<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-rats-epoch-markers-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-rats-epoch-markers-06"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 93?>

<t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system. Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell. Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock). Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birkholz-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="RFC9334"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock where the ticks are conveyed by the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.  This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "epoch id" types are defined to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While Epoch Markers are encoded in CBOR <xref target="STD94"/>, and many of the epoch id types are themselves encoded in CBOR, a prominent format in this space is the Time-Stamp Token defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
Time-Stamp Tokens (TST) are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an epoch id type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp, and therefore other kinds of payloads that can be used to implement Epoch Markers.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The top-level structure of Epoch Markers and an initial set of epoch id types are specified using CDDL <xref target="RFC8610"/>.
To increase trustworthiness in the Epoch Bell, Epoch Markers also provide the option to include a "veracity proof" in the form of attestation evidence, attestation results, or SCITT receipts <xref target="I-D.ietf-scitt-architecture"/> associated with the trust status of the Epoch Bell.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="STD94"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>.</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in Section 10.3 of the RATS architecture <xref target="RFC9334"/>.</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models.
In general, there are three interaction models:</t>
      <ul spacing="normal">
        <li>
          <t>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to Section 7.1 in <xref target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
        <li>
          <t>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to Section 7.2 in <xref target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
        <li>
          <t>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to Section 7.3 in <xref target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
      </ul>
      <t>In all three interaction models, Epoch Markers can be used as content for the generic information element 'handle'.
Handles are most useful to establish freshness in unsolicited and solicited distribution by the Epoch Bell.
An Epoch Marker can be used as a nonce in challenge-response remote attestation (e.g., for limiting the number of ad-hoc requests by a Verifier).
Using an Epoch Marker requires the challenger to acquire an Epoch Marker beforehand, which may introduce a sensible overhead compared to using a simple nonce.</t>
    </section>
    <section anchor="sec-epoch-markers">
      <name>Epoch Marker Structure</name>
      <t>At the top level, an Epoch Marker is a CBOR array carrying the actual epoch id (<xref target="epoch-payloads"/>) and an optional veracity proof about the Epoch Bell.</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker definition</name>
        <artwork type="CDDL" align="left"><![CDATA[
epoch-marker = [
  $tagged-epoch-id
  ? bell-veracity-proof
]

; veracity of the bell
bell-veracity-proof = non-empty<{
  ? remote-attestation-evidence ; could be EAT or Concise Evidence
  ? remote-attestation-result ; hopefully EAT with AR4SI Claims
  ? scitt-receipt ; SCITT receipt
}>

remote-attestation-evidence = (1: "PLEASE DEFINE")
remote-attestation-result = (2: "PLEASE DEFINE")
scitt-receipt = (3: "PLEASE DEFINE")

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-epoch-id
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(epoch-tick)
$tagged-epoch-id /= #6.26983(epoch-tick-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
]]></artwork>
      </figure>
      <t>The veracity proof can be encoded in an Evidence or Attestation Result conceptual message <xref target="RFC9334"/>, e.g., using <xref target="I-D.ietf-rats-eat"/>, <xref target="TCG-CoEvidence"/>, <xref target="I-D.ietf-rats-ar4si"/>, or SCITT receipts <xref target="I-D.ietf-scitt-architecture"/>.</t>
      <section anchor="epoch-payloads">
        <name>Epoch Marker Payloads</name>
        <t>This memo comes with a set of predefined payloads.</t>
        <section anchor="cbor-time-tags">
          <name>CBOR Time Tags</name>
          <t>A CBOR time representation choosing from CBOR tag 0 (tdate, RFC3339 time as a string), tag 1 (time, Posix time as int or float) or tag 1001 (extended time data item), optionally bundled with a nonce.</t>
          <t>See <xref section="3" sectionFormat="of" target="I-D.ietf-cbor-time-tag"/> for the (many) details about the CBOR extended
time format (tag 1001). See <xref target="STD94"/> for tdate (tag 0) and time (tag 1).</t>
          <sourcecode type="CDDL"><![CDATA[
cbor-epoch-id = [
   cbor-time
   ? nonce
]

etime = #6.1001({* (int/tstr) => any})

cbor-time = tdate / time / etime

nonce = tstr / bstr / int
]]></sourcecode>
          <t>The following describes each member of the cbor-epoch-id map.</t>
          <dl>
            <dt>etime:</dt>
            <dd>
              <t>A freshly sourced timestamp represented as either time or tdate (<xref target="STD94"/>, <xref target="RFC8610"/>) or etime <xref target="I-D.ietf-cbor-time-tag"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>An optional random byte string used as extra data in challenge-response interaction models (see <xref target="I-D.ietf-rats-reference-interaction-models"/>).</t>
            </dd>
          </dl>
          <section anchor="creation">
            <name>Creation</name>
            <t>To generate the cbor-time value, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-time-reqs"/>.</t>
            <t>If a nonce is generated, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="CDDL"><![CDATA[
classical-rfc3161-TST-info = bytes
]]></sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl>
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The DER-encoded TSTInfo generated by a <xref target="RFC3161"/> Time Stamping Authority.</t>
            </dd>
          </dl>
          <section anchor="creation-1">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as MessageImprint in its request to the TSA:</t>
            <sourcecode type="ASN.1"><![CDATA[
SEQUENCE {
  SEQUENCE {
    OBJECT      2.16.840.1.101.3.4.2.1 (sha256)
    NULL
  }
  OCTET STRING BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F
}
]]></sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
            <t>The TimeStampToken obtained by the TSA <bcp14>MUST</bcp14> be stripped of the TSA signature.
Only the TSTInfo is to be kept the rest <bcp14>MUST</bcp14> be discarded.
The Epoch Bell COSE signature will replace the TSA signature.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t><cref anchor="issue">Issue tracked at:</cref> https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker/issues/18</t>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical
<xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="CDDL"><![CDATA[
TST-info-based-on-CBOR-time-tag = {
  &(version : 0) => v1
  &(policy : 1) => oid
  &(messageImprint : 2) => MessageImprint
  &(serialNumber : 3) => integer
  &(eTime : 4) => profiled-etime
  ? &(ordering : 5) => bool .default false
  ? &(nonce : 6) => integer
  ? &(tsa : 7) => GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 => ~time
  ? -8 => profiled-duration
  * int => any
}
profiled-duration = {* int => any}

GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]
; See Section 4.2.1.6 of RFC 5280 for type/value
]]></sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's
policy under which the tst-info was produced.  Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.  Cf. messageImprint,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.  Cf.
serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.  Cf. genTime,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="I-D.ietf-cbor-time-tag"/>, indicated by CBOR tag 1001, profiled
as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>
              <t>The "base time" is encoded using key 1, indicating Posix time as int or float.</t>
            </li>
            <li>
              <t>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time".  The duration map
is profiled to disallow string keys.  This is an optional field.</t>
            </li>
            <li>
              <t>The map <bcp14>MAY</bcp14> also contain one or more integer keys, which may encode
supplementary information <cref anchor="tf1">Allowing unsigned integer (i.e., critical) keys goes counter interoperability</cref>.</t>
            </li>
          </ul>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely
based on the "base time". This is an optional field, whose default value is
"false".  Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.  Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint
in identifying the name of the TSA.  Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data
format.  Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.  Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
          <section anchor="creation-2">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as messageImprint in its request to the TSA:</t>
            <t><tt>cbor-diag
[
    / hashAlg   / -16, / sha-256 /
    / hashValue / h'BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F'
]
</tt></t>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick">
          <name>Epoch Tick</name>
          <t>An Epoch Tick is a single opaque blob sent to multiple consumers.</t>
          <sourcecode type="CDDL"><![CDATA[
; Epoch-Tick

epoch-tick = tstr / bstr / int
]]></sourcecode>
          <t>The following describes the epoch-tick type.</t>
          <dl>
            <dt>epoch-tick:</dt>
            <dd>
              <t>Either a string, a byte string, or an integer used by RATS roles within a trust domain as extra data included in conceptual messages <xref target="RFC9334"/> to associate them with a certain epoch.</t>
            </dd>
          </dl>
          <section anchor="creation-3">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick-list">
          <name>Multi-Nonce-List</name>
          <t>A list of nonces send to multiple consumer. The consumers use each Nonce in the list of Nonces sequentially. Technically, each sequential Nonce in the distributed list is not used just once, but by every Epoch Marker consumer involved. This renders each Nonce in the list a Multi-Nonce</t>
          <sourcecode type="CDDL"><![CDATA[
; Epoch-Tick-List

epoch-tick-list = [ + epoch-tick ]
]]></sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce-list:</dt>
            <dd>
              <t>A sequence of byte strings used by RATS roles in trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each nonce in the list is used in a consecutive production of a conceptual messages. Asserting freshness of a conceptual message including a nonce from the multi-nonce-list requires some state on the receiver side to assess if that nonce is the appropriate next unused nonce from the multi-nonce-list.</t>
            </dd>
          </dl>
          <section anchor="creation-4">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch bell.</t>
          <sourcecode type="CDDL"><![CDATA[
strictly-monotonic-counter = uint
]]></sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl>
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="sec-time-reqs">
        <name>Time Requirements</name>
        <t>Time <bcp14>MUST</bcp14> be sourced from a trusted clock.</t>
      </section>
      <section anchor="sec-nonce-reqs">
        <name>Nonce Requirements</name>
        <t>A nonce <bcp14>MUST</bcp14> be freshly generated.
The generated value <bcp14>MUST</bcp14> have at least 64 bits of entropy (before encoding).
The generated value <bcp14>MUST</bcp14> be generated via a cryptographically secure random number generator.</t>
        <t>A maximum nonce size of 512 bits is set to limit the memory requirements.
All receivers <bcp14>MUST</bcp14> be able to accommodate the maximum size.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR-encoding of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-epoch-tick"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-epoch-tick-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-iana-em-claim">
        <name> New EM CWT Claim</name>
        <t>This specification adds the following value to the "CBOR Web Token Claims" registry <xref target="IANA.cwt"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: em</t>
          </li>
          <li>
            <t>Claim Description: Epoch Marker</t>
          </li>
          <li>
            <t>Claim Key: 2000</t>
          </li>
          <li>
            <t>Claim Value Type(s): CBOR array</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="sec-epoch-markers"/> of RFCthis</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3161"/>
          <seriesInfo name="DOI" value="10.17487/RFC3161"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9054"/>
          <seriesInfo name="DOI" value="10.17487/RFC9054"/>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-time-tag">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Ben Gamari" initials="B." surname="Gamari">
              <organization>Well-Typed</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <date day="22" month="October" year="2023"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949) is a data
   format whose design goals include the possibility of extremely small
   code size, fairly small message size, and extensibility without the
   need for version negotiation.

   In CBOR, one point of extensibility is the definition of CBOR tags.
   RFC 8949 defines two tags for time: CBOR tag 0 (RFC3339 time as a
   string) and tag 1 (POSIX time as int or float).  Since then,
   additional requirements have become known.  The present document
   defines a CBOR tag for time that allows a more elaborate
   representation of time, as well as related CBOR tags for duration and
   time period.  This document is intended as the reference document for
   the IANA registration of the CBOR tags defined.


   // (This cref will be removed by the RFC editor:) The present
   // revision (–11) addresses the ARTART and IOTDIR directorate
   // reviews.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-time-tag-11"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-07"/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T" value="Recommendation X.690"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.cbor-tags" target="http://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="10" month="September" year="2023"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-08"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
              <organization>RKVST</organization>
            </author>
            <date day="16" month="October" year="2023"/>
            <abstract>
              <t>   Traceability of physical and digital Artifacts in supply chains is a
   long-standing, but increasingly serious security concern.  The rise
   in popularity of verifiable data structures as a mechanism to make
   actors more accountable for breaching their compliance promises has
   found some successful applications to specific use cases (such as the
   supply chain for digital certificates), but lacks a generic and
   scalable architecture that can address a wider range of use cases.

   This document defines a generic, interoperable and scalable
   architecture to enable transparency across any supply chain with
   minimum adoption barriers.  It provides flexibility, enabling
   interoperability across different implementations of Transparency
   Services with various auditing and compliance requirements.
   Producers can register their Signed Statements on any Transparency
   Service, with the guarantee that all Consumers will be able to verify
   them.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-03"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="14" month="October" year="2023"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-22"/>
        </reference>
        <reference anchor="TCG-CoEvidence" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Concise-Evidence-Binding-for-SPDM-Version-1.0-Revision-53_1August2023.pdf">
          <front>
            <title>TCG DICE Concise Evidence Binding for SPDM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2023" month="June"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="30" month="August" year="2023"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-05"/>
        </reference>
        <reference anchor="IANA.cwt" target="http://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
    </references>
    <?line 496?>

<section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an epoch marker with a cbor-epoch-id and no
bell veracity proof.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR epoch id without bell veracity proof</name>
        <artwork type="CBOR-DIAG" align="center"><![CDATA[
[
  / cbor-epoch-id / [
    / 1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
    / etime / 1001({
        1: 851042397,
      -10: "America/Los_Angeles",
      -11: { "u-ca": "hebrew" }
    })
  ]
  / no bell veracity proof /
]
]]></artwork>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depects the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="ASN.1"><![CDATA[
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
]]></sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
