tr>
              <th align="left">CBOR Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">CPA907</td>
              <td align="left">CBOR map, CBOR array, CBOR tag</td>
              <td align="left">RATS Conceptual Message Wrapper</td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="iana-ind-ext">
        <name>RATS Conceptual Message Wrapper (CMW) Indicators Registry</name>
        <t>This specification defines a new "RATS Conceptual Message Wrapper (CMW) Indicators" registry, with "IETF Review" policy (<xref section="4.8" sectionFormat="of" target="BCP26"/>).</t>
        <t>The objective is to register CMW Indicator values for all RATS Conceptual Messages (see <xref section="8" sectionFormat="of" target="RFC9334"/>).</t>
        <t>This registry is to be added to the Remote Attestation Procedures (RATS) registry group at <xref target="IANA.rats"/>.</t>
        <t>Indicator values should be added in ascending order.</t>
        <t>Acceptable values correspond to the RATS conceptual messages defined by the RATS architecture <xref target="RFC9334"/> and any updates to it.</t>
        <section anchor="structure-of-entries">
          <name>Structure of Entries</name>
          <t>Each entry in the registry must include:</t>
          <dl newline="true">
            <dt>Indicator value:</dt>
            <dd>
              <t>A number corresponding to the bit position in the <tt>ind</tt> bitmap (<xref target="type-n-val"/>).</t>
            </dd>
            <dt>Conceptual Message name:</dt>
            <dd>
              <t>A text string describing the RATS conceptual message this indicator corresponds to.</t>
            </dd>
            <dt>Reference:</dt>
            <dd>
              <t>A reference to a document, if available, or the registrant.</t>
            </dd>
          </dl>
          <t>The initial registrations for the registry are detailed in <xref target="tab-ind-regs"/>.</t>
          <table anchor="tab-ind-regs">
            <name>CMW Indicators Registry Initial Contents</name>
            <thead>
              <tr>
                <th align="left">Indicator value</th>
                <th align="left">Conceptual Message name</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Reference Values</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Endorsements</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Evidence</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Attestation Results</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">Appraisal Policy</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">5-31</td>
                <td align="left">Unassigned</td>
                <td align="left"> </td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="provisional-registration">
          <name>Provisional Registration</name>
          <t>Before the creation of the registry by IANA, new codepoints can be added to the <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-msg-wrap/blob/main/provisional/cmw-indicators-registry.md">provisional CMW Indicators registry</eref> by following the documented procedure.</t>
          <t><xref target="tab-ind-regs"/> will be regularly updated to match the contents of the provisional registry.</t>
          <t>The provisional registry will be discontinued once IANA establishes the permanent registry, which is expected to coincide with the publication of the current document.</t>
        </section>
      </section>
      <section anchor="iana-mt">
        <name>Media Types</name>
        <t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="tab-mt-regs">
          <name>CMW Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>cmw+cbor</tt></td>
              <td align="left">
                <tt>application/cmw+cbor</tt></td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+json</tt></td>
              <td align="left">
                <tt>application/cmw+json</tt></td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+cose</tt></td>
              <td align="left">
                <tt>application/cmw+cose</tt></td>
              <td align="left">
                <xref target="signed-cbor-cmw"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+jws</tt></td>
              <td align="left">
                <tt>application/cmw+jws</tt></td>
              <td align="left">
                <xref target="signed-json-cmw"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <section anchor="applicationcmwcbor">
          <name><tt>application/cmw+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwjson">
          <name><tt>application/cmw+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwcose">
          <name><tt>application/cmw+cose</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+cose</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)  Note that the <tt>cose-type</tt> parameter is explicitly not supported, as it is understood to be <tt>"cose-sign1"</tt>.</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwjws">
          <name><tt>application/cmw+jws</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+jws</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>8bit; values are represented as a JSON Object or as a series of base64url-encoded values each separated from the next by a single period ('.') character.</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="iana-cf">
        <name>CoAP Content-Formats</name>
        <t>IANA is requested to register the following Content-Format IDs in the "CoAP Content-Formats" registry, within the "Constrained RESTful Environments (CoRE) Parameters" registry group <xref target="IANA.core-parameters"/>:</t>
        <table align="left">
          <name>New CoAP Content Formats</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/cmw+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+json</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+cose</td>
              <td align="left">-</td>
              <td align="left">TBD3</td>
              <td align="left">
                <xref target="signed-cbor-cmw"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+jws</td>
              <td align="left">-</td>
              <td align="left">TBD4</td>
              <td align="left">
                <xref target="signed-json-cmw"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>If possible, TBD1, TBD2, TBD3 and TBD4 should be assigned in the 256..9999 range.</t>
        <section anchor="registering-new-coap-content-formats-for-parameterized-cmw-media-types">
          <name>Registering new CoAP Content-Formats for Parameterized CMW Media Types</name>
          <t>New CoAP Content-Formats can be created based on parameterized instances of the <tt>application/cmw+json</tt>, <tt>application/cmw+cbor</tt>, <tt>application/cmw+cose</tt> and <tt>application/cmw+jws</tt> media types.</t>
          <t>When assigning a new CoAP Content-Format ID for a CMW media type that utilizes the <tt>cmwc_t</tt> parameter, the registrar must check (directly or through the Designated Expert) that:</t>
          <ul spacing="normal">
            <li>
              <t>The corresponding CMW is a Collection (<xref target="cmw-coll"/>), and</t>
            </li>
            <li>
              <t>The <tt>cmwc_t</tt> value is either a (non-relative) OID or an absolute URI.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-smi">
        <name>New SMI Numbers Registrations</name>
        <t>IANA has assigned an object identifier (OID) for the CMW extension defined in <xref target="x509"/> in the "SMI Security for PKIX Certificate Extension" registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry group as follows:</t>
        <table align="left">
          <name>New CMW Extension OID</name>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">35</td>
              <td align="left">id-pe-cmw</td>
              <td align="left">
                <xref target="x509"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>IANA is requested to assign an object identifier (OID) for the ASN.1 Module defined in <xref target="asn1-x509"/> in the "SMI Security for PKIX Module Identifier" registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry group:</t>
        <table align="left">
          <name>New ASN.1 Module OID</name>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">id-mod-cmw-extn</td>
              <td align="left">
                <xref target="asn1-x509"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="STD90">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:.plus,.cat, and.det for the construction of constants;.abnf/.abnfb for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and.feature for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="BCP26">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1): Specification of Basic Notation</title>
            <author>
              <organization>International Telephone and Telegraph
Consultative Committee</organization>
            </author>
            <date month="July" year="1994"/>
          </front>
          <seriesInfo name="CCITT" value="Recommendation X.680"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-type-structured-suffix" target="https://www.iana.org/assignments/media-type-structured-suffix">
          <front>
            <title>Structured Syntax Suffixes</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.rats" target="https://www.iana.org/assignments/rats">
          <front>
            <title>Remote Attestation Procedures (RATS)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.smi-numbers" target="https://www.iana.org/assignments/smi-numbers">
          <front>
            <title>Structure of Management Information (SMI) Numbers (MIB Module Registrations)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3647">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework</title>
            <author fullname="S. Chokhani" initials="S." surname="Chokhani"/>
            <author fullname="W. Ford" initials="W." surname="Ford"/>
            <author fullname="R. Sabett" initials="R." surname="Sabett"/>
            <author fullname="C. Merrill" initials="C." surname="Merrill"/>
            <author fullname="S. Wu" initials="S." surname="Wu"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>This document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates. In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement. This document supersedes RFC 2527.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3647"/>
          <seriesInfo name="DOI" value="10.17487/RFC3647"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC9193">
          <front>
            <title>Sensor Measurement Lists (SenML) Fields for Indicating Data Value Content-Format</title>
            <author fullname="A. Keränen" initials="A." surname="Keränen"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Sensor Measurement Lists (SenML) media types support multiple types of values, from numbers to text strings and arbitrary binary Data Values. In order to facilitate processing of binary Data Values, this document specifies a pair of new SenML fields for indicating the content format of those binary Data Values, i.e., their Internet media type, including parameters as well as any content codings applied.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9193"/>
          <seriesInfo name="DOI" value="10.17487/RFC9193"/>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="RFC9782">
          <front>
            <title>Entity Attestation Token (EAT) Media Types</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>The payloads used in Remote ATtestation procedureS (RATS) may require an associated media type for their conveyance, for example, when the payloads are used in RESTful APIs.</t>
              <t>This memo defines media types to be used for Entity Attestation Tokens (EATs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9782"/>
          <seriesInfo name="DOI" value="10.17487/RFC9782"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="15" month="August" year="2025"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-09"/>
        </reference>
        <reference anchor="RFC9781">
          <front>
            <title>A Concise Binary Object Representation (CBOR) Tag for Unprotected CBOR Web Token Claims Sets (UCCS)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document defines the Unprotected CWT Claims Set (UCCS), a data format for representing a CBOR Web Token (CWT) Claims Set without protecting it by a signature, Message Authentication Code (MAC), or encryption. UCCS enables the use of CWT claims in environments where protection is provided by other means, such as secure communication channels or trusted execution environments. This specification defines a CBOR tag for UCCS and describes the UCCS format, its encoding, and its processing considerations. It also discusses security implications of using unprotected claims sets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9781"/>
          <seriesInfo name="DOI" value="10.17487/RFC9781"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="30" month="April" year="2025"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-09"/>
        </reference>
        <reference anchor="I-D.fossati-tls-exported-attestation">
          <front>
            <title>Remote Attestation with Exported Authenticators</title>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Muhammad Usama Sardar" initials="M. U." surname="Sardar">
              <organization>TU Dresden</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <date day="3" month="July" year="2025"/>
            <abstract>
              <t>   This specification defines a method for two parties in a
   communication interaction to exchange Evidence and Attestation
   Results using exported authenticators, as defined in RFC 9261.
   Additionally, it introduces the cmw_attestation extension, which
   allows attestation credentials to be included directly in the
   Certificate message sent during the Exported Authenticator-based
   post-handshake authentication.  The approach supports both the
   passport and background check models from the RATS architecture while
   ensuring that attestation remains bound to the underlying
   communication channel.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-exported-attestation-02"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="5" month="October" year="2025"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of RATS conceptual messages (see Section 8 of
   [RFC9334], such as Evidence, Endorsements and Attestation Results, in
   Certificate Signing Requests (CSRs), such as PKCS#10 or Certificate
   Request Message Format (CRMF) payloads.  This provides an elegant and
   automatable mechanism for transporting attestation data to a
   Certification Authority.

   Including Evidence, Endorsements and Attestation Results along with a
   CSR can help to improve the assessment of the security posture for
   the private key, and can help the Certification Authority to assess
   whether it satisfies the requested certificate profile.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-21"/>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-08"/>
        </reference>
        <reference anchor="DICE-arch" target="https://trustedcomputinggroup.org/wp-content/uploads/DICE-Attestation-Architecture-Version-1.1-Revision-18_pub.pdf">
          <front>
            <title>DICE Attestation Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="I-D.bormann-cbor-draft-numbers">
          <front>
            <title>Managing CBOR codepoints in Internet-Drafts</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   CBOR-based protocols often make use of numbers allocated in a
   registry.  During development of the protocols, those numbers may not
   yet be available.  This impedes the generation of data models and
   examples that actually can be used by tools.

   This short draft proposes a common way to handle these situations,
   without any changes to existing tools.  Also, in conjunction with the
   application-oriented EDN literal e'', a further reduction in
   editorial processing of CBOR examples around the time of approval can
   be achieved.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-draft-numbers-06"/>
        </reference>
      </references>
    </references>
    <?line 1327?>

<section anchor="registering-and-using-cmws">
      <name>Registering and Using CMWs</name>
      <t><xref target="fig-howto-cmw"/> describes the registration preconditions for using
CMWs in either Record CMW or Tag CMW forms.
When using Collection CMW, the preconditions apply for each entry in the Collection.</t>
      <figure anchor="fig-howto-cmw">
        <name>How To Create a CMW</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="480" width="344" viewBox="0 0 344 480" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 40,48 L 40,80" fill="none" stroke="black"/>
              <path d="M 56,176 L 56,424" fill="none" stroke="black"/>
              <path d="M 80,96 L 80,152" fill="none" stroke="black"/>
              <path d="M 80,168 L 80,424" fill="none" stroke="black"/>
              <path d="M 96,144 L 96,176" fill="none" stroke="black"/>
              <path d="M 104,256 L 104,288" fill="none" stroke="black"/>
              <path d="M 120,96 L 120,144" fill="none" stroke="black"/>
              <path d="M 168,192 L 168,232" fill="none" stroke="black"/>
              <path d="M 168,304 L 168,376" fill="none" stroke="black"/>
              <path d="M 184,48 L 184,80" fill="none" stroke="black"/>
              <path d="M 200,48 L 200,80" fill="none" stroke="black"/>
              <path d="M 224,96 L 224,144" fill="none" stroke="black"/>
              <path d="M 240,256 L 240,288" fill="none" stroke="black"/>
              <path d="M 248,144 L 248,176" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,152" fill="none" stroke="black"/>
              <path d="M 264,168 L 264,424" fill="none" stroke="black"/>
              <path d="M 288,176 L 288,424" fill="none" stroke="black"/>
              <path d="M 296,48 L 296,80" fill="none" stroke="black"/>
              <path d="M 56,32 L 168,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 280,32" fill="none" stroke="black"/>
              <path d="M 56,96 L 168,96" fill="none" stroke="black"/>
              <path d="M 216,96 L 280,96" fill="none" stroke="black"/>
              <path d="M 112,128 L 232,128" fill="none" stroke="black"/>
              <path d="M 72,160 L 104,160" fill="none" stroke="black"/>
              <path d="M 240,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 112,192 L 232,192" fill="none" stroke="black"/>
              <path d="M 120,240 L 224,240" fill="none" stroke="black"/>
              <path d="M 120,304 L 224,304" fill="none" stroke="black"/>
              <path d="M 112,384 L 248,384" fill="none" stroke="black"/>
              <path d="M 96,416 L 232,416" fill="none" stroke="black"/>
              <path d="M 24,432 L 336,432" fill="none" stroke="black"/>
              <path d="M 8,464 L 320,464" fill="none" stroke="black"/>
              <path d="M 8,464 L 24,432" fill="none" stroke="black"/>
              <path d="M 96,416 L 112,384" fill="none" stroke="black"/>
              <path d="M 232,416 L 248,384" fill="none" stroke="black"/>
              <path d="M 320,464 L 336,432" fill="none" stroke="black"/>
              <path d="M 56,32 C 47.16936,32 40,39.16936 40,48" fill="none" stroke="black"/>
              <path d="M 168,32 C 176.83064,32 184,39.16936 184,48" fill="none" stroke="black"/>
              <path d="M 216,32 C 207.16936,32 200,39.16936 200,48" fill="none" stroke="black"/>
              <path d="M 280,32 C 288.83064,32 296,39.16936 296,48" fill="none" stroke="black"/>
              <path d="M 56,96 C 47.16936,96 40,88.83064 40,80" fill="none" stroke="black"/>
              <path d="M 168,96 C 176.83064,96 184,88.83064 184,80" fill="none" stroke="black"/>
              <path d="M 216,96 C 207.16936,96 200,88.83064 200,80" fill="none" stroke="black"/>
              <path d="M 280,96 C 288.83064,96 296,88.83064 296,80" fill="none" stroke="black"/>
              <path d="M 112,128 C 103.16936,128 96,135.16936 96,144" fill="none" stroke="black"/>
              <path d="M 232,128 C 240.83064,128 248,135.16936 248,144" fill="none" stroke="black"/>
              <path d="M 72,160 C 63.16936,160 56,167.16936 56,176" fill="none" stroke="black"/>
              <path d="M 104,160 C 112.83064,160 120,152.83064 120,144" fill="none" stroke="black"/>
              <path d="M 240,160 C 231.16936,160 224,152.83064 224,144" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,167.16936 288,176" fill="none" stroke="black"/>
              <path d="M 112,192 C 103.16936,192 96,184.83064 96,176" fill="none" stroke="black"/>
              <path d="M 232,192 C 240.83064,192 248,184.83064 248,176" fill="none" stroke="black"/>
              <path d="M 120,240 C 111.16936,240 104,247.16936 104,256" fill="none" stroke="black"/>
              <path d="M 224,240 C 232.83064,240 240,247.16936 240,256" fill="none" stroke="black"/>
              <path d="M 120,304 C 111.16936,304 104,296.83064 104,288" fill="none" stroke="black"/>
              <path d="M 224,304 C 232.83064,304 240,296.83064 240,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="296,424 284,418.4 284,429.6" fill="black" transform="rotate(90,288,424)"/>
              <polygon class="arrowhead" points="272,424 260,418.4 260,429.6" fill="black" transform="rotate(90,264,424)"/>
              <path class="jump" d="M 264,168 C 258,168 258,152 264,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="176,376 164,370.4 164,381.6" fill="black" transform="rotate(90,168,376)"/>
              <polygon class="arrowhead" points="176,232 164,226.4 164,237.6" fill="black" transform="rotate(90,168,232)"/>
              <polygon class="arrowhead" points="88,424 76,418.4 76,429.6" fill="black" transform="rotate(90,80,424)"/>
              <path class="jump" d="M 80,168 C 74,168 74,152 80,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="64,424 52,418.4 52,429.6" fill="black" transform="rotate(90,56,424)"/>
              <g class="text">
                <text x="72" y="52">Reuse</text>
                <text x="136" y="52">EAT/CoRIM</text>
                <text x="244" y="52">Register</text>
                <text x="72" y="68">media</text>
                <text x="128" y="68">type(s)</text>
                <text x="224" y="68">new</text>
                <text x="264" y="68">media</text>
                <text x="56" y="84">+</text>
                <text x="96" y="84">profile</text>
                <text x="228" y="84">type</text>
                <text x="172" y="148">Register</text>
                <text x="152" y="164">new</text>
                <text x="188" y="164">CoAP</text>
                <text x="172" y="180">Content-Format</text>
                <text x="168" y="260">Automatically</text>
                <text x="140" y="276">derive</text>
                <text x="188" y="276">CBOR</text>
                <text x="128" y="292">tag</text>
                <text x="184" y="292">[RFC9277]</text>
                <text x="152" y="404">Tag</text>
                <text x="184" y="404">CMW</text>
                <text x="148" y="452">Record</text>
                <text x="192" y="452">CMW</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
     .---------------.   .---------.
    | Reuse EAT/CoRIM | | Register  |
    | media type(s)   | | new media |
    | + profile       | | type      |
     `---+----+------'   `-+----+--'
         |    |            |    |
         |  .-+------------+-.  |
         | |  |  Register  |  | |
       .-(-+-'   new CoAP   `-+-(-.
      |  | |  Content-Format  | |  |
      |  |  `-------+--------'  |  |
      |  |          |           |  |
      |  |          v           |  |
      |  |   .--------------.   |  |
      |  |  | Automatically  |  |  |
      |  |  | derive CBOR    |  |  |
      |  |  | tag [RFC9277]  |  |  |
      |  |   `------+-------'   |  |
      |  |          |           |  |
      |  |          |           |  |
      |  |          |           |  |
      |  |          v           |  |
      |  |   .----------------. |  |
      |  |  /    Tag CMW     /  |  |
      v  v `----------------'   v  v
  .--------------------------------------.
 /             Record CMW               /
`--------------------------------------'
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The list of currently open issues for this documents can be found at
<eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap/issues"/>.</t>
      <t><cref anchor="rfced_3">RFC Editor:</cref> please remove before publication.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
Brian Campbell,
Carl Wallace,
Carsten Bormann,
Dave Thaler,
Deb Cooley,
<contact fullname="Ionuț Mihalcea"/>,
Michael B. Jones,
Mike Ounsworth,
Mohit Sethi,
Paul Howard,
Russ Housley,
Steven Bellock,
Tom Jones,
and
Usama Sardar
for their reviews and suggestions.</t>
      <t>The definition of a Collection CMW has been modelled on a proposal originally made by Simon Frost for an EAT-based Evidence collection type.  The Collection CMW aims at superseding it by generalizing the allowed Evidence formats.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="L." surname="Lundblade" fullname="Laurence Lundblade">
        <organization>Security Theory LLC</organization>
        <address>
          <email>lgl@securitytheory.com</email>
        </address>
      </contact>
      <t>Laurence made significant contributions to enhancing the security requirements and considerations for Collection CMWs.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
