<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-rats-epoch-markers-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-rats-epoch-markers-05"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2023" month="July" day="10"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 83?>

<t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system. Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell. Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock). Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birkholz-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <?line 87?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="RFC9334"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock where the ticks are conveyed by the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.  This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "epoch id" types are defined to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While Epoch Markers are encoded in CBOR <xref target="STD94"/>, and many of the epoch id types are themselves encoded in CBOR, a prominent format in this space is the Time-Stamp Token defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
Time-Stamp Tokens (TST) are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an epoch id type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp, and therefore other kinds of payloads that can be used to implement Epoch Markers.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The top-level structure of Epoch Markers and an initial set of epoch id types are specified using CDDL <xref target="RFC8610"/>.
To increase trustworthiness in the Epoch Bell, Epoch Markers also provide the option to include a "veracity proof" in the form of attestation evidence, attestation results, or SCITT receipts <xref target="I-D.birkholz-scitt-receipts"/> associated with the trust status of the Epoch Bell.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="STD94"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>.</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in Section 10.3 of the RATS architecture <xref target="RFC9334"/>.</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models.
In general, there are three interaction models:</t>
      <ul spacing="normal">
        <li>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to Section 7.1 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to Section 7.2 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to Section 7.3 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
      </ul>
      <t>In all three interaction models, Epoch Markers can be used as content for the generic information element 'handle'.
Handles are most useful to establish freshness in unsolicited and solicited distribution by the Epoch Bell.
An Epoch Marker can be used as a nonce in challenge-response remote attestation (e.g., for limiting the number of ad-hoc requests by a Verifier).
Using an Epoch Marker requires the challenger to acquire an Epoch Marker beforehand, which may introduce a sensible overhead compared to using a simple nonce.</t>
    </section>
    <section anchor="epoch-marker-structure">
      <name>Epoch Marker Structure</name>
      <t>At the top level, an Epoch Marker is a CBOR array with a header carrying an optional veracity proof about the Epoch Bell and a payload.</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker definition</name>
        <artwork type="CDDL" align="left"><![CDATA[
epoch-marker = [
  $tagged-epoch-id
  ? bell-veracity-proof
]

; veracity of the bell
bell-veracity-proof = non-empty<{
  ? remote-attestation-evidence ; could be EAT or Concise Evidence
  ? remote-attestation-result ; hopefully EAT with AR4SI Claims
  ? scitt-receipt ; SCITT receipt
}>

remote-attestation-evidence = (1: "PLEASE DEFINE")
remote-attestation-result = (2: "PLEASE DEFINE")
scitt-receipt = (3: "PLEASE DEFINE")

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-epoch-id
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(multi-nonce)
$tagged-epoch-id /= #6.26983(multi-nonce-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
]]></artwork>
      </figure>
      <section anchor="epoch-marker-payloads">
        <name>Epoch Marker Payloads</name>
        <t>This memo comes with a set of predefined payloads.</t>
        <section anchor="cbor-time-tags">
          <name>CBOR Time Tags</name>
          <t>A CBOR time representation choosing from CBOR tag 0 (tdate, RFC3339 time as a string), tag 1 (time, Posix time as int or float) or tag 1001 (extended time data item), optionally bundled with a nonce.</t>
          <t>See <xref section="3" sectionFormat="of" target="I-D.ietf-cbor-time-tag"/> for the (many) details about the CBOR extended
time format (tag 1001). See <xref target="STD94"/> for tdate (tag 0) and time (tag 1).</t>
          <sourcecode type="CDDL">
cbor-epoch-id = [
   cbor-time
   ? nonce
]

etime = #6.1001({* (int/tstr) =&gt; any})

cbor-time = tdate / time / etime

nonce = tstr / bstr / int
</sourcecode>
          <t>The following describes each member of the cbor-epoch-id map.</t>
          <dl>
            <dt>etime:</dt>
            <dd>
              <t>A freshly sourced timestamp represented as either time or tdate (<xref target="STD94"/>, <xref target="RFC8610"/>) or etime <xref target="I-D.ietf-cbor-time-tag"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>An optional random byte string used as extra data in challenge-response interaction models (see <xref target="I-D.ietf-rats-reference-interaction-models"/>).</t>
            </dd>
          </dl>
          <section anchor="creation">
            <name>Creation</name>
            <t>To generate the cbor-time value, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-time-reqs"/>.</t>
            <t>If a nonce is generated, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="CDDL">
classical-rfc3161-TST-info = bytes
</sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl>
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The DER-encoded TSTInfo generated by a <xref target="RFC3161"/> Time Stamping Authority.</t>
            </dd>
          </dl>
          <section anchor="creation-1">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as MessageImprint in its request to the TSA:</t>
            <sourcecode type="ASN.1">
SEQUENCE {
  SEQUENCE {
    OBJECT      2.16.840.1.101.3.4.2.1 (sha256)
    NULL
  }
  OCTET STRING BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F
}
</sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
            <t>The TimeStampToken obtained by the TSA <bcp14>MUST</bcp14> be stripped of the TSA signature.
Only the TSTInfo is to be kept the rest <bcp14>MUST</bcp14> be discarded.
The Epoch Bell COSE signature will replace the TSA signature.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t><cref anchor="issue">Issue tracked at:</cref> https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker/issues/18</t>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical
<xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="CDDL">
TST-info-based-on-CBOR-time-tag = {
  &amp;(version : 0) =&gt; v1
  &amp;(policy : 1) =&gt; oid
  &amp;(messageImprint : 2) =&gt; MessageImprint
  &amp;(serialNumber : 3) =&gt; integer
  &amp;(eTime : 4) =&gt; profiled-etime
  ? &amp;(ordering : 5) =&gt; bool .default false
  ? &amp;(nonce : 6) =&gt; integer
  ? &amp;(tsa : 7) =&gt; GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 =&gt; ~time
  ? -8 =&gt; profiled-duration
  * int =&gt; any
}
profiled-duration = {* int =&gt; any}

GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]
; See Section 4.2.1.6 of RFC 5280 for type/value
</sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's
policy under which the tst-info was produced.  Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.  Cf. messageImprint,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.  Cf.
serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.  Cf. genTime,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="I-D.ietf-cbor-time-tag"/>, indicated by CBOR tag 1001, profiled
as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>The "base time" is encoded using key 1, indicating Posix time as int or float.</li>
            <li>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time".  The duration map
is profiled to disallow string keys.  This is an optional field.</li>
            <li>The map <bcp14>MAY</bcp14> also contain one or more integer keys, which may encode
supplementary information <cref anchor="tf1">Allowing unsigned integer (i.e., critical) keys goes counter interoperability</cref>.</li>
          </ul>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely
based on the "base time". This is an optional field, whose default value is
"false".  Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.  Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint
in identifying the name of the TSA.  Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data
format.  Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.  Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
          <section anchor="creation-2">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as messageImprint in its request to the TSA:</t>
            <t><tt>cbor-diag
[
    / hashAlg   / -16, / sha-256 /
    / hashValue / h'BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F'
]
</tt></t>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
          </section>
        </section>
        <section anchor="sec-multi-nonce">
          <name>Multi-Nonce</name>
          <t>Typically, a nonce is a number only used once. In the context of Epoch Markers, one Nonce can be distributed to multiple consumers, each of them using that Nonce only once. Technically, that is not a Nonce anymore. This type of Nonce is called Multi-Nonce in Epoch Markers.</t>
          <sourcecode type="CDDL">
; Multi-Nonce

; a single nonce used by multiple entities
multi-nonce = tstr / bstr / int
</sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce:</dt>
            <dd>
              <t>A byte string used by RATS roles in a trust domain as extra data included in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch.</t>
            </dd>
          </dl>
          <section anchor="creation-3">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-multi-nonce-list">
          <name>Multi-Nonce-List</name>
          <t>A list of nonces send to multiple consumer. The consumers use each Nonce in the list of Nonces sequentially. Technically, each sequential Nonce in the distributed list is not used just once, but by every Epoch Marker consumer involved. This renders each Nonce in the list a Multi-Nonce</t>
          <sourcecode type="CDDL">
; Multi-Nonce-List

; a list of nonces potentially used by multiple entities
multi-nonce-list = [ + multi-nonce ]
</sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce-list:</dt>
            <dd>
              <t>A sequence of byte strings used by RATS roles in trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each nonce in the list is used in a consecutive production of a conceptual messages. Asserting freshness of a conceptual message including a nonce from the multi-nonce-list requires some state on the receiver side to assess if that nonce is the appropriate next unused nonce from the multi-nonce-list.</t>
            </dd>
          </dl>
          <section anchor="creation-4">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch bell.</t>
          <sourcecode type="CDDL">
strictly-monotonic-counter = uint
</sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl>
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="sec-time-reqs">
        <name>Time Requirements</name>
        <t>Time <bcp14>MUST</bcp14> be sourced from a trusted clock.</t>
      </section>
      <section anchor="sec-nonce-reqs">
        <name>Nonce Requirements</name>
        <t>A nonce <bcp14>MUST</bcp14> be freshly generated.
The generated value <bcp14>MUST</bcp14> have at least 64 bits of entropy (before encoding).
The generated value <bcp14>MUST</bcp14> be generated via a cryptographically secure random number generator.</t>
        <t>A maximum nonce size of 512 bits is set to limit the memory requirements.
All receivers <bcp14>MUST</bcp14> be able to accommodate the maximum size.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR-encoding of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-multi-nonce"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-multi-nonce-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC3161"/>
            <seriesInfo name="RFC" value="3161"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <seriesInfo name="DOI" value="10.17487/RFC5652"/>
            <seriesInfo name="RFC" value="5652"/>
            <seriesInfo name="STD" value="70"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9090"/>
            <seriesInfo name="RFC" value="9090"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9054"/>
            <seriesInfo name="RFC" value="9054"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cbor-time-tag">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-time-tag-08"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Ben Gamari" initials="B." surname="Gamari">
              <organization>Well-Typed</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <date day="9" month="July" year="2023"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949) is a data
   format whose design goals include the possibility of extremely small
   code size, fairly small message size, and extensibility without the
   need for version negotiation.

   In CBOR, one point of extensibility is the definition of CBOR tags.
   RFC 8949 defines two tags for time: CBOR tag 0 (RFC3339 time as a
   string) and tag 1 (Posix time as int or float).  Since then,
   additional requirements have become known.  The present document
   defines a CBOR tag for time that allows a more elaborate
   representation of time, as well as related CBOR tags for duration and
   time period.  It is intended as the reference document for the IANA
   registration of the CBOR tags defined.


   // The present version (-08) fixes some cosmetic bugs, in the
   // references and in the plaintext representation of one formula.  It
   // reflects the state of the document after the short final WGLC
   // completed.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-06"/>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <seriesInfo name="ITU-T" value="Recommendation X.690"/>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-07"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="10" month="March" year="2023"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.birkholz-scitt-receipts">
          <front>
            <title>Countersigning COSE Envelopes in Transparency Services</title>
            <seriesInfo name="Internet-Draft" value="draft-birkholz-scitt-receipts-03"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Maik Riechert" initials="M." surname="Riechert">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="26" month="April" year="2023"/>
            <abstract>
              <t>   A transparent and authentic Transparent Registry service in support
   of a supply chain's integrity, transparency, and trust requires all
   peers that contribute to the Registry operations to be trustworthy
   and authentic.  In this document, a countersigning variant is
   specified that enables trust assertions on Merkle-tree based
   operations for global supply chain registries.  A generic procedure
   for producing payloads to be signed and validated is defined and
   leverages solutions and principles from the Concise Signing and
   Encryption (COSE) space.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 475?>

<section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an epoch marker with a cbor-epoch-id and no
bell veracity proof.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR epoch id without bell veracity proof</name>
        <artwork type="CBOR-DIAG" align="center"><![CDATA[
[
  / cbor-epoch-id / [
    / 1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
    / etime / 1001({
        1: 851042397,
      -10: "America/Los_Angeles",
      -11: { "u-ca": "hebrew" }
    })
  ]
  / no bell veracity proof /
]
]]></artwork>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depects the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="ASN.1">
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
</sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
