<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-rats-epoch-markers-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-rats-epoch-markers-04"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2023" month="March" day="14"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system. Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell. Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock). Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birkholz-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="I-D.ietf-rats-architecture"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock where the ticks are conveyed by the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.  This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "epoch id" types are defined to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While Epoch Markers are encoded in CBOR <xref target="STD94"/>, and many of the epoch id types are themselves encoded in CBOR, a prominent format in this space is the Time-Stamp Token defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
Time-Stamp Tokens (TST) are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an epoch id type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp, and therefore other kinds of payloads that can be used to implement Epoch Markers.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The top-level structure of Epoch Markers and an initial set of epoch id types are specified using CDDL <xref target="RFC8610"/>.
To increase trustworthiness in the Epoch Bell, Epoch Markers also provide the option to include a "veracity proof" in the form of attestation evidence, attestation results, or SCITT receipts <xref target="I-D.birkholz-scitt-receipts"/> associated with the trust status of the Epoch Bell.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="STD94"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>.</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in Section 10.3 of the RATS architecture <xref target="I-D.ietf-rats-architecture"/>.</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models.
In general, there are three interaction models:</t>
      <ul spacing="normal">
        <li>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to Section 7.1 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to Section 7.2 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to Section 7.3 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
      </ul>
    </section>
    <section anchor="epoch-marker-structure">
      <name>Epoch Marker Structure</name>
      <t>At the top level, an Epoch Marker is a CBOR array with a header carrying an optional veracity proof about the Epoch Bell and a payload.</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker definition</name>
        <artwork type="CDDL" align="left"><![CDATA[
epoch-marker = [
  $tagged-epoch-id
  ? bell-veracity-proof
]

; veracity of the bell
bell-veracity-proof = non-empty<{
  ? remote-attestation-evidence ; could be EAT or Concise Evidence
  ? remote-attestation-result ; hopefully EAT with AR4SI Claims
  ? scitt-receipt ; SCITT receipt
}>

remote-attestation-evidence = (1: "PLEASE DEFINE")
remote-attestation-result = (2: "PLEASE DEFINE")
scitt-receipt = (3: "PLEASE DEFINE")

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-epoch-id
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(multi-nonce)
$tagged-epoch-id /= #6.26983(multi-nonce-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
$tagged-epoch-id /= #6.26985(stateless-nonce)
]]></artwork>
      </figure>
      <section anchor="epoch-marker-payloads">
        <name>Epoch Marker Payloads</name>
        <t>This memo comes with a set of predefined payloads.</t>
        <section anchor="cbor-time-tag-etime">
          <name>CBOR Time Tag (etime)</name>
          <t>CBOR extended time tag (1001) optionally bundled with a nonce.</t>
          <t>See <xref section="3" sectionFormat="of" target="I-D.ietf-cbor-time-tag"/> for the (many) details about the CBOR extended
time format.</t>
          <sourcecode type="CDDL">
cbor-epoch-id = [
   etime
   ? nonce
]

etime = #6.1001({* (int/tstr) =&gt; any})

nonce = tstr / bstr / int
</sourcecode>
          <t>The following describes each member of the cbor-epoch-id map.</t>
          <dl>
            <dt>etime:</dt>
            <dd>
              <t>An extended time value as defined by <xref target="I-D.ietf-cbor-time-tag"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>A never-repeating byte string used as extra data in challenge-response interaction models (see <xref target="I-D.ietf-rats-reference-interaction-models"/>).</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="CDDL">
classical-rfc3161-TST-info = bytes
</sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl>
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The response message of a Time Stamp Authority including a <xref target="RFC3161"/> Time Stamp Token Info structure.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t><cref anchor="issue">Issue tracked at:</cref> https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker/issues/18</t>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical
<xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="CDDL">
TST-info-based-on-CBOR-time-tag = {
  &amp;(version : 0) =&gt; v1
  &amp;(policy : 1) =&gt; oid
  &amp;(messageImprint : 2) =&gt; MessageImprint
  &amp;(serialNumber : 3) =&gt; integer
  &amp;(eTime : 4) =&gt; profiled-etime
  ? &amp;(ordering : 5) =&gt; bool .default false
  ? &amp;(nonce : 6) =&gt; integer
  ? &amp;(tsa : 7) =&gt; GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 =&gt; ~time
  ? -8 =&gt; profiled-duration
  * int =&gt; any
}
profiled-duration = {* int =&gt; any}

GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]
; See Section 4.2.1.6 of RFC 5280 for type/value
</sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's
policy under which the tst-info was produced.  Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.  Cf. messageImprint,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.  Cf.
serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.  Cf. genTime,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="I-D.ietf-cbor-time-tag"/>, indicated by CBOR tag 1001, profiled
as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>The "base time" is encoded using key 1, indicating Posix time as int or float.</li>
            <li>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time".  The duration map
is profiled to disallow string keys.  This is an optional field.</li>
            <li>The map <bcp14>MAY</bcp14> also contain one or more integer keys, which may encode
supplementary information <cref anchor="tf1">Allowing unsigned integer (i.e., critical) keys goes counter interoperability</cref>.</li>
          </ul>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely
based on the "base time". This is an optional field, whose default value is
"false".  Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.  Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint
in identifying the name of the TSA.  Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data
format.  Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.  Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-multi-nonce">
          <name>Multi-Nonce</name>
          <t>Typically, a nonce is a number only used once. In the context of Epoch Markers, one Nonce can be distributed to multiple consumers, each of them using that Nonce only once. Technically, that is not a Nonce anymore. This type of Nonce is called Multi-Nonce in Epoch Markers.</t>
          <sourcecode type="CDDL">
; Multi-Nonce

; a single nonce used by multiple entities
multi-nonce = tstr / bstr / int
</sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce:</dt>
            <dd>
              <t>A never-repeating byte string used by RATS roles in a trust domain as extra data included in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-multi-nonce-list">
          <name>Multi-Nonce-List</name>
          <t>A list of nonces send to multiple consumer. The consumers use each Nonce in the list of Nonces sequentially. Technically, each sequential Nonce in the distributed list is not used just once, but by every Epoch Marker consumer involved. This renders each Nonce in the list a Multi-Nonce</t>
          <sourcecode type="CDDL">
; Multi-Nonce-List

; a list of nonces potentially used by multiple entities
multi-nonce-list = [ + multi-nonce ]
</sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce-list:</dt>
            <dd>
              <t>A sequence of never-repeating byte strings used by RATS roles in trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each nonce in the list is used in a consecutive production of a conceptual messages. Asserting freshness of a conceptual message including a nonce from the multi-nonce-list requires some state on the receiver side to assess, if that nonce is the appropriate next unused nonce from the multi-nonce-list.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch bell.</t>
          <sourcecode type="CDDL">
strictly-monotonic-counter = uint
</sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl>
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-stateless-nonce">
          <name>Stateless Nonce</name>
          <t>In a highly available service (e.g., a cloud attestation verifier) having to
keep per-session nonce state poses scalablity problems.  An alternative is to
use time-synchronised servers that share a symmetric key, which produce and
consume nonces based on coarse-grained clock ticks that are signed using the
shared secret.  This way, a nonce minted by a server in the pool can be
processed by any other server in pool, which avoids the need for session
"stickiness."</t>
          <t>A stateless-nonce supports the above use case by encoding a Posix time (i.e.,
the epoch identifier), alongside a minimal set of metadata, authenticated with
a symmetric key in a self-contained and compact token.</t>
          <sourcecode type="CDDL">
stateless-nonce = [
  TimeToken
  AuthTag: bstr .size 32
]

TimeToken = (
  Version: bytes .size 1
  KeyID: bytes .size 1
  Timestamp: posix-time
  Pad: bytes
)

posix-time = #6.1(int)
</sourcecode>
          <t>The following describes each member of the stateless-nonce array:</t>
          <dl newline="true">
            <dt>Version:</dt>
            <dd>
              <t>version of the TimeToken encoded as a single byte.  The value <bcp14>MUST</bcp14> be 0x01.</t>
            </dd>
            <dt>KeyID:</dt>
            <dd>
              <t>opaque identifier shared across the server pool for the signing key used to
compute AuthTag.  It is semantically equivalent to the TID field defined in
<xref section="3.1.3" sectionFormat="of" target="RFC6896"/>.</t>
            </dd>
            <dt>Timestamp:</dt>
            <dd>
              <t>the timestamp associated with the current epoch encoded as CBOR tag for Posix
time.  It <bcp14>MUST</bcp14> use the int format.</t>
            </dd>
            <dt>Pad:</dt>
            <dd>
              <t>zero or more pad bytes, used to make the stateless nonce the desired size.</t>
            </dd>
            <dt>AuthTag:</dt>
            <dd>
              <t>HMAC <xref target="RFC2104"/> w/ SHA-256 computed over the CBOR serialisation of TimeToken
encoded as a 32-bytes string.</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR-encoding of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-multi-nonce"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-multi-nonce-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26985</td>
              <td align="left">array</td>
              <td align="left">stateless nonce</td>
              <td align="left">
                <xref target="sec-stateless-nonce"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC3161"/>
            <seriesInfo name="RFC" value="3161"/>
            <author fullname="C. Adams" initials="C." surname="Adams">
              <organization/>
            </author>
            <author fullname="P. Cain" initials="P." surname="Cain">
              <organization/>
            </author>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas">
              <organization/>
            </author>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato">
              <organization/>
            </author>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned.  It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <seriesInfo name="DOI" value="10.17487/RFC5652"/>
            <seriesInfo name="RFC" value="5652"/>
            <seriesInfo name="STD" value="70"/>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2104">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <seriesInfo name="DOI" value="10.17487/RFC2104"/>
            <seriesInfo name="RFC" value="2104"/>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk">
              <organization/>
            </author>
            <author fullname="M. Bellare" initials="M." surname="Bellare">
              <organization/>
            </author>
            <author fullname="R. Canetti" initials="R." surname="Canetti">
              <organization/>
            </author>
            <date month="February" year="1997"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9090"/>
            <seriesInfo name="RFC" value="9090"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9054"/>
            <seriesInfo name="RFC" value="9054"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="D. Thaler" initials="D." surname="Thaler">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="N. Smith" initials="N." surname="Smith">
              <organization/>
            </author>
            <author fullname="W. Pan" initials="W." surname="Pan">
              <organization/>
            </author>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need to be able to define basic security services for this data format.  This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.  </t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cbor-time-tag">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-time-tag-05"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Ben Gamari" initials="B." surname="Gamari">
              <organization>Well-Typed</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949) is a data
   format whose design goals include the possibility of extremely small
   code size, fairly small message size, and extensibility without the
   need for version negotiation.

   In CBOR, one point of extensibility is the definition of CBOR tags.
   RFC 8949 defines two tags for time: CBOR tag 0 (RFC3339 time as a
   string) and tag 1 (Posix time as int or float).  Since then,
   additional requirements have become known.  The present document
   defines a CBOR tag for time that allows a more elaborate
   representation of time, as well as related CBOR tags for duration and
   time period.  It is intended as the reference document for the IANA
   registration of the CBOR tags defined.


   // The present version (-05) adds CDDL definitions; this should now
   // address all WGLC comments.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-05"/>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="January" year="2023"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <seriesInfo name="ITU-T" value="Recommendation X.690"/>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-architecture">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-22"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="September" year="2022"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state.  This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.
              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-07"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="10" month="March" year="2023"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.birkholz-scitt-receipts">
          <front>
            <title>Countersigning COSE Envelopes in Transparency Services</title>
            <seriesInfo name="Internet-Draft" value="draft-birkholz-scitt-receipts-02"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Maik Riechert" initials="M." surname="Riechert">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   A transparent and authentic Transparent Registry service in support
   of a supply chain's integrity, transparency, and trust requires all
   peers that contribute to the Registry operations to be trustworthy
   and authentic.  In this document, a countersigning variant is
   specified that enables trust assertions on Merkle-tree based
   operations for global supply chain registries.  A generic procedure
   for producing payloads to be signed and validated is defined and
   leverages solutions and principles from the Concise Signing and
   Encryption (COSE) space.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6896">
          <front>
            <title>SCS: KoanLogic's Secure Cookie Sessions for HTTP</title>
            <seriesInfo name="DOI" value="10.17487/RFC6896"/>
            <seriesInfo name="RFC" value="6896"/>
            <author fullname="S. Barbato" initials="S." surname="Barbato">
              <organization/>
            </author>
            <author fullname="S. Dorigotti" initials="S." surname="Dorigotti">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." role="editor" surname="Fossati">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>This memo defines a generic URI and HTTP-header-friendly envelope for carrying symmetrically encrypted, authenticated, and origin-timestamped tokens.  It also describes one possible usage of such tokens via a simple protocol based on HTTP cookies.</t>
              <t>Secure Cookie Session (SCS) use cases cover a wide spectrum of applications, ranging from distribution of authorized content via HTTP (e.g., with out-of-band signed URIs) to securing browser sessions with diskless embedded devices (e.g., Small Office, Home Office (SOHO) routers) or web servers with high availability or load- balancing requirements that may want to delegate the handling of the application state to clients instead of using shared storage or forced peering.</t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an epoch marker with a cbor-epoch-id and no
bell veracity proof.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR epoch id without bell veracity proof</name>
        <artwork type="CBOR-DIAG" align="center"><![CDATA[
[
  / cbor-epoch-id / [
    / 1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
    / etime / 1001({
        1: 851042397,
      -10: "America/Los_Angeles",
      -11: { "u-ca": "hebrew" }
    })
  ]
  / no bell veracity proof /
]
]]></artwork>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depects the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="ASN.1">
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
</sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
