<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lake-app-profiles-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="EDHOC Application Profiles">Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lake-app-profiles-00"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2024" month="December" day="10"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 64?>

<t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) requires certain parameters to be agreed out-of-band, in order to ensure its successful completion. To this end, application profiles specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. This document defines a number of means to coordinate the use and discovery of EDHOC application profiles. Also, it defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles. Finally, this document defines a set of well-known EDHOC application profiles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/lake-wg/app-profiles"/>.</t>
    </note>
  </front>
  <middle>
    <?line 68?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol, especially intended for use in constrained scenarios.</t>
      <t>In order to successfully run EDHOC, the two peers acting as Initiator and Responder have to agree on certain parameters. Some of those are in-band and communicated through the protocol execution, during which a few of them may even be negotiated. However, other parameters have to be known out-of-band, before running the EDHOC protocol.</t>
      <t>As discussed in <xref section="3.9" sectionFormat="of" target="RFC9528"/>, applications can use EDHOC application profiles, which specify the intended usage of EDHOC to allow for the relevant processing and verifications to be made. In particular, an EDHOC application profile may include both in-band and out-of-band parameters.</t>
      <t>This document defines a number of means to coordinate the use and discovery of EDHOC application profiles, that is:</t>
      <ul spacing="normal">
        <li>
          <t>The new IANA registry "EDHOC Application Profiles" defined in <xref target="iana-edhoc-application-profiles"/>, where to register integer identifiers of EDHOC application profiles to use as corresponding Profile IDs.</t>
        </li>
        <li>
          <t>The new parameter "ed-prof" defined in <xref target="web-linking"/>. This parameter is employed to specify an EDHOC application profile identified by its Profile ID, and can be used as target attribute in a web link <xref target="RFC8288"/> to an EDHOC resource, or as filter criteria in a discovery request to discover EDHOC resources.  </t>
          <t>
For instance, the target attribute can be used in a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> (see <xref section="A.2" sectionFormat="of" target="RFC9528"/> as well as <xref target="I-D.ietf-core-oscore-edhoc"/>).</t>
        </li>
        <li>
          <t>The new parameter "app_prof" defined in <xref target="sec-edhoc-information-object"/> for the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. This parameter is employed to specify a set of EDHOC application profiles, each identified by its Profile ID.  </t>
          <t>
For instance, the parameter can be used in the EDHOC and OSCORE profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>, in order to indicate the EDHOC application profiles supported by an ACE resource server.</t>
        </li>
        <li>
          <t>Additional parameters that provide information about an EDHOC application profile. A subset of these parameters are to be used as target attributes in a web link to an EDHOC resource, or as filter criteria in a discovery request to discover EDHOC resources (see <xref target="sec-parameters-web-linking"/>). Another subset of these parameters are to be used as elements of the EDHOC_Information object (see <xref target="sec-parameters-edhoc-info-object"/>).</t>
        </li>
      </ul>
      <t>In order to ensure the applicability of such parameters beyond transport- or setup-specific scenarios, this document also defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles as CBOR data items (see <xref target="sec-app-profile-cbor"/>). The defined representation is transport- and setup-independent, and avoids the need to reinvent an encoding for the available options to run the EDHOC protocol or the selection logic to apply on those.</t>
      <t>The CBOR-based representation of an EDHOC application profile can be, for example: retrieved as a result of a discovery process; or retrieved/provided during the retrieval/provisioning of an EDHOC peer's public authentication credential; or obtained during the execution of a device on-boarding/registration workflow.</t>
      <t>Finally, this document defines a set of well-known EDHOC application profiles (see <xref target="sec-well-known-app-profiles"/>). These application profiles are meant to reflect what is most common and expected to be supported by EDHOC peers, while they are not to be intended as "default" application profiles or as a deviation from what is mandatory to support for EDHOC peers (see <xref section="8" sectionFormat="of" target="RFC9528"/>).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>The reader is expected to be familiar with terms and concepts defined in EDHOC <xref target="RFC9528"/>, and with the use of EDHOC with CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> defined in <xref target="I-D.ietf-core-oscore-edhoc"/>.</t>
        <t>Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and Concise Data Definition Language (CDDL) <xref target="RFC8610"/> are used in this document. CDDL predefined type names, especially bstr for CBOR byte strings and tstr for CBOR text strings, are used extensively in this document.</t>
        <t>CBOR data items are represented using the CBOR extended diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/> ("diagnostic notation"). Diagnostic notation comments are used to provide a textual representation of the parameters' keys and values.</t>
        <t>In the CBOR diagnostic notation used in this document, constructs of the form e'SOME_NAME' are replaced by the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. For example, {e'methods' : [0, 1, 2, 3], e'cipher_suites': 3} stands for {1 : [0, 1, 2, 3], 2 : 3}.</t>
        <t>Note to RFC Editor: Please delete the paragraph immediately preceding this note. Also, in the CBOR diagnostic notation used in this document, please replace the constructs of the form e'SOME_NAME' with the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. Finally, please delete this note.</t>
      </section>
    </section>
    <section anchor="identifying-edhoc-application-profiles-by-profile-id">
      <name>Identifying EDHOC Application Profiles by Profile ID</name>
      <t>This section defines two means to identify EDHOC application profiles by their Profile IDs, i.e., the parameter "ed-prof" for web linking (see <xref target="web-linking"/>) and the parameter "app_prof" of the EDHOC_Information object (see <xref target="sec-edhoc-information-object"/>).</t>
      <section anchor="web-linking">
        <name>Web Linking</name>
        <t><xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/> defines a number of target attributes that can be used in a web link <xref target="RFC8288"/> with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>). This is the case, e.g., when using a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> as defined in <xref section="A.2" sectionFormat="of" target="RFC9528"/>. This allows a client to obtain relevant information about the EDHOC application profile(s) to be used with a certain EDHOC resource.</t>
        <t>In the same spirit, this section defines the following additional parameter, which can be optionally specified as a target attribute with the same name in the link to the respective EDHOC resource, or among the filter criteria in a discovery request from a client.</t>
        <ul spacing="normal">
          <li>
            <t>'ed-prof', specifying an EDHOC application profile supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying an EDHOC application profile.</t>
          </li>
        </ul>
        <t>When specifying the parameter 'ed-prof' in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
        <t>If a link to an EDHOC resource includes occurrences of the target attribute 'ed-prof', then the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The link <bcp14>MUST NOT</bcp14> include other target attributes that provide information about an EDHOC application profile (see, e.g., <xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/> and <xref target="sec-parameters-web-linking"/> of this document), with the exception of the target attribute 'ed-ead' that <bcp14>MAY</bcp14> be included.  </t>
            <t>
The recipient <bcp14>MUST</bcp14> ignore other target attributes that provide information about an EDHOC application profile, with the exception of the target attribute 'ed-ead'.</t>
          </li>
          <li>
            <t>If the link includes occurrences of the target attribute 'ed-ead', the link provides the following information: when using the target EDHOC resource as per the EDHOC application profile indicated by any occurrence of the target attribute 'ed-prof', the server supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the occurrences of the target attribute 'ed-ead'.</t>
          </li>
        </ul>
        <t>The example in <xref target="fig-web-link-example"/> shows how a CoAP client discovers two EDHOC resources at a CoAP server, and obtains information about the application profile corresponding to each of those resources. The Link Format notation from <xref section="5" sectionFormat="of" target="RFC6690"/> is used.</t>
        <t>The example assumes the existence of an EDHOC application profile identified by the integer Profile ID 500, which is supported by the EDHOC resource at /edhoc-alt and whose definition includes the support for the EAD items with EAD label 111 and 222.</t>
        <t>Therefore, the link to the EDHOC resource at /edhoc-alt indicates that, when using that EDHOC resource as per the EDHOC application profile with Profile ID 500, the server supports the EAD items with EAD label 111, 222, and 333.</t>
        <figure anchor="fig-web-link-example">
          <name>The Web Link.</name>
          <artwork align="center"><![CDATA[
REQ: GET /.well-known/core

RES: 2.05 Content
    </sensors/temp>;osc,
    </sensors/light>;if=sensor,
    </.well-known/edhoc>;rt=core.edhoc;ed-csuite=0;ed-csuite=2;
        ed-method=0;ed-cred-t=1;ed-cred-t=3;ed-idcred-t=4;
        ed-i;ed-r;ed-comb-req,
    </edhoc-alt>;rt=core.edhoc;ed-prof=500;ed-ead=333
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-edhoc-information-object">
        <name>EDHOC_Information Object</name>
        <t><xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines the EDHOC_Information object, as including information that guides two peers towards executing the EDHOC protocol, and defines an initial set of its parameters.</t>
        <t>This document defines the new parameter "app_prof" of the EDHOC_Information object, as summarized in <xref target="_table-cbor-key-edhoc-params"/> and described further below.</t>
        <table align="center" anchor="_table-cbor-key-edhoc-params">
          <name>EDHOC_Information Parameter "app_prof"</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">CBOR label</th>
              <th align="left">CBOR type</th>
              <th align="left">Registry</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">app_prof</td>
              <td align="left">18</td>
              <td align="left">int or array</td>
              <td align="left">EDHOC Application Profiles Registry</td>
              <td align="left">Set of supported EDHOC Application Profiles</td>
            </tr>
          </tbody>
        </table>
        <ul spacing="normal">
          <li>
            <t>app_prof: This parameter specifies a set of supported EDHOC application profiles, identified by their Profile ID. If the set is composed of a single EDHOC application profile, its Profile ID is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one Profile ID. In JSON, the "app_prof" value is an integer or an array of integers. In CBOR, "app_prof" is an integer or an array of integers, and has label 18. The integer values are taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
          </li>
        </ul>
        <section anchor="use-in-the-edhoc-and-oscore-profile-of-the-ace-framework">
          <name>Use in the EDHOC and OSCORE Profile of the ACE Framework</name>
          <t><xref section="3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines how the EDHOC_Information object can be used within the workflow of the EDHOC and OSCORE transport profile of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>.</t>
          <t>In particular, the AS-to-C Access Token Response includes the parameter "edhoc_info", with value an EDHOC_Information object. This allows the ACE authorization server (AS) to provide the ACE client (C) with information about how to run the EDHOC protocol with the ACE resource server (RS) for which the access token is issued.</t>
          <t>Similarly, the access token includes the corresponding claim "edhoc_info", with value an EDHOC_Information object. This allows the AS to provide the ACE RS with information about how to run the EDHOC protocol with the ACE client, according to the issued access token.</t>
          <t>In turn, the EDHOC_Information object can include the parameter "app_prof" defined in this document. This parameter indicates a set of EDHOC application profiles associated with the EDHOC resource to use at the RS, which is either implied or specified by the parameter "uri_path" within the same EDHOC_Information object.</t>
          <t>If the EDHOC_Information object specified as value of "edhoc_info" includes the "app_prof" parameter, then the following applies.</t>
          <ul spacing="normal">
            <li>
              <t>The object <bcp14>MUST NOT</bcp14> include other parameters that provide information pertaining to an EDHOC application profile, with the exception of the parameter "eads" that <bcp14>MAY</bcp14> be included.  </t>
              <t>
C and RS <bcp14>MUST</bcp14> ignore other parameters present in the EDHOC_Information object, with the exception of the parameter "eads".  </t>
              <t>
At the time of writing this document, such parameters are: "methods", "cipher_suites", "message_4", "comb_req", "osc_ms_len", "osc_salt_len", "osc_version", "cred_types", "id_cred_types", "initiator", and "responder" (which are all defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>), as well as those defined in <xref target="sec-parameters-edhoc-info-object"/> of this document.</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the parameter "edhoc_info" of the AS-to-C Access Token Response includes the parameter "eads", the object provides the following information.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE RS for which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the claim "edhoc_info" of the access token includes the parameter "eads", the object provides the following information.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE client to which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-parameters-web-linking">
      <name>Additional Parameters for Web Linking</name>
      <t>Building on what is defined and prescribed in <xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/>, this section defines additional parameters for web linking <xref target="RFC8288"/>, which can be used to obtain relevant pieces of information from the EDHOC application profile associated with an EDHOC resource.</t>
      <t>These parameters can be optionally specified as target attributes with the same name in a link with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>) targeting an EDHOC resource, or as filter criteria in a discovery request from a client.</t>
      <t>When specifying any of the parameters defined below in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
      <ul spacing="normal">
        <li>
          <t>'ed-max-msgsize', specifying the admitted maximum size of EDHOC messages in bytes. This parameter <bcp14>MUST</bcp14> specify a single unsigned integer value.</t>
        </li>
        <li>
          <t>'ed-coap-cf', specifying that CoAP messages have to include the CoAP Content-Format Option with value 64 (application/edhoc+cbor-seq) or 65 (application/cid-edhoc+cbor-seq) as appropriate, when the message payload includes exclusively an EDHOC message possibly prepended by an EDHOC connection identifier (see Sections <xref target="RFC9528" section="3.4.1" sectionFormat="bare"/> and <xref target="RFC9528" section="A.2" sectionFormat="bare"/> of <xref target="RFC9528"/>). A value <bcp14>MUST NOT</bcp14> be given to this parameter and any present value <bcp14>MUST</bcp14> be ignored by the recipient.</t>
        </li>
        <li>
          <t>'ed-idep-t', specifying a type of endpoint identity for EDHOC supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'CBOR Label' column of the "EDHOC Endpoint Identity Types" Registry defined in <xref target="sec-edhoc-endpoint-identity-types"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying a type of endpoint identity for EDHOC.</t>
        </li>
        <li>
          <t>'ed-tp', specifying a means for transporting EDHOC messages supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Transport ID' column of the "EDHOC Transports" Registry defined in <xref target="sec-edhoc-transports"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying a means for transporting EDHOC messages.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-parameters-edhoc-info-object">
      <name>Additional Parameters of the EDHOC_Information Object</name>
      <t>This section defines additional parameters of the EDHOC_Information object defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>. These parameters are summarized in <xref target="_table-cbor-key-edhoc-params-2"/> and described further below.</t>
      <t>Editor's note: these parameters can better be defined directly in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <table align="center" anchor="_table-cbor-key-edhoc-params-2">
        <name>EDHOC_Information Parameters</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">CBOR label</th>
            <th align="left">CBOR type</th>
            <th align="left">Registry</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">max_msgsize</td>
            <td align="left">14</td>
            <td align="left">uint</td>
            <td align="left"> </td>
            <td align="left">Maximum size of EDHOC messages in bytes</td>
          </tr>
          <tr>
            <td align="left">coap_cf</td>
            <td align="left">15</td>
            <td align="left">True of False</td>
            <td align="left"> </td>
            <td align="left">Requested use of the CoAP Content-Format Option in CoAP messages whose payload includes exclusively an EDHOC message, possibly prepended by an EDHOC connection identifier</td>
          </tr>
          <tr>
            <td align="left">id_ep_types</td>
            <td align="left">16</td>
            <td align="left">int or array</td>
            <td align="left">EDHOC Endpoint Identity Types Registry</td>
            <td align="left">Set of supported types of endpoint identities for EDHOC</td>
          </tr>
          <tr>
            <td align="left">transports</td>
            <td align="left">17</td>
            <td align="left">int or array</td>
            <td align="left">EDHOC Transports Registry</td>
            <td align="left">Set of supported means for transporting EDHOC messages</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>
          <t>max_msgsize: This parameter specifies the admitted maximum size of EDHOC messages in bytes. In JSON, the "max_msgsize" value is an unsigned integer. In CBOR, "max_msgsize" is an unsigned integer and has label 14.</t>
        </li>
        <li>
          <t>coap_cf: This parameter specifies whether it is required that CoAP messages include the CoAP Content-Format Option with value 64 (application/edhoc+cbor-seq) or 65 (application/cid-edhoc+cbor-seq) as appropriate, when the message payload includes exclusively an EDHOC message possibly prepended by an EDHOC connection identifier (see Sections <xref target="RFC9528" section="3.4.1" sectionFormat="bare"/> and <xref target="RFC9528" section="A.2" sectionFormat="bare"/> of <xref target="RFC9528"/>). In JSON, the "coap_cf" value is a boolean. In CBOR, "coap_cf" is the simple value <tt>true</tt> (0xf5) or <tt>false</tt> (0xf4), and has label 15.</t>
        </li>
        <li>
          <t>id_ep_types: This parameter specifies a set of supported types of endpoint identities for EDHOC. If the set is composed of a single type of endpoint identity, this is encoded as an integer. Otherwise, the set is encoded as an array, where each array element encodes one type of endpoint identity as an integer. In JSON, the "id_ep_types" value is an integer or an array of integers. In CBOR, "id_ep_types" is an integer or an array of integers, and has label 16. The integer values are taken from the 'CBOR Label' column of the "EDHOC Endpoint Identity Types" registry defined in <xref target="iana-edhoc-endpoint-identity-types"/> of this document.</t>
        </li>
        <li>
          <t>transports: This parameter specifies a set of supported means for transporting EDHOC messages. If the set is composed of a single means for transporting EDHOC messages, this is encoded as an integer. Otherwise, the set is encoded as an array, where each array element encodes one means for transporting EDHOC messages as an integer. In JSON, the "transports" value is an integer or an array of integers. In CBOR, "transports" is an integer or an array of integers, and has label 17. The integer values are taken from the 'Transport ID' column of the "EDHOC Transports" Registry defined in <xref target="sec-edhoc-transports"/> of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-app-profile-cbor">
      <name>Representation of an EDHOC Application Profile</name>
      <t>This section defines the EDHOC_Application_Profile object, which can be used as a canonical representation of EDHOC application profiles for their description, distribution, and storage.</t>
      <t>An EDHOC_Application_Profile object is encoded as a CBOR map <xref target="RFC8949"/>. Each element of the CBOR map is an element of the CBOR-encoded EDHOC_Information object defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>, and thus uses the corresponding CBOR abbreviations from the 'CBOR label' column of the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The CBOR map encoding an EDHOC_Application_Profile object <bcp14>MUST</bcp14> include the element "app_prof" defined in this document. The value of the element "app_prof" is the unique identifier of the EDHOC application profile described by the EDHOC_Application_Profile object, taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in this document, and encoded as a CBOR integer.</t>
      <t>The CBOR map <bcp14>MUST</bcp14> include the following elements defined for the EDHOC_Information object: "methods" and "cred_types".</t>
      <t>The CBOR map <bcp14>MUST NOT</bcp14> include the following elements defined for the EDHOC_Information object: "session_id", "uri_path", "initiator", and "responder".</t>
      <t>The CBOR map <bcp14>MAY</bcp14> include other elements defined for the EDHOC_Information object. These also comprise the new parameters defined in <xref target="sec-parameters-edhoc-info-object"/> of this document.</t>
      <t>Furthermore, consistent with Sections <xref target="RFC9528" section="8" sectionFormat="bare"/> and <xref target="RFC9528" section="A.1" sectionFormat="bare"/> of <xref target="RFC9528"/> and with <xref section="5.4" sectionFormat="of" target="RFC8613"/>, the following applies:</t>
      <ul spacing="normal">
        <li>
          <t>If the element "cipher_suites" is not present in the CBOR map, this indicates that the EDHOC application profile uses the EDHOC cipher suites 2 and 3.</t>
        </li>
        <li>
          <t>If the element "id_cred_types" is not present in the CBOR map, this indicates that the EDHOC application profile uses "kid" as type of authentication credential identifiers for EDHOC.</t>
        </li>
        <li>
          <t>If the element "osc_ms_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE <xref target="RFC8613"/>, the size of the OSCORE Master Secret in bytes is equal to the size of the key length for the application AEAD Algorithm of the selected cipher suite for the EDHOC session.</t>
        </li>
        <li>
          <t>If the element "osc_salt_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the size of the OSCORE Master Salt in bytes is 8.</t>
        </li>
        <li>
          <t>If the element "osc_version" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the OSCORE Version Number has value 1.</t>
        </li>
        <li>
          <t>The absence of any other elements in the CBOR map <bcp14>MUST NOT</bcp14> result in assuming any value.</t>
        </li>
      </ul>
      <t>If an element is present in the CBOR map and the information that it specifies is intrinsically a set of one or more co-existing alternatives, then all the specified alternatives apply for the EDHOC application profile in question.</t>
      <t>For example, the element "cipher_suites" with value the CBOR array [0, 2] means that, in order to adhere to the EDHOC application profile in question, an EDHOC peer has to implement both the EDHOC cipher suites 0 and 2, because either of them can be used by another EDHOC peer also adhering to the same EDHOC application profile.</t>
      <t>The CDDL grammar describing the EDHOC_Application_Profile object is:</t>
      <artwork><![CDATA[
EDHOC_Application_Profile = {
      1 => int / array,    ; methods
      9 => int / array,    ; cred_types
     18 => int,            ; app_prof
   * int / tstr => any
}
]]></artwork>
    </section>
    <section anchor="sec-well-known-app-profiles">
      <name>Well-known EDHOC Application Profiles</name>
      <t>This section defines a set of well-known EDHOC application profiles that are meant to reflect what is most common and expected to be supported by EDHOC peers.</t>
      <t>The well-known application profiles are <em>not</em> to be intended as "default" profiles to use, in case no other indication is provided to EDHOC peers.</t>
      <t>In particular, an EDHOC peer <bcp14>MUST NOT</bcp14> assume that, unless otherwise indicated, any of such profiles is used when running EDHOC through a well-known EDHOC resource, such as the resource at /.well-known/edhoc when EDHOC messages are transported as payload of CoAP messages (see <xref section="A.2" sectionFormat="of" target="RFC9528"/>).</t>
      <t>Building on the above, the well-known application profiles are <em>not</em> intended to deviate from what is mandatory to support for EDHOC peers, which is defined by the compliance requirements in <xref section="8" sectionFormat="of" target="RFC9528"/>.</t>
      <t>The rest of this section defines the well-known application profiles, each of which is represented by means of an EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) using the CBOR extended diagnostic notation.</t>
      <t>An entry for each well-known application profile is also registered at the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
      <section anchor="well-known-application-profile-wk-minimalcs2">
        <name>Well-Known Application Profile WK-MINIMAL_CS_2</name>
        <artwork><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-WK-MINIMAL-CS-2'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-minimalcs0">
        <name>Well-Known Application Profile WK-MINIMAL_CS_0</name>
        <artwork><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-WK-MINIMAL-CS-0'
}
]]></artwork>
      </section>
      <section anchor="well-known-application-profile-wk-basiccs2x509">
        <name>Well-Known Application Profile WK-BASIC_CS_2_X509</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                               and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-WK-BASIC-CS-2-X509'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-basiccs0x509">
        <name>Well-Known Application Profile WK-BASIC_CS_0_X509</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                               and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-WK-BASIC-CS-0-X509'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-basiccs2c509">
        <name>Well-Known Application Profile WK-BASIC_CS_2_C509</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                          and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-WK-BASIC-CS-2-C509'
}
]]></artwork>
      </section>
      <section anchor="well-known-application-profile-wk-basiccs0c509">
        <name>Well-Known Application Profile WK-BASIC_CS_0_C509</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                          and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-WK-BASIC-CS-0-C509'
}
]]></artwork>
      </section>
      <section anchor="well-known-application-profile-wk-intermediatecs2">
        <name>Well-Known Application Profile WK-INTERMEDIATE_CS_2</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                             X.509 certificate,
                                             and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                        x5t, x5chain,
                                                        c5t, and c5c /
       e'app_prof' : e'APP-PROF-WK-INTERMEDIATE-CS-2'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-intermediatecs0">
        <name>Well-Known Application Profile WK-INTERMEDIATE_CS_0</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                             X.509 certificate,
                                             and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                        x5t, x5chain,
                                                        c5t, and c5c /
       e'app_prof' : e'APP-PROF-WK-INTERMEDIATE-CS-0'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-advanced">
        <name>Well-Known Application Profile WK-ADVANCED</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 1, 2, 3], / EDHOC Method Types
                                     0, 1, 2, and 3 /
  e'cipher_suites' : [0, 1, 2, 3], / EDHOC Cipher Suites
                                     0, 1, 2, and 3 /
     e'cred_types' : [1, 0, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                                CWT, X.509 certificate,
                                                and C509 certificate /
  e'id_cred_types' : [4, 14, 13, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                            kcwt, x5t,
                                                            x5chain,
                                                            c5t, and
                                                            c5c /
       e'app_prof' : e'APP-PROF-WK-ADVANCED'
}
]]></artwork>
        <t>This application profile is aligned with the example traces of EDHOC compiled in Sections <xref target="RFC9529" section="2" sectionFormat="bare"/> and <xref target="RFC9529" section="3" sectionFormat="bare"/> of <xref target="RFC9529"/>.</t>
      </section>
    </section>
    <section anchor="sec-edhoc-well-known-app-profiles">
      <name>EDHOC Well-known Application Profiles</name>
      <t>This document defines the following identifiers of well-known EDHOC application profiles.</t>
      <table align="center" anchor="_table-edhoc-well-known-app-profiles">
        <name>EDHOC Well-known Application Profiles</name>
        <thead>
          <tr>
            <th align="left">Profile ID</th>
            <th align="left">Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">WK-MINIMAL-CS-2</td>
            <td align="left">Method 3; Cipher Suite 2; CCS; kid</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">WK-MINIMAL-CS-0</td>
            <td align="left">Method 3; Cipher Suite 0; CCS; kid</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">WK-BASIC-CS-2-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">WK-BASIC-CS-0-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">WK-BASIC-CS-2-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">WK-BASIC-CS_0-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">WK-INTERMEDIATE-CS-2</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">WK-INTERMEDIATE-CS-0</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">WK-ADVANCED</td>
            <td align="left">Methods (0, 1, 2, 3); Cipher Suites (0, 1, 2, 3); (CCS, CWT, X.509/C509 certificates); (kid, kccs, kcwt, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="sec-edhoc-endpoint-identity-types">
      <name>EDHOC Endpoint Identity Types</name>
      <t>This document defines the following identifier of type of endpoint identity for EDHOC.</t>
      <table align="center" anchor="_table-edhoc-endpoint-identity-types">
        <name>EDHOC Endpoint Identity Types</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">CBOR label</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">EUI-64</td>
            <td align="left">0</td>
            <td align="left">An EUI-64 identity</td>
            <td align="left">[RFC-XXXX]<xref target="RFC4291"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="sec-edhoc-transports">
      <name>EDHOC Transports</name>
      <t>This document defines the following identifiers of means for transporting EDHOC messages.</t>
      <table align="center" anchor="_table-edhoc-transports">
        <name>EDHOC Transports</name>
        <thead>
          <tr>
            <th align="left">Transport ID</th>
            <th align="left">Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">CoAP over UDP</td>
            <td align="left">EDHOC messages are transported as payload of CoAP messages, in turn transported over UDP</td>
            <td align="left">
              <xref target="RFC7252"/>, <xref section="A.2" sectionFormat="of" target="RFC9528"/></td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">CoAP over TCP</td>
            <td align="left">EDHOC messages are transported as payload of CoAP messages, in turn transported over TCP</td>
            <td align="left">
              <xref target="RFC7252"/><xref target="RFC8323"/></td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">CoAP over WebSockets</td>
            <td align="left">EDHOC messages are transported as payload of CoAP messages, in turn transported over WebSockets</td>
            <td align="left">
              <xref target="RFC7252"/><xref target="RFC8323"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-media-type">
        <name>Media Type Registrations</name>
        <t>IANA is asked to register the media type "application/edhoc-app-profile+cbor-seq". This registration follows the procedures specified in <xref target="RFC6838"/>.</t>
        <t>Type name: application</t>
        <t>Subtype name: edhoc-app-profile+cbor-seq</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: Must be encoded as a CBOR sequence <xref target="RFC8742"/> of CBOR maps <xref target="RFC8949"/>. Each element of each CBOR map is also defined as an element of the CBOR-encoded EDHOC_Information object from <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>Security considerations: See <xref target="sec-security-considerations"/> of [RFC-XXXX].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [RFC-XXXX]</t>
        <t>Applications that use this media type: Applications that need to describe, distribute, and store a representation of an EDHOC application profile (see <xref section="3.9" sectionFormat="of" target="RFC9528"/>).</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information: N/A</t>
        <t>Person &amp; email address to contact for further information: LAKE WG mailing list (lake@ietf.org) or IETF Applications and Real-Time Area (art@ietf.org)</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: None</t>
        <t>Author/Change controller: IETF</t>
        <t>Provisional registration: No</t>
      </section>
      <section anchor="iana-content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is asked to add the following entry to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <t>Content Type: application/edhoc-app-profile+cbor-seq</t>
        <t>Content Coding: -</t>
        <t>ID: TBD</t>
        <t>Reference: [RFC-XXXX]</t>
      </section>
      <section anchor="iana-target-attributes">
        <name>Target Attributes Registry</name>
        <t>IANA is asked to register the following entries in the "Target Attributes" registry within the "Constrained RESTful Environments (CoRE) Parameters", as per <xref target="RFC9423"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-max-msgsize</t>
          </li>
          <li>
            <t>Brief Description: The admitted maximum size of EDHOC messages in bytes</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-coap-cf</t>
          </li>
          <li>
            <t>Brief Description: Requested use of the CoAP Content-Format Option in CoAP messages whose payload includes exclusively an EDHOC message, possibly prepended by an EDHOC connection identifier</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-idep-t</t>
          </li>
          <li>
            <t>Brief Description: A supported type of endpoint identity for EDHOC</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-tp</t>
          </li>
          <li>
            <t>Brief Description: A supported means for transporting EDHOC messages</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-prof</t>
          </li>
          <li>
            <t>Brief Description: A supported EDHOC application profile</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-information-registry">
        <name>EDHOC Information Registry</name>
        <t>IANA is asked to register the following entries in the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: max_msgsize</t>
          </li>
          <li>
            <t>CBOR label: 14</t>
          </li>
          <li>
            <t>CBOR type: uint</t>
          </li>
          <li>
            <t>Registry:</t>
          </li>
          <li>
            <t>Description: The admitted maximum size of EDHOC messages in bytes</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: coap_cf</t>
          </li>
          <li>
            <t>CBOR label: 15</t>
          </li>
          <li>
            <t>CBOR type: True or False</t>
          </li>
          <li>
            <t>Registry:</t>
          </li>
          <li>
            <t>Description: Requested use of the CoAP Content-Format Option in CoAP messages whose payload includes exclusively an EDHOC message, possibly prepended by an EDHOC connection identifier</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: id_ep_types</t>
          </li>
          <li>
            <t>CBOR label: 16</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Endpoint Identity Types</t>
          </li>
          <li>
            <t>Description: Set of supported types of endpoint identities for EDHOC</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: transports</t>
          </li>
          <li>
            <t>CBOR label: 17</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Transports Registry</t>
          </li>
          <li>
            <t>Description: Set of supported means for transporting EDHOC messages</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: app_prof</t>
          </li>
          <li>
            <t>CBOR label: 18</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Application Profiles Registry</t>
          </li>
          <li>
            <t>Description: Set of supported EDHOC Application Profiles</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-application-profiles">
        <name>EDHOC Application Profiles Registry</name>
        <t>IANA is requested to create a new "EDHOC Application Profiles" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>The registration policy is either "Private Use", "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. "Expert Review" guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, WG chairs are encouraged to consult the expert(s) early during the process outlined in <xref section="3.1" sectionFormat="of" target="RFC7120"/>.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Profile ID: This field contains the value used to identify the EDHOC application profile. These values <bcp14>MUST</bcp14> be unique. The value can be a positive integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>. Integer values from -24 to 23 are designated as "Standards Action With Expert Review". Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required". Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
          </li>
          <li>
            <t>Name: This field contains the name of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the EDHOC application profile.</t>
          </li>
        </ul>
        <t>This registry has been initially populated with the values in <xref target="_table-edhoc-well-known-app-profiles"/>.</t>
      </section>
      <section anchor="iana-edhoc-endpoint-identity-types">
        <name>EDHOC Endpoint Identity Types Registry</name>
        <t>IANA is requested to create a new "EDHOC Endpoint Identity Types" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>The registration policy is either "Private Use", "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. "Expert Review" guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, WG chairs are encouraged to consult the expert(s) early during the process outlined in <xref section="3.1" sectionFormat="of" target="RFC7120"/>.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Name: This field contains the name of the EDHOC endpoint identity type.</t>
          </li>
          <li>
            <t>CBOR Label: The value to be used to identify this EDHOC endpoint identity type. These values <bcp14>MUST</bcp14> be unique. The value can be a positive integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>. Integer values from -24 to 23 are designated as "Standards Action With Expert Review". Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required". Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the EDHOC endpoint identity type.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the EDHOC endpoint identity type.</t>
          </li>
        </ul>
        <t>This registry has been initially populated with the values in <xref target="_table-edhoc-endpoint-identity-types"/>.</t>
      </section>
      <section anchor="iana-edhoc-transports">
        <name>EDHOC Transport Registry</name>
        <t>IANA is requested to create a new "EDHOC Transport" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>The registration policy is either "Private Use", "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. "Expert Review" guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, WG chairs are encouraged to consult the expert(s) early during the process outlined in <xref section="3.1" sectionFormat="of" target="RFC7120"/>.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Transport ID: The value to be used to identify this means for transporting EDHOC messages. These values <bcp14>MUST</bcp14> be unique. The value can be a positive integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>. Integer values from -24 to 23 are designated as "Standards Action With Expert Review". Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required". Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
          </li>
          <li>
            <t>Name: This field contains the name of the means for transporting EDHOC messages.</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the means used for transporting EDHOC messages.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the means used for transporting EDHOC messages.</t>
          </li>
        </ul>
        <t>This registry has been initially populated with the values in <xref target="_table-edhoc-transports"/>.</t>
      </section>
      <section anchor="iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>"Standards Action with Expert Review" and "Specification Required" are two of the registration policies defined for the IANA registries established in this document. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts need to make sure that the object of registration (i.e., an EDHOC application profile, an EDHOC endpoint identity type, or a means for transporting EDHOC messages) is clearly defined in the corresponding specification. Entries that do not meet these objective of clarity and completeness must not be registered.</t>
          </li>
          <li>
            <t>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. The zones tagged as "Private Use" are intended for testing purposes and closed environments. Code points in other ranges should not be assigned for testing.</t>
          </li>
          <li>
            <t>Specifications are required for the "Standards Action With Expert Review" range of point assignment. Specifications should exist for "Specification Required" ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</t>
          </li>
          <li>
            <t>Experts should take into account the expected usage of fields when approving point assignment. Documents published via Standards Action can also register points outside the Standards Action range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9423">
          <front>
            <title>Constrained RESTful Environments (CoRE) Target Attributes Registry</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>The Constrained RESTful Environments (CoRE) specifications apply web technologies to constrained environments. One such important technology is Web Linking (RFC 8288), which CoRE specifications use as the basis for a number of discovery protocols, such as the Link Format (RFC 6690) in the Constrained Application Protocol's (CoAP's) resource discovery process (Section 7.2 of RFC 7252) and the Resource Directory (RD) (RFC 9176).</t>
              <t>Web Links can have target attributes, the names of which are not generally coordinated by the Web Linking specification (Section 2.2 of RFC 8288). This document introduces an IANA registry for coordinating names of target attributes when used in CoRE. It updates the "RD Parameters" IANA registry created by RFC 9176 to coordinate with this registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9423"/>
          <seriesInfo name="DOI" value="10.17487/RFC9423"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-edhoc">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
              <organization>Fraunhofer AISEC</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="April" year="2024"/>
            <abstract>
              <t>   The lightweight authenticated key exchange protocol Ephemeral Diffie-
   Hellman Over COSE (EDHOC) can be run over the Constrained Application
   Protocol (CoAP) and used by two peers to establish a Security Context
   for the security protocol Object Security for Constrained RESTful
   Environments (OSCORE).  This document details this use of the EDHOC
   protocol, by specifying a number of additional and optional
   mechanisms.  These especially include an optimization approach for
   combining the execution of EDHOC with the first OSCORE transaction.
   This combination reduces the number of round trips required to set up
   an OSCORE Security Context and to complete an OSCORE transaction
   using that Security Context.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-11"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth Client and Resource
   Server, and it binds an authentication credential of the Client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-06"/>
        </reference>
        <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9529">
          <front>
            <title>Traces of Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Serafin" initials="M." surname="Serafin"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="M. Vučinić" initials="M." surname="Vučinić"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document contains example traces of Ephemeral Diffie-Hellman Over COSE (EDHOC).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9529"/>
          <seriesInfo name="DOI" value="10.17487/RFC9529"/>
        </reference>
      </references>
    </references>
    <?line 693?>

<section anchor="sec-cddl-model" removeInRFC="true">
      <name>CDDL Model</name>
      <figure anchor="fig-cddl-model">
        <name>CDDL model</name>
        <artwork type="CDDL" align="left"><![CDATA[
; EDHOC Information
methods = 1
cipher_suites = 2
cred_types = 9
id_cred_types = 10
app_prof = 18

; EDHOC Application Profiles
APP-PROF-WK-MINIMAL-CS-2 = 0
APP-PROF-WK-MINIMAL-CS-0 = 1
APP-PROF-WK-BASIC-CS-2-X509 = 2
APP-PROF-WK-BASIC-CS-0-X509 = 3
APP-PROF-WK-BASIC-CS-2-C509 = 4
APP-PROF-WK-BASIC-CS-0-C509 = 5
APP-PROF-WK-INTERMEDIATE-CS-2 = 6
APP-PROF-WK-INTERMEDIATE-CS-0 = 7
APP-PROF-WK-ADVANCED = 8

; COSE Header Parameters
c5t = 22
c5c = 25

; EDHOC Authentication Credential Types
c509_cert = 3
]]></artwork>
      </figure>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Göran Selander"/>, and <contact fullname="Brian Sipos"/> for their feedback and comments.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1923LbuJbou74CR6ma2D2SYsuXJMpOzyiy0vF0Ymcs987u
6nR5UxQkc0yRal7seKdzvuV8xTzN09k/dtYFIAGKlCnHTrpPRVWJJV6AhYV1
x8JCu91uXPbETqOReIkve2IQhtHEC5zEC2YiOZfip1iKcCr6i4XvuXA5DMTb
KJx6vozFNIzEcHEu5zJyfHHgTaeebL+Svj93AnF8KSMxOB4Nxcbw4NXxYLPh
jMeRhN7oZ2mLjUnoBs4c4JhEzjRpezKZtn3nQradxaK9UE/BlUTGSQNe7ok4
mTTidDz34hhaSq4X8PLh8PRlo+Etop5IojROultbT7e6DSeSTk+MpJtGXnLd
uJr1xOv+j0PxLowucLg/RGG6aFxcQQNBIqNAJu0DBKPRcEPACTyeAjhPGg0n
Tc7DqNcQbSEY3DdO5Ibi1PND12kI+IQRPH5yCKPvv6ALcRJJCfAexs70vwDH
8cxJAEvdLt11AaCe+NGLE34dOoRWR8P29v7u7pYYJaF7cR76c3UzDZIInh9d
yYkM6JqcO57fE3OEo5MQHP8eeZ1YGkCeeBdONBGv/vnfMz8NJl8TzohA6ZyH
BImCtBGE0RwI4lICasXJy8Fu9+m2+rq//3RLf32y80R9fbzd1Vcfd/e66uuT
7e6+/tp9op99stPd0V/3t7fyr9nVx7tZC093n6qvT4F49NfdrIWne11q97B9
0CEidcNItsOY/sjJeehadx1XXdWPKFLGh5BFOq+kM5FR560TwUwB7cU9wlZG
aCKbq8P+UZ9+T4AJemLq+DjH8NEMjBzHzYm8OX7CiWY4tedJsoh7jx5dXV11
PCdwOtDwIwf4ZxbMZZDEj9wwlvRf58N5MvcfnFNz7UXeXMMLpoXJApQAzhrQ
ANIIXBsNX7/sieYvcK/9N/j82mw02u22cMZAY44LbHUK8sX3ZufJlcT/abj4
PjC2nIgLeS3kB/fcCWZSAMKAtkJ/DXkjIvlb6kUgp1wZJY4XiHwAIgnFWApn
BsQ+EWGatMNpe+wEk5aA54DsoS14RAZxGknhJbGIU9eVcTxNfaDr+cKXKLg6
4jQEKenF8CS86hgiTQsrES+k602vSZh6IFeCCfSYslRlSQgdOb4fXpE8xcci
6ctLJ0iwEewUhRPAJmCE3lR1oIcwh6kBMBAGEJ4pTqCYyKkXQNeOCNL5GIYC
Xc2lw++4WsJL6gshwbYnHlAmdHCdw1U2nI7o+3EIWDJ7cZ0gDOBJvyUGL45P
AJExjDGSC0A+wMMtJOdOgk8i0CneB1gmMnYjbyxb2H0C39IEviM4cQJsshKO
lzAG379uMf5Lxh7LBMdyBfTRvgjCq2BVc0yac28y8UEQPUANEIWT1KWnHoiP
Dzy88KnRWIP+Pn5UkuLTJ+EhRGvSektIIh4cZk46SCQ4aUCnLpABsBKMFxDm
ysCJvBCHcmiQcE630EiUKiS0aO6Tq1AsJLIDsCMRWQwD9xLPAezTNJwABGGA
TZ07l5IoFVlGAFKWmaojRuGc6BqkFpIVsk5AbEWNAd/M00CNODkHbTs7Jzgy
5pYfQDkjyoEgQEkDRFfnnnsOqJvKK25YzoHkAVmXkigpkLMQ4ZWTjngVXsHl
qCVCeCwyuV0DDy8wJVgcP5ZTJDZATqCtHqYUDRegtB8Th6QxUi6M+uNHsCOI
OHY6TxGybKotMRATxeN0VdNeSw2yQlA4s7sVFYc0ZUB4qe9EyGzVoBGmvcD1
04kUY8CqNZ0GDk0iQLH+hYRRi4WKB9qy8Z1AbRIAmaCGBLzMUKJci2a1tdlU
sKkJRVWotLTRWWZ14sxeAV0RIXHzMBicqBn+nSAzgzwAalsJM75NwwTSCKOI
+QtnTUElDg8Qh/lwMtSKppwQNAW4r+S47XsBmrCfPilVkL+EugnUVXjNElcT
2cppzwYzEeNr0n45cCyeTTkOI2HLQjiJkuEImAOSdywQMBaEaIqBIEQK1n3D
6MM0ckHko7gBf8LzEWRQCfDHc7iVnBZQn4PdT4pDXSw0hJgT4mWI8wImaoBN
k6ArwmfCT70gnG02aXLSJbjR8gS4larCmSr0Cc2StolI9gCJ6OEB6kE6B/FU
wjwDv5CCCPtvuV00WKHdjRjEaS5N+p2uJU0QLajB8O/Hj9Xm5qdPm1VUAzN8
VkI2sXQVtWe2HFB7OP4vgAT61QKGhnJ2mD8i+BFFSZ5u7kZbdw3a1Kp7FedL
B0TmKkKtIIW89wIN5GIfCfx4NDg+GWYcUWt8SkGJ/mAoptjLFTiWhEhD2eMo
SIKSae/9g68UlLkMLr0oZGtcbEB72pgAZwTlkGmjeiA+XC1AV8idOF0swihh
VMHQEUpNw4p6iYL6k4mHb4KFY9rLKGihrUtAuTAIBqx50AMrxQmYjND5WM0p
QBlLs2Un0qq5SprEBXFyvyJEcyTyRw5m25KymzCmgK2MtUYGyprnVFFKJXOV
w5Cza8anmwVzT3ks2LiairHng0OGPYIpeG7CN5bXoHtYRiFptBGHMJh00VbM
7eZmZdHOBr8z/LouACIU+0JPGCY6kXNr7oyIUdsdhxHNGopHLQULwGlpzZgg
AAgVwF9ygcZYkDBczmXoTWJCcSB5EJH0gkvCSgAzwNGiTII6l47nO2OQIuEi
M8fQEl82NIV6JQZCYX3ghzOYBaR4wMC1ICSiY87OczWqYbpXqniehRYBKT84
6ND2oA2YADChiVYdZInUJ9I2WUgZms8Q1uyFR0o0TLTdzrYp3XV8vovxObxl
gobex0NQCekYICyKSTeSJN8dnzoLxwlLR6OLzGFQUMpLz0XvpD0OHTQsZ4+U
IcgtokCegvkM6LtT99Gku/wFK2ipyS+WFcQMtI5mccL0NEUCAGOCzFsxD0Fm
ofuklIf8APyZMO0BL1miPUcsexY+SYNr6gBklnolczBgppswaAdmulkOGQtW
Ri7fmkbhPIcNAEJ/8Zq9TYKEI8M5IEUr54ll46AMe/BAnMpo7gUhUPy1eIAu
d5Jf+MT0jm7yFQYlRfPNT6PTZov/iqNj+n4y/M+fDk+GB/h99Kr/+nX2paGe
GL06/un1Qf4tf3Nw/ObN8OiAX4arwrrUaL7p/9xk/m8evz09PD7qv26y2WBJ
xUzkI4IjYMmEcNzQYo5MjReDt//3/2zvAkL+FyChu739FIwH/vFk+/Eu/EAr
knsLA2B7/onT2IApkk5Eeg2sQtdZeAmI4hZOUXyOVIouCiryXxAzv/bEX8bu
Ynv3e3UBB2xd1DizLhLOlq8svcxILLlU0k2GTet6AdM2vP2frd8a78bFv/wb
6GQp2ttP/u37BtNIxLFPtC1tLpk6c1CFgLsrDzxZJK5YhSXAOFyAUjbMY6Zd
I4DDk8FvKkc1M1Dp6pJhb1iR7P/sb++QH2HY4KvseZjDAUDmQU8vQFYBfx2z
bXBiS/oNVALKPsS4tepav3uAyvEAOyWrTrx2glmKMYWNwcHB680MNvRxkHpz
c9ig647Ah0EkSA0+LrTQskJsRakwtEvMT4p5fA1mKSr1YMaoTqzbifyQ6Nut
vHO4ClaMdykp6lUABJBSUPn4Xqb8KGKilQM9Sa2RYvKcWQByFPQMiEFlvMb2
fBTlk4HP/OYP+iYjbaNZ0nIThP1BSYcow8kAzEYLtKnNaocwkoLhvazMLdcl
foiSkFEK6jWVKuiXDbpsrKUT21JuR+rmRikao0I+HB2/GZ4d9d8MH2oU++D6
kIrBp6hfwasGPIzsBe1NEc3Mw4n0lWgiHE+9WdudTPw23WGviTWnebVDrpuy
TFrio3wIIz8PJzD0nnj/y1ZLbLdEtyV23v8KBPjQ9RYg987iFGgiftgTO58E
On0TXqP8uF3yUlfgY4C4ozAhoQ1TKobg+4RRT7z1JVhVQBy+VJ4VIn8WOQtw
OmEKJxhy9NEYkoATJjhAKyBbZhHy283HgntW6KYm6kxRJpnuf1604bQo4EiP
n8Ln7Jhf5+GS0gVkoKXcYVeBw1ixmbbEMEidxQuVw3+9yhZjAvUiM6IG09GR
nWIEIA+oIZVo/xJhVvaK7fSxCLNbyIMra7h01WEXZQq9A1BeK1DQEjLhaDRy
UbSPva5SIqXR12X/eskxq47fEaFlcQNSA03ssUM9NouW3vZWZ3urYO1xGMhj
F8oFGgIO7sw6KnbG8vsrRuSqlEIxNKfGQfF4coF9T7L5zp5KHptfjpesjNVs
xJtm3IAw7mTrLfZYc8EfA0mKeOFFXqKcmiVOIsmB4BKGS+I8eilCkQL7q6TY
82gf+QJLAdVM/hAYaBhoaaNDNuwRYju4aFwavgH3hjV3zSgO+SEa8RS8eqg4
+mFLRxN5QWSFJ2w5T+x8UyysGKwk69kIUULDvhK3Gm1IXs6FVA4StvUwl0EP
QY776TzT5isXJrLli/VWKLhty3ArjqL/swhdN43EHDw+b4HeoUdWHM0gRVXp
fiQDjAvWQyLg/h1ymfG4LSezecmj7RVhvNJwfZQ8t4QMzQU5WbQ2NUEumK5q
Vz8ZG4PLtOlSdwYVYUCiyDg4fpkv0lCn2rfKlss4Olgham8XSCXZqmXlOkqA
7ddVAc0lwtls5SwtP6B/ZBiipQgDt+shjw5pzJ4cIdgzAzONZCRhCwwUDPDd
A6JuBTvN5+E0l1lrkwy20srfV7AX5a4xlJ6p8YxmC7QLEncho9U6I1sGUOH9
a5OL69G5EnxaIDLcw/6B8rNoPtATsBZ+Eh1Q9XIkO8mqqTEWtOwOrBHgrXXw
rgKiymHILVpN5W11B0gdbd5YwH8gMEj5K8Wt9QubnKUmBT2u7QqKzpCmjys0
fGng1Vr0xYg9iVydM5GvZBLLoBGInhAaQZnnQNol5/89ZZUoswiYGM2GAkLA
IQC+jhVP4Nq1Iow1FoJ1YgKud+d6TextbRkKcEmdFok5EY+UCvMTDqrQwA0i
yhiPiNKIKNr0QjyOP31nDK7M9vY2NdftdnnsEaV1GAypjJCVAGkiZHpv2Qzq
3I41CdAiwm5muOXxtXBwTHg7Ozswyv9d/DROhv/ZEz8MT8WjTh6IfoTaoAH3
Rj3R7WztYXAICCChrMC/PIplEIdR/Ah6XXz/DHRHq3CD8pa+f+ZNn/MVfd/s
glD4/TPQ1LmifgbM6ZJP/nzL+N59phIahYCL7NerB8AqbyfPt43vO/jdm6hf
u9arHt6L6OFwPm6DWaghyya0BCKclucwB89YdDwHVJYg8mNPPCgTIJxn+byJ
zKXdtE4TBGOCiwvQJag1MFYwFhU1P5E3t+wSqkgeunYr/UHT19vp7FqKfsU6
tGnwV/mjJIiZ0wpaiQl9lrLuylLEkvDKwci7WnIpTZRi2sx8TmRlzCbz9WIK
rtDXSBVKSpMY3tdztDkUns7nTuT9Q1vOCa6/0TJg+0JeK7xR87Gyj/IA/TSN
yCQBpqOVot/FEboz+PmdwznMkOoHucB070Qb7Ss+v4sD6ohtkps+v0PnOsIA
r24/MdoBSUxOUxQ51/BzRZQlg+t3MeJ5yIX0itd+Jx5YgTnNCsszkSUei/dZ
hOR9E7ikyB3fiWxie0VXRdsZxmJcEe7y1JAlrWXFgjrayMM2vZiyeUP0s2kF
Ubl1K+wXO8uE1hlwxVd5xoHWkB1xjFR05cWyZXZnP8yzh5zBb8U6x4ysAr6r
kgbUm2AKBdIeTiD+Y3R8xL2YjMKhQM+EiiimpFtqBcm5ZbVQ611m+nMYkFJU
T9h20a9xhJqXxv5g3jGK5we0xaUqAUhDaKT2vNSpPZZ0Xlc2o/25Ml5ohuPQ
FFAQ6iVsSwyaEGdJDJn98YXSkjgUZeaWUq+jdhK2YSYpDVmchkgBnFYcS9vU
swKzgLwzVEpN5cypuHZQiTA7HKcHbI9HGVwb/dGmufCiH1aOwMZgk/tctupp
1iqzNzKvsyS3SmycQKcUZyZTmfwDxklCOKGQaJyS5T7y5h5gkNMTis+ZKLO9
Cdd3vPldIW9UhqGT0R1ghtHcwmFR9u9MW+Y8fmu4Kr6ZRrz+vZpddOylMkZv
yIvVYbLcDaiRjIjOVehSEno+0IKjoLN+2TE8GRkek/TI3PDmGFaaUA5W5mEr
H8oYTBp5ZwsnOW+aQoGCrpVzS8GxlcizortMLDBik5BssjNQasSOa8TKVH8V
0bI6+YYLDoMrqrltFMgUNc4EVEpl4IplK9D9cszKAFct11pqpNQ2rQ8S9d5n
esEQLSUjRV6SLTbma4bFxD5QtT3RVAummM9iLY/ihTkwmDOTZ7t0F5ynM3Ce
8Dvoq7N5fObLQP+KwYsyf2OEBFe48UVwys7Q/qU2vclZ4YLeSqITZyK9m6Qp
NtTGDkAm5rGULrjU93g2C2GlLKBgJjuvTqQsMw6yeGC9JOhqHZap4NspQ4dm
Mcn55+bQIlHPuzWiixgyrBldrBKvLVNN1NF0f5xQYwnz3WLyl/WvnvhqDf6n
nud8yfNPPdUPzKT3fNMs0XBxKX7FKkqj8SL1fDJoMNdU5UdqOUTbpCIzDXCN
JZyKFd2yNdx4KZnBWL4vLPDqDKTigvXCkyrobqrezG+rpp+iJbS0EMehWTtP
/obV5uWlofLFZrX89/kJCqpHa9HzlvsMiivUxVVSWqgpZndlJEMRqHtbMeXV
8rnzoT2PZ7H3D2kvmhMvT+ZegpMJT3nzdC7wsdwYVlYE7c/AXL+45qJ5Gqjs
JCtEkIHkhs6i7U6L4AA70fpL1qve1Wma/fSECm+31cLJMdtZhie0vys2DPLl
cPG/UpArlr9t4hzv79mPuN6kXXwMYzgLIP1FhCSvFgsQCgUiIOLaD51JLvHB
6vNTlduYTWX2dBjH3pizyhactDg2HgNPPFBEm+82LJBzjEZThxdCivkquGlF
jT+zv4EiZh5upU3UPvZ86nib53Vm2hpvIh2RIZwJ1WxpN5tEAHHRTgp5GMyO
ABSMbhFiBJNHklwbGeP3m5BBMdvXGKiqCDkNNWiHGrRTMmjzMGrFNjo9prYe
U5ss4XvOyqiD0mxSkkVxQjizjhbXdNwoT6jKOO1+p+Q0i1hVxgGzR2rMQzaQ
e0d9LeStsC8qVzIK60MrPZeKtMly0+CmJMXP9MP0DpfCJrg1VmPa3RvXYzhH
9yFnm/ZwPGXmRJLQK9mIJh7IqIRTym81NGsh6Ia1oJqLQWuvB33lDy5HgSVw
puwFXJHazW+KFKWP8btuq+JNPeviTsdyyw+iAO2TM3fKv8X2Xn4T5BSHzl5i
WZ51UHDCBmNeGuYGYwZwYhtDnEWxlsHRup3FgSjwJmdywZEeRMG+MRJrXTJb
mKzQqivXJrn5EtXm6dpj1PRX+CAKcjVDVPD4RhTkOqxCOJSgoJ56/hqfG1eH
290a68Nx6ZowyJj3WsisWBa+nYdiL5eaXdkrpkUnxVwitd8qf764KrpLVhjK
jvcgPFYMC7wIXhCg8IEqYjUpc4C+OT51HR970vUkmBMuxmHoA7eZ05w/pzYr
xB6lAPFbf09A2P9dbGx9mO4R5v5Oxdj4yu7m0rL4HhGAN3kPovM9y871ch7q
ycNa+Q2VToMKNN1BVkPNTIZq96XQsT2FFhpvnepQaOV26Q77tdMdbu973pjx
sIbziVSYK6/1SLCex1OHAmu19MWpsZ6+XUmZieGq3pIszSZuR5OPa9PkF3W+
0RU+qS5UUZLtk/nAS+U8qrYLZu6t0dpZlsajl2GXouCOVcWkZAfuivV/lZvs
RcprJbVrFDShX7qkCVAQ1pMLboSySMnsYs6dhbnXuyOGSNGalrXjoJ9k6im5
29Yt31cooKV2S6aUjl6WrUJAck1gT9WpK4hKf4WoNCCuEo/1vPpTE19Z8Ran
xvxwRoBhg2k818w4kXmqRcXbyuxIA++3VJrGj538VbIQk4dPzDT8lTxxj8l5
hXwFKmGyRNlanhamZAnL+TpoVk5Jd3VT0TIjK4IzEoyEhdJ+zRyVz+87llSk
+sybYHpElsmzOlViCa7+z4W0mbVByQrRYA0n1M4RVorAN6ys6/gucihecvRu
TlsxMJmQ9p4k7JQY5vsTZbpvF8rf6aobxn4XlkFZSY1Wec5Rz1jCz1jLToQR
vGW9mL2jUa2tD2tLyA18l8k65bpQf4L7E13eutEpg8zOnrkvyJoXQHu0qKrM
7sqSS1ZFS3sloQi6kTN0G7itTTYMfxJSqZ/l8inKzFM+Pn5Xz7xxqBwn0Egk
kzxiiCr0N6yooTIMzTexB4B5BsSVleoy8NbHHIK+PwsjIL+5fokrcwFLmDNr
M5xQbF6Jqyyj6j6wdSOGeJdTjp8nlXDqTK/7A1OB9lfuSBxxiYLzLAlxO0sc
dMZxvmPtuij4ChDlsluVMMMldNwAp5fc9Xrz4dQ0j7ylPL6sQV35YWmbjJcY
DhNhAevZxGhD+kYlS/QtgEZQCoIQbNMOPAIGswjwtIVLdnYkl3WiKcxzIIyH
VB04m+DKM3kERZSZEK1iKqskohEryhDA7gbVT+m+/1UX46BJNgtROhNdHbc2
ZEb5YdxkRDOPC/oIJ4FHRYerxOkW7/fDAs6ug2FzlUkbqjrRpnlP8SSmGqM/
UoAEt5GFnCfTVmx1J3WMNVRmoAznjrb6x9aeqNWGfc/au9eofuO5+Kh2vG2L
599TZPmR9mjh80woe0Y99LT8oVyz8HPbT9RzLTOk+yzba4RPfafaoZpN8DTw
TeOTBXUDC5UUquOV7iTSPlxVabyqJcz1avBlqWR3XUZPTbkBRWUFv++Axr5b
WWKvUAeaWAhroICEVVJNCVIKd8Y6BZBgtGGqKuRNlJ1JQN74q9g1DXzMzQt1
1CTPjmvpVCTOJdZAqs3ELMx1gXQlzlUBd2d5evLcJGpN5eRZO26Xto6aZVry
QAvKEx1RYEzqyDKAagfDbyikjJV1zPQ8Uvfj8FLJw/qTm00rFS9F11WuXxDR
yIbIkr2ulY+M+wCwXrEO/Wcqrqp+YkcXvouTzAIvC4vcMMZWthU9g82sqwbw
seQ3IjarhNzqUqzrlGnjcInEs2S4XimCuXowFPhA4a4LtSPxJLdzXm+9s4yl
448EY1lo692P7TeHR4dv+q/PBqOzrq0SPuYbnc3SZzstEMk8gjd0lSLEYkc8
aoilOmjwfDd/fsDKc0QWa5deoNZz5YAvbOMLg3enYoDJzDEtSW4MBqNN1YPl
p+ALu/gCuBW6QXxI6xG8Lx/2375tvz05ftnOB9wejNrdh0V9wnuQqmaTV9eM
DRRqP3bkuMaKH/IPvFKMW+UM85QYZt3Z2bqX2dmqmJ2trz87W0uzUwtlL/qj
wwGR89nf9rae1sIaGpY7v5aiTht5d0ffv2AVhV+r0JgBWPFBWP7WgYFROS4+
YUNW4f4XQP7O7q96BvDdD3tJvZkgPBKXtBGPf3hWyeZ968vM+9qc82eb960v
Pe/dz5v37tngD8vvcA1gO8Ope3hrEihQw2ANYsD+Vc+aINxbCIJBGUGsy51f
ZJZuxZ3/X8zS1mfM0uHR6fDkzfDgsH86rG8RfnntWXOqWmvMFXyWxOua7687
3dskpeHfjp56/utmJNASF64brwmG8QGh34L/3HPHC27firunVswAtHrEaNLR
n8PQLlJ+PWv7y9sP3yi/3uePQvnLTswfzX7qH/y1fzQYHtQmeFXBvILs6+E6
a2Yli5T3ZnLL7bsT5Qy2dW88Bh9opfXZvCZux27bO/fNcvi5cK+I75LPa+az
GRc/mnk/s5GajK/Z6A75Pb6B4bPl/CW+V28ZayMrV0U4sHjD2khpjTyjIoB9
/GTdM29/NyuZ2dubss8fYIcSbo+ZSt6Ah1svtsxbhaCivqyk4s6zgmULvwej
Z2Th3zfQHz/+C56B/ekTAb1dDfTWDUBvfTWguwWgC2EpA+hYbKA5trmMbxTX
JYI3hkc3SPCBwNq8S6B3qoDeqgn01lcAete8tez33wx0humibsphdj8T5iWg
98xbBtBnWzWB3voKQO+bt8rcpfVo+lE16KTRbWOY9SLotRvGVAT6sXmrzNJd
j6a/DNBPzFuGljYvm0Ara7MAevGeIpjMmrtxLLlZVDYiG+h8U9tKtWxtbbtJ
05fscdM2QtW2SNs2qNrcsa5tQMuUtcoFZLZAYZdziSlgKmeTFqCN4U+H7f1d
UVDYmPrON7KujTmgZL/d7tPt0umowIQ9HZW7aCqnwdiaaWPe2M5wK0OsboWA
34W5D+PrmWIVk1n2pG2HEaVgPgadqfPTwdv88u1zOvgQrTQKrBeWezBO72mt
SAEpmmE2zKeD+4bZ6sGAmfNbd7p4PGApnrvWBQPmd3I8Ct0LmcT3BbPVQ32Y
i3xrbJa2WNXcWlTCnTCTaYQMPMDE8YmM1D4RzaSxut92rfvIqy8O6Byy/lG/
8HKRj8+dpZORlH+HbIsNrD4jTp/UhnmbhRMrmplUa+ZOJjZhnMVFyTrqtOW8
DK95qFp28hzHlN7g4XOcV3BinG0bA0ooT4UOpyOxCGig8aOrG19IdVIx58Oo
3brYFJfIWtoVbOq7bOtvU9VPsU7VZcypcnZ4OvAkjWRsV3Tjg7ue7Kh0JX16
ZM/0TBuNUTpO8lvVYDQaJ3pbdL4joSeOHvUbjePFUtkTdWeoN/fY1NITb9I4
wYy95T0pMZZlQGHI9P54t8vJPjoxOF69F4sylazNWPmp2Xp74q02ZxWOAFmr
jEnGVEU0jLKErSq+UocCKqKmHETAb7iAB9Qx48U2CfFv8Xjn+ByrAJqU3sub
ajQMw0mlcqaxYoCcTHti+TF9BvdNB4k76x6RXUgo3Ok8XUoofAmcyanjuY1V
igGj/o91/g+jB0gUOvgXIeeO52PlnogrKGJbieNy9qAug2O9/7r/41C8+0Hg
i0jZgOZEbPjOhfx3JIROGM1oa/rh8PSljTuqaisdv32KtWX7kXTEhhMl+Ws8
uZSTl6KW6Ak8pff4CHkP8auEZBjo20dhIGGkVHD70eDcCWZ0dGUSgXiQIC8R
BhisPgqcNlnmUgTfJ/lWUsjAKJihhJyr7jMqygQdYLG4Y4sSCFWSd7OsGyP/
zyiu3BwYJdBPhqPTaeqDjWmWQh+EJ8NNq6pF1tAsCtMFn+VL+55OiYzrSdv8
rQEJrp5ow0gPeoK0W2apWXyEB2lzMcB+XjAxQx+dq00Y5IqB7byq4o3awsak
J7NtF82lDu8OkS1dt5QLze+iwUGbQrLOyFTuCbuUITzwAkCcmgZzjzeSrFkw
BFpStDwo0vJ3onwK/jKOvq8AUZU2LAfvz1MD6G6RwqUCy3HSL9S/uMF1vVvA
ksXNQNXy8O4WLNqhcSNglYrtFsDoQ4zMXddlQmX5ICMtBz5Dutzxfu/vFCKN
QmaIkSzK0RPbu/oC2xxY14xQw5324PtdiJVRhS1knDqfkwHDrCqPFeHds+Hl
ImQRFyFbBfifSuDcAl1GlbIiyvZtlJkVu0yMrQ7TFfF5ywpmKwZXHFHuRxcH
9HitAZXUIrtxMHUlXd2xZJvNCiN5stZIVp54deOYqtuoS3GZaFx99FZRRpbu
I8llZJRxJnoBYJwn6MDg7vx621dMq2u4OAcPMwJ7+8CbAjO1X0nfnwO/HdPx
18ejodigRjeLZqstXpf3GxkxgEUI4Fwbx5k030beJYL9UyyxwsEowW1ReIBc
n5mbjzf8gOd5AJouPXnVpOLaTQvtQjv6TWUFandst7OvqwBsd/fR+W7ajfEJ
dj7vJIxkvpHO2NJDL7QjeoHG1acS8ljIjQ1S64iaWmPgHYgOFmfAut1L7zTF
2Im9eGk0T63RtEqaNkq6+td5XbhiQ3sFtJyaURm1fyqCBojU8MAfN3OHc1hB
PrgXAoMQguRWvEQKj7e7eNoo76BVp7zwQQS858/oU20ibHGXVx7h+IKIE7QF
4JrqxfNkqLPPqbrcpaqqQuAakI7pYE+L/qh6ksZPCz1iXOdR5WcxmpJi3Z2J
8qlpTzgnfOg+uRMANzu7GsHHvZJp4pfVwdF1KhgPiiW4TEqcBfYydsITWVDy
5ekWqu4W8KM/YT/fCziExruvdWl+pQPNs1TLdiWrih6q0JOu0s2FY8xaM2pP
tINa2KOD2M3SUiBhZo55tUMyAy3CRERoM9LYVC9oNEzy20viAJUch8cUKR7a
5agoiNXu7uIwuzs0VQY94K7ZJYZ7t8xwFc3u7+3t7GPL7e4eBTvoMneG9/ZK
+ysXPUtdxHMHrWYMQAW6K+xjRpJaXc97mTvRherBlIqGMVpFC3S2wU3Ffqid
gkW63JyDBx9HiVmiql7LhktQ3i5JCK4BQJyD0T63ENS+sWCBPgw0YxmMy4+l
zM4QRYMxXKS+fcyWmhCjrPTqdCqVmFmzKG1Ra1cvxNZW3DeX+Pumu7/p7m+6
+4+nu9eV1MthKhQWJFLzQqA9Qzdz2YgSxQ89rmzym/L/kyr/z1faK4jsHvR2
ZW93qborS9maqjtPl6lU1lbuTm39nDX8TSN/08jfNPIfWiObOXN1FWnNCtbf
NOqfU6PWN9LqpmZ+npbmXogU63R1pzp7rb7vUoObRcCV0rZE7yGmAaQqgcRQ
25YCaTRqaggsl1ul5SgJ8irUs1HOVMWyuSRY1aN4H+wFRycwVZwcrsttzahG
YxwCmc1kQGaCoTj5TFzHlJYxkk7q41mPwg9DOq8THmuJcUqPkbCDm3jd5i79
/pQkDXAK5hDFIb+UN8rH+8XpGAbBhV1hEr0knaDZplDJGMeUZfUeloJGmRXa
2UyFhVrWZSSJB75DKWW0WxerfLtJQPJ+auEcBOtQgU2qxKi/555Ll7WYq9qC
dxdphCcHULPGEmVuxKm14rxZnQ02xxHEqC+z0rgqda4AktjwOrLTWpkKZtwt
t4D5VNB6ImWTjkTwlYo0a2QXC6RbXA1DVOviNKBJSCVZ51LS4GI9PFQ2MELX
mg/c1JhImpA5pjrim2PNDVgbjWTPWxpX/FvqJAR2TkN0rinr/I7iO1lqDWAW
UJyCWex6XEXVODwWsGLhXU0i5bnJwJ4qyijTZWdnobIYJynPjOSDQ1S5PccH
2p9cW5XegknelpquWPjeBS5IG8aBh/XxFn54TeYp6/V/hJTU78xmJSqGhpwV
AKSJllzIVVEq59W5Ph13IY3Upg6mcGXmH5ZNJbteGQEK1Wpe2GS2O6AZsqQc
4z8zXLXwqqXkuV/iMMJObqR3ip0o0KhiLXVSKWt5LCy5lJWZNautTKegqnD+
Lh3PR+XBR4WwuMlqcgLUc4/yBaQ2iJeRwMWJ2SFpaUs408SZq4KygciNDo6t
oFPTYLxaoiEWxFql0qQMbTmei070dtIgF/ZuolMpEfGk2WOuesn2eSZSrek4
UIomZl1PSujSc8TSNKMpapU81MQGNjfilOBYeosmjSlf1cLWpxGoFGS2c3NZ
cCW9GcLgzNAiScR5eIUVL68t9yZUB3arJnGOfDlN7NrUWDzTlVhBmZwYzZT6
rAyy17I8ebN1bIrbZyDZGIKf2DLMSbvdBrfQvcANAFSn9w085GebBtzJxG/P
8dKnxsdeJOfgGnlBNHU/WUUYsg+10Xi2nAHVUKUZxHOx3bDKJ8CVbiOvBAA/
nzas2gD4ylZDZ0DgryeNrIvSdISqIorw7lbVzS2CbEVZOYJzRfkxuL9T9f6A
7+9Wva/u7zVWlqaBJ/ZXPoFjeNwo2+sPNwhpFHN5BToAKCXPHG1g7SYYHszD
notf9gwE20XvB3nRe07rycpP0PjLaII2uEy9mUFMemMLURxdQXUBxmd00VZb
W5BweWNL38W1KV9OZszbSJuOfQ2Jk+lfTp436Wix5id2jB3KsY7xKCWAkpQa
eEgXYIV/HJxHWFocZEF/Hv/zf2KwwGlP1Mcf/vnfwOtiJH0Hj5X4pE9ogVsv
Inx+5IECg8vGaTZTEJjISNqMYE2mfAUcmLhySg4HHl0hPh/GwCtBeKmq6YM5
7F6Lvx4eHR3/tW9G1IY/nQx/7IvB8PUpkM7R8G+nKLHJVBv8/PZkOBp1Gv8P
vu4hkKe+AAA=

-->

</rfc>
