<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-rats-epoch-markers-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-rats-epoch-markers-08"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2024" month="July" day="22"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 94?>

<t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system. Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell. Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock). Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birkholz-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="RFC9334"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock where the ticks are conveyed by the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.  This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "epoch id" types are defined to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While Epoch Markers are encoded in CBOR <xref target="STD94"/>, and many of the epoch id types are themselves encoded in CBOR, a prominent format in this space is the Time-Stamp Token defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
Time-Stamp Tokens (TST) are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an epoch id type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp, and therefore other kinds of payloads that can be used to implement Epoch Markers.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The top-level structure of Epoch Markers and an initial set of epoch id types are specified using CDDL <xref target="RFC8610"/>.
To increase trustworthiness in the Epoch Bell, Epoch Markers also provide the option to include a "veracity proof" in the form of attestation evidence, attestation results, or SCITT receipts <xref target="I-D.ietf-scitt-architecture"/> associated with the trust status of the Epoch Bell.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="STD94"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>.</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in Section 10.3 of the RATS architecture <xref target="RFC9334"/>.</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models.
In general, there are three interaction models:</t>
      <ul spacing="normal">
        <li>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to Section 7.1 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to Section 7.2 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to Section 7.3 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
      </ul>
      <t>In all three interaction models, Epoch Markers can be used as content for the generic information element 'handle'.
Handles are most useful to establish freshness in unsolicited and solicited distribution by the Epoch Bell.
An Epoch Marker can be used as a nonce in challenge-response remote attestation (e.g., for limiting the number of ad-hoc requests by a Verifier).
Using an Epoch Marker requires the challenger to acquire an Epoch Marker beforehand, which may introduce a sensible overhead compared to using a simple nonce.</t>
    </section>
    <section anchor="sec-epoch-markers">
      <name>Epoch Marker Structure</name>
      <t>At the top level, an Epoch Marker is a CBOR array carrying the actual epoch id (<xref target="epoch-payloads"/>) and an optional veracity proof about the Epoch Bell.</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker definition</name>
        <artwork type="cddl" align="left"><![CDATA[
epoch-marker = [
  $tagged-epoch-id
  ? bell-veracity-proof
]

; veracity of the bell
bell-veracity-proof = non-empty<{
  ? remote-attestation-evidence ; could be EAT or Concise Evidence
  ? remote-attestation-result ; hopefully EAT with AR4SI Claims
  ? scitt-receipt ; SCITT receipt
}>

remote-attestation-evidence = (1: "PLEASE DEFINE")
remote-attestation-result = (2: "PLEASE DEFINE")
scitt-receipt = (3: "PLEASE DEFINE")

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-epoch-id
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(epoch-tick)
$tagged-epoch-id /= #6.26983(epoch-tick-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
]]></artwork>
      </figure>
      <t>The veracity proof can be encoded in an Evidence or Attestation Result conceptual message <xref target="RFC9334"/>, e.g., using <xref target="I-D.ietf-rats-eat"/>, <xref target="TCG-CoEvidence"/>, <xref target="I-D.ietf-rats-ar4si"/>, or SCITT receipts <xref target="I-D.ietf-scitt-architecture"/>.</t>
      <section anchor="epoch-payloads">
        <name>Epoch Marker Payloads</name>
        <t>This memo comes with a set of predefined payloads.</t>
        <section anchor="cbor-time-tags">
          <name>CBOR Time Tags</name>
          <t>A CBOR time representation choosing from CBOR tag 0 (<tt>tdate</tt>, RFC3339 time as a string), tag 1 (<tt>time</tt>, Posix time as int or float) or tag 1001 (extended time data item), optionally bundled with a nonce.</t>
          <t>See <xref section="3" sectionFormat="of" target="I-D.ietf-cbor-time-tag"/> for the (many) details about the CBOR extended
time format (tag 1001). See <xref target="STD94"/> for <tt>tdate</tt> (tag 0) and <tt>time</tt> (tag 1).</t>
          <sourcecode type="cddl">
cbor-epoch-id = [
   cbor-time
   ? nonce
]

etime = #6.1001({* (int/tstr) =&gt; any})

cbor-time = tdate / time / etime

nonce = tstr / bstr / int
</sourcecode>
          <t>The following describes each member of the cbor-epoch-id map.</t>
          <dl>
            <dt>etime:</dt>
            <dd>
              <t>A freshly sourced timestamp represented as either time or tdate (<xref target="STD94"/>, <xref target="RFC8610"/>) or etime <xref target="I-D.ietf-cbor-time-tag"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>An optional random byte string used as extra data in challenge-response interaction models (see <xref target="I-D.ietf-rats-reference-interaction-models"/>).</t>
            </dd>
          </dl>
          <section anchor="creation">
            <name>Creation</name>
            <t>To generate the cbor-time value, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-time-reqs"/>.</t>
            <t>If a nonce is generated, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="cddl">
classical-rfc3161-TST-info = bytes
</sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl>
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The DER-encoded TSTInfo generated by a <xref target="RFC3161"/> Time Stamping Authority.</t>
            </dd>
          </dl>
          <section anchor="creation-1">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as MessageImprint in its request to the TSA:</t>
            <sourcecode type="asn.1">
SEQUENCE {
  SEQUENCE {
    OBJECT      2.16.840.1.101.3.4.2.1 (sha256)
    NULL
  }
  OCTET STRING
    BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F
}
</sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
            <t>The TimeStampToken obtained by the TSA <bcp14>MUST</bcp14> be stripped of the TSA signature.
Only the TSTInfo is to be kept the rest <bcp14>MUST</bcp14> be discarded.
The Epoch Bell COSE signature will replace the TSA signature.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t><cref anchor="issue">Issue tracked at:</cref> https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker/issues/18</t>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical
<xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="cddl">
TST-info-based-on-CBOR-time-tag = {
  &amp;(version : 0) =&gt; v1
  &amp;(policy : 1) =&gt; oid
  &amp;(messageImprint : 2) =&gt; MessageImprint
  &amp;(serialNumber : 3) =&gt; integer
  &amp;(eTime : 4) =&gt; profiled-etime
  ? &amp;(ordering : 5) =&gt; bool .default false
  ? &amp;(nonce : 6) =&gt; integer
  ? &amp;(tsa : 7) =&gt; GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 =&gt; ~time
  ? -8 =&gt; profiled-duration
  * int =&gt; any
}
profiled-duration = {* int =&gt; any}

GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]
; See Section 4.2.1.6 of RFC 5280 for type/value
</sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's
policy under which the tst-info was produced.  Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.  Cf. messageImprint,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.  Cf.
serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.  Cf. genTime,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="I-D.ietf-cbor-time-tag"/>, indicated by CBOR tag 1001, profiled
as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>The "base time" is encoded using key 1, indicating Posix time as int or float.</li>
            <li>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time".  The duration map
is profiled to disallow string keys.  This is an optional field.</li>
            <li>The map <bcp14>MAY</bcp14> also contain one or more integer keys, which may encode
supplementary information <cref anchor="tf1">Allowing unsigned integer (i.e., critical) keys goes counter interoperability</cref>.</li>
          </ul>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely
based on the "base time". This is an optional field, whose default value is
"false".  Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.  Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint
in identifying the name of the TSA.  Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data
format.  Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.  Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
          <section anchor="creation-2">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as messageImprint in its request to the TSA:</t>
            <sourcecode type="cbor-diag">
[
    / hashAlg   / -16, / sha-256 /
    / hashValue / h'BF4EE9143EF2329B1B778974AAD44506
                    4940B9CAE373C9E35A7B23361282698F'
]
</sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick">
          <name>Epoch Tick</name>
          <t>An Epoch Tick is a single opaque blob sent to multiple consumers.</t>
          <sourcecode type="cddl">
; Epoch-Tick

epoch-tick = tstr / bstr / int
</sourcecode>
          <t>The following describes the epoch-tick type.</t>
          <dl>
            <dt>epoch-tick:</dt>
            <dd>
              <t>Either a string, a byte string, or an integer used by RATS roles within a trust domain as extra data included in conceptual messages <xref target="RFC9334"/> to associate them with a certain epoch.</t>
            </dd>
          </dl>
          <section anchor="creation-3">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick-list">
          <name>Multi-Nonce-List</name>
          <t>A list of nonces send to multiple consumer. The consumers use each Nonce in the list of Nonces sequentially. Technically, each sequential Nonce in the distributed list is not used just once, but by every Epoch Marker consumer involved. This renders each Nonce in the list a Multi-Nonce</t>
          <sourcecode type="cddl">
; Epoch-Tick-List

epoch-tick-list = [ + epoch-tick ]
</sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce-list:</dt>
            <dd>
              <t>A sequence of byte strings used by RATS roles in trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each nonce in the list is used in a consecutive production of a conceptual messages. Asserting freshness of a conceptual message including a nonce from the multi-nonce-list requires some state on the receiver side to assess if that nonce is the appropriate next unused nonce from the multi-nonce-list.</t>
            </dd>
          </dl>
          <section anchor="creation-4">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch bell.</t>
          <sourcecode type="cddl">
strictly-monotonic-counter = uint
</sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl>
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="sec-time-reqs">
        <name>Time Requirements</name>
        <t>Time <bcp14>MUST</bcp14> be sourced from a trusted clock.</t>
      </section>
      <section anchor="sec-nonce-reqs">
        <name>Nonce Requirements</name>
        <t>A nonce <bcp14>MUST</bcp14> be freshly generated.
The generated value <bcp14>MUST</bcp14> have at least 64 bits of entropy (before encoding).
The generated value <bcp14>MUST</bcp14> be generated via a cryptographically secure random number generator.</t>
        <t>A maximum nonce size of 512 bits is set to limit the memory requirements.
All receivers <bcp14>MUST</bcp14> be able to accommodate the maximum size.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR-encoding of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-epoch-tick"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-epoch-tick-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-iana-em-claim">
        <name>&nbsp;New EM CWT Claim</name>
        <t>This specification adds the following value to the "CBOR Web Token Claims" registry <xref target="IANA.cwt"/>.</t>
        <ul spacing="normal">
          <li>Claim Name: em</li>
          <li>Claim Description: Epoch Marker</li>
          <li>Claim Key: 2000 (IANA: suggested assignment)</li>
          <li>Claim Value Type(s): CBOR array</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="sec-epoch-markers"/> of RFCthis</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC3161"/>
            <seriesInfo name="RFC" value="3161"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <seriesInfo name="DOI" value="10.17487/RFC5652"/>
            <seriesInfo name="RFC" value="5652"/>
            <seriesInfo name="STD" value="70"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9090"/>
            <seriesInfo name="RFC" value="9090"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9054"/>
            <seriesInfo name="RFC" value="9054"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cbor-time-tag">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-time-tag-12"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Ben Gamari" initials="B." surname="Gamari">
              <organization>Well-Typed</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <date day="30" month="October" year="2023"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949) is a data
   format whose design goals include the possibility of extremely small
   code size, fairly small message size, and extensibility without the
   need for version negotiation.

   In CBOR, one point of extensibility is the definition of CBOR tags.
   RFC 8949 defines two tags for time: CBOR tag 0 (RFC3339 time as a
   string) and tag 1 (POSIX time as int or float).  Since then,
   additional requirements have become known.  The present document
   defines a CBOR tag for time that allows a more elaborate
   representation of time, as well as related CBOR tags for duration and
   time period.  This document is intended as the reference document for
   the IANA registration of the CBOR tags defined.


   // (This cref will be removed by the RFC editor:) The present
   // revision (-12) addresses the IESG reviews.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-11"/>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50% while also significantly reducing memory and code size
   compared to ASN.1.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 Certificate Signing Requests, C509 COSE headers, a
   C509 TLS certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <seriesInfo name="ITU-T" value="Recommendation X.690"/>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-11"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="22" month="July" year="2024"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-08"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
              <organization>DataTrails</organization>
            </author>
            <date day="22" month="July" year="2024"/>
            <abstract>
              <t>   Traceability of physical and digital Artifacts in supply chains is a
   long-standing, but increasingly serious security concern.  The rise
   in popularity of verifiable data structures as a mechanism to make
   actors more accountable for breaching their compliance promises has
   found some successful applications to specific use cases (such as the
   supply chain for digital certificates), but lacks a generic and
   scalable architecture that can address a wider range of use cases.

   This document defines a generic, interoperable and scalable
   architecture to enable transparency across any supply chain with
   minimum adoption barriers.  It provides flexibility, enabling
   interoperability across different implementations of Transparency
   Services with various auditing and compliance requirements.  Issuers
   can register their Signed Statements on any Transparency Service,
   with the guarantee that any Relying Parties will be able to verify
   them.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-29"/>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="TCG-CoEvidence" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Concise-Evidence-Binding-for-SPDM-Version-1.0-Revision-53_1August2023.pdf">
          <front>
            <title>TCG DICE Concise Evidence Binding for SPDM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2023" month="June"/>
          </front>
          <refcontent>Version 1.00</refcontent>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-06"/>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date day="22" month="March" year="2018"/>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date day="19" month="September" year="2013"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 499?>

<section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an epoch marker with a cbor-epoch-id and no
bell veracity proof.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR epoch id without bell veracity proof</name>
        <artwork type="cbor-diag" align="center"><![CDATA[
[
  / cbor-epoch-id / [
    / 1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
    / etime / 1001({
        1: 851042397,
      -10: "America/Los_Angeles",
      -11: { "u-ca": "hebrew" }
    })
  ]
  / no bell veracity proof /
]
]]></artwork>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depicts the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="asn.1">
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
</sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
