<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY SELF "RFCthis">
]>


<rfc ipr="trust200902" docName="draft-fft-rats-eat-measured-component-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="EAT Measured Component">EAT Measured Component</title>

    <author initials="S." surname="Frost" fullname="Simon Frost">
      <organization>Arm</organization>
      <address>
        <email>Simon.Frost@arm.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>Hannes.Tschofenig@siemens.com</email>
      </address>
    </author>

    <date year="2024" month="March" day="03"/>

    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT</keyword> <keyword>measurements</keyword> <keyword>claim</keyword> <keyword>measured</keyword> <keyword>component</keyword>

    <abstract>


<?line 48?>

<t>This document defines a "measured components" format that can be used with the EAT Measurements claim.</t>



    </abstract>



  </front>

  <middle>


<?line 52?>

<section anchor="introduction"><name>Introduction</name>

<t><xref section="4.2.16" sectionFormat="of" target="I-D.ietf-rats-eat"/> defines a Measurements claim that:</t>

<ul empty="true"><li>
  <t>"[c]ontains descriptions, lists, evidence or measurements of the software that exists on the entity or any other measurable subsystem of the entity."</t>
</li></ul>

<t>This claim allows for different measurement formats, each identified by a different CoAP Content-Format (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
Initially, the only specified format is CoSWID of type "evidence", as per <xref section="2.9.4" sectionFormat="of" target="RFC9393"/>.</t>

<t>This document introduces the "measured components" format that can be used with the EAT Measurements claim in addition or as an alternative to CoSWID.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> <xref target="I-D.ietf-cbor-cddl-modules"/> <xref target="I-D.ietf-cbor-cddl-more-control"/> is used to describe the data formats.</t>

</section>
<section anchor="measured-component"><name>Information Model</name>

<t>A measured component information element includes the computed digest on the software or configuration payload, along with metadata that helps in identifying the measurement and the authorizing entity for component installation.</t>

<t><xref target="tab-mc-info-elems"/> describes the information model of a measured component.</t>

<texttable title="Measured Component Information Elements" anchor="tab-mc-info-elems">
      <ttcol align='left'>IE</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Requirement Level</ttcol>
      <c>Component Name</c>
      <c>The name given to a measured component. It is important that this name remains consistent across different releases to allow for better tracking of the same measured item across updates. When combined with a consistent versioning scheme, it enables better signaling from the appraisal procedure to the relying parties.</c>
      <c><bcp14>REQUIRED</bcp14></c>
      <c>Component Version</c>
      <c>A value representing the specific release or development version of the measured component.  Using Semantic Versioning is <bcp14>RECOMMENDED</bcp14>.</c>
      <c><bcp14>OPTIONAL</bcp14></c>
      <c>Digest Value</c>
      <c>Hash of the invariant part of the component that is loaded in memory at startup time.</c>
      <c><bcp14>REQUIRED</bcp14></c>
      <c>Digest Algorithm</c>
      <c>Hash algorithm used to compute the Digest Value.</c>
      <c><bcp14>REQUIRED</bcp14></c>
      <c>Signer</c>
      <c>A unique identifier of the entity authorizing installation of the measured component.</c>
      <c><bcp14>REQUIRED</bcp14></c>
      <c>Countersigners</c>
      <c>One or more unique identifiers of further authorizing entities for component installation</c>
      <c><bcp14>OPTIONAL</bcp14></c>
</texttable>

</section>
<section anchor="data-model"><name>Data Model</name>

<t>The data model is inspired by the "PSA software component" claim (<xref section="4.4.1" sectionFormat="of" target="I-D.tschofenig-rats-psa-token"/>), which has been slightly refactored to take into account the recommendations about new EAT claims design in <xref section="E" sectionFormat="of" target="I-D.ietf-rats-eat"/>.</t>

<t>The following types and semantics have been reused:</t>

<t><list style="symbols">
  <t>COSE Key Thumbprint <xref target="I-D.ietf-cose-key-thumbprint"/>, for signer and countersigners;</t>
  <t>CoSWID software name and version <xref target="RFC9393"/>, for component name and version;</t>
  <t>CoRIM digest <xref target="I-D.ietf-rats-corim"/>, for digest value and algorithm.</t>
</list></t>

<section anchor="cddl"><name>CDDL</name>

<t>The <spanx style="verb">measured-component</spanx> data item:</t>

<figure><sourcecode type="cddl"><![CDATA[
measured-component = [
  id:               component-id
  measurement:      corim.digest
  signer:           ckt
  ? countersigners: [ + ckt ]
]

; COSE Key Thumbprint
ckt = bytes

component-id = [
  name:      text
  ? version: version
]

;# import $version-scheme from rfc9393 as coswid

version = [
  val:      text 
  ? scheme: coswid.$version-scheme
]

; eventually: ";#import digest from rfcxxxx as corim"

corim.digest = [
  alg: (int / text)
  val: bytes
]
]]></sourcecode></figure>

<t>The CDDL extending the EAT Measurements format:</t>

<figure><sourcecode type="cddl"><![CDATA[
mc-cbor = bstr .cbor measured-component
mc-json = tstr .json measured-component

; EAT CBOR (`.feature "cbor"`)
$measurements-body-cbor /= mc-cbor            ; native
$measurements-body-cbor /= tstr .b64u mc-json ; tunnel

; EAT JSON (`.feature "json"`)
$measurements-body-json /= mc-json            ; native
$measurements-body-json /= tstr .b64u mc-cbor ; tunnel
]]></sourcecode></figure>

<section anchor="cwt"><name>CWT</name>

<texttable>
      <ttcol align='left'>content-type (CoAP C-F equivalent)</ttcol>
      <ttcol align='left'>content-format</ttcol>
      <c><spanx style="verb">application/measured-component+cbor</spanx></c>
      <c><spanx style="verb">mc-cbor</spanx></c>
      <c><spanx style="verb">application/measured-component+json</spanx></c>
      <c><spanx style="verb">tstr .b64u mc-json</spanx></c>
</texttable>

</section>
<section anchor="jwt"><name>JWT</name>

<texttable>
      <ttcol align='left'>content-type (CoAP C-F equivalent)</ttcol>
      <ttcol align='left'>content-format</ttcol>
      <c><spanx style="verb">application/measured-component+json</spanx></c>
      <c><spanx style="verb">mc-json</spanx></c>
      <c><spanx style="verb">application/measured-component+cbor</spanx></c>
      <c><spanx style="verb">tstr .b64u mc-cbor</spanx></c>
</texttable>

</section>
</section>
</section>
<section anchor="examples"><name>Examples</name>

<t>(The examples are CBOR only.
JSON examples will be added in a future version of this document.)</t>

<t>The example in <xref target="ex-1"/> is a measured component with all the fields populated.</t>

<figure title="Complete Measured Component" anchor="ex-1"><sourcecode type="cbor-edn"><![CDATA[
[
  / id / [
    / name / "boot loader X",
    / version / [
      "1.2.3rc2",
      16384 / semver /
    ]
  ],
  / measurement / [
    / alg / "sha-256",
    / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31dbe7af4b37
              3431fc7d319da3'
  ],
  / signer / h'492e9b676c21f6012b1ceeb9032feb4141a880797355f6675
              015ec59c51ca1ec',
  / countersigners / [
    h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb814d6ff5
      7a8a5e'
  ]
]
]]></sourcecode></figure>

<t>The example in <xref target="ex-eat-1"/> is the same measured component as above but used as the format of a <spanx style="verb">measurements</spanx> claim in a EAT claims-set.</t>

<t>Note that the example uses a CoAP Content-Format value from the experimental range (65000), which will change to the value assigned by IANA for the <spanx style="verb">application/measured-component+cbor</spanx> Content-Format.</t>

<t>Note also that the array contains only one measured component, but additional entries could be added if the measured TCB is made of multiple, individually measured components.</t>

<figure title="EAT Measurements Claim using a Measured Component" anchor="ex-eat-1"><sourcecode type="cbor-edn"><![CDATA[
{
  273: [
    [
      65000, / using a CoAP C-F from the experimental range /
      <<
        [
          / id / [
            / name / "boot loader X",
            / version / [
              "1.2.3rc2",
              16384 / semver /
            ]
          ],
          / measurement / [
            / alg / "sha-256",
            / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31db
                      e7af4b373431fc7d319da3'
          ],
          / signer / h'492e9b676c21f6012b1ceeb9032feb4141a880797
                      355f6675015ec59c51ca1ec',
          / countersigners / [
            h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb
              814d6ff57a8a5e'
          ]
        ]
      >>
    ]
  ]
}
]]></sourcecode></figure>

</section>
<section anchor="seccons"><name>Security Considerations</name>

<t>TODO</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t><cref anchor="rfced">RFC Editor:</cref> replace "&SELF;" with the RFC number assigned to this document.</t>

<section anchor="media-types-registrations"><name>Media Types Registrations</name>

<t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>

<texttable title="Measured Component Media Types" anchor="tab-mc-regs">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Template</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c><spanx style="verb">mc+cbor</spanx></c>
      <c><spanx style="verb">application/measured-component+cbor</spanx></c>
      <c>&SELF;</c>
      <c><spanx style="verb">mc+json</spanx></c>
      <c><spanx style="verb">application/measured-component+json</spanx></c>
      <c>&SELF;</c>
</texttable>

<section anchor="applicationmeasured-componentcbor"><name><spanx style="verb">application/measured-component+cbor</spanx></name>

<dl spacing="compact">
  <dt>Type name:</dt>
  <dd>
    <t>application</t>
  </dd>
  <dt>Subtype name:</dt>
  <dd>
    <t>measured-component+cbor</t>
  </dd>
  <dt>Required parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Optional parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Encoding considerations:</dt>
  <dd>
    <t>binary (CBOR)</t>
  </dd>
  <dt>Security considerations:</dt>
  <dd>
    <t><xref target="seccons"/> of &SELF;</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Published specification:</dt>
  <dd>
    <t>&SELF;</t>
  </dd>
  <dt>Applications that use this media type:</dt>
  <dd>
    <t>Attesters, Verifiers and Relying Parties</t>
  </dd>
  <dt>Fragment identifier considerations:</dt>
  <dd>
    <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
  </dd>
  <dt>Person &amp; email address to contact for further information:</dt>
  <dd>
    <t>RATS WG mailing list (rats@ietf.org)</t>
  </dd>
  <dt>Intended usage:</dt>
  <dd>
    <t>COMMON</t>
  </dd>
  <dt>Restrictions on usage:</dt>
  <dd>
    <t>none</t>
  </dd>
  <dt>Author/Change controller:</dt>
  <dd>
    <t>IETF</t>
  </dd>
  <dt>Provisional registration:</dt>
  <dd>
    <t>no</t>
  </dd>
</dl>

</section>
<section anchor="applicationmeasured-componentjson"><name><spanx style="verb">application/measured-component+json</spanx></name>

<dl spacing="compact">
  <dt>Type name:</dt>
  <dd>
    <t>application</t>
  </dd>
  <dt>Subtype name:</dt>
  <dd>
    <t>measured-component+json</t>
  </dd>
  <dt>Required parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Optional parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Encoding considerations:</dt>
  <dd>
    <t>binary (JSON is UTF-8-encoded text)</t>
  </dd>
  <dt>Security considerations:</dt>
  <dd>
    <t><xref target="seccons"/> of &SELF;</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Published specification:</dt>
  <dd>
    <t>&SELF;</t>
  </dd>
  <dt>Applications that use this media type:</dt>
  <dd>
    <t>Attesters, Verifiers and Relying Parties</t>
  </dd>
  <dt>Fragment identifier considerations:</dt>
  <dd>
    <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
  </dd>
  <dt>Person &amp; email address to contact for further information:</dt>
  <dd>
    <t>RATS WG mailing list (rats@ietf.org)</t>
  </dd>
  <dt>Intended usage:</dt>
  <dd>
    <t>COMMON</t>
  </dd>
  <dt>Restrictions on usage:</dt>
  <dd>
    <t>none</t>
  </dd>
  <dt>Author/Change controller:</dt>
  <dd>
    <t>IETF</t>
  </dd>
  <dt>Provisional registration:</dt>
  <dd>
    <t>no</t>
  </dd>
</dl>

</section>
</section>
<section anchor="measured-component-content-format-registrations"><name>Measured Component Content-Format Registrations</name>

<t>IANA is requested to register two Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>, as follows:</t>

<texttable>
      <ttcol align='left'>Content-Type</ttcol>
      <ttcol align='left'>Content Coding</ttcol>
      <ttcol align='left'>ID</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>application/measured-component+cbor</c>
      <c>-</c>
      <c>TBD1</c>
      <c>&SELF;</c>
      <c>application/measured-component+json</c>
      <c>-</c>
      <c>TBD2</c>
      <c>&SELF;</c>
</texttable>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor="RFC7252">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>

<reference anchor="RFC8610">
  <front>
    <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="C. Vigano" initials="C." surname="Vigano"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2019"/>
    <abstract>
      <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8610"/>
  <seriesInfo name="DOI" value="10.17487/RFC8610"/>
</reference>

<reference anchor="RFC9165">
  <front>
    <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="December" year="2021"/>
    <abstract>
      <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
      <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:,, and for the construction of constants; / for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and for indicating the use of a non-basic feature in an instance.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9165"/>
  <seriesInfo name="DOI" value="10.17487/RFC9165"/>
</reference>


<reference anchor="I-D.ietf-cbor-cddl-modules">
   <front>
      <title>CDDL Module Structure</title>
      <author fullname="Carsten Bormann" initials="C." surname="Bormann">
         <organization>Universität Bremen TZI</organization>
      </author>
      <date day="18" month="December" year="2023"/>
      <abstract>
	 <t>   At the time of writing, the Concise Data Definition Language (CDDL)
   is defined by RFC 8610 and RFC 9165.  The latter has used the
   extension point provided in RFC 8610, the _control operator_.

   As CDDL is being used in larger projects, the need for corrections
   and additional features has become known that cannot be easily mapped
   into this single extension point.  Hence, there is a need for
   evolution of the base CDDL specification itself.

   The present document defines a backward- and forward-compatible way
   to add a module structure to CDDL.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-modules-01"/>
   
</reference>


<reference anchor="I-D.ietf-cbor-cddl-more-control">
   <front>
      <title>More Control Operators for CDDL</title>
      <author fullname="Carsten Bormann" initials="C." surname="Bormann">
         <organization>Universität Bremen TZI</organization>
      </author>
      <date day="26" month="February" year="2024"/>
      <abstract>
	 <t>   The Concise Data Definition Language (CDDL), standardized in RFC
   8610, provides &quot;control operators&quot; as its main language extension
   point.  RFCs have added to this extension point both in an
   application-specific and a more general way.

   The present document defines a number of additional generally
   applicable control operators for text conversion (Bytes, Integers,
   JSON, Printf-style formatting), operations on text, and deterministic
   encoding.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-more-control-03"/>
   
</reference>

<reference anchor="RFC9393">
  <front>
    <title>Concise Software Identification Tags</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
    <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
    <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
    <date month="June" year="2023"/>
    <abstract>
      <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9393"/>
  <seriesInfo name="DOI" value="10.17487/RFC9393"/>
</reference>


<reference anchor="I-D.ietf-rats-eat">
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
         </author>
      <author fullname="Jeremy O&#x27;Donoghue" initials="J." surname="O&#x27;Donoghue">
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname="Carl Wallace" initials="C." surname="Wallace">
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day="15" month="January" year="2024"/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-25"/>
   
</reference>


<reference anchor="I-D.ietf-cose-key-thumbprint">
   <front>
      <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
      <author fullname="Kohei Isobe" initials="K." surname="Isobe">
         <organization>SECOM CO., LTD.</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Transmute</organization>
      </author>
      <date day="23" month="October" year="2023"/>
      <abstract>
	 <t>   This specification defines a method for computing a hash value over a
   COSE Key. It defines which fields in a COSE Key structure are used in
   the hash computation, the method of creating a canonical form of the
   fields, and how to hash the byte sequence.  The resulting hash value
   can be used for identifying or selecting a key that is the subject of
   the thumbprint.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-key-thumbprint-04"/>
   
</reference>


<reference anchor="I-D.ietf-rats-corim">
   <front>
      <title>Concise Reference Integrity Manifest</title>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>arm</organization>
      </author>
      <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
         <organization>arm</organization>
      </author>
      <author fullname="Ned Smith" initials="N." surname="Smith">
         <organization>Intel</organization>
      </author>
      <author fullname="Wei Pan" initials="W." surname="Pan">
         <organization>Huawei Technologies</organization>
      </author>
      <date day="23" month="October" year="2023"/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies the information elements for representing Endorsements and
   Reference Values in CBOR format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-03"/>
   
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
  <front>
    <title>Media Types</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>

<reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
  <front>
    <title>Constrained RESTful Environments (CoRE) Parameters</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor="I-D.tschofenig-rats-psa-token">
   <front>
      <title>Arm&#x27;s Platform Security Architecture (PSA) Attestation Token</title>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Simon Frost" initials="S." surname="Frost">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Mathias Brossard" initials="M." surname="Brossard">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
         <organization>HP Labs</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>Linaro</organization>
      </author>
      <date day="21" month="February" year="2024"/>
      <abstract>
	 <t>   The Arm Platform Security Architecture (PSA) is a family of hardware
   and firmware security specifications, as well as open-source
   reference implementations, to help device makers and chip
   manufacturers build best-practice security into products.  Devices
   that are PSA compliant can produce attestation tokens as described in
   this memo, which are the basis for many different protocols,
   including secure provisioning and network access control.  This
   document specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by PSA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with ARM&#x27;s architecture.  It is not a
   standard nor a product of the IETF.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-22"/>
   
</reference>




    </references>


<?line 371?>

<section anchor="collected-cddl"><name>Collected CDDL</name>

<t>TODO</t>

</section>
<section anchor="open-issues"><name>Open Issues</name>

<t>The list of currently open issues for this documents can be found at <eref target="https://github.com/thomas-fossati/draft-fft-rats-eat-measured-component/issues"></eref>.</t>

<t><cref>Note to RFC Editor: please remove before publication.</cref></t>

</section>
<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank
Carsten Bormann
for comments, reviews and suggestions.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA+1a63LjuLH+j6fAkVNZT2LSulqW5rKr8eWskxnbsTzZpKZ8
YpAELR5TJJcg7VE82mfJs+TJ0t0ASOoyEye1yZ9EVZYFEOhu9A1fA3Qchz2M
eY+xIipiOeYnk2v+XgpV5jLgR+k8SxOZFEx4Xi5hYGv78xYLUj8RcyAQ5CIs
nBD+clEoR4rCmZvxjm/HO7EopCqYD//u0nwx5qoImJ8mSiaqVGNe5KVkqvTm
kVJRmlwvMiB9dnJ9yliU5fRcFd12e9TuMpFLAZJNpV/mUbFoscc0v7/L0zKD
3is5TwvJJ9fITxRAi1/mqS8DEGjaYvdyAaODMf+IK9/jRtQ5yKj2uB+LaF51
BtBhF8BvGAN6SfAnEUPHmC+kYmou8uJPP5bAEJaQpCyLgHCR+ntcpXmRyxBo
qsUcf8B8URazNB8z7nCtumk0B/FO8xQ0wzlP8zuRRH8mocd8ks+xU85FFJuh
Lg39TuRzFwSr6VzP0rlQ/DRVCiZvknoXJSJPG9T0BNdM+C6m5y5Mqml+L5JE
Kn6t/FkayiS62yQ7jVBvqkFXT3LrSd8pPYbkZUmaz2HugwQd8KvTo2F30B2D
jkWm24cHnTa0gyDW7VHnYKDbWVwinzPn2I1kETq+l+YOPnDmaVDGqH5sQeNL
o3IJ3pgUeRrroX4RK8OlN+qhFOoxWplt3XnM7a8V2qmSDniTU8zKuZflUVIQ
kfXODYp+mkdzHAr/wLmTsKkUHFpU2tMTMiWcIr2XoPHqJ2Pgk+D7OGd68u4U
Hf/0qJhFqsWY4zhceKrIhV8wdg2dHKK1RB/ngQwjtKvgLevltZOrFtfS8GIG
X75IuCd5qWDMY1TMoFc28wUFjY4ZV3OdR6BZydgOP0NVB6WPnsLY0xMEK8Vi
3+26nQOehrzS73LZkGqTNMkyZuwNb330b8CEIkpgQVL5eZQhTYixOFIYvvIh
CmTiS/DTlcBGdii7SsPiEbKHXp78hLM4CIXPtD5xpkjgH3RZGsKLYWrpqYUq
5NzS0uPdllGwFlXEcfqoUIk8iMJQ5qjyhiRGvSiq8GccpS2iMAL9egtYfD3n
KJ1cwldSYO481TbZrbXY6bo90iHGznL5wmVnSVREwH6xR9KlSbzgKpO+pm6s
CnIepdMfzo5pEZBiecuqrLXHIYNksOiaS9cduX3DBoNjuXTX3SkyZgbbIduf
1aeAOBdBEJEsaBfwD+iJC5knFDC8SM16XHQ5UNcD6hM8AgYG/BidimYrFFty
CEyOyV/x1vsP02tYMv3n5xf0++rkdx/Ork6O8ff0+8m7d9UPZkZMv7/48O64
/lXPPLp4//7k/FhPhl6+0sVa7yd/RA2DVK2Ly+uzi/PJuxaur1jRJrlmivoB
vco8y2UBahKKaW/3oAFz3h5d/vUvnT4Y6n8g5rudzggiSDcOO8M+NB5nMtHc
yA90ExS9YCLLpMhJs3EMxsiiQsSKbK9m6WPCwe0laPNXH1EzN2P+yvOzTv+N
6cAFr3Rana10ks42ezYmayVu6drCptLmSv+aplflnfxxpW313uh89S3sfJI7
ncNv3zAGMbRqjz1+dHz8DlRLewgp2bGbUd2CPadu4K4CLSBCHg7GtKYjRw9E
IWwOcHWaNOkfXPx9GsiYP+1soqclYxO+GVo8asyWsTQR6cdlYOIRh5boQ0F0
B3DI5roqD0JUwaYYRneQ5YhKJhZxKgD4IMq50xE6l4UgwSmAZzLOFDqQSV6L
CMYh0WaaQ9fDPo14oj/jGJNgQ+JZrwBAVRwTcxf3iUJ4ztx3cGUOLknR7qBV
qNfUXPScVAYZSmxRD9D7DBCSf4ZMUG0W0LqSP5aREfSdfAACn9ln2L0c+qo+
qy3TBxQrDMzPASgBPUwtiJn4HeSkBG2+VRp+Rgk4gnYOQNLkQ3I4mp0jhoLU
haAYNiZSow94TzW2hRxUIhQqItV7DanTkwVkC477/T1q2u52SLUSJMK9yxAs
swDhuMt/gMyAInoQBiYfi6YADzJHNI5EAZSAyvaADlgSt0Rl+aroLhExjgnz
dK7tnmW5iJSIeWaxN4qMj2AJ5DIZQOcIZQCDmCTCV9X7e80cBkz4g4hLnAsp
UaEjGZ8zO5xvFYMOHaBJ02zekN9qZJtV+AeF1KagfaDrW67YB5ZpJBeU1OYQ
kvRYx9TvSbTPgH3VzDKKkgeRR2hkXKbtrd2eTA/kMdZ0Up9D2ZIDBiigMIIp
ZcaLaC43tGN4TmIoosBac8tXVB0275jQJ8ZNSTdITsF8YEXUcplEP8JaKliS
r4KdlXBuRu7X9Lth3hK3NkVMFao00XANAPomf0JuYZkTGttIJuA+X0knq+Z6
GvOdjdzCqQZ+3dqsb1cS84lOraq1xJR9jKmQcrVGFZQadSLC8E5UFuUa0BEi
upxO6nxbSdoyEGe3iYz7bofQVoXyAdntwe4dAVScCYw3iFYVR3ezAnZ1KCoB
36e5Nnch7gk1QF7wfdSxCTbgCLIHwsAiLy0LnshHglwkAkFpsAY64dPTBPBB
EkSf+MkaRHf1YsMUsw6FH8BHjbOUCR0FQgIoIylziX4IqP1X/OhiesJ/C9Dr
uqqJaLfcLJWWyz2yp3YOou2vuMtLJKcBbKVSyp041Ma6pk1wdW/NPdbHanpX
Z+/t/khzoS6zU023zj44sYoz3L13CB9oxdxu7tq32jUw8YIifvrpJ13Zbg7k
r/lHqOOiYMxXP/XxCVWmjR12bAeAsK6WEgZoNTWp+PfY/+2aHvH049f4jN+w
G8ZebrMRw8evwY1ho2CsKYkRVx8T0KeQnzQbo9ex/UHUd8yex39heh29l+jt
Ig99LMARgZoSnFlLaj6g/AYbTnw0AVu0u2uE9ZokFgMllkRQHL/cMTIYi1rW
n+CjWYMiW7jOWqGGP5h8zHfRa/dJghdWJq2aG7Ss9gFCizACI8hsUBuVjc4q
K/7g0zkF6hpKdu5SY9NJcNz/K9JKQeOosWUcLB25Hr29uOK7t24I4Yvbbwvp
tm5fsF80K2PHS4OF5r//mltRGp+XXNdaX5um5fEO+iW3Qr7kRZkkmCK1NL+Z
XpyvSIOjviANEdDS0M9nSmOnrUpDMlbSkKl2MHB/uEZ0eOubEhuz2S3f1WW3
c8oRIoKR4dEL3himrXerAeNnjQdvAezEkU8Zdn/THr9GCW6RiJGGZv/dWbga
mrWpXCRAi/jNv28RlTgNGf6BpW/aRC+Cn3wS8yzGDLOLESRNkyph8mAsYF1G
7lM9fIygdoWKSgQGPEFNVZJbreC9RiXnvtARakjovU5+cjq6VtuG1w0aBk4Y
xwBG4kDxLM1KPMkOXBPAeMAog4RhotiHDA5f+BMbtNns85aXpoUGejn/Q2vP
PLWS2vGctzpu1+3lfteM4bxz0DvswwjYYGE436fuG/i+2SN2zYqr5gv5Ctmq
mXC6g4OaIYDxfT77pjcaHbTbvaB/eBB6o04Yeu3BQTgM2r2w63VHI/jqDLxe
J/DkUIR9rzdkq5tSr9/rhP4w6HVGgeh9U4tjtm1k0h915cg7GB743U540O50
vY4vpTdq97qh9PqdfkccHraHo2FvMAgPDoaDNR7tzkD6g5E/6PiiI/1vNIPV
TaxaMrDrDoeeNxp6YugNOoPhULSD3mFn0Al6sn3o9dteEI76wKYXDryBF0jv
sNMPDsLQ8h2KQzGQtBaT0BEvooNYiIjIMJaAp7fchSy3OxfehBgH2yzHaj8T
BMsQOAE0I/Qu9ARzbEbV7W0z3902zscaQM5REmve87SQtrashSoVHa9uO1fU
6Kaq3eSnTMImCAPAY3KR3Em+ezBot9sVFqX482f0yFR1BiEpsg2B37PJ+YQw
FD5+XqJYlcsuRcQqrdcj8lwssETVx8B0vgU0tih2jxRqDxBhLdCXY8kAbhQH
jfyxVrtcH71Fk80hYFH38zIuItAgVL6wrT9EAUGKLfzUek54AnfqDntj46Y2
zkmXe+C9JRWe1iaQr79mgn0z+9WrKlQ+NoJmJffUnV/LQfWozVxkP5s5yX62
5ib7uWm0bvZWxNyWs+qnW3NXQ9B/OIetSW0/NrVt5rIviP3P5LYv8LYpb1uO
qxl+IdfZzz+T89bksSmwzn3V2tn6rzdv6r2HLZsJkpKcTZIbaPeI8pR19O2p
c4fbi1xMAAqK/9xUq087Svp4GoUJ9uL4gg5MMa2sjmPs4/8BlJfBDR4QxcIH
ePn09Eu8FlsuW/Utw9XpEU+gvMHS0iYqSl9NoEBl3XsZRIJfU4V7Je8ivEoz
rIg/TMgBXEGNoElAIjEZ21bHc6Kga2STIlsNqi2YT2QXeHCPNF2aQRBOUbX9
uTpelJDAAXPQySWdA8ICzYnl3z2w3HxCuG3u19jsmRiu0ii3FCpM+Ezs2KTQ
OI4BTXztIKaptaXGvc8SmQEP7BJ+sWQ4XResbMwbsxmbll7RfPgFcoyZU+MA
T/RgLMYmjk/2BWMXmdlitjw7SfyUykF/xWnxuYfX7gsA7AB0AaBWYbA58unJ
RsIS96RKk3hnAdxS2C6EF8XbJ5MYl6UXR2oG8tszU32JT8QrapNaNUrvuYAb
dITUHo1zJgW+XgHr3MMDU3NWhwckV+Z491If7zJ2mos7fTFRnypuyoj4SS1g
v/u0dqSE53+bFHSBgJdWzStO3mo6BtW7Lt89Tzcp6CGWI17fljkesMPGrq+i
v0gP7HQJ/GHyL/VLDxj8uVRKn7kCPZ9ueatTy8Z1BS70anI95T/8L8epqCe8
uea7eM72Hb4igO9gvNBWTRCclErckcLxGPriHN0QskbkawuBFNWABJwVDEhn
pPtHGpyZFx5imeMI/TbNZZ4+REq7a97IbZrG8wKMIvrnCzAk9y8NMCofwcof
rk+dQ0fiBEzcdJjz37D7ecOODnZ+xrDT9P4Dwm4LPFqv1J6DRTRxvA58TNfn
a/Sj9IsHgEi2VIMATVTpORae7BF8qscnyJ4MdXUyvQ7LmJ8kD1GeJhrv7R6l
Vycv0AtNlLaszDXQ8fFVrDqO8ahdKAOdwCnpjkhLREmlasJ/CvPP/Ox4HQvx
ZyACmOMgnHp73NmAM8/Id/X07tp0evPJE/69fgkF7O6jLfS7Azu+7dAvEdRI
9iKTCT9TqpTm9RTySQi8OihSHBLREFNKN6Cqsu/ShFAqBHhz+PFmd1YUmRrv
79+B1UoP37rbL+hdPyfU7/rtP+t1zX3N9AXg0Fd+LsM3+lAhJQx9AhV1mo95
pq9cAevT6YUM8Qovw4SnNem+2qe5uNiJf5+kj7EMKCEo2Dq0L8rgdSuECl/a
QxR9yaf4IxXpcXRvjhhEcs+ORI7X0vwtemqSMHO5Y97dzOVDJB/NlVR5hyf4
GCZuXR6Mm+KzvwG2IRY5CisAAA==

-->

</rfc>

