<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.29 (Ruby 3.1.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-coap-est-oscore-00" category="std" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="EST-oscore">Protecting EST Payloads with OSCORE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-coap-est-oscore-00"/>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>
    <author initials="M." surname="Vučinić" fullname="Mališa Vučinić">
      <organization>Inria</organization>
      <address>
        <email>malisa.vucinic@inria.fr</email>
      </address>
    </author>
    <author initials="T." surname="Claeys" fullname="Timothy Claeys">
      <organization/>
      <address>
        <email>timothy.claeys@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="April" day="19"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies public-key certificate enrollment procedures protected with lightweight application-layer security protocols suitable for Internet of Things (IoT) deployments. The protocols leverage payload formats defined in Enrollment over Secure Transport (EST) and existing IoT standards including the Constrained Application Protocol (CoAP), Concise Binary Object Representation (CBOR) and the CBOR Object Signing and Encryption (COSE) format.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/EricssonResearch/EST-OSCORE"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is certificate enrollment, because existing enrollment protocols are not optimized for constrained environments <xref target="RFC7228"/>.</t>
      <t>One optimization of certificate enrollment targeting IoT deployments is specified in EST-coaps (<xref target="RFC9148"/>), which defines a version of Enrollment over Secure Transport <xref target="RFC7030"/> for transporting EST payloads over CoAP <xref target="RFC7252"/> and DTLS <xref target="RFC6347"/>, instead of secured HTTP.</t>
      <t>This document describes a method for protecting EST payloads over CoAP or HTTP with OSCORE <xref target="RFC8613"/>. OSCORE specifies an extension to CoAP which protects the application layer message and can be applied independently of how CoAP messages are transported. OSCORE can also be applied to CoAP-mappable HTTP which enables end-to-end security for mixed CoAP and HTTP transfer of application layer data. Hence EST payloads can be protected end-to-end independent of underlying transport and through proxies translating between between CoAP and HTTP.</t>
      <t>OSCORE is designed for constrained environments, building on IoT standards such as CoAP, CBOR <xref target="RFC7049"/> and COSE <xref target="RFC8152"/>, and has in particular gained traction in settings where message sizes and the number of exchanged messages needs to be kept at a minimum, such as 6TiSCH <xref target="RFC9031"/>, or for securing multicast CoAP messages <xref target="I-D.ietf-core-oscore-groupcomm"/>. Where OSCORE is implemented and used for communication security, the reuse of OSCORE for other purposes, such as enrollment, reduces the code footprint.</t>
      <t>In order to protect certificate enrollment with OSCORE, the necessary keying material (notably, the OSCORE Master Secret, see <xref target="RFC8613"/>) needs to be established between EST-oscore client and EST-oscore server. For this purpose we assume by default the use of the lightweight authenticated key exchange protocol EDHOC <xref target="I-D.ietf-lake-edhoc"/>, although pre-shared OSCORE keying material would also be an option.</t>
      <t>Other ways to optimize the performance of certificate enrollment and certificate based authentication described in this draft include the use of:</t>
      <ul spacing="normal">
        <li>Compact representations of X.509 certificates (see <xref target="I-D.ietf-cose-cbor-encoded-cert"/>)</li>
        <li>Certificates by reference (see <xref target="I-D.ietf-cose-x509"/>)</li>
        <li>Compact, CBOR representations of EST payloads (see <xref target="I-D.ietf-cose-cbor-encoded-cert"/>)</li>
      </ul>
      <section anchor="operational">
        <name>Operational Differences with EST-coaps</name>
        <t>The protection of EST payloads defined in this document builds on EST-coaps <xref target="RFC9148"/> but transport layer security is replaced, or complemented, by protection of the transfer- and application layer data (i.e., CoAP message fields and payload). This specification deviates from EST-coaps in the following respects:</t>
        <ul spacing="normal">
          <li>The DTLS record layer is replaced, or complemented, with OSCORE.</li>
          <li>
            <t>The DTLS handshake is replaced, or complemented, with the lightweight authenticated key exchange protocol EDHOC <xref target="I-D.ietf-lake-edhoc"/>, and makes use of the following features:
            </t>
            <ul spacing="normal">
              <li>Authentication based on certificates is complemented with  authentication based on raw public keys.</li>
              <li>Authentication based on signature keys is complemented with authentication based on static Diffie-Hellman keys, for certificates/raw public keys.</li>
              <li>Authentication based on certificate by value is complemented with authentication based on certificate/raw public keys by reference.</li>
            </ul>
          </li>
          <li>The EST payloads protected by OSCORE can be proxied between constrained networks supporting CoAP/CoAPs and non-constrained networks supporting HTTP/HTTPs with a CoAP-HTTP proxy protection without any security processing in the proxy (see <xref target="proxying"/>). The concept "Registrar" and its required trust relation with EST server as described in Section 5 of <xref target="RFC9148"/> is therefore redundant.</li>
        </ul>
        <t>So, while the same authentication scheme (Diffie-Hellman key exchange authenticated with transported certificates) and the same EST payloads as EST-coaps also apply to EST-oscore, the latter specifies other authentication schemes and a new matching EST function. The reason for these deviations is that a significant overhead can be removed in terms of message sizes and round trips by using a different handshake, public key type or transported credential, and those are independent of the actual enrollment procedure.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>. These
words may also appear in this document in lowercase, absent their
normative meanings.</t>
      <t>This document uses terminology from <xref target="RFC9148"/> which in turn is based on <xref target="RFC7030"/> and, in turn, on <xref target="RFC5272"/>.</t>
      <t>The term "Trust Anchor" follows the terminology of <xref target="RFC6024"/>: "A trust anchor represents an authoritative entity via a public key and associated data. The public key is used to verify digital signatures, and the associated data is used to constrain the types of information for which the trust anchor is authoritative." One example of specifying more compact alternatives to X.509 certificates for exchanging trust anchor information is provided by the TrustAnchorInfo structure of <xref target="RFC5914"/>, the mandatory parts of which essentially is the SubjectPublicKeyInfo structure <xref target="RFC5280"/>, i.e., an algorithm identifier followed by a public key.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>This specification replaces the DTLS handshake in EST-coaps with the lightweight authenticated key exchange protocol EDHOC <xref target="I-D.ietf-lake-edhoc"/>. During initial enrollment the EST-oscore client and server run EDHOC <xref target="I-D.ietf-lake-edhoc"/> to authenticate and establish the OSCORE security context with which the EST payloads are protected.</t>
      <t>EST-oscore clients and servers MUST perform mutual authentication.
The EST server and EST client are responsible for ensuring that an acceptable cipher suite is negotiated.
The client MUST authenticate the server before accepting any server response. The server MUST authenticate the client and provide relevant information to the CA for decision about issuing a certificate.</t>
      <section anchor="edhoc">
        <name>EDHOC</name>
        <t>EDHOC supports authentication with certificates/raw public keys (referred to as "credentials"), and the credentials may either be transported in the protocol, or referenced. This is determined by the identifier of the credential of the endpoint, ID_CRED_x for x= Initiator/Responder, which is transported in an EDHOC message. This identifier may be the credential itself (in which case the credential is transported), or a pointer such as a URI to the credential (e.g., x5t, see <xref target="I-D.ietf-cose-x509"/>) or some other identifier which enables the receiving endpoint to retrieve the credential.</t>
      </section>
      <section anchor="certificate-based-authentication">
        <name>Certificate-based Authentication</name>
        <t>EST-oscore, like EST-coaps, supports certificate-based authentication between EST client and server. In this case the client MUST be configured with an Implicit or Explicit Trust Anchor (TA) <xref target="RFC7030"/> database, enabling the client to authenticate the server. During the initial enrollment the client SHOULD populate its Explicit TA database and use it for subsequent authentications.</t>
        <t>The EST client certificate SHOULD conform to <xref target="RFC7925"/>. The EST client and/or EST server certificate MAY be a (natively signed) CBOR certificate <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</t>
      </section>
      <section anchor="channel-binding">
        <name>Channel Binding</name>
        <t>The <xref target="RFC5272"/> specification describes proof-of-possession as the ability of a client to prove its possession of a private key which is linked to a certified public key. In case of signature key, a proof-of-possession is generated by the client when it signs the PKCS#10 Request during the enrollment phase. Connection-based proof-of-possession is OPTIONAL for EST-oscore clients and servers.</t>
        <t>When desired the client can use the EDHOC-Exporter API to extract channel-binding information and provide a connection-based proof-of possession. Channel-binding information is obtained as follows</t>
        <t>edhoc-unique = EDHOC-Exporter(TBD1, "EDHOC Unique", length),</t>
        <t>where TBD1 is a registered label from the EDHOC Exporter Label registry, length equals the desired length of the edhoc-unique byte string. The client then adds the edhoc-unique byte string as a challengePassword (see Section 5.4.1 of <xref target="RFC2985"/>) in the attributes section of the PKCS#10 Request <xref target="RFC2986"/> to prove to the server that the authenticated EDHOC client is in possession of the private key associated with the certification request, and signed the certification request after the EDHOC session was established.</t>
      </section>
      <section anchor="optimizations">
        <name>Optimizations</name>
        <ul spacing="normal">
          <li>The last message of the EDHOC protocol, message_3, MAY be combined with an OSCORE request, enabling authenticated Diffie-Hellman key exchange and a protected CoAP request/response (which may contain an enrolment request and response) in two round trips <xref target="I-D.ietf-core-oscore-edhoc"/>.</li>
          <li>The certificates MAY be compressed, e.g. using the CBOR encoding defined in <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</li>
          <li>The certificate MAY be referenced instead of transported <xref target="I-D.ietf-cose-x509"/>. The EST-oscore server MAY use information in the credential identifier field of the EDHOC message (ID_CRED_x) to access the EST-oscore client certificate, e.g., in a directory or database provided by the issuer. In this case the certificate may not need to be transported over a constrained link between EST client and server.</li>
          <li>Conversely, the response to the PKCS#10 request MAY be a reference to the enrolled certificate rather than the certificate itself. The EST-oscore server MAY in the enrolment response to the EST-oscore client include a pointer to a directory or database where the certificate can be retrieved.</li>
        </ul>
      </section>
    </section>
    <section anchor="protocol-design-and-layering">
      <name>Protocol Design and Layering</name>
      <t>EST-oscore uses CoAP <xref target="RFC7252"/> and Block-Wise <xref target="RFC7959"/> to transfer EST messages in the same way as <xref target="RFC9148"/>. Instead of DTLS record layer, OSCORE <xref target="RFC8613"/> is used to protect the EST payloads. DTLS handshake is replaced with EDHOC <xref target="I-D.ietf-lake-edhoc"/>. <xref target="fig-stack"/> below shows the layered EST-oscore architecture.</t>
      <figure anchor="fig-stack">
        <name>EST protected with OSCORE.</name>
        <artwork align="center"><![CDATA[
             +----------------+
             |  EST messages  |
+------------+----------------+
|    EDHOC   |    OSCORE      |
+------------+----------------+
|       CoAP or HTTP          |
+-----------------------------+
|        UDP or TCP           |
+-----------------------------+

]]></artwork>
      </figure>
      <t>EST-oscore follows much of the EST-coaps and EST design.</t>
      <section anchor="discovery">
        <name>Discovery and URI</name>
        <t>The discovery of EST resources and the definition of the short EST-coaps URI paths specified in Section 4.1 of <xref target="RFC9148"/>, as well as the new Resource Type defined in Section 8.2 of <xref target="RFC9148"/> apply to EST-oscore. Support for OSCORE is indicated by the "osc" attribute defined in Section 9 of <xref target="RFC8613"/>, for example:</t>
        <artwork><![CDATA[
     REQ: GET /.well-known/core?rt=ace.est.sen

     RES: 2.05 Content
   </est>; rt="ace.est";osc

]]></artwork>
      </section>
      <section anchor="est-functions">
        <name>Mandatory/optional EST Functions</name>
        <t>The EST-oscore specification has the same set of required-to-implement functions as EST-coaps. The content of <xref target="table_functions"/> is adapted from Section 4.2 in <xref target="RFC9148"/> and uses the updated URI paths (see <xref target="discovery"/>).</t>
        <table anchor="table_functions">
          <name>Mandatory and optional EST-oscore functions</name>
          <thead>
            <tr>
              <th align="left">EST functions</th>
              <th align="left">EST-oscore implementation</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">/crts</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">/sen</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">/sren</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">/skg</td>
              <td align="left">OPTIONAL</td>
            </tr>
            <tr>
              <td align="left">/skc</td>
              <td align="left">OPTIONAL</td>
            </tr>
            <tr>
              <td align="left">/att</td>
              <td align="left">OPTIONAL</td>
            </tr>
          </tbody>
        </table>
        <section anchor="crts">
          <name>/crts</name>
          <t>EST-coaps provides the /crts operation.
A successful request from the client to this resource will be answered with a bag of certificates which is subsequently installed in the Explicit TA.</t>
          <t>A trust anchor is commonly a self-signed certificate of the CA public key.
In order to reduce transport overhead, the trust anchor could be just the CA public key and associated data (see <xref target="terminology"/>), e.g., the SubjectPublicKeyInfo, or a public key certificate without the signature.
In either case they can be compactly encoded, e.g. using CBOR encoding <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</t>
        </section>
      </section>
      <section anchor="payload-formats">
        <name>Payload formats</name>
        <t>Similar to EST-coaps, EST-oscore allows transport of the ASN.1 structure of a given Media-Type in binary format. In addition, EST-oscore uses the same CoAP Content-Format Options to transport EST requests and responses . <xref target="table_mediatypes"/> summarizes the information from Section 4.3 in <xref target="RFC9148"/>.</t>
        <table anchor="table_mediatypes">
          <name>EST functions and there associated Media-Type and IANA numbers</name>
          <thead>
            <tr>
              <th align="left">URI</th>
              <th align="left">Content-Format</th>
              <th align="left">#IANA</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">/crts</td>
              <td align="left">N/A                                            (req)</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">application/pkix-cert                          (res)</td>
              <td align="left">287</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">application/pkcs-7-mime;smime-type=certs-only  (res)</td>
              <td align="left">281</td>
            </tr>
            <tr>
              <td align="left">/sen</td>
              <td align="left">application/pkcs10                             (req)</td>
              <td align="left">286</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">application/pkix-cert                          (res)</td>
              <td align="left">287</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">application/pkcs-7-mime;smime-type=certs-only  (res)</td>
              <td align="left">281</td>
            </tr>
            <tr>
              <td align="left">/sren</td>
              <td align="left">application/pkcs10                             (req)</td>
              <td align="left">286</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">application/pkix-cert                          (res)</td>
              <td align="left">287</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">application/pkcs-7-mime;smime-type=certs-only  (res)</td>
              <td align="left">281</td>
            </tr>
            <tr>
              <td align="left">/skg</td>
              <td align="left">application/pkcs10                             (req)</td>
              <td align="left">286</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">application/multipart-core                     (res)</td>
              <td align="left">62</td>
            </tr>
            <tr>
              <td align="left">/skc</td>
              <td align="left">application/pkcs10                             (req)</td>
              <td align="left">286</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">application/multipart-core                     (res)</td>
              <td align="left">62</td>
            </tr>
            <tr>
              <td align="left">/att</td>
              <td align="left">N/A                                            (req)</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">application/csrattrs                           (res)</td>
              <td align="left">285</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="message-bindings">
        <name>Message Bindings</name>
        <t>The EST-oscore message characteristics are identical to those specified in Section 4.4 of <xref target="RFC9148"/>. It is RECOMMENDED that</t>
        <ul spacing="normal">
          <li>The EST-oscore endpoints support delayed responses</li>
          <li>The endpoints supports the following CoAP options: OSCORE, Uri-Host, Uri-Path, Uri-Port, Content-Format, Block1, Block2, and Accept.</li>
          <li>The EST URLs based on https:// are translated to coap://, but with mandatory use of the CoAP OSCORE option.</li>
        </ul>
      </section>
      <section anchor="coap-response-codes">
        <name>CoAP response codes</name>
        <t>See Section 4.5 in <xref target="RFC9148"/>.</t>
      </section>
      <section anchor="message-fragmentation">
        <name>Message fragmentation</name>
        <t>The EDHOC key exchange is optimized for message overhead, in particular the use of static DH keys instead of signature keys for authentication (e.g., method 3 of <xref target="I-D.ietf-lake-edhoc"/>). Together with various measures listed in this document such as CBOR-encoded payloads (<xref target="I-D.ietf-cose-cbor-encoded-cert"/>), CBOR certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>, certificates by reference (<xref target="optimizations"/>), and trust anchors without signature (<xref target="crts"/>), a significant reduction of message sizes can be achieved.</t>
        <t>Nevertheless, depending on application, the protocol messages may become larger than available frame size resulting in fragmentation and, in resource constrained networks such as IEEE 802.15.4 where throughput is limited, fragment loss can trigger costly retransmissions.</t>
        <t>It is RECOMMENDED to prevent IP fragmentation, since it involves an error-prone datagram reconstitution. To limit the size of the CoAP payload, this specification mandates the implementation of CoAP option Block1 and Block2 fragmentation mechanism <xref target="RFC7959"/> as described in Section 4.6 of <xref target="RFC9148"/>.</t>
      </section>
      <section anchor="delayed-responses">
        <name>Delayed Responses</name>
        <t>See Section 4.7 in <xref target="RFC9148"/>.</t>
      </section>
      <section anchor="enrollment-of-static-dh-keys">
        <name>Enrollment of Static DH Keys</name>
        <t>This section specifies how the EST client enrolls a static DH key.
Because a DH key pair cannot be used for signing operations, the EST client attempting to enroll a DH key must use an alternative proof-of-possesion algorithm.
The EST client obtained the CA certs including the CA's DH certificate using the /crts function.
The certificate indicates the DH group parameters which MUST be respected by the EST client when generating its own DH key pair.
The EST client prepares the PKCS #10 object and signs it by following the steps in Section 4 of <xref target="RFC6955"/>.
The Key Derivation Function (KDF) and the MAC MUST be set to the HDKF and HMAC algorithms used by OSCORE.
As per <xref target="RFC8613"/>, the HKDF MUST be one of the HMAC-based HKDF <xref target="RFC5869"/> algorithms defined for COSE <xref target="RFC9052"/>.
The KDF and MAC is thus defined by the hash algorithm used by OSCORE in HKDF and HMAC, which by default is SHA-256.
When EDHOC is used, then the hash algorithm is the application hash algorithm of the selected cipher suite.</t>
      </section>
    </section>
    <section anchor="proxying">
      <name>HTTP-CoAP Proxy</name>
      <t>As noted in Section 5 of <xref target="RFC9148"/>, in real-world deployments, the EST server will not always reside within the CoAP boundary.  The EST-server can exist outside the constrained network in a non-constrained network that supports HTTP but not CoAP, thus requiring an intermediary CoAP-to-HTTP proxy.</t>
      <t>Since OSCORE is applicable to CoAP-mappable HTTP (see Section 11 of <xref target="RFC8613"/>) the EST payloads can be protected end-to-end between EST client and EST server independent of transport protocol or potential transport layer security which may need to be terminated in the proxy, see <xref target="fig-proxy"/>. Therefore the concept "Registrar" and its required trust relation with EST server as described in Section 5 of <xref target="RFC9148"/> is redundant.</t>
      <t>The mappings between CoAP and HTTP referred to in Section 8.1 of <xref target="RFC9148"/> apply, and additional mappings resulting from the use of OSCORE are specified in Section 11 of <xref target="RFC8613"/>.</t>
      <t>OSCORE provides end-to-end security between EST Server and EST Client. The use of TLS and DTLS is optional.</t>
      <figure anchor="fig-proxy">
        <name>CoAP-to-HTTP proxy at the CoAP boundary.</name>
        <artwork align="center"><![CDATA[
                                       Constrained-Node Network
  .---------.                       .----------------------------.
  |   CA    |                       |.--------------------------.|
  '---------'                       ||                          ||
       |                            ||                          ||
   .------.  HTTP   .-----------------.   CoAP   .-----------.  ||
   | EST  |<------->|  CoAP-to-HTTP   |<-------->| EST Client|  ||
   |Server|  (TLS)  |      Proxy      |  (DTLS)  '-----------'  ||
   '------'         '-----------------'                         ||
                                    ||                          ||
       <------------------------------------------------>       ||
                        OSCORE      ||                          ||
                                    |'--------------------------'|
                                    '----------------------------'
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>TBD: Compare with RFC9148</t>
      <t>TBD: Channel binding security considerations: 3SHAKE attack and EDHOC.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="edhoc-exporter-label-registry">
        <name>EDHOC Exporter Label Registry</name>
        <t>IANA is requested to register the following entry in the "EDHOC Exporter Label" registry under the group name "Ephemeral Diffie-Hellman Over COSE (EDHOC).</t>
        <figure anchor="fig-exporter-label">
          <name>EDHOC Exporter Label</name>
          <artwork><![CDATA[
+-------------+------------------------------+-------------------+
| Label       | Description                  | Reference         |
+=============+==============================+===================+
| TBD1        | EDHOC unique                 | [[this document]] |
+-------------+------------------------------+-------------------+

]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5869" target="https://www.rfc-editor.org/info/rfc5869" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5869.xml">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications.  The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="RFC6955" target="https://www.rfc-editor.org/info/rfc6955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6955.xml">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC7049" target="https://www.rfc-editor.org/info/rfc7049" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7049.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.  These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7049"/>
          <seriesInfo name="DOI" value="10.17487/RFC7049"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7252.xml">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7959" target="https://www.rfc-editor.org/info/rfc7959" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7959.xml">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8152" target="https://www.rfc-editor.org/info/rfc8152" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format.  This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8613" target="https://www.rfc-editor.org/info/rfc8613" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8613.xml">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9148" target="https://www.rfc-editor.org/info/rfc9148" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9148.xml">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS.  Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges.  This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc" target="https://datatracker.ietf.org/doc/html/draft-ietf-lake-edhoc-19" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="3" month="February" year="2023"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-19"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC2985" target="https://www.rfc-editor.org/info/rfc2985" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2985.xml">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from that specification.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986" target="https://www.rfc-editor.org/info/rfc2986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC5272" target="https://www.rfc-editor.org/info/rfc5272" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5272.xml">
          <front>
            <title>Certificate Management over CMS (CMC)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
              <t>1. The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
              <t>2. The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
              <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5272"/>
          <seriesInfo name="DOI" value="10.17487/RFC5272"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5914" target="https://www.rfc-editor.org/info/rfc5914" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5914.xml">
          <front>
            <title>Trust Anchor Format</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="S. Ashmore" initials="S." surname="Ashmore"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document describes a structure for representing trust anchor information.  A trust anchor is an authoritative entity represented by a public key and associated data.  The public key is used to verify digital signatures, and the associated data is used to constrain the types of information or actions for which the trust anchor is authoritative.  The structures defined in this document are intended to satisfy the format-related requirements defined in Trust Anchor Management Requirements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5914"/>
          <seriesInfo name="DOI" value="10.17487/RFC5914"/>
        </reference>
        <reference anchor="RFC6024" target="https://www.rfc-editor.org/info/rfc6024" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6024.xml">
          <front>
            <title>Trust Anchor Management Requirements</title>
            <author fullname="R. Reddy" initials="R." surname="Reddy"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>A trust anchor represents an authoritative entity via a public key and associated data.  The public key is used to verify digital signatures, and the associated data is used to constrain the types of information for which the trust anchor is authoritative.  A relying party uses trust anchors to determine if a digitally signed object is valid by verifying a digital signature using the trust anchor's public key, and by enforcing the constraints expressed in the associated data for the trust anchor.  This document describes some of the problems associated with the lack of a standard trust anchor management mechanism and defines requirements for data formats and push-based protocols designed to address these problems.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6024"/>
          <seriesInfo name="DOI" value="10.17487/RFC6024"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8392.xml">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9031" target="https://www.rfc-editor.org/info/rfc9031" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9031.xml">
          <front>
            <title>Constrained Join Protocol (CoJP) for 6TiSCH</title>
            <author fullname="M. Vučinić" initials="M." role="editor" surname="Vučinić"/>
            <author fullname="J. Simon" initials="J." surname="Simon"/>
            <author fullname="K. Pister" initials="K." surname="Pister"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes the minimal framework required for a new device, called a "pledge", to securely join a 6TiSCH (IPv6 over the Time-Slotted Channel Hopping mode of IEEE 802.15.4) network.  The framework requires that the pledge and the JRC (Join Registrar/Coordinator, a central entity), share a symmetric key.  How this key is provisioned is out of scope of this document.  Through a single CoAP (Constrained Application Protocol) request-response exchange secured by OSCORE (Object Security for Constrained RESTful Environments), the pledge requests admission into the network, and the JRC configures it with link-layer keying material and other parameters.  The JRC may at any time update the parameters through another request-response exchange secured by OSCORE.  This specification defines the Constrained Join Protocol and its CBOR (Concise Binary Object Representation) data structures, and it describes how to configure the rest of the 6TiSCH communication stack for this join process to occur in a secure manner.  Additional security mechanisms may be added on top of this minimal framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9031"/>
          <seriesInfo name="DOI" value="10.17487/RFC9031"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-groupcomm" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-oscore-groupcomm-17" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-oscore-groupcomm.xml">
          <front>
            <title>Group OSCORE - Secure Group Communication for CoAP</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Jiye Park" initials="J." surname="Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <date day="20" month="December" year="2022"/>
            <abstract>
              <t>This document defines Group Object Security for Constrained RESTful Environments (Group OSCORE), providing end-to-end security of CoAP messages exchanged between members of a group, e.g., sent over IP multicast. In particular, the described approach defines how OSCORE is used in a group communication setting to provide source authentication for CoAP group requests, sent by a client to multiple servers, and for protection of the corresponding CoAP responses. Group OSCORE also defines a pairwise mode where each member of the group can efficiently derive a symmetric pairwise key with any other member of the group for pairwise OSCORE communication.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-17"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-edhoc" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-oscore-edhoc-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-oscore-edhoc.xml">
          <front>
            <title>Using EDHOC with CoAP and OSCORE</title>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
              <organization>Fraunhofer AISEC</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol EDHOC can be run over CoAP and used by two peers to establish an OSCORE Security Context. This document details this use of the EDHOC protocol, by specifying a number of additional and optional mechanisms. These especially include an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-07"/>
        </reference>
        <reference anchor="I-D.ietf-cose-x509" target="https://datatracker.ietf.org/doc/html/draft-ietf-cose-x509-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-x509.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="Jim Schaad" initials="J." surname="Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="13" month="October" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-x509-09"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert" target="https://datatracker.ietf.org/doc/html/draft-ietf-cose-cbor-encoded-cert-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-cbor-encoded-cert.xml">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="January" year="2023"/>
            <abstract>
              <t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%. The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re- encoding for the signature to be verified. The document also specifies C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-05"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
