<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-msg-wrap-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="RATS CMW">RATS Conceptual Messages Wrapper (CMW)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-11"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization>Intel</organization>
      <address>
        <email>ned.smith@intel.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="D." surname="Glaze" fullname="Dionna Glaze">
      <organization>Google LLC</organization>
      <address>
        <email>dionnaglaze@google.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="16"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>evidence</keyword>
    <keyword>attestation results</keyword>
    <keyword>endorsements</keyword>
    <keyword>reference values</keyword>
    <abstract>
      <?line 92?>

<t>This document defines the RATS conceptual message wrapper (CMW) format, a type of encapsulation format that can be used for any RATS messages, such as Evidence, Attestation Results, Endorsements, and Reference Values.
Additionally, the document describes a collection type that enables the aggregation of one or more CMWs into a single message.</t>
      <t>This document also defines corresponding CBOR tag, JSON Web Tokens (JWT) and CBOR Web Tokens (CWT) claims, as well as an X.509 extension.
These allow embedding the wrapped conceptual messages into CBOR-based protocols, web APIs, and PKIX protocols.
In addition, a Media Type and a CoAP Content-Format are defined for transporting CMWs in HTTP, MIME, CoAP and other Internet protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap"/>.</t>
    </note>
  </front>
  <middle>
    <?line 101?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The RATS architecture defines a handful of conceptual messages
(see <xref section="8" sectionFormat="of" target="RFC9334"/>), such as Evidence and Attestation Results.
Each conceptual message can have multiple claims encoding and serialization
formats (<xref section="9" sectionFormat="of" target="RFC9334"/>). Throughout their lifetime, RATS
conceptual messages are typically transported over different protocols.
For example,</t>
      <ul spacing="normal">
        <li>
          <t>EAT <xref target="I-D.ietf-rats-eat"/> Evidence in a "background check" topological
arrangement first flows from Attester to Relying Party, and then from Relying
Party to Verifier, over separate protocol legs.</t>
        </li>
        <li>
          <t>Attestation Results for Secure Interactions (AR4SI) <xref target="I-D.ietf-rats-ar4si"/> payloads in
"passport" mode would be sent by the Verifier to the Attester and then, at a later
point in time and over a different channel, from the Attester to the Relying Party.</t>
        </li>
      </ul>
      <t>It is desirable to reuse any typing information associated with the messages
across such protocol boundaries to minimize the cost associated with
type registrations and maximize interoperability. With the CMW format described
in this document, protocol designers do not need to update protocol specifications
to support different conceptual messages. This approach reduces the implementation
effort for developers to support different attestation technologies. For example,
an implementer of a Relying Party application does not need to parse
attestation-related conceptual messages, such as different Evidence formats,
but can instead utilize the CMW format to be agnostic to the attestation
technology.</t>
      <t>This document defines two encapsulation formats for RATS conceptual
messages that aim to achieve the goals stated above.</t>
      <t>These encapsulation formats have been specifically designed to possess the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>They are self-describing, which means that they can convey precise typing information without relying on the framing provided by the embedding protocol or the storage system.</t>
        </li>
        <li>
          <t>They are based on media types <xref target="RFC6838"/>, which allows the cost of their registration to be spread across numerous usage scenarios.</t>
        </li>
      </ul>
      <t>A protocol designer could use these formats, for example, to convey
Evidence, Endorsements and Reference Values in certificates and CRLs
extensions (<xref target="DICE-arch"/>), to embed Attestation Results or Evidence as
first-class authentication credentials in TLS handshake messages
<xref target="I-D.fossati-tls-attestation"/>, to transport attestation-related payloads in RESTful APIs,
or for stable storage of Attestation Results in the form of file system
objects.</t>
      <t>This document also defines corresponding CBOR tag, JSON Web Tokens (JWT) and CBOR Web Tokens (CWT) claims, as well as an X.509 extension.
These allow embedding the wrapped conceptual messages into CBOR-based protocols, web APIs, and PKIX protocols.
In addition, a Media Type and a CoAP Content-Format are defined for transporting CMWs in HTTP, MIME, CoAP and other Internet protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> is used to describe the
data formats.</t>
      <t>The reader is assumed to be familiar with the vocabulary and concepts
defined in <xref target="RFC9334"/>.</t>
      <t>This document reuses the terms defined in <xref section="2" sectionFormat="of" target="RFC9193"/>
(e.g., "Content-Type").</t>
    </section>
    <section anchor="conceptual-message-wrappers">
      <name>Conceptual Message Wrappers</name>
      <t>A RATS Conceptual Message Wrapper (CMW) has a tree structure of leaves that contain payload messages associated with their content type.
The two leaf node types are:</t>
      <ul spacing="normal">
        <li>
          <t>A CMW using a CBOR or JSON record (<xref target="type-n-val"/>);</t>
        </li>
        <li>
          <t>A CMW based on CBOR tags (<xref target="cbor-tag"/>).</t>
        </li>
      </ul>
      <t>Intermediate tree nodes are either:</t>
      <ul spacing="normal">
        <li>
          <t>A CMW "collection" type that holds together multiple CMW items (<xref target="cmw-coll"/>);</t>
        </li>
        <li>
          <t>A CMW "tunnel" type that allows transporting CBOR CMWs in JSON collections and vice-versa (<xref target="cmw-tunnel"/>).</t>
        </li>
      </ul>
      <t>The following snippet outlines the productions associated with the top-level types.</t>
      <sourcecode type="cddl"><![CDATA[
start = cmw

cmw = json-cmw / cbor-cmw

json-cmw = json-record / json-collection
cbor-cmw = cbor-record / cbor-collection / $cbor-tag
]]></sourcecode>
      <t>The complete CDDL can be found in <xref target="collected-cddl"/>.</t>
      <t><xref target="webtokens"/> and <xref target="x509"/> describe the transport of CMWs using CBOR and JSON Web Tokens and PKIX messages, respectively.</t>
      <t>This document only defines an encapsulation, not a security format.
It is the responsibility of the Attester to ensure that the CMW contents have the necessary security protection.
Security considerations are discussed in <xref target="seccons"/>.</t>
      <section anchor="type-n-val">
        <name>CMW Record</name>
        <t>The format of the CMW record is shown in <xref target="fig-cddl-record"/>.
The JSON <xref target="STD90"/> and CBOR <xref target="STD94"/> representations are provided separately.
Both the <tt>json-record</tt> and <tt>cbor-record</tt> have the same fields except for slight differences in the types discussed below.</t>
        <figure anchor="fig-cddl-record">
          <name>CDDL definition of the Record format</name>
          <artwork type="cddl" align="left"><![CDATA[
json-record = [
  type: media-type
  value: base64url-string
  ? ind: uint .bits cm-type
]

cbor-record = [
  type: coap-content-format-type / media-type
  value: bytes
  ? ind: uint .bits cm-type
]
]]></artwork>
        </figure>
        <t>Each contains two or three members:</t>
        <dl newline="true">
          <dt><tt>type</tt>:</dt>
          <dd>
            <t>Either a text string representing a Content-Type (e.g., an EAT media type
<xref target="I-D.ietf-rats-eat-media-type"/>) or an unsigned integer corresponding to a CoAP Content-Format
number (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
The latter <bcp14>MUST NOT</bcp14> be used in the JSON serialization.</t>
          </dd>
          <dt><tt>value</tt>:</dt>
          <dd>
            <t>The RATS conceptual message serialized according to the
value defined in the type member.
When using JSON, the value field <bcp14>MUST</bcp14> be encoded as Base64 using the URL and
filename safe alphabet (<xref section="5" sectionFormat="of" target="RFC4648"/>) without padding.
This always applies, even if the conceptual message format is already textual (e.g., a JWT EAT).
When using CBOR, the value field <bcp14>MUST</bcp14> be encoded as a CBOR byte string.</t>
          </dd>
          <dt><tt>ind</tt>:</dt>
          <dd>
            <t>An optional bitmap that indicates which conceptual message types are
carried in the <tt>value</tt> field.  Any combination (i.e., any value between
1 and 15, included) is allowed.  This is useful only if the <tt>type</tt> is
potentially ambiguous and there is no further context available to the
CMW consumer to decide.  For example, this might be the case if the base
media type is not profiled (e.g., <tt>application/eat+cwt</tt>), if the <tt>value</tt>
field contains multiple conceptual messages with different types (e.g.,
both Reference Values and Endorsements within the same <tt>application/signed-corim+cbor</tt>), or if the same profile identifier is
shared by different conceptual messages.
Future specifications may add new values to the <tt>ind</tt> field; see <xref target="iana-ind-ext"/>.</t>
          </dd>
        </dl>
      </section>
      <section anchor="cbor-tag">
        <name>CMW CBOR Tags</name>
        <t>CMW of type CBOR Tag derive their tag numbers from a corresponding CoAP Content-Format ID using the <tt>TN()</tt> transform defined in <xref section="B" sectionFormat="of" target="RFC9277"/>.
Such CBOR tag numbers are in range [1668546817, 1668612095].</t>
        <t>The RATS conceptual message is first serialized according to the Content-Format ID and then encoded as a CBOR byte string, to which the TN-derived tag number is prepended.</t>
        <t>The CMW CBOR Tag is defined in <xref target="fig-cddl-cbor-tag"/> using two different macros.
One for CBOR-encoded types, the other for all other types.
Both macros take the CBOR tag number <tt>tn</tt> as a parameter.
The <tt>cbor-tagged-cbor</tt> macro takes the CDDL definition of the associated conceptual message <tt>fmt</tt> as a second parameter.</t>
        <figure anchor="fig-cddl-cbor-tag">
          <name>CDDL definition of the CBOR Tag format macros</name>
          <artwork type="cddl" align="left"><![CDATA[
cbor-tagged-cbor<tn, fmt> = #6.<tn>(bytes .cbor fmt)

cbor-tagged-data<tn> = #6.<tn>(bytes)
]]></artwork>
        </figure>
        <t>To add a new CMW, the <tt>$cbor-tag</tt> type socket is extended with a new instance of the CMW CBOR Tag macro.
For example, to associate conceptual messages of type <tt>my-evidence</tt> with CBOR Tag <tt>1668576819</tt>, one would extend <tt>$cbor-tag</tt> as follows:</t>
        <sourcecode type="cddl"><![CDATA[
$cbor-tag /= cbor-tagged-cbor<1668576819, my-evidence>

my-evidence = {
  &(eat_nonce: 10) => bstr .size (8..64)
}
]]></sourcecode>
      </section>
      <section anchor="cmw-coll">
        <name>CMW Collections</name>
        <t>Layered Attesters and composite devices (Sections <xref target="RFC9334" section="3.2" sectionFormat="bare"/> and <xref target="RFC9334" section="3.3" sectionFormat="bare"/> of <xref target="RFC9334"/>) generate Evidence that consists of multiple parts.
For example, in data center servers, it is not uncommon for separate attesting environments (AE) to serve a subsection of the entire machine.
One AE might measure and attest to what was booted on the main CPU, while another AE might measure and attest to what was booted on a SmartNIC plugged into a PCIe slot, and a third AE might measure and attest to what was booted on the machine's GPU.
To allow aggregation of multiple, potentially non-homogeneous evidence formats collected from different AEs, this document defines a CMW "collection" as a container that holds several CMW items, each with a label that is unique within the scope of the collection.</t>
        <t>Although originally designed to support layered Attester and composite device use cases, the CMW collection can be adapted for other scenarios that require the aggregation of RATS conceptual messages.
For instance, collections may be used to group Endorsements, Reference Values, Attestation Results, and more.
A single CMW collection can contain a mix of different message types, and it can also be used to carry messages related to multiple devices simultaneously.</t>
        <t>The CMW collection (<xref target="fig-cddl-collection"/>) is defined as a CBOR map or JSON object with CMW values, either native or "tunnelled" (<xref target="cmw-tunnel"/>).
The position of a <tt>cmw</tt> entry in the <tt>cmw-collection</tt> is not significant.
Labels can be strings (or integers in the CBOR serialization) that serve as a mnemonic for different conceptual messages in the collection.</t>
        <t>The <tt>"__cmwc_t"</tt> key is reserved for associating an optional type to the overall collection and <bcp14>MUST NOT</bcp14> be used for a label.
The collection type is either a Uniform Resource Identifier (URI) or an object identifier (OID).
The OID is always absolute and never relative.</t>
        <t>Since the collection type is recursive, implementations may limit the allowed depth of nesting.</t>
        <figure anchor="fig-cddl-collection">
          <name>CDDL definition of the CMW collection format</name>
          <artwork type="cddl" align="left"><![CDATA[
json-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: text) => json-cmw / c2j-tunnel
}

cbor-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: (int / text)) => cbor-cmw / j2c-tunnel
}
]]></artwork>
        </figure>
        <t>CMW itself provides no facilities for authenticity, integrity protection, or confidentiality.
It is the responsibility of the designer for each use case to determine the necessary security properties and implement them accordingly.
A secure channel (e.g., via TLS) or object-level security (e.g., using JWT) may suffice in some scenarios, but not in all.</t>
        <t>When a CMW is used to carry Evidence for composite or layered attestation of a single device, all components within the CMW must be cryptographically
bound to prevent an attacker from replacing Evidence from a compromised device with Evidence from a non-compromised device. The protection of authenticity and integrity
<bcp14>MUST</bcp14> be provided by the attestation technology. For additional security considerations related to collections, refer to <xref target="seccons-coll"/>.</t>
        <section anchor="cmw-collections-role-in-composite-attester-topology">
          <name>CMW Collections' role in composite Attester topology</name>
          <t>A CMW Collection's tree structure is not required to be a spanning tree of the system's composite Attester topology.
If the labels carry semantic content for a Verifier (e.g. to improve Verifier performance or aid human comprehension), the collection <bcp14>SHOULD</bcp14> be integrity protected.
For example, the collection can be integrity protected by including it in a signed token such as a CWT or JWT.</t>
        </section>
        <section anchor="cmw-tunnel">
          <name>CMW Tunnel</name>
          <t>The CMW tunnel type (<xref target="fig-cddl-tunnel"/>) allows for moving a CMW in one serialization format, either JSON or CBOR, into a collection that uses the opposite serialization format.</t>
          <t>Both tunnel types are arrays with two elements.
The first element, a fixed text string starting with a <tt>#</tt>, acts as a sentinel value.
The <tt>#</tt>, which is not an acceptable start symbol for the <tt>Content-Type</tt> production (<xref target="collected-cddl"/>), makes it possible to disambiguate a CMW tunnel from a CMW record.</t>
          <figure anchor="fig-cddl-tunnel">
            <name>CDDL definition of the CMW tunnel format</name>
            <artwork type="cddl" align="left"><![CDATA[
c2j-tunnel = [ "#cmw-c2j-tunnel", base64url-string ]
j2c-tunnel = [ "#cmw-j2c-tunnel", bytes ]
]]></artwork>
          </figure>
          <t>The conversion algorithms are described in the following subsections.</t>
          <section anchor="cbor-to-json">
            <name>CBOR-to-JSON</name>
            <t>The CBOR byte string of the serialised CBOR CMW is encoded as Base64 using the URL and filename safe alphabet (<xref section="5" sectionFormat="of" target="RFC4648"/>) without padding.
The obtained string is added as the second element of the <tt>c2j-tunnel</tt> array.
The <tt>c2j-tunnel</tt> array is serialized as JSON.</t>
          </section>
          <section anchor="json-to-cbor">
            <name>JSON-to-CBOR</name>
            <t>The UTF-8 string of the serialized JSON CMW is encoded as a CBOR byte string (Major type 2).
The byte string is added as the second element of the <tt>j2c-tunnel</tt> array.
The <tt>j2c-tunnel</tt> array is serialized as CBOR.</t>
          </section>
        </section>
      </section>
      <section anchor="decapsulation-algorithm">
        <name>Decapsulation Algorithm</name>
        <t>Once any external framing is removed (for example, if the CMW is carried in a certificate extension), the CMW decoder performs a 1-byte lookahead to determine how to decode the remaining byte buffer.
The following pseudo-code illustrates this process:</t>
        <artwork><![CDATA[
func CMWTypeDemux(b []byte) (CMW, error) {
  if len(b) == 0 {
    return Unknown
  }

  if b[0] == 0x82 || b[0] == 0x83 {
    return CBORRecord
  } else if b[0] >= 0xc0 && b[0] <= 0xdb {
    return CBORTag
  } else if b[0] == 0x5b {
    return JSONRecord
  } else if b[0] == 0x7b {
    return JSONCollection
  } else if (b[0] >= 0xa0 && b[0] <= 0xbb) || b[0] == 0xbf {
    return CBORCollection
  }

  return Unknown
}
]]></artwork>
      </section>
    </section>
    <section anchor="webtokens">
      <name>Transporting CMW in COSE and JOSE Web Tokens</name>
      <t>To facilitate the embedding of CMWs and CMW collections in CBOR-based protocols and web APIs, this document defines two <tt>"cmw"</tt> claims for use with JSON Web Tokens (JWT) and CBOR Web Tokens (CWT).</t>
      <t>The definitions for these claims can be found in <xref target="iana-jwt"/> and <xref target="iana-cwt"/>, respectively.</t>
      <section anchor="encoding-requirements">
        <name>Encoding Requirements</name>
        <t>A CMW collection carried in a <tt>"cmw"</tt> JWT claim <bcp14>MUST</bcp14> be a <tt>json-collection</tt>.
A CMW collection carried in a <tt>"cmw"</tt> CWT claim <bcp14>MUST</bcp14> be a <tt>cbor-collection</tt>.</t>
        <t>A CMW record carried in a <tt>"cmw"</tt> JWT claim <bcp14>MUST</bcp14> be a <tt>json-record</tt>.
A CMW record carried in a <tt>"cmw"</tt> CWT claim <bcp14>MUST</bcp14> be a <tt>cbor-record</tt>.</t>
      </section>
    </section>
    <section anchor="x509">
      <name>Transporting CMW in X.509 Messages</name>
      <t>CMW may need to be transported in PKIX messages, such as Certificate Signing Requests (CSRs) or in X.509 Certificates and Certificate Revocation Lists (CRLs).</t>
      <t>The use of CMW in CSRs is documented in <xref target="I-D.ietf-lamps-csr-attestation"/>, while its application in X.509 Certificates and CRLs is detailed in Section 6.1 of <xref target="DICE-arch"/>.</t>
      <t>This section outlines the CMW extension designed to carry CMW objects.</t>
      <t>The CMW extension <bcp14>MAY</bcp14> be included in X.509 Certificates, CRLs <xref target="RFC5280"/>, and CSRs.</t>
      <t>The CMW extension <bcp14>MUST</bcp14> be identified by the following object identifier:</t>
      <sourcecode type="asn.1"><![CDATA[
id-pe-cmw  OBJECT IDENTIFIER ::=
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-pe(1) TBD }
]]></sourcecode>
      <t>This extension <bcp14>SHOULD NOT</bcp14> be marked critical.
It <bcp14>MAY</bcp14> be marked critical in cases where the attestation-related information is essential for granting resource access, and there is a risk that legacy relying parties would bypass such controls.</t>
      <t>The CMW extension <bcp14>MUST</bcp14> have the following syntax:</t>
      <sourcecode type="asn.1"><![CDATA[
CMW ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING
}
]]></sourcecode>
      <t>The CMW <bcp14>MUST</bcp14> include the serialized CMW object in either JSON or CBOR format, utilizing the appropriate CHOICE entry.</t>
      <t>The DER-encoded CMW is the value of the OCTET STRING for the extnValue field of the extension.</t>
      <section anchor="asn1-x509">
        <name>ASN.1 Module</name>
        <t>This section provides an ASN.1 module <xref target="X.680"/> for the CMW extension, following the conventions established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <sourcecode type="asn.1"><![CDATA[
CMWExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-cmw-collection-extn(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) } ;

-- CMW Extension

ext-CMW EXTENSION ::= {
  SYNTAX CMW
  IDENTIFIED BY id-pe-cmw }

-- CMW Extension OID

id-pe-cmw  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) TBD }

-- CMW Extension Syntax

CMW ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING
}

END
]]></sourcecode>
      </section>
      <section anchor="compatibility-with-dice-conceptualmessagewrapper">
        <name>Compatibility with DICE <tt>ConceptualMessageWrapper</tt></name>
        <t>Section 6.1.8 of <xref target="DICE-arch"/> specifies the ConceptualMessageWrapper (CMW) format and its corresponding object identifier.
The CMW format outlined in <xref target="DICE-arch"/> permits only a subset of the CMW grammar defined in this document.
In particular, the tunnel and collection formats cannot be encoded using DICE CMWs.</t>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The (equivalent) examples in <xref target="ex-ja"/>, <xref target="ex-ca"/>, and <xref target="ex-ct"/> assume that
the Media-Type-Name <tt>application/vnd.example.rats-conceptual-msg</tt> has been
registered alongside a corresponding CoAP Content-Format ID <tt>30001</tt>.  The
CBOR tag <tt>1668576935</tt> is derived applying the <tt>TN()</tt> transform as described in
<xref target="cbor-tag"/>.</t>
      <t>All the examples focus on the wrapping aspects.
The wrapped messages are not instances of real Conceptual Messages.</t>
      <section anchor="ex-ja">
        <name>JSON Record</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  "I0faVQ"
]
]]></sourcecode>
      </section>
      <section anchor="ex-ca">
        <name>CBOR Record</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  30001,
  h'2347da55'
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
82             # array(2)
   19 7531     # unsigned(30001)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
        <t>Note that a Media-Type-Name can also be used with the CBOR record form,
for example if it is known that the receiver cannot handle CoAP
Content-Formats, or (unlike the case in point) if a CoAP Content-Format
number has not been registrered.</t>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  h'2347da55'
]
]]></sourcecode>
      </section>
      <section anchor="ex-ct">
        <name>CBOR Tag</name>
        <sourcecode type="cbor-diag"><![CDATA[
1668576935(h'2347da55')
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
da 637476a7    # tag(1668576935)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
      </section>
      <section anchor="ex-ca-ind">
        <name>CBOR Record with explicit CM indicator</name>
        <t>This is an example of a signed CoRIM (Concise Reference Integrity Manifest) <xref target="I-D.ietf-rats-corim"/> with an explicit <tt>ind</tt> value of <tt>0b0000_0011</tt> (3), indicating that the wrapped message contains both Reference Values and Endorsements.</t>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/signed-corim+cbor",
  h'd901f6d28440a044d901f5a040',
  3
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <!-- fold -w71 cddl/cmw-example-3.pretty -->
<artwork><![CDATA[
83                                      # array(3)
   78 1d                                # text(29)
      6170706c69636174696f6e2f7369676e65642d636f72696d2b63626f72 # "app
lication/signed-corim+cbor"
   4d                                   # bytes(13)
      d901f6d28440a044d901f5a040        # "\xD9\u0001\xF6҄@\xA0D\xD9\u00
01\xF5\xA0@"
   03                                   # unsigned(3)
]]></artwork>
      </section>
      <section anchor="cbor-collection">
        <name>CBOR Collection</name>
        <t>The following example is a CBOR collection that assembles conceptual messages from three attesters: Evidence for attesters A and B and Attestation Results for attester C.
Since attester C returns Attestation Results as CMW in JSON record format, the JSON record needs to be tunnelled.
It is given an explicit collection type using the URI form.</t>
        <artwork><![CDATA[
{
  "__cmwc_t": "tag:example.com,2024:composite-attester",
  / attester A / 0: [
    30001,
    h'2347da55',
    4
  ],
  / attester B / 1: 1668576935(h'2347da55'),
  / attester C / 2: [
    "#cmw-j2c-tunnel",
    '[ "application/eat+jwt", "Li4u", 8 ]'
  ]
}
]]></artwork>
      </section>
      <section anchor="json-collection">
        <name>JSON Collection</name>
        <t>The following example is a JSON collection that assembles Evidence from two attesters.
Since attester B outputs Evidence as CMW in CMW record format, the CBOR record needs to be tunnelled.</t>
        <artwork><![CDATA[
{
  "__cmwc_t": "tag:example.com,2024:another-composite-attester",
  "attester A": [
    "application/eat-ucs+json",
    "e30K",
    4
  ],
  "attester B (tunnelled)": [
    "#cmw-c2j-tunnel",
    "g3gYYXBwbGljYXRpb24vZWF0LXVjcytjYm9yQaAE"
  ]
}
]]></artwork>
      </section>
      <section anchor="use-in-jwt">
        <name>Use in JWT</name>
        <t>The following example shows the use of the <tt>"cmw"</tt> JWT claim to transport a CMW collection in a JWT Claims Set <xref target="RFC7519"/>:</t>
        <artwork><![CDATA[
{
  "cmw": {
    "__cmwc_t": "tag:example.com,2024:another-composite-attester",
    "attester A": [
      "application/eat-ucs+json",
      "e30K",
      4
    ],
    "attester B (tunnelled)": [
      "#cmw-c2j-tunnel",
      "g3gYYXBwbGljYXRpb24vZWF0LXVjcytjYm9yQaAE"
    ]
  },
  "iss": "evidence collection daemon",
  "exp": 1300819380
}
]]></artwork>
      </section>
    </section>
    <section anchor="collected-cddl">
      <name>Collected CDDL</name>
      <sourcecode type="cddl"><![CDATA[
start = cmw

cmw = json-cmw / cbor-cmw

json-cmw = json-record / json-collection
cbor-cmw = cbor-record / cbor-collection / $cbor-tag

json-record = [
  type: media-type
  value: base64url-string
  ? ind: uint .bits cm-type
]

cbor-record = [
  type: coap-content-format-type / media-type
  value: bytes
  ? ind: uint .bits cm-type
]

cbor-tagged-cbor<tn, fmt> = #6.<tn>(bytes .cbor fmt)

cbor-tagged-data<tn> = #6.<tn>(bytes)

json-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: text) => json-cmw / c2j-tunnel
}

cbor-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: (int / text)) => cbor-cmw / j2c-tunnel
}

c2j-tunnel = [ "#cmw-c2j-tunnel", base64url-string ]
j2c-tunnel = [ "#cmw-j2c-tunnel", bytes ]

media-type = text .abnf ("Content-Type" .cat Content-Type-ABNF)
base64url-string = text .regexp "[A-Za-z0-9_-]+"

cm-type = &(
  reference-values: 0
  endorsements: 1
  evidence: 2
  attestation-results: 3
)

coap-content-format-type = uint .size 2

oid = text .regexp "([0-2])((\\.0)|(\\.[1-9][0-9]*))*"

Content-Type-ABNF = '

Content-Type   = Media-Type-Name *( *SP ";" *SP parameter )
parameter      = token "=" ( token / quoted-string )

token          = 1*tchar
tchar          = "!" / "#" / "$" / "%" / "&" / "\'" / "*"
               / "+" / "-" / "." / "^" / "_" / "`" / "|" / "~"
               / DIGIT / ALPHA
quoted-string  = %x22 *( qdtext / quoted-pair ) %x22
qdtext         = SP / %x21 / %x23-5B / %x5D-7E
quoted-pair    = "\" ( SP / VCHAR )

Media-Type-Name = type-name "/" subtype-name

type-name = restricted-name
subtype-name = restricted-name

restricted-name = restricted-name-first *126restricted-name-chars
restricted-name-first  = ALPHA / DIGIT
restricted-name-chars  = ALPHA / DIGIT / "!" / "#" /
                         "$" / "&" / "-" / "^" / "_"
restricted-name-chars =/ "." ; Characters before first dot always
                             ; specify a facet name
restricted-name-chars =/ "+" ; Characters after last plus always
                             ; specify a structured syntax suffix

DIGIT     =  %x30-39           ; 0 - 9
POS-DIGIT =  %x31-39           ; 1 - 9
ALPHA     =  %x41-5A / %x61-7A ; A - Z / a - z
SP        =  %x20
VCHAR     =  %x21-7E           ; printable ASCII (no SP)
'

]]></sourcecode>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>This section records the status of known implementations of the protocol
defined by this specification at the time of posting of this Internet-Draft,
and is based on a proposal described in <xref target="RFC7942"/>.
The description of implementations in this section is intended to assist the
IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not
imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here
that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of
available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups to
assign due consideration to documents that have the benefit of running code,
which may serve as evidence of valuable experimentation and feedback that have
made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see
fit".</t>
      <section anchor="project-veraison">
        <name>Project Veraison</name>
        <t>The organization responsible for this implementation is Project Veraison, a
Linux Foundation project hosted at the Confidential Computing Consortium.</t>
        <t>The software, hosted at <eref target="https://github.com/veraison/cmw"/>, provides a Golang
package that allows encoding and decoding of CMW payloads.
The implementation covers all the features presented in this draft.
The maturity level is alpha.
The license is Apache 2.0.
The developers can be contacted on the Zulip channel:
<eref target="https://veraison.zulipchat.com/#narrow/stream/383526-CMW/"/>.</t>
      </section>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <section anchor="records-and-cbor-tags">
        <name>Records and CBOR Tags</name>
        <t>RATS conceptual messages are typically secured using cryptography.
If the messages are already protected, then there are no additional security requirements imposed by the introduction of this encapsulation.
If an adversary tries to modify the payload encapsulation, it will result in incorrect processing of the encapsulated message and lead to an error.
If the messages are not protected, additional security must be added at a different layer.
As an example, a <tt>cbor-record</tt> containing an UCCS (Unprotected CWT Claims Sets) <xref target="I-D.ietf-rats-uccs"/> can be signed using COSE Sign1 <xref target="STD96"/>.</t>
      </section>
      <section anchor="seccons-coll">
        <name>Collections</name>
        <t>If the collection is not protected from tampering by external security measures (such as object security primitives) or internal mechanisms (such as intra-item binding), an attacker could easily manipulate the collection's contents.
It is the responsibility of the Attester who creates the CMW collection to ensure that the contents of the collection are integrity-protected.
The designer of the attestation technology is typically in charge of ensuring that the security properties are met, not the user of the conceptual message wrapper.
In particular, when a CMW is used to carry multiple Evidence messages for a composite device or layered attestation, there should be strong binding between the Evidence messages within the collection.
This binding is needed to prevent attacks where Evidence from a subverted part of the device is replaced by Evidence from a separate non-subverted device.
The binding of Evidence messages should be some form of attestation.
For example, key material used to sign/bind an entire CMW collection should be an attestation key, handled as described in <xref section="12.1" sectionFormat="of" target="RFC9334"/>.
The binding does not necessarily have to be a signature over the CMW collection, it might also be achieved through identifiers, cross-linking, signing or hashing between the members of the collection.
Client-authenticated TLS may be used to bind a CMW collection of Evidence messages.
However, the client key used with TLS should not be that of the end-user or owner of the device.
Instead, it should be attestation-oriented key material from the device or the attester manufacturer.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> Please replace "RFCthis" with the RFC number assigned to this document.</t>
      <t><cref anchor="rfced_1">RFC Editor:</cref> This document uses the CPA (code point allocation) convention described in <xref target="I-D.bormann-cbor-draft-numbers"/>. For each usage of the term "CPA", please remove the prefix "CPA" from the indicated value and replace the residue with the value assigned by IANA; perform an analogous substitution for all other occurrences of the prefix "CPA" in the document. Finally, please remove this note.</t>
      <section anchor="iana-cwt">
        <name>CWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>JWT Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Key: CPA299</t>
          </li>
          <li>
            <t>Claim Value Type(s): CBOR Map, CBOR Array, or CBOR Tag</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/>, <xref target="cmw-coll"/> and <xref target="cbor-tag"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-jwt">
        <name>JWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "JSON Web Token Claims" sub-registry of the "JSON Web Token (JWT)" registry <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-cbor-tag">
        <name>CBOR Tag Registration</name>
        <t>IANA is requested to add the following tag to the "CBOR Tags" <xref target="IANA.cbor-tags"/> registry.</t>
        <table>
          <thead>
            <tr>
              <th align="left">CBOR Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">CPA765</td>
              <td align="left">CBOR map, CBOR array, CBOR tag</td>
              <td align="left">RATS Conceptual Message Wrapper</td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="iana-ind-ext">
        <name>RATS Conceptual Message Wrapper (CMW) Indicators Registry</name>
        <t>This specification defines a new "RATS Conceptual Message Wrapper (CMW) Indicators" registry, with the policy "Expert Review" (<xref section="4.5" sectionFormat="of" target="BCP26"/>).</t>
        <t>The objective is to have CMW Indicators values registered for all RATS Conceptual Messages (<xref section="8" sectionFormat="of" target="RFC9334"/>).</t>
        <t>This registry is to be added to the Remote Attestation Procedures (RATS) registry group at <xref target="IANA.rats"/>.</t>
        <section anchor="de-instructions">
          <name>Instructions for the Designated Expert</name>
          <t>The expert is instructed to add the values incrementally.</t>
          <t>Acceptable values are those corresponding to RATS Conceptual Messages defined by the RATS architecture <xref target="RFC9334"/> and any of its updates.</t>
        </section>
        <section anchor="structure-of-entries">
          <name>Structure of Entries</name>
          <t>Each entry in the registry must include:</t>
          <dl newline="true">
            <dt>Indicator value:</dt>
            <dd>
              <t>A number corresponding to the bit position in the <tt>ind</tt> bitmap (<xref target="type-n-val"/>).</t>
            </dd>
            <dt>Conceptual Message name:</dt>
            <dd>
              <t>A text string describing the RATS conceptual message this indicator corresponds to.</t>
            </dd>
            <dt>Reference:</dt>
            <dd>
              <t>A reference to a document, if available, or the registrant.</t>
            </dd>
          </dl>
          <t>The initial registrations for the registry are detailed in <xref target="tab-ind-regs"/>.</t>
          <table anchor="tab-ind-regs">
            <name>CMW Indicators Registry Initial Contents</name>
            <thead>
              <tr>
                <th align="left">Indicator value</th>
                <th align="left">Conceptual Message name</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Reference Values</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Endorsements</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Evidence</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Attestation Results</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">4-31</td>
                <td align="left">Unassigned</td>
                <td align="left">RFCthis</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="provisional-registration">
          <name>Provisional Registration</name>
          <t>Before the creation of the registry by IANA, new codepoints can be added to the <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-msg-wrap/blob/main/provisional/cmw-indicators-registry.md">provisional CMW Indicators registry</eref> by following the documented procedure.</t>
          <t><xref target="tab-ind-regs"/> will be regularly updated to match the contents of the provisional registry.</t>
          <t>The provisional registry will be discontinued once IANA establishes the permanent registry, which is expected to coincide with the publication of the current document.</t>
        </section>
      </section>
      <section anchor="media-types">
        <name>Media Types</name>
        <t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="tab-mt-regs">
          <name>CMW Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>cmw+cbor</tt></td>
              <td align="left">
                <tt>application/cmw+cbor</tt></td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+json</tt></td>
              <td align="left">
                <tt>application/cmw+json</tt></td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <section anchor="applicationcmwcbor">
          <name><tt>application/cmw+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (CMW collection type in string format.  The parameter value is case-insensitive.  It <bcp14>MUST NOT</bcp14> be used for CMW that are not collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwjson">
          <name><tt>application/cmw+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (CMW collection type in string format.  The parameter value is case-insensitive.  It <bcp14>MUST NOT</bcp14> be used for CMW that are not collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="coap-content-formats">
        <name>CoAP Content Formats</name>
        <t>IANA is requested to register the following Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>:</t>
        <table align="left">
          <name>New CoAP Content Formats</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/cmw+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+json</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>If possible, TBD1 and TBD2 should be assigned in the 256..9999 range.</t>
      </section>
      <section anchor="new-smi-numbers-registrations">
        <name>New SMI Numbers Registrations</name>
        <t>IANA is requested to assign an object identifier (OID) for the CMW extension defined in <xref target="x509"/> in the "SMI Security for PKIX Certificate Extension" sub-registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry:</t>
        <table align="left">
          <name>New CMW Extension OID</name>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">id-pe-cmw</td>
              <td align="left">
                <xref target="x509"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>IANA is requested to assign an object identifier (OID) for the ASN.1 Module defined in <xref target="asn1-x509"/> in the "SMI Security for PKIX Module Identifier" sub-registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry:</t>
        <table align="left">
          <name>New ASN.1 Module OID</name>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">id-mod-cmw-collection-extn</td>
              <td align="left">
                <xref target="asn1-x509"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="STD90">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:.plus,.cat, and.det for the construction of constants;.abnf/.abnfb for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and.feature for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="BCP26">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1): Specification of Basic Notation</title>
            <author>
              <organization>International Telephone and Telegraph
Consultative Committee</organization>
            </author>
            <date month="July" year="1994"/>
          </front>
          <seriesInfo name="CCITT" value="Recommendation X.680"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.rats" target="https://www.iana.org/assignments/rats">
          <front>
            <title>Remote Attestation Procedures (RATS)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.smi-numbers" target="https://www.iana.org/assignments/smi-numbers">
          <front>
            <title>Structure of Management Information (SMI) Numbers (MIB Module Registrations)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC9193">
          <front>
            <title>Sensor Measurement Lists (SenML) Fields for Indicating Data Value Content-Format</title>
            <author fullname="A. Keränen" initials="A." surname="Keränen"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Sensor Measurement Lists (SenML) media types support multiple types of values, from numbers to text strings and arbitrary binary Data Values. In order to facilitate processing of binary Data Values, this document specifies a pair of new SenML fields for indicating the content format of those binary Data Values, i.e., their Internet media type, including parameters as well as any content codings applied.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9193"/>
          <seriesInfo name="DOI" value="10.17487/RFC9193"/>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat-media-type">
          <front>
            <title>EAT Media Types</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   Payloads used in Remote Attestation Procedures may require an
   associated media type for their conveyance, for example when used in
   RESTful APIs.

   This memo defines media types to be used for Entity Attestation
   Tokens (EAT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-media-type-12"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="2" month="September" year="2024"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-07"/>
        </reference>
        <reference anchor="I-D.ietf-rats-uccs">
          <front>
            <title>A CBOR Tag for Unprotected CWT Claims Sets</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document defines the Unprotected CWT Claims Set (UCCS), a data
   format for representing a CBOR Web Token (CWT) Claims Set without
   protecting it by a signature, message authentication code (MAC), or
   encryption.  UCCS enables the use of CWT claims in environments where
   protection is provided by other means, such as secure communication
   channels or trusted execution environments.  This specification
   defines a CBOR tag for UCCS and describes the UCCS format, its
   encoding, and processing considerations, and discusses security
   implications of using unprotected claims sets.


   // (This editors' note will be removed by the RFC editor:) The
   // present revision (–12) contains remaining document changes based
   // on feedback from the IESG evaluation and has been submitted as
   // input to IETF 121.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-12"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
              <organization>Beyond Identity</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of Evidence in Certificate Signing Requests (CSRs)
   such as PKCS#10 or Certificate Request Message Format (CRMF) payloads
   which provides an elegant and automatable mechanism for transporting
   Evidence to a Certification Authority.

   Including Evidence along with a CSR can help to improve the
   assessment of the security posture for the private key, and can help
   the Certification Authority to assess whether it satisfies the
   requested certificate profile.  These Evidence Claims can include
   information about the hardware component's manufacturer, the version
   of installed or running firmware, the version of software installed
   or running in layers above the firmware, or the presence of hardware
   components providing specific protection capabilities or shielded
   locations (e.g., to protect keys).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-14"/>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="18" month="October" year="2024"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-06"/>
        </reference>
        <reference anchor="DICE-arch" target="https://trustedcomputinggroup.org/wp-content/uploads/DICE-Attestation-Architecture-Version-1.1-Revision-18_pub.pdf">
          <front>
            <title>DICE Attestation Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="I-D.bormann-cbor-draft-numbers">
          <front>
            <title>Managing CBOR codepoints in Internet-Drafts</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="29" month="August" year="2024"/>
            <abstract>
              <t>   CBOR-based protocols often make use of numbers allocated in a
   registry.  During development of the protocols, those numbers may not
   yet be available.  This impedes the generation of data models and
   examples that actually can be used by tools.

   This short draft proposes a common way to handle these situations,
   without any changes to existing tools.  Also, in conjunction with the
   application-oriented EDN literal e'', a further reduction in
   editorial processing of CBOR examples around the time of approval can
   be achieved.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-draft-numbers-04"/>
        </reference>
      </references>
    </references>
    <?line 1015?>

<section anchor="registering-and-using-cmws">
      <name>Registering and Using CMWs</name>
      <t><xref target="fig-howto-cmw"/> describes the registration preconditions for using
CMWs in either CMW record or CBOR tag forms.
When using CMW collection, the preconditions apply for each entry in the collection.</t>
      <figure anchor="fig-howto-cmw">
        <name>How To Create a CMW</name>
        <artset>
          <artwork type="svg" align="left"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="496" width="344" viewBox="0 0 344 496" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 40,48 L 40,80" fill="none" stroke="black"/>
              <path d="M 56,176 L 56,424" fill="none" stroke="black"/>
              <path d="M 80,96 L 80,152" fill="none" stroke="black"/>
              <path d="M 80,168 L 80,424" fill="none" stroke="black"/>
              <path d="M 96,144 L 96,176" fill="none" stroke="black"/>
              <path d="M 104,256 L 104,288" fill="none" stroke="black"/>
              <path d="M 120,96 L 120,144" fill="none" stroke="black"/>
              <path d="M 168,192 L 168,232" fill="none" stroke="black"/>
              <path d="M 168,304 L 168,376" fill="none" stroke="black"/>
              <path d="M 184,48 L 184,80" fill="none" stroke="black"/>
              <path d="M 200,48 L 200,80" fill="none" stroke="black"/>
              <path d="M 224,96 L 224,144" fill="none" stroke="black"/>
              <path d="M 240,256 L 240,288" fill="none" stroke="black"/>
              <path d="M 248,144 L 248,176" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,152" fill="none" stroke="black"/>
              <path d="M 264,168 L 264,424" fill="none" stroke="black"/>
              <path d="M 288,176 L 288,424" fill="none" stroke="black"/>
              <path d="M 296,48 L 296,80" fill="none" stroke="black"/>
              <path d="M 56,32 L 168,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 280,32" fill="none" stroke="black"/>
              <path d="M 56,96 L 168,96" fill="none" stroke="black"/>
              <path d="M 216,96 L 280,96" fill="none" stroke="black"/>
              <path d="M 112,128 L 232,128" fill="none" stroke="black"/>
              <path d="M 72,160 L 104,160" fill="none" stroke="black"/>
              <path d="M 240,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 112,192 L 232,192" fill="none" stroke="black"/>
              <path d="M 120,240 L 224,240" fill="none" stroke="black"/>
              <path d="M 120,304 L 224,304" fill="none" stroke="black"/>
              <path d="M 112,384 L 248,384" fill="none" stroke="black"/>
              <path d="M 96,416 L 232,416" fill="none" stroke="black"/>
              <path d="M 24,432 L 336,432" fill="none" stroke="black"/>
              <path d="M 8,464 L 320,464" fill="none" stroke="black"/>
              <path d="M 8,464 L 24,432" fill="none" stroke="black"/>
              <path d="M 96,416 L 112,384" fill="none" stroke="black"/>
              <path d="M 232,416 L 248,384" fill="none" stroke="black"/>
              <path d="M 320,464 L 336,432" fill="none" stroke="black"/>
              <path d="M 56,32 C 47.16936,32 40,39.16936 40,48" fill="none" stroke="black"/>
              <path d="M 168,32 C 176.83064,32 184,39.16936 184,48" fill="none" stroke="black"/>
              <path d="M 216,32 C 207.16936,32 200,39.16936 200,48" fill="none" stroke="black"/>
              <path d="M 280,32 C 288.83064,32 296,39.16936 296,48" fill="none" stroke="black"/>
              <path d="M 56,96 C 47.16936,96 40,88.83064 40,80" fill="none" stroke="black"/>
              <path d="M 168,96 C 176.83064,96 184,88.83064 184,80" fill="none" stroke="black"/>
              <path d="M 216,96 C 207.16936,96 200,88.83064 200,80" fill="none" stroke="black"/>
              <path d="M 280,96 C 288.83064,96 296,88.83064 296,80" fill="none" stroke="black"/>
              <path d="M 112,128 C 103.16936,128 96,135.16936 96,144" fill="none" stroke="black"/>
              <path d="M 232,128 C 240.83064,128 248,135.16936 248,144" fill="none" stroke="black"/>
              <path d="M 72,160 C 63.16936,160 56,167.16936 56,176" fill="none" stroke="black"/>
              <path d="M 104,160 C 112.83064,160 120,152.83064 120,144" fill="none" stroke="black"/>
              <path d="M 240,160 C 231.16936,160 224,152.83064 224,144" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,167.16936 288,176" fill="none" stroke="black"/>
              <path d="M 112,192 C 103.16936,192 96,184.83064 96,176" fill="none" stroke="black"/>
              <path d="M 232,192 C 240.83064,192 248,184.83064 248,176" fill="none" stroke="black"/>
              <path d="M 120,240 C 111.16936,240 104,247.16936 104,256" fill="none" stroke="black"/>
              <path d="M 224,240 C 232.83064,240 240,247.16936 240,256" fill="none" stroke="black"/>
              <path d="M 120,304 C 111.16936,304 104,296.83064 104,288" fill="none" stroke="black"/>
              <path d="M 224,304 C 232.83064,304 240,296.83064 240,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="296,424 284,418.4 284,429.6" fill="black" transform="rotate(90,288,424)"/>
              <polygon class="arrowhead" points="272,424 260,418.4 260,429.6" fill="black" transform="rotate(90,264,424)"/>
              <path class="jump" d="M 264,168 C 258,168 258,152 264,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="176,376 164,370.4 164,381.6" fill="black" transform="rotate(90,168,376)"/>
              <polygon class="arrowhead" points="176,232 164,226.4 164,237.6" fill="black" transform="rotate(90,168,232)"/>
              <polygon class="arrowhead" points="88,424 76,418.4 76,429.6" fill="black" transform="rotate(90,80,424)"/>
              <path class="jump" d="M 80,168 C 74,168 74,152 80,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="64,424 52,418.4 52,429.6" fill="black" transform="rotate(90,56,424)"/>
              <g class="text">
                <text x="72" y="52">Reuse</text>
                <text x="136" y="52">EAT/CoRIM</text>
                <text x="244" y="52">Register</text>
                <text x="72" y="68">media</text>
                <text x="128" y="68">type(s)</text>
                <text x="224" y="68">new</text>
                <text x="264" y="68">media</text>
                <text x="56" y="84">+</text>
                <text x="96" y="84">profile</text>
                <text x="228" y="84">type</text>
                <text x="172" y="148">Register</text>
                <text x="152" y="164">new</text>
                <text x="188" y="164">CoAP</text>
                <text x="172" y="180">Content-Format</text>
                <text x="168" y="260">Automatically</text>
                <text x="140" y="276">derive</text>
                <text x="188" y="276">CBOR</text>
                <text x="128" y="292">tag</text>
                <text x="184" y="292">[RFC9277]</text>
                <text x="140" y="404">CBOR</text>
                <text x="176" y="404">tag</text>
                <text x="208" y="404">CMW</text>
                <text x="168" y="452">CMW</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="left"><![CDATA[
       .---------------.   .---------.
      | Reuse EAT/CoRIM | | Register  |
      | media type(s)   | | new media |
      | + profile       | | type      |
       `---+----+------'   `-+----+--'
           |    |            |    |
           |  .-+------------+-.  |
           | |  |  Register  |  | |
         .-(-+-'   new CoAP   `-+-(-.
        |  | |  Content-Format  | |  |
        |  |  `-------+--------'  |  |
        |  |          |           |  |
        |  |          v           |  |
        |  |   .--------------.   |  |
        |  |  | Automatically  |  |  |
        |  |  | derive CBOR    |  |  |
        |  |  | tag [RFC9277]  |  |  |
        |  |   `------+-------'   |  |
        |  |          |           |  |
        |  |          |           |  |
        |  |          |           |  |
        |  |          v           |  |
        |  |   .----------------. |  |
        |  |  /  CBOR tag CMW  /  |  |
        v  v `----------------'   v  v
    .--------------------------------------.
   /                 CMW                  /
  `--------------------------------------'
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The list of currently open issues for this documents can be found at
<eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap/issues"/>.</t>
      <t><cref anchor="rfced_2">RFC Editor:</cref> please remove before publication.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
Brian Campbell,
Carl Wallace,
Carsten Bormann,
<contact fullname="Ionuț Mihalcea"/>,
Michael B. Jones,
Mohit Sethi,
Russ Housley,
and
Tom Jones
for their reviews and suggestions.</t>
      <t>The definition of a CMW collection has been modelled on a proposal originally made by Simon Frost for an EAT-based Evidence collection type.  The CMW collection intentionally attains binary compatibility with Simon's design and aims at superseding it by also generalizing on the allowed Evidence formats.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="L." surname="Lundblade" fullname="Laurence Lundblade">
        <organization>Security Theory LLC</organization>
        <address>
          <email>lgl@securitytheory.com</email>
        </address>
      </contact>
      <t>Laurence made significant contributions to enhancing the security requirements and considerations for CMW collections.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
