<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-iotops-mud-rats-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Muddy Rats">MUD-Based RATS Resources Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-mud-rats-02"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>Canada</country>
        </postal>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="C." surname="Liu" fullname="Chunchi Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="28"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 63?>

<t>Manufacturer Usage Description (MUD) files and the MUD URIs that point to them are defined in RFC 8520.
This document introduces a new type of MUD file to be delivered in conjunction with a MUD file signature and/or to be referenced via a MUD URI embedded in other documents or messages, such as an IEEE 802.1AR Secure Device Identifier (DevID) or a CBOR Web Token (CWT).
These signed documents can be presented to other entities, e.g., a network management system or network path orchestrator.
If this entity also takes on the role of a verifier as defined by the IETF Remote ATtestation procedureS (RATS) architecture, this verifier can use the references included in the MUD file specified in this document to discover, for example, appropriate reference value providers, endorsement documents or endorsement distribution APIs, trust anchor stores, remote verifier services (sometimes referred to as Attestation Verification Services), or transparency logs.
All theses references in the MUD file pointing to resources and auxiliary RATS services can satisfy general RATS prerequisite by enabling discovery or improve discovery resilience of corresponding resources or services.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Verifiers, Endorsers, and Attesters are roles defined in the RATS Architecture <xref target="RFC9334"/>.
In the RATS architecture, the Relying Party roles depend on the Verifier to bear the burden of Evidence appraisal and to generate corresponding Attestation Results for them.
Attestation Results compose a believable chunk of information that can be digested by Relying Parities in order to assess an Attester's trustworthiness.
The assessment of a remote peer's trustworthiness is vital to determine whether any future protocol interaction between a Relying Party and a remote Attester can be considered secure.
To create these Attestation Results to be consumed by Relying Parties, the Attestation Evidence an Attester generates has to be appraised by one or more appropriate Verifiers.</t>
      <t>This document defines a procedure that enables the discovery of resources or services in support of RATS, including:</t>
      <ol spacing="normal" type="1">
        <li>Reference Values,</li>
        <li>Trust Anchors,</li>
        <li>Endorsements and Endorsement Distribution APIs,</li>
        <li>(remote) Verifier APIs,</li>
        <li>Transparency Logs, or</li>
        <li>Appraisal Policies.</li>
      </ol>
      <t>MUD URIs can be embedded in any data item that was signed with trusted key material.
One common way to establish trust in a signed data item is to associate the signing key material with a trust anchor via a certification path (see <xref target="RFC4949"/> for trust anchor and certification path).
This document defines the use of MUD URIs embedded in two types of signed data items that typically are trusted via certification paths:</t>
      <ol spacing="normal" type="1">
        <li>Secure Device Identifiers (IEEE 802.1AR DevIDs) as defined by <xref target="RFC8520"/> and</li>
        <li>Entity Attestation Tokens (EAT) as defined by <xref target="I-D.ietf-rats-eat"/>.</li>
      </ol>
      <t>DevIDs and EATs (essentially CWTs ) are two very prominent examples of "trustworthy documents" (TDs) with a binary format and the embedding of MUD URIs in theses TDs can be applied to other TD types, for example, Selective Disclosure CWTs <xref target="I-D.ietf-spice-sd-cwt"/>.
Other TDs are out-of-scope of this specification, though.
The TDs are typically enrolled on Attesters by manufacturers or provisioned by supply chain entities with appropriate authority.
The TDs can be presented to local Network Management Systems, AAA-services (e.g., via IEEE 802.1X), or other points of first contact (POFC), for example, <xref target="RFC8071"/>.
These POFC are typically trusted third parties (TTP) that can digest the TDs and then base trust decisions on the associated certification paths and trust anchors.
If a TD presented by the Attester is deemed to be trusted by a local trust authority, the MUD URI embedded is considered to be a trusted source for viable resources and services in support of remote attestation of the Attester.</t>
      <t>This specification does not define the shape or format of any resource or service that is referenced by the MUD file.
In support of a unified mechanism to categorize the formats of referenced resources, a conceptual message wrapper (CMW, <xref target="I-D.ietf-rats-msg-wrap"/> is used for each type of resource.
An example of a referenced resource is a CoRIM tag <xref target="I-D.ietf-rats-corim"/>.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="mud-uris-in-trusted-documents-tds">
      <name>MUD URIs in Trusted Documents (TDs)</name>
      <t>This document does neither modify nor augment the definition about how to compose a MUD URI.
The two types of trusted documents (TDs) covered by this specification are Secure Device Identifiers and Entity Attestation Tokens.</t>
      <section anchor="mud-uris-in-devids">
        <name>MUD URIs in DevIDs</name>
        <t><xref target="RFC8520"/> defines the format of how to embed MUD URIs in DevIDs and that specification is used in this document.</t>
      </section>
      <section anchor="eat-mud-uri">
        <name>MUD URIs in EATs</name>
        <t>To embed a MUD URI in an EAT, the <tt>mud-uri</tt> claim specified in this document <bcp14>MUST</bcp14> be used.</t>
      </section>
    </section>
    <section anchor="mud-file-signatures">
      <name>MUD File Signatures</name>
      <t>As the resources required by a Verifier's appraisal procedures have to be trustworthy, a MUD signature file for a corresponding MUD File <bcp14>MUST</bcp14> be available.
The MUD File <bcp14>MUST</bcp14> include a reference to its MUD signature file via the 'mud-signature' statement.
The MUD File Signature generation as specified in <xref section="13.1" sectionFormat="of" target="RFC8520"/> applies.
If a MUD file changed (i.e., the checking of the MUD File Signature fails) or the corresponding MUD File Signer certificate is expired (see <xref section="13.2" sectionFormat="of" target="RFC8520"/>, the reference in the changed MUD File <bcp14>MUST</bcp14> point to a new valid MUD Signature File and that new MUD File Signature <bcp14>MUST</bcp14> be available.
If a corresponding MUD File Signer certificate is expired (see <xref section="13.2" sectionFormat="of" target="RFC8520"/>) or a MUD File Signature referenced by a MUD File cannot be checked successfully, the MUD File <bcp14>MUST NOT</bcp14> be trusted.</t>
      <section anchor="mud-file-signer-in-devids">
        <name>MUD File Signer in DevIDs</name>
        <t><xref target="RFC8520"/> defines the format of how to embed a reference to the signing certificate in DevIDs and that specification applies to this specification.</t>
      </section>
      <section anchor="eat-mud-signer">
        <name>MUD File Signer in EATs</name>
        <t>To embed a reference to a MUD File Signer in an EAT, the <tt>mud-signer</tt> claim specified in this document <bcp14>MUST</bcp14> be used and the <tt>mud-uri</tt> claim <bcp14>MUST</bcp14> be present.
The value of the <tt>mud-signer</tt> claim is a CBOR byte-wrapped subject field of the signing certificate of the MUD File as specified in <xref section="11" sectionFormat="of" target="RFC8520"/>.</t>
      </section>
    </section>
    <section anchor="trusting-mud-uris-and-mud-files">
      <name>Trusting MUD URIs and MUD Files</name>
      <t>The level of assurance about the authenticity of a MUD URI embedded in a TD is based on the level of trust put into the corresponding trust anchor associated with the key material that signed the TD.
If it is not possible to establish a level of trust towards the entity that signed a TD, the embedded MUD URI <bcp14>SHOULD NOT</bcp14> be trusted.
In some usage scenarios it might suffice to trust a MUD File, if the referenced MUD File Signer's certificate is not expired, but that behavior is <bcp14>NOT RECOMMENDED</bcp14>.</t>
      <t>The level of assurance about the authenticity of a MUD file is based on the level of trust put into the entity that created the corresponding MUD File Signer's certificate.
If it is not possible to establish a level of trust into the corresponding trust anchor associated with the MUD Signer's certificate, the MUD File that references that MUD Signer <bcp14>MUST NOT</bcp14> be trusted.</t>
      <section anchor="trusting-rats-resources-referenced-by-a-mud-file">
        <name>Trusting RATS Resources Referenced by a MUD File</name>
        <t>Resources, e.g., RATS Conceptual Messages, that are referenced by a MUD File <bcp14>MUST</bcp14> be signed (e.g., via a COSE_Sign1 envelope).
The signing procedures, the format of corresponding identity documents, and the establishment of trust relationships associated with these resources are out-of-scope of this document.</t>
      </section>
    </section>
    <section anchor="specification-of-rats-mud-files-referenced-by-mud-uris">
      <name>Specification of RATS MUD Files Referenced by MUD URIs</name>
      <t>The MUD URI embedded in a TD presented by an Attester points to a MUD File.
MUD URIs typically point to a piece of data that is a YANG-modeled XML file with a structure specified in the style of a YANG module definition (<xref target="RFC7950"/> and corresponding updates: <xref target="RFC8342"/>, <xref target="RFC8526"/>).
This document specifies a YANG module augment definition for generic MUD files to create RATS MUD files.
The following definition <bcp14>MUST</bcp14> be used, if a MUD URI points to a RATS MUD file.</t>
      <section anchor="tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram <xref target="RFC8340"/> provides an overview of the data model for the "ietf-mud-rats" module augment.</t>
        <sourcecode markers="true"><![CDATA[

module: ietf-mud-rats
  augment /mud:mud:
    +--rw ras
    |  +--rw ras-uris*   inet:uri
    +--rw rim
    |  +--rw rim-uris*   inet:uri
    +--rw edt
       +--rw edt-uris*   inet:uri
]]></sourcecode>
      </section>
      <section anchor="yang-module">
        <name>YANG Module</name>
        <t>This YANG module has normative references to <xref target="RFC6991"/> and augments <xref target="RFC8520"/>.</t>
        <sourcecode type="YANG">
&lt;CODE BEGINS&gt; file ietf-mud-rats@2025-02-09.yang
module ietf-mud-rats {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-mud-rats";
  prefix "mud-rats";

  import ietf-mud {
    prefix "mud";
  }

  import ietf-inet-types {
    prefix "inet";
  }

  organization
    "IETF RATS (Remote ATtestation procedureS) Working Group";

  contact
    "WG Web: http://tools.ietf.org/wg/rats/
     WG List: rats@ietf.org
     Author: Eliot Lear &lt;lear@cisco.com&gt;
     Author: Henk Birkholz &lt;henk.birkholz@sit.fraunhofer.de&gt;";

  description
    "This YANG module augments the ietf-mud model to provide for three
     optional lists to enable Remote Attestation Procedures so that
     this device type may be used as a controller for other
     MUD-enabled devices.

     Copyright (c) 2020 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
      for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  revision 2020-03-09 {
    description
      "Initial proposed standard.";
       reference "RFC XXXX: MUD Extension to find RATS supply chain
       entity resources: remote attestation services, endorsement
       documents, and reference integrity measurement";
  }

  grouping mud-rats-grouping {
    description
      "Grouping to locate RATS services";
    container ras {
      description
        "Lists of Remote Attestation Service
         (RAS/Verifiers) candidates.";
      leaf-list ras-uris {
        type inet:uri;
        description
          "A list of Verifiers that can appraise evidence produced by
           the entity that presents a DevID including this MUD URI.";
      }
    }
    container rim {
      description
        "Lists of Reference Integrity Measurement (RIM) candidates.";
      leaf-list rim-uris {
        type inet:uri;
        description
          "A list of RIM CoSWID that provide reference integrity
           measurements represented as signed CoSWID using
           the CoSWID RIM extension.";
      }
    }
    container edt {
      description
        "List of Endorsements for Roots of Trusts (e.g. Endorsement
         Key Certificates).";
      leaf-list edt-uris {
        type inet:uri;
        description
          "A list of Endorsements that vouch for the characteristics
           of Roots of Trusts the entity possesses.";
      }
    }
  }
  augment "/mud:mud" {
    uses mud-rats-grouping;
    description
      "add mud-rats URI resources";
  }
}
&lt;CODE ENDS&gt;
</sourcecode>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations of RFC 9334 apply.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The trust model and Security Considerations of RFC 8520 and RFC 9334 apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> Please replace "RFCthis" with the RFC number assigned to this document.</t>
      <t><cref anchor="rfced_1">RFC Editor:</cref> This document uses the CPA (code point allocation) convention described in <xref target="I-D.bormann-cbor-draft-numbers"/>. For each usage of the term "CPA", please remove the prefix "CPA" from the indicated value and replace the residue with the value assigned by IANA; perform an analogous substitution for all other occurrences of the prefix "CPA" in the document. Finally, please remove this note.</t>
      <section anchor="iana-mud-uri">
        <name>CWT <tt>mud-uri</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-uri</tt> CBOR Web Token claim to the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> in the Standards Action Range as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-uri</li>
          <li>Claim Description: A CBOR byte-wrapped MUD URI as specified in <xref target="RFC8520"/></li>
          <li>JWT Claim Name: mud-uri</li>
          <li>Claim Key: CPA109</li>
          <li>Claim Value Type(s): CBOR byte string</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-signer">
        <name>CWT <tt>mud-signer</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> CBOR Web Token claim to the "CBOR Web Token (CWT) Claims" registry group <xref target="IANA.cwt"/> in the Standards Action Range as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-uri</li>
          <li>Claim Description: A CBOR byte-wrapped subject field of the signing certificate for a MUD file as specified in <xref target="RFC8520"/></li>
          <li>JWT Claim Name: mud-signer</li>
          <li>Claim Key: CPA110</li>
          <li>Claim Value Type(s): CBOR byte string</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-signer"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-uri-json">
        <name>JWT <tt>mud-uri</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> JSON Web Token Claim to the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-signer</li>
          <li>Claim Description: A MUD signer reference represented via a URI text string as defined by <xref target="RFC8520"/></li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-signer-json">
        <name>JWT <tt>mud-signer</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> JSON Web Token Claim to the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-signer</li>
          <li>Claim Description: A MUD signer reference represented via a URI text string as defined by <xref target="RFC8520"/></li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <seriesInfo name="DOI" value="10.17487/RFC6991"/>
            <seriesInfo name="RFC" value="6991"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <seriesInfo name="DOI" value="10.17487/RFC7950"/>
            <seriesInfo name="RFC" value="7950"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8071">
          <front>
            <title>NETCONF Call Home and RESTCONF Call Home</title>
            <seriesInfo name="DOI" value="10.17487/RFC8071"/>
            <seriesInfo name="RFC" value="8071"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This RFC presents NETCONF Call Home and RESTCONF Call Home, which enable a NETCONF or RESTCONF server to initiate a secure connection to a NETCONF or RESTCONF client, respectively.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <seriesInfo name="DOI" value="10.17487/RFC8340"/>
            <seriesInfo name="RFC" value="8340"/>
            <seriesInfo name="BCP" value="215"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8342"/>
            <seriesInfo name="RFC" value="8342"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8520"/>
            <seriesInfo name="RFC" value="8520"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8526">
          <front>
            <title>NETCONF Extensions to Support the Network Management Datastore Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC8526"/>
            <seriesInfo name="RFC" value="8526"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the Network Configuration Protocol (NETCONF) defined in RFC 6241 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFCs 6241 and 7950. The update to RFC 6241 adds new and operations and augments existing,, and operations. The update to RFC 7950 requires the usage of the YANG library (described in RFC 8525) by NETCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-21"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Independent</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="18" month="November" year="2025"/>
            <abstract>
              <t>   The Conceptual Messages introduced by the RATS architecture (RFC
   9334) are protocol-agnostic data units that are conveyed between RATS
   roles during remote attestation procedures.  Conceptual Messages
   describe the meaning and function of such data units within RATS data
   flows without specifying a wire format, encoding, transport
   mechanism, or processing details.  The initial set of Conceptual
   Messages is defined in Section 8 of RFC 9334 and includes Evidence,
   Attestation Results, Endorsements, Reference Values, and Appraisal
   Policies.

   This document introduces the Conceptual Message Wrapper (CMW) that
   provides a common structure to encapsulate these messages.  It
   defines a dedicated CBOR tag, corresponding JSON Web Token (JWT) and
   CBOR Web Token (CWT) claims, and an X.509 extension.

   This allows CMWs to be used in CBOR-based protocols, web APIs using
   JWTs and CWTs, and PKIX artifacts like X.509 certificates.
   Additionally, the draft defines a media type and a CoAP content
   format to transport CMWs over protocols like HTTP, MIME, and CoAP.

   The goal is to improve the interoperability and flexibility of remote
   attestation protocols.  By introducing a shared message format like
   the CMW, we can consistently support different attestation message
   types, evolve message serialization formats without breaking
   compatibility, and avoid having to redefine how messages are handled
   in each protocol.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-09"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Independent</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <seriesInfo name="DOI" value="10.17487/RFC4949"/>
            <seriesInfo name="RFC" value="4949"/>
            <seriesInfo name="FYI" value="36"/>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-spice-sd-cwt">
          <front>
            <title>Selective Disclosure CBOR Web Tokens (SD-CWT)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-spice-sd-cwt-05"/>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Rohan Mahy" initials="R." surname="Mahy">
         </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This specification describes a data minimization technique for use
   with CBOR Web Tokens (CWTs).  The approach is based on the Selective
   Disclosure JSON Web Token (SD-JWT), with changes to align with CBOR
   Object Signing and Encryption (COSE) and CWTs.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.bormann-cbor-draft-numbers">
          <front>
            <title>Managing CBOR codepoints in Internet-Drafts</title>
            <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-draft-numbers-06"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   CBOR-based protocols often make use of numbers allocated in a
   registry.  During development of the protocols, those numbers may not
   yet be available.  This impedes the generation of data models and
   examples that actually can be used by tools.

   This short draft proposes a common way to handle these situations,
   without any changes to existing tools.  Also, in conjunction with the
   application-oriented EDN literal e'', a further reduction in
   editorial processing of CBOR examples around the time of approval can
   be achieved.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 364?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
