<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lake-app-profiles-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="EDHOC Application Profiles">Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lake-app-profiles-02"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 64?>

<t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) requires certain parameters to be agreed out-of-band, in order to ensure its successful completion. To this end, application profiles specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. In order to ensure the applicability of such parameters and information beyond transport- or setup-specific scenarios, this document defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles. Furthermore, In order to facilitate interoperability between EDHOC implementations and support EDHOC extensibility for additional integrations, this document defines a number of means to coordinate the use of EDHOC application profiles. Finally, this document defines a set of well-known EDHOC application profiles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/lake-wg/app-profiles"/>.</t>
    </note>
  </front>
  <middle>
    <?line 68?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol, especially intended for use in constrained scenarios. A main use case for EDHOC is to establish a Security Context for Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>.</t>
      <t>In order to successfully run EDHOC, the two peers acting as Initiator and Responder have to agree on certain parameters. Some of those are in-band and communicated through the protocol execution, during which a few of them may even be negotiated. However, other parameters have to be known out-of-band, before running the EDHOC protocol.</t>
      <t>As discussed in <xref section="3.9" sectionFormat="of" target="RFC9528"/>, applications can use EDHOC application profiles, which specify the intended usage of EDHOC to allow for the relevant processing and verifications to be made. In particular, an EDHOC application profile may include both in-band and out-of-band parameters.</t>
      <t>In order to ensure the applicability of such parameters and information beyond transport- or setup-specific scenarios, this document also defines the EDHOC_Application_Profile object, i.e., a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles as CBOR data items (see <xref target="sec-app-profile-cbor"/>). The defined representation is transport- and setup-independent, and avoids the need to reinvent an encoding for the available options to run the EDHOC protocol or the selection logic to apply on those.</t>
      <t>The CBOR-based representation of an EDHOC application profile can be, for example: retrieved as a result of a discovery process; or retrieved/provided during the retrieval/provisioning of an EDHOC peer's public authentication credential; or obtained during the execution of a device on-boarding/registration workflow.</t>
      <t>Furthermore, in order to facilitate interoperability between EDHOC implementations and to support EDHOC extensibility for additional integrations (e.g., of external security applications, handling of authentication credentials, and message transports), this document defines a number of means to coordinate the use of EDHOC application profiles, that is:</t>
      <ul spacing="normal">
        <li>
          <t>The new IANA registry "EDHOC Application Profiles" defined in <xref target="iana-edhoc-application-profiles"/>, where to register integer identifiers of EDHOC application profiles to use as corresponding Profile IDs.</t>
        </li>
        <li>
          <t>The new parameter "ed-prof" defined in <xref target="web-linking"/>. This parameter is employed to specify an EDHOC application profile identified by its Profile ID and can be used as target attribute in a web link <xref target="RFC8288"/> to an EDHOC resource, or as filter criterion in a discovery request to discover EDHOC resources.  </t>
          <t>
For instance, the target attribute can be used in a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over the Constrained Application Protocol (CoAP) <xref target="RFC7252"/> (see <xref section="A.2" sectionFormat="of" target="RFC9528"/> as well as <xref target="RFC9668"/>).</t>
        </li>
        <li>
          <t>The new parameter "app_prof" defined in <xref target="sec-edhoc-information-object"/> for the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. This parameter is employed to specify a set of EDHOC application profiles, each identified by its Profile ID.  </t>
          <t>
For instance, the parameter can be used in the EDHOC and OSCORE profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>, in order to indicate the EDHOC application profiles supported by an ACE resource server.  </t>
          <t>
This parameter is also used in the EDHOC_Application_Profile object defined in this document, in order to encode the Profile ID of the EDHOC application profile described by an instance of that object.</t>
        </li>
        <li>
          <t>Additional parameters that provide information about an EDHOC application profile. These parameters correspond to elements of the EDHOC_Information object and are to be used as target attributes in a web link to an EDHOC resource, or as filter criteria in a discovery request to discover EDHOC resources (see <xref target="sec-parameters-web-linking"/>).</t>
        </li>
        <li>
          <t>A new EDHOC External Authorization Data (EAD) item (see <xref target="sec-app-profile-edhoc-message_1_2"/>) and a new error code for the EDHOC error message (see <xref target="sec-app-profile-edhoc-error-message"/>). When running EDHOC, a peer can use those in order to advertise the EDHOC application profiles that it supports to the other peer.</t>
        </li>
        <li>
          <t>The use of SVCB Resource Records (RR) <xref target="RFC9460"/><xref target="RFC9461"/> to advertise the support for EDHOC and for EDHOC application profiles of a given server (see <xref target="sec-svcb"/>).</t>
        </li>
      </ul>
      <t>Finally, this document defines a set of well-known EDHOC application profiles (see <xref target="sec-well-known-app-profiles"/>). These application profiles are meant to reflect what is most common and expected to be supported by EDHOC peers, while they are not to be intended as "default" application profiles or as a deviation from what is mandatory to support for EDHOC peers (see <xref section="8" sectionFormat="of" target="RFC9528"/>). On the other hand, they provide implementers and users with a quick overview of the several available options to run the EDHOC protocol and of their most expected combinations.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>The reader is expected to be familiar with terms and concepts defined in EDHOC <xref target="RFC9528"/>, and with the use of EDHOC with CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> defined in <xref target="RFC9668"/>.</t>
        <t>Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and Concise Data Definition Language (CDDL) <xref target="RFC8610"/> are used in this document. CDDL predefined type names, especially bstr for CBOR byte strings and tstr for CBOR text strings, are used extensively in this document.</t>
        <t>CBOR data items are represented using the CBOR extended diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/> ("diagnostic notation"). Diagnostic notation comments are used to provide a textual representation of the parameters' keys and values.</t>
        <t>In the CBOR diagnostic notation used in this document, constructs of the form e'SOME_NAME' are replaced by the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. For example, {e'methods' : [0, 1, 2, 3], e'cipher_suites': 3} stands for {1 : [0, 1, 2, 3], 2 : 3}.</t>
        <t>Note to RFC Editor: Please delete the paragraph immediately preceding this note. Also, in the CBOR diagnostic notation used in this document, please replace the constructs of the form e'SOME_NAME' with the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. Finally, please delete this note.</t>
      </section>
    </section>
    <section anchor="sec-app-profile-cbor">
      <name>EDHOC_Application_Profile</name>
      <t>This section defines the EDHOC_Application_Profile object, which can be used as a canonical representation of EDHOC application profiles for their description, distribution, and storage.</t>
      <t>An EDHOC_Application_Profile object is encoded as a CBOR map <xref target="RFC8949"/>. All elements that can be included in the EDHOC_Application_Profile object are elements that can be included in the CBOR-encoded EDHOC_Information object specified in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>. In particular, they use the same CBOR abbreviations from the 'CBOR label' column of the IANA registry "EDHOC Information" defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>By construction, an EDHOC_Application_Profile object conveys information that pertains to the execution of EDHOC. This includes, e.g., information about transporting and processing EDHOC messages during an EDHOC session. An EDHOC_Application_Profile object does not convey information that does not play a role in completing an EDHOC execution. For instance, this includes the size of outputs of the EDHOC_Exporter interface (see <xref section="4.2.1" sectionFormat="of" target="RFC9528"/>), or properties and features of protocols other than EDHOC itself that build on the results from an EDHOC session (e.g., the version of the application protocol subsequently used).</t>
      <t>The CBOR map encoding an EDHOC_Application_Profile object <bcp14>MUST</bcp14> include the element "app_prof" defined in <xref target="sec-edhoc-information-object"/> of this document, as well as the elements "methods" and "cred_types" defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The value of the element "app_prof" is the unique identifier of the EDHOC application profile described by the instance of the EDHOC_Application_Profile object in question. The identifier is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in this document and encoded as a CBOR integer.</t>
      <t>The CBOR map <bcp14>MUST NOT</bcp14> include the following elements: "session_id", "uri_path", "initiator", "responder", and "trust_anchors". A consumer <bcp14>MUST</bcp14> ignore those elements if they are included in the EDHOC_Application_Profile object.</t>
      <t>The CBOR map <bcp14>MAY</bcp14> include other elements.</t>
      <t>Furthermore, consistent with Sections <xref target="RFC9528" section="8" sectionFormat="bare"/> and <xref target="RFC9528" section="A.1" sectionFormat="bare"/> of <xref target="RFC9528"/> and with <xref section="5.4" sectionFormat="of" target="RFC8613"/>, the following applies:</t>
      <ul spacing="normal">
        <li>
          <t>If the element "cipher_suites" is not present in the CBOR map, this indicates that the EDHOC application profile uses the EDHOC cipher suites 2 and 3, and possibly other cipher suites.</t>
        </li>
        <li>
          <t>If the element "id_cred_types" is not present in the CBOR map, this indicates that the EDHOC application profile uses "kid" as type of authentication credential identifiers for EDHOC, and possibly other types of authentication credential identifiers.</t>
        </li>
        <li>
          <t>The absence of any other elements in the CBOR map <bcp14>MUST NOT</bcp14> result in assuming any value.</t>
        </li>
      </ul>
      <t>If an element is present in the CBOR map and the corresponding entry in the IANA registry "EDHOC Information" specifies "NP" (non-prescriptive) in the 'Type' column and "True or False" in the 'CBOR type' column, then the following applies. An EDHOC peer that adheres to the EDHOC application profile in question is required or not to support the property or feature of EDHOC associated with the element in the CBOR map, if that element encodes the CBOR simple value <tt>true</tt> (0xf5) or <tt>false</tt> (0xf4), respectively. For example, the presence of the parameter "comb_req" denotes whether EDHOC peers adhering to the EDHOC application profile have to support the EDHOC + OSCORE combined request defined in <xref target="RFC9668"/>, or instead do not have to but might if they are willing to.</t>
      <t>If an element present in the CBOR map specifies an information that is intrinsically a set of one or more co-existing alternatives, then all the specified alternatives apply for the EDHOC application profile in question. For example, the element "cipher_suites" with value the CBOR array [0, 2] means that, in order to adhere to the EDHOC application profile in question, an EDHOC peer has to implement both the EDHOC cipher suites 0 and 2, because either of them can be used by another EDHOC peer also adhering to the same EDHOC application profile.</t>
      <t>The CDDL grammar describing the EDHOC_Application_Profile object is:</t>
      <figure anchor="fig-cddl-edhoc_application-profile-object">
        <name>CDDL Definition of the EDHOC_Application_Profile object</name>
        <artwork type="CDDL" align="left"><![CDATA[
EDHOC_Application_Profile = {
      1 => int / array,    ; methods
      6 => int / array,    ; cred_types
     23 => int,            ; app_prof
   * int / tstr => any
}
]]></artwork>
      </figure>
    </section>
    <section anchor="identifying-edhoc-application-profiles-by-profile-id">
      <name>Identifying EDHOC Application Profiles by Profile ID</name>
      <t>This document introduces the concept of Profile IDs, i.e., integer values that uniquely identify EDHOC application profiles, for which an IANA registry is defined in <xref target="iana-edhoc-application-profiles"/>.</t>
      <t>This section defines two parameters to convey such Profile IDs, i.e.:</t>
      <ul spacing="normal">
        <li>
          <t>The parameter "ed-prof" for web linking <xref target="RFC8288"/> (see <xref target="web-linking"/>).</t>
        </li>
        <li>
          <t>The parameter "app_prof" of the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> (see <xref target="sec-edhoc-information-object"/>).  </t>
          <t>
As defined in <xref target="sec-app-profile-cbor"/>, Profile IDs are also conveyed by the parameter "app_prof" in the EDHOC_Application_Profile object, in order to identify the EDHOC application profile described by a given instance of that object.</t>
        </li>
      </ul>
      <t>As defined later in this document, Profile IDs can be used to identify EDHOC application profiles also:</t>
      <ul spacing="normal">
        <li>
          <t>Within certain EDHOC messages sent during an EDHOC session by a peer that supports such EDHOC application profiles (see <xref target="sec-app-profile-edhoc-messages"/>).</t>
        </li>
        <li>
          <t>When using SVCB Resource Records (RR) <xref target="RFC9460"/><xref target="RFC9461"/> to advertise the support for EDHOC and for EDHOC application profiles of a given server (see <xref target="sec-svcb"/>).</t>
        </li>
      </ul>
      <section anchor="web-linking">
        <name>In Web Linking</name>
        <t><xref section="6" sectionFormat="of" target="RFC9668"/> defines a number of target attributes that can be used in a web link <xref target="RFC8288"/> with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>). This is the case, e.g., when using a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> as defined in <xref section="A.2" sectionFormat="of" target="RFC9528"/>. This allows a client to obtain relevant information about the EDHOC application profile(s) to be used with a certain EDHOC resource.</t>
        <t>In the same spirit, this section defines the following additional parameter, which can be optionally specified as a target attribute with the same name in the link to the respective EDHOC resource, or among the filter criteria in a discovery request from a client.</t>
        <ul spacing="normal">
          <li>
            <t>'ed-prof', specifying an EDHOC application profile supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying an EDHOC application profile.</t>
          </li>
        </ul>
        <t>When specifying the parameter 'ed-prof' in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
        <t>If a link to an EDHOC resource includes occurrences of the target attribute 'ed-prof', then the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The link <bcp14>MUST NOT</bcp14> include other target attributes that provide information about an EDHOC application profile (see, e.g., <xref section="6" sectionFormat="of" target="RFC9668"/> and <xref target="sec-parameters-web-linking"/> of this document), with the exception of the target attribute 'ed-ead' that <bcp14>MAY</bcp14> be included.  </t>
            <t>
The recipient <bcp14>MUST</bcp14> ignore other target attributes that provide information about an EDHOC application profile, with the exception of the target attribute 'ed-ead'.</t>
          </li>
          <li>
            <t>If the link includes occurrences of the target attribute 'ed-ead', the link provides the following information: when using the target EDHOC resource as per the EDHOC application profile indicated by any occurrence of the target attribute 'ed-prof', the server supports the External Authorization Data (EAD) items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the occurrences of the target attribute 'ed-ead'.</t>
          </li>
        </ul>
        <t>The example in <xref target="fig-web-link-example"/> shows how a CoAP client discovers two EDHOC resources at a CoAP server, and obtains information about the application profile corresponding to each of those resources. The Link Format notation from <xref section="5" sectionFormat="of" target="RFC6690"/> is used.</t>
        <t>The example assumes the existence of an EDHOC application profile identified by the integer Profile ID 500, which is supported by the EDHOC resource at /edhoc-alt and whose definition includes the support for the EAD items with EAD label 111 and 222.</t>
        <t>Therefore, the link to the EDHOC resource at /edhoc-alt indicates that, when using that EDHOC resource as per the EDHOC application profile with Profile ID 500, the server supports the EAD items with EAD label 111, 222, and 333.</t>
        <figure anchor="fig-web-link-example">
          <name>The Web Link.</name>
          <artwork align="center"><![CDATA[
REQ: GET /.well-known/core

RES: 2.05 Content
    </sensors/temp>;osc,
    </sensors/light>;if=sensor,
    </.well-known/edhoc>;rt=core.edhoc;ed-csuite=0;ed-csuite=2;
        ed-method=0;ed-cred-t=1;ed-cred-t=3;ed-idcred-t=4;
        ed-i;ed-r;ed-comb-req,
    </edhoc-alt>;rt=core.edhoc;ed-prof=500;ed-ead=333
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-edhoc-information-object">
        <name>In the EDHOC_Information Object</name>
        <t><xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines the EDHOC_Information object, as including information that guides two peers towards executing the EDHOC protocol, and defines an initial set of its parameters.</t>
        <t>This document defines the new parameter "app_prof" of the EDHOC_Information object, as summarized in <xref target="_table-cbor-key-edhoc-params"/> and described further below.</t>
        <table align="center" anchor="_table-cbor-key-edhoc-params">
          <name>EDHOC_Information Parameter "app_prof"</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">CBOR label</th>
              <th align="left">CBOR type</th>
              <th align="left">Registry</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">app_prof</td>
              <td align="left">23</td>
              <td align="left">int or array</td>
              <td align="left">EDHOC Application Profiles Registry</td>
              <td align="left">Set of supported EDHOC Application Profiles</td>
            </tr>
          </tbody>
        </table>
        <ul spacing="normal">
          <li>
            <t>app_prof: This parameter specifies a set of supported EDHOC application profiles, identified by their Profile ID. If the set is composed of a single EDHOC application profile, its Profile ID is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one Profile ID. In JSON, the "app_prof" value is an integer or an array of integers. In CBOR, "app_prof" is an integer or an array of integers, and has label 23. The integer values are taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
          </li>
        </ul>
        <section anchor="use-in-the-edhoc-and-oscore-profile-of-the-ace-framework">
          <name>Use in the EDHOC and OSCORE Profile of the ACE Framework</name>
          <t><xref section="3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines how the EDHOC_Information object can be used within the workflow of the EDHOC and OSCORE transport profile of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>.</t>
          <t>In particular, the AS-to-C Access Token Response includes the parameter "edhoc_info", with value an EDHOC_Information object. This allows the ACE authorization server (AS) to provide the ACE client (C) with information about how to run the EDHOC protocol with the ACE resource server (RS) for which the access token is issued.</t>
          <t>Similarly, the access token includes the corresponding claim "edhoc_info", with value an EDHOC_Information object. This allows the AS to provide the ACE RS with information about how to run the EDHOC protocol with the ACE client, according to the issued access token.</t>
          <t>In turn, the EDHOC_Information object can include the parameter "app_prof" defined in this document. This parameter indicates a set of EDHOC application profiles associated with the EDHOC resource to use at the RS, which is either implied or specified by the parameter "uri_path" within the same EDHOC_Information object.</t>
          <t>If the EDHOC_Information object specified as value of "edhoc_info" includes the "app_prof" parameter, then the following applies.</t>
          <ul spacing="normal">
            <li>
              <t>The object <bcp14>MUST NOT</bcp14> include other parameters, with the following exceptions:  </t>
              <ul spacing="normal">
                <li>
                  <t>The parameter "eads".</t>
                </li>
                <li>
                  <t>The parameters that are not allowed in the EDHOC_Application_Profile object defined in <xref target="sec-app-profile-cbor"/>.      </t>
                  <t>
These include the parameter "session_id", which the EDHOC_Information object has to include (see Sections <xref target="I-D.ietf-ace-edhoc-oscore-profile" section="3.3" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-edhoc-oscore-profile" section="3.3.1" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
                </li>
              </ul>
              <t>
C and RS <bcp14>MUST</bcp14> ignore other parameters that are not admitted if they are present in the EDHOC_Information object.</t>
            </li>
            <li>
              <t>The object might provide an information that corresponds to an EDHOC_Information prescriptive parameter (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>), e.g., "message_4" or "max_msgsize". The type of a parameter is indicated in the 'Type' column of the corresponding entry in the IANA registry "EDHOC Information" (see <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).  </t>
              <t>
If the object specifies such an information multiple times, then each occurrence of that information <bcp14>MUST</bcp14> convey exactly the same content. This <bcp14>MUST</bcp14> take into account prescriptive parameters that are included: i) as elements of the EDHOC_Information object; or ii) as elements of an EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) encoding an EDHOC application profile, which is identified by its Profile ID specified in the "app_prof" parameter of the EDHOC_Information object.  </t>
              <t>
A consumer <bcp14>MUST</bcp14> treat as malformed an EDHOC_Information object that does not comply with the restriction above.</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the parameter "edhoc_info" of the AS-to-C Access Token Response includes the parameter "eads", then the following applies.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE RS for which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the claim "edhoc_info" of the access token includes the parameter "eads", then the following applies.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE client to which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-parameters-web-linking">
      <name>Additional Parameters for Web Linking</name>
      <t>Building on what is defined and prescribed in <xref section="6" sectionFormat="of" target="RFC9668"/>, this section defines additional parameters for web linking <xref target="RFC8288"/>, which can be used to obtain relevant pieces of information from the EDHOC application profile associated with an EDHOC resource.</t>
      <t>These parameters can be optionally specified as target attributes with the same name in a link with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>) targeting an EDHOC resource, or as filter criteria in a discovery request from a client.</t>
      <t>When specifying any of the parameters defined below in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
      <ul spacing="normal">
        <li>
          <t>'ed-max-msgsize', specifying the admitted maximum size of EDHOC messages in bytes. This parameter <bcp14>MUST</bcp14> specify a single unsigned integer value.</t>
        </li>
        <li>
          <t>'ed-coap-ct', specifying that CoAP messages have to include the CoAP Content-Format Option with value 64 (application/edhoc+cbor-seq) or 65 (application/cid-edhoc+cbor-seq) as appropriate, when the message payload includes exclusively an EDHOC message possibly prepended by an EDHOC connection identifier (see Sections <xref target="RFC9528" section="3.4.1" sectionFormat="bare"/> and <xref target="RFC9528" section="A.2" sectionFormat="bare"/> of <xref target="RFC9528"/>). A value <bcp14>MUST NOT</bcp14> be given to this parameter and any present value <bcp14>MUST</bcp14> be ignored by the recipient.</t>
        </li>
        <li>
          <t>'ed-epid-t', specifying a type of endpoint identity for EDHOC supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'CBOR Label' column of the "EDHOC Endpoint Identity Types" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying a type of endpoint identity for EDHOC.</t>
        </li>
        <li>
          <t>'ed-tp', specifying a means for transporting EDHOC messages supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Transport ID' column of the "EDHOC Transports" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying a means for transporting EDHOC messages.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-uuid', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a UUID <xref target="RFC9562"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the UUID in its string format (see Section 4 of <xref target="RFC9562"/>). This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-kid', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a binary key identifier. This parameter <bcp14>MUST</bcp14> specify a single value, which is the base64url-encoded text string of the binary representation of the key identifier. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-c5t', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a hash of a C509 certificate <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the base64url-encoded text string of the binary representation of the certificate hash encoded as a COSE_CertHash <xref target="RFC9360"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-c5u', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a URI <xref target="RFC3986"/> pointing to a C509 certificate <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the URI pointing to the certificate. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-x5t', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a hash of an X.509 certificate <xref target="RFC5280"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the base64url-encoded text string of the binary representation of the certificate hash encoded as a COSE_CertHash <xref target="RFC9360"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-x5u', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a URI <xref target="RFC3986"/> pointing to an X.509 certificate <xref target="RFC5280"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the URI pointing to the certificate. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-app-profile-edhoc-messages">
      <name>Advertising Supported EDHOC Application Profiles during an EDHOC Session</name>
      <t>The rest of this section defines means that an EDHOC peer can use in order to advertise the EDHOC application profiles that it supports to another EDHOC peer, when running EDHOC with that other peer.</t>
      <t>Such means are an EDHOC EAD item (see <xref target="sec-app-profile-edhoc-message_1_2"/>) and an error code for the EDHOC error message (see <xref target="sec-app-profile-edhoc-error-message"/>).</t>
      <section anchor="sec-app-profile-edhoc-message_1_2">
        <name>In EDHOC Message 1 and Message 2</name>
        <t>This section defines the EDHOC EAD item "Supported EDHOC application profiles", which is registered in <xref target="iana-edhoc-ead-registry"/> of this document.</t>
        <t>The EAD item <bcp14>MAY</bcp14> be included:</t>
        <ul spacing="normal">
          <li>
            <t>In the EAD_1 field of EDHOC message_1, in order to specify EDHOC application profiles supported by the Initiator.</t>
          </li>
          <li>
            <t>In the EAD_2 field of EDHOC message_2, in order to specify EDHOC application profiles supported by the Responder.</t>
          </li>
        </ul>
        <t>When the EAD item is present, its ead_label TBD_EAD_LABEL <bcp14>MUST</bcp14> be used only with negative sign, i.e., the use of the EAD item is always critical (see <xref section="3.8" sectionFormat="of" target="RFC9528"/>).</t>
        <t>The EAD item <bcp14>MUST NOT</bcp14> occur more than once in the EAD fields of EDHOC message_1 or message_2. The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message if the EAD item occurs multiple times in the EAD fields of EDHOC message_1 or message_2.</t>
        <t>The EAD item <bcp14>MUST NOT</bcp14> be included in the EAD fields of EDHOC message_3 or message_4. In case the recipient peer supports the EAD item, the recipient peer <bcp14>MUST</bcp14> silently ignore the EAD item if this is included in the EAD fields of EDHOC message_3 or message_4.</t>
        <t>The EAD item <bcp14>MUST</bcp14> specify an ead_value, as a CBOR byte string with value the binary representation of a CBOR sequence <xref target="RFC8742"/>, namely APP_PROF_SEQ. The CBOR sequence is composed of one or more items, whose order has no meaning.</t>
        <t>Each item of the CBOR sequence <bcp14>MUST</bcp14> be either of the following:</t>
        <ul spacing="normal">
          <li>
            <t>A CBOR integer, specifying the Profile ID of an EDHOC application profile. The integer value is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.  </t>
            <t>
This item of the CBOR sequence indicates that the message sender supports the EDHOC application profile identified by the Profile ID.</t>
          </li>
          <li>
            <t>A CBOR array including at least one element. In particular:  </t>
            <ul spacing="normal">
              <li>
                <t>The first element <bcp14>MUST</bcp14> be a CBOR integer, specifying the Profile ID of an EDHOC application profile. The integer value is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry.</t>
              </li>
              <li>
                <t>Each of the elements following the first one <bcp14>MUST</bcp14> be a CBOR unsigned integer, specifying the ead_label of an EAD item.</t>
              </li>
            </ul>
            <t>
This item of the CBOR sequence indicates that the message sender supports:  </t>
            <ul spacing="normal">
              <li>
                <t>The EDHOC application profile PROFILE identified by the Profile ID in the first element of the array; and</t>
              </li>
              <li>
                <t>The EAD items identified by the ead_label in the elements following the first one, in addition to the EAD items that are specified in the definition of the EDHOC application profile PROFILE.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>An EDHOC_Information object encoded in CBOR, i.e., as a CBOR map (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>).  </t>
            <t>
The EDHOC_Information object <bcp14>MUST NOT</bcp14> include the element "app_prof" and <bcp14>MUST NOT</bcp14> include elements that are not allowed within the EDHOC_Application_Profile object defined in <xref target="sec-app-profile-cbor"/>, with the exception of the element "trust_anchor" that <bcp14>MAY</bcp14> be included. The recipient peer <bcp14>MUST</bcp14> ignore elements that are not allowed if they are present in the EDHOC_Information object.  </t>
            <t>
This item of the CBOR sequence indicates that the message sender supports an EDHOC application profile consistent with the pieces of information specified by the EDHOC_Information object.</t>
          </li>
        </ul>
        <t>When composing ead_value, the sender peer <bcp14>MUST</bcp14> comply with the content restrictions specified in <xref target="sec-app-profile-edhoc-message_1_2-restrictions"/>.</t>
        <t>The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message if ead_value is malformed or does not conform with the format defined above.</t>
        <t>The CDDL grammar describing ead_value for the EAD item "Supported EDHOC application profiles" is shown in <xref target="fig-cddl-ead-value"/>.</t>
        <figure anchor="fig-cddl-ead-value">
          <name>CDDL Definition of ead_value for the EAD item "Supported EDHOC application profiles"</name>
          <artwork type="CDDL" align="left"><![CDATA[
ead_value = << APP_PROF_SEQ >>

; This defines an array, the elements of which
; are to be used in the CBOR Sequence APP_PROF_SEQ:
APP_PROF_SEQ = [1* element]

element = profile_id / profile_id_with_eads / EDHOC_Information

profile_id = int

profile_id_with_eads = [profile_id, 1* uint]

; The full definition is provided in
; draft-ietf-ace-edhoc-oscore-profile
EDHOC_Information : map
]]></artwork>
        </figure>
        <section anchor="sec-app-profile-edhoc-message_1_2-restrictions">
          <name>Content Restrictions</name>
          <t>When the sender peer composes ead_value of the EDHOC EAD item "Supported EDHOC application profiles", the following applies.</t>
          <t>It is possible that ead_value provides an information that corresponds to an EDHOC_Information prescriptive parameter (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>), e.g., "message_4" or "max_msgsize". The type of such a parameter is indicated in the 'Type' column of the corresponding entry in the IANA registry "EDHOC Information" (see <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
          <t>If ead_value specifies such an information multiple times, then each occurrence of that information <bcp14>MUST</bcp14> convey exactly the same content. With reference to the CBOR sequence APP_PROF_SEQ defined in <xref target="sec-app-profile-edhoc-message_1_2"/>, the enforcement of these content restrictions <bcp14>MUST</bcp14> take into account prescriptive parameters that are included:</t>
          <ul spacing="normal">
            <li>
              <t>As elements of an EDHOC_Information object specified within APP_PROF_SEQ; or</t>
            </li>
            <li>
              <t>As elements of an EDHOC_Application_Profile object encoding an EDHOC application profile, which is identified by its Profile ID specified within APP_PROF_SEQ.</t>
            </li>
          </ul>
          <t>If the Responder receives the EAD item in the EAD_1 field of EDHOC message_1 and intends to include the EAD item in the EAD_2 field of EDHOC message_2, then the Responder <bcp14>MUST</bcp14> further take into account the presence of such information in the received EAD item when composing ead_value.</t>
          <t>A consumer <bcp14>MUST</bcp14> treat as malformed an EDHOC_Information object that does not comply with the restrictions above.</t>
        </section>
      </section>
      <section anchor="sec-app-profile-edhoc-error-message">
        <name>In the EDHOC Error Message</name>
        <t>This section defines the error code TBD_ERROR_CODE, which is registered in <xref target="iana-edhoc-error-codes-registry"/> of this document.</t>
        <t>Error code TBD_ERROR_CODE <bcp14>MUST</bcp14> only be used when replying to EDHOC message_1. If an EDHOC error message with error code TBD_ERROR_CODE is received as reply to an EDHOC message different from EDHOC message_1, then the recipient of the error message <bcp14>MUST</bcp14> ignore what is specified in ERR_INFO.</t>
        <t>The Responder <bcp14>MUST NOT</bcp14> abort an EDHOC session exclusively due to the wish of sending an error message with error code TBD_ERROR_CODE. Instead, the Responder can advertise the EDHOC application profiles that it supports to the Initiator by means of the EAD item "Supported EDHOC application profiles" defined in <xref target="sec-app-profile-edhoc-message_1_2"/>, specifying it in the EAD_2 field of the EDHOC message_2 to send in the EDHOC session.</t>
        <t>When replying to an EDHOC message_1 with an error message, the Responder has to consider the reason for which it is aborting the EDHOC session and <bcp14>MUST NOT</bcp14> specify error code TBD_ERROR_CODE if a different, more appropriate error code can be specified instead. For example, if the negotiation of the selected cipher suite fails (see <xref section="6.3" sectionFormat="of" target="RFC9528"/>), the error message <bcp14>MUST NOT</bcp14> specify error code TBD_ERROR_CODE, since the error message intended to be used in that case specifies error code 2 (Wrong selected cipher suite) and conveys SUITES_R as ERR_INFO.</t>
        <t>When using error code TBD_ERROR_CODE, the error information specified in ERR_INFO <bcp14>MUST</bcp14> be a CBOR byte string with value the binary representation of a CBOR sequence APP_PROF_SEQ. This CBOR sequence has the same format and semantics of the one used for ead_value of the EAD item "Supported EDHOC application profiles" (see <xref target="sec-app-profile-edhoc-message_1_2"/>).</t>
        <t>The recipient peer <bcp14>MUST</bcp14> silently ignore elements of the CBOR sequence APP_PROF_SEQ that are malformed or do not conform with the intended format.</t>
      </section>
    </section>
    <section anchor="sec-svcb">
      <name>Advertising Supported EDHOC Application Profiles using SVCB Resource Records</name>
      <t>Given a server, its support for EDHOC and for EDHOC application profiles can be advertised using SVCB Resource Records (RR) <xref target="RFC9460"/><xref target="RFC9461"/>.</t>
      <t>To this end, this document specifies the SvcParamKeys "edhocpath" and "edhoc-app-prof", which are defined below and are registered in <xref target="iana-svcb"/>.</t>
      <ul spacing="normal">
        <li>
          <t>"edhocpath" - The SvcParamKey "edhocpath" is single-valued and its value <bcp14>MUST</bcp14> be a CBOR data item PATH_OUTER, which <bcp14>MUST</bcp14> be a CBOR byte string PATH_BSTR or a CBOR array. In the latter case, the array <bcp14>MUST</bcp14> include at least two elements, each of which <bcp14>MUST</bcp14> be a CBOR byte string PATH_BSTR. The SVCB RR <bcp14>MUST</bcp14> be considered malformed if the SvcParamValue ends within PATH_OUTER or if PATH_OUTER is malformed.  </t>
          <t>
The value of each CBOR byte string PATH_BSTR is the binary representation of a CBOR sequence PATH_SEQ composed of zero or more CBOR text strings. In particular, each PATH_SEQ specifies the URI path of an EDHOC resource at the server, with each CBOR text string within that PATH_SEQ specifying a URI path segment.  </t>
          <t>
If PATH_OUTER is a CBOR array, it <bcp14>MUST NOT</bcp14> include any two elements that specify the same URI path.  </t>
          <t>
The CDDL grammar describing the value of the SvcParamKey "edhocpath" is shown in <xref target="fig-cddl-edhocpath-value"/>.  </t>
          <t>
Editor's note: consider to add the same explanation about the chosen encoding for the URI path as a CBOR sequence that is given in Section 3.2 of draft-ietf-core-dns-over-coap-15.</t>
        </li>
        <li>
          <t>"edhoc-app-prof" - The SvcParamKey "edhoc-app-prof" is single-valued and its value <bcp14>MUST</bcp14> be a CBOR data item APP_OUTER, which <bcp14>MUST</bcp14> be a CBOR byte string APP_BSTR or a CBOR array. In the latter case, the array <bcp14>MUST</bcp14> include at least two elements, each of which <bcp14>MUST</bcp14> be a CBOR byte string APP_BSTR. The SVCB RR <bcp14>MUST</bcp14> be considered malformed if the SvcParamValue ends within APP_OUTER or if APP_OUTER is malformed.  </t>
          <t>
The value of each CBOR byte string APP_BSTR is the binary representation of a CBOR sequence APP_PROF_SEQ, which has the same format and semantics specified in <xref target="sec-app-profile-edhoc-message_1_2"/>. The SVCB RR <bcp14>MUST</bcp14> be considered malformed if APP_PROF_SEQ is malformed or does not conform with the format defined in <xref target="sec-app-profile-edhoc-message_1_2"/>.  </t>
          <t>
The CDDL grammar describing the value of the SvcParamKey "edhoc-app-prof" is shown in <xref target="fig-cddl-edhoc-app-prof-value"/>.  </t>
          <t>
Each CBOR sequence APP_PROF_SEQ specifies a set of EDHOC application profiles that the server supports.</t>
        </li>
      </ul>
      <t>If the SvcParamKey "edhoc-app-prof" is not present in the SVCB RR, then the SvcParamKey "edhocpath", if present, specifies the URI paths of EDHOC resources at the server.</t>
      <t>If the SvcParamKey "edhoc-app-prof" is present in the SVCB RR, then the following applies.</t>
      <ul spacing="normal">
        <li>
          <t>If the SvcParamKey "edhocpath" is not present in the SVCB RR, then the value of the SvcParamKey "edhoc-app-prof" <bcp14>MUST</bcp14> be a CBOR byte string.  </t>
          <t>
The information specified by the SvcParamKey "edhoc-app-prof" pertains to the EDHOC resource at the server with URI path "/.well-known/edhoc".</t>
        </li>
        <li>
          <t>If the SvcParamKey "edhocpath" is present in the SVCB RR, then the following applies.  </t>
          <ul spacing="normal">
            <li>
              <t>If the value of the SvcParamKey "edhocpath" is a CBOR byte string, then the value of the SvcParamKey "edhoc-app-prof" <bcp14>MUST</bcp14> also be a CBOR byte string.      </t>
              <t>
The information specified by the SvcParamKey "edhoc-app-prof" pertains to the EDHOC resource at the server with URI path specified by the SvcParamKey "edhocpath".</t>
            </li>
            <li>
              <t>If the value of the SvcParamKey "edhocpath" is a CBOR array including N elements, then the value of the SvcParamKey "edhoc-app-prof" <bcp14>MUST</bcp14> also be a CBOR array including N elements.      </t>
              <t>
The information specified by the i-th element of the CBOR array within the SvcParamKey "edhoc-app-prof" pertains to the EDHOC resource at the server with URI path specified by the i-th element of the CBOR array within the SvcParamKey "edhocpath".</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>A consumer <bcp14>MUST</bcp14> treat as malformed an SVCB RR, in case the SvcParamKeys "edhocpath" and "edhoc-app-prof", if present, do not comply with the format and restrictions defined above.</t>
      <figure anchor="fig-cddl-edhocpath-value">
        <name>CDDL Definition of the value of the SvcParamKey "edhocpath"</name>
        <artwork type="CDDL" align="left"><![CDATA[
edhocpath-value = PATH_OUTER

PATH_OUTER = PATH_BSTR / [2* PATH_BSTR]

PATH_BSTR = << PATH_SEQ >>

; This defines an array, the elements of which
; are to be used in the CBOR Sequence PATH_SEQ:
PATH_SEQ = [* path_segment]

path_segment = tstr
]]></artwork>
      </figure>
      <figure anchor="fig-cddl-edhoc-app-prof-value">
        <name>CDDL Definition of the value of the SvcParamKey "edhoc-app-prof"</name>
        <artwork type="CDDL" align="left"><![CDATA[
edhoc-app-prof-value = APP_OUTER

APP_OUTER = APP_BSTR / [2* APP_BSTR]

; The full definition of APP_PROF_SEQ
; is provided in Section 5.1
APP_BSTR = << APP_PROF_SEQ >>
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-well-known-app-profiles">
      <name>Well-known EDHOC Application Profiles</name>
      <t>This section defines a set of well-known EDHOC application profiles that are meant to reflect what is most common and expected to be supported by EDHOC peers.</t>
      <t>The well-known application profiles are <em>not</em> to be intended as "default" profiles to use, in case no other indication is provided to EDHOC peers.</t>
      <t>In particular, an EDHOC peer <bcp14>MUST NOT</bcp14> assume that, unless otherwise indicated, any of such profiles is used when running EDHOC through a well-known EDHOC resource, such as the resource at /.well-known/edhoc when EDHOC messages are transported as payload of CoAP messages (see <xref section="A.2" sectionFormat="of" target="RFC9528"/>).</t>
      <t>Building on the above, the well-known application profiles are <em>not</em> intended to deviate from what is mandatory to support for EDHOC peers, which is defined by the compliance requirements in <xref section="8" sectionFormat="of" target="RFC9528"/>.</t>
      <t>The rest of this section defines the well-known application profiles, each of which is represented by means of an EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) using the CBOR extended diagnostic notation.</t>
      <t>An entry for each well-known application profile is also registered at the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
      <section anchor="well-known-application-profile-minimalcs2">
        <name>Well-Known Application Profile MINIMAL_CS_2</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-MINIMAL-CS-2'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-minimalcs0">
        <name>Well-Known Application Profile MINIMAL_CS_0</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-MINIMAL-CS-0'
}
]]></sourcecode>
      </section>
      <section anchor="well-known-application-profile-basiccs2x509">
        <name>Well-Known Application Profile BASIC_CS_2_X509</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                             and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-2-X509'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-basiccs0x509">
        <name>Well-Known Application Profile BASIC_CS_0_X509</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                             and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-0-X509'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-basiccs2c509">
        <name>Well-Known Application Profile BASIC_CS_2_C509</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                        and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-2-C509'
}
]]></sourcecode>
      </section>
      <section anchor="well-known-application-profile-basiccs0c509">
        <name>Well-Known Application Profile BASIC_CS_0_C509</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                        and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-0-C509'
}
]]></sourcecode>
      </section>
      <section anchor="well-known-application-profile-intermediatecs2">
        <name>Well-Known Application Profile INTERMEDIATE_CS_2</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                           X.509 certificate,
                                           and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                      x5t, x5chain,
                                                      c5t, and c5c /
       e'app_prof' : e'APP-PROF-INTERMEDIATE-CS-2'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-intermediatecs0">
        <name>Well-Known Application Profile INTERMEDIATE_CS_0</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                             X.509 certificate,
                                             and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                      x5t, x5chain,
                                                      c5t, and c5c /
       e'app_prof' : e'APP-PROF-INTERMEDIATE-CS-0'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-extensive">
        <name>Well-Known Application Profile EXTENSIVE</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 1, 2, 3], / EDHOC Method Types
                                     0, 1, 2, and 3 /
  e'cipher_suites' : [0, 1, 2, 3], / EDHOC Cipher Suites
                                     0, 1, 2, and 3 /
     e'cred_types' : [1, 0, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                              CWT, X.509 certificate,
                                              and C509 certificate /
  e'id_cred_types' : [4, 14, 13, 34, 33, e'c5t', e'c5c'], / kid,
                                                          kccs, kcwt,
                                                          x5t,
                                                          x5chain,
                                                          c5t, and
                                                          c5c /
       e'app_prof' : e'APP-PROF-EXTENSIVE'
}
]]></sourcecode>
        <t>This application profile is aligned with the example traces of EDHOC compiled in Sections <xref target="RFC9529" section="2" sectionFormat="bare"/> and <xref target="RFC9529" section="3" sectionFormat="bare"/> of <xref target="RFC9529"/>.</t>
      </section>
    </section>
    <section anchor="sec-edhoc-well-known-app-profiles">
      <name>Identifiers of Well-known EDHOC Application Profiles</name>
      <t>This document defines the following identifiers of well-known EDHOC application profiles.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <table align="center" anchor="_table-edhoc-well-known-app-profiles">
        <name>EDHOC Well-known Application Profiles</name>
        <thead>
          <tr>
            <th align="left">Profile ID</th>
            <th align="left">Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">MINIMAL-CS-2</td>
            <td align="left">Method 3; Cipher Suite 2; CCS; kid</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">MINIMAL-CS-0</td>
            <td align="left">Method 3; Cipher Suite 0; CCS; kid</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">BASIC-CS-2-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">BASIC-CS-0-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">BASIC-CS-2-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">BASIC-CS_0-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">INTERMEDIATE-CS-2</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">INTERMEDIATE-CS-0</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">EXTENSIVE</td>
            <td align="left">Methods (0, 1, 2, 3); Cipher Suites (0, 1, 2, 3); (CCS, CWT, X.509/C509 certificates); (kid, kccs, kcwt, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-media-type">
        <name>Media Type Registrations</name>
        <t>IANA is asked to register the media type "application/edhoc-app-profile+cbor-seq". This registration follows the procedures specified in <xref target="RFC6838"/>.</t>
        <t>Type name: application</t>
        <t>Subtype name: edhoc-app-profile+cbor-seq</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: Must be encoded as a CBOR sequence <xref target="RFC8742"/> of CBOR maps <xref target="RFC8949"/>. Each element of each CBOR map is also defined as an element of the CBOR-encoded EDHOC_Information object from <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>Security considerations: See <xref target="sec-security-considerations"/> of [RFC-XXXX].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [RFC-XXXX]</t>
        <t>Applications that use this media type: Applications that need to describe, distribute, and store a representation of an EDHOC application profile (see <xref section="3.9" sectionFormat="of" target="RFC9528"/>).</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information: N/A</t>
        <t>Person &amp; email address to contact for further information: LAKE WG mailing list (lake@ietf.org) or IETF Applications and Real-Time Area (art@ietf.org)</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: None</t>
        <t>Author/Change controller: IETF</t>
        <t>Provisional registration: No</t>
      </section>
      <section anchor="iana-content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is asked to add the following entry to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <t>Content Type: application/edhoc-app-profile+cbor-seq</t>
        <t>Content Coding: -</t>
        <t>ID: TBD (range 0-255)</t>
        <t>Reference: [RFC-XXXX]</t>
      </section>
      <section anchor="iana-target-attributes">
        <name>Target Attributes Registry</name>
        <t>IANA is asked to register the following entries in the "Target Attributes" registry within the "Constrained RESTful Environments (CoRE) Parameters", as per <xref target="RFC9423"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-max-msgsize</t>
          </li>
          <li>
            <t>Brief Description: The admitted maximum size of EDHOC messages in bytes</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-coap-ct</t>
          </li>
          <li>
            <t>Brief Description: Requested use of the CoAP Content-Format Option in CoAP messages whose payload includes exclusively an EDHOC message, possibly prepended by an EDHOC connection identifier</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-epid-t</t>
          </li>
          <li>
            <t>Brief Description: A supported type of endpoint identity for EDHOC</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-tp</t>
          </li>
          <li>
            <t>Brief Description: A supported means for transporting EDHOC messages</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-prof</t>
          </li>
          <li>
            <t>Brief Description: A supported EDHOC application profile</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-uuid</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a UUID</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-kid</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a binary key identifier</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-c5t</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a hash of a C509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-c5u</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a URI pointing to a C509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-x5t</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a hash of an X.509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-x5u</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a URI pointing to an X.509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-information-registry">
        <name>EDHOC Information Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: app_prof</t>
          </li>
          <li>
            <t>CBOR label: 23 (suggested)</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Application Profiles registry</t>
          </li>
          <li>
            <t>Description: Set of supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-ead-registry">
        <name>EDHOC External Authorization Data Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC External Authorization Data" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: Supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Label: TBD_EAD_LABEL (range 0-23)</t>
          </li>
          <li>
            <t>Description: Set of supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-error-codes-registry">
        <name>EDHOC Error Codes Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC Error Codes" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <ul spacing="normal">
          <li>
            <t>ERR_CODE: TBD_ERROR_CODE (range -24 to 23)</t>
          </li>
          <li>
            <t>ERR_INFO Type: app_profiles</t>
          </li>
          <li>
            <t>Description: Supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-svcb">
        <name>DNS SVCB Service Parameter Keys (SvcParamKeys)</name>
        <t>IANA is asked to add the following entries to the "Service Parameter Keys (SvcParamKeys)" registry within the "DNS Service Bindings (SVCB)" registry group. The definition of these parameters can be found in <xref target="sec-svcb"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Number: 11 (suggested)</t>
          </li>
          <li>
            <t>Name: edhocpath</t>
          </li>
          <li>
            <t>Meaning: EDHOC resource path</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Number: 12 (suggested)</t>
          </li>
          <li>
            <t>Name: edhoc-app-prof</t>
          </li>
          <li>
            <t>Meaning: Supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-application-profiles">
        <name>EDHOC Application Profiles Registry</name>
        <t>IANA is requested to create a new "EDHOC Application Profiles" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>The registration policy is either "Private Use", "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. "Expert Review" guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, WG chairs are encouraged to consult the expert(s) early during the process outlined in <xref section="3.1" sectionFormat="of" target="RFC7120"/>.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Profile ID: This field contains the value used to identify the EDHOC application profile. These values <bcp14>MUST</bcp14> be unique. The value can be a positive integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>. Integer values from -24 to 23 are designated as "Standards Action With Expert Review". Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required". Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
          </li>
          <li>
            <t>Name: This field contains the name of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the EDHOC application profile.</t>
          </li>
        </ul>
        <t>This registry has been initially populated with the values in <xref target="_table-edhoc-well-known-app-profiles"/>.</t>
      </section>
      <section anchor="iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>"Standards Action with Expert Review" and "Specification Required" are two of the registration policies defined for the IANA registry established in this document. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts need to make sure that the object of registration is clearly defined in the corresponding specification. Entries that do not meet these objective of clarity and completeness must not be registered.</t>
          </li>
          <li>
            <t>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. The zones tagged as "Private Use" are intended for testing purposes and closed environments. Code points in other ranges should not be assigned for testing.</t>
          </li>
          <li>
            <t>Specifications are required for the "Standards Action With Expert Review" range of point assignment. Specifications should exist for "Specification Required" ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</t>
          </li>
          <li>
            <t>Experts should take into account the expected usage of fields when approving point assignment. Documents published via Standards Action can also register points outside the Standards Action range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC9562">
          <front>
            <title>Universally Unique IDentifiers (UUIDs)</title>
            <author fullname="K. Davis" initials="K." surname="Davis"/>
            <author fullname="B. Peabody" initials="B." surname="Peabody"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This specification defines UUIDs (Universally Unique IDentifiers) --
also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform
Resource Name namespace for UUIDs. A UUID is 128 bits long and is
intended to guarantee uniqueness across space and time. UUIDs were
originally used in the Apollo Network Computing System (NCS), later
in the Open Software Foundation's (OSF's) Distributed Computing
Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the OSF DCE specification with the
kind permission of the OSF (now known as "The Open Group"). Information from earlier versions of the OSF DCE specification have
been incorporated into this document. This document obsoletes RFC
4122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9562"/>
          <seriesInfo name="DOI" value="10.17487/RFC9562"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth client and resource
   server, and it binds an authentication credential of the client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications between the client and resource
   server when accessing protected resources according to the
   authorization information indicated in the access token.  This
   profile can be used to delegate management of authorization
   information from a resource-constrained server to a trusted host with
   less severe limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-08"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="23" month="June" year="2025"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA 1.0, RPKI,
   GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles.
   When used to re-encode DER encoded X.509 certificates, the CBOR
   encoding can in many cases reduce the size of RFC 7925 profiled
   certificates with over 50% while also significantly reducing memory
   and code size compared to ASN.1.  The CBOR encoded structure can
   alternatively be signed directly ("natively signed"), which does not
   require re-encoding for the signature to be verified.  The TLSA
   selectors registry defined in RFC 6698 is extended to include C509
   certificates.  The document also specifies C509 Certificate Requests,
   C509 COSE headers, a C509 TLS certificate type, and a C509 file
   format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-14"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9423">
          <front>
            <title>Constrained RESTful Environments (CoRE) Target Attributes Registry</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>The Constrained RESTful Environments (CoRE) specifications apply web technologies to constrained environments. One such important technology is Web Linking (RFC 8288), which CoRE specifications use as the basis for a number of discovery protocols, such as the Link Format (RFC 6690) in the Constrained Application Protocol's (CoAP's) resource discovery process (Section 7.2 of RFC 7252) and the Resource Directory (RD) (RFC 9176).</t>
              <t>Web Links can have target attributes, the names of which are not generally coordinated by the Web Linking specification (Section 2.2 of RFC 8288). This document introduces an IANA registry for coordinating names of target attributes when used in CoRE. It updates the "RD Parameters" IANA registry created by RFC 9176 to coordinate with this registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9423"/>
          <seriesInfo name="DOI" value="10.17487/RFC9423"/>
        </reference>
        <reference anchor="RFC9529">
          <front>
            <title>Traces of Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Serafin" initials="M." surname="Serafin"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="M. Vučinić" initials="M." surname="Vučinić"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document contains example traces of Ephemeral Diffie-Hellman Over COSE (EDHOC).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9529"/>
          <seriesInfo name="DOI" value="10.17487/RFC9529"/>
        </reference>
        <reference anchor="I-D.serafin-lake-ta-hint">
          <front>
            <title>Trust Anchor Hints in Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Marek Serafin" initials="M." surname="Serafin">
              <organization>ASSA ABLOY</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a format for transport of hints about Trust
   Anchors of trusted third parties when using the lightweight
   authenticated key exchange protocol Ephemeral Diffie-Hellman Over
   COSE (EDHOC).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-serafin-lake-ta-hint-00"/>
        </reference>
      </references>
    </references>
    <?line 872?>

<section anchor="sec-cddl-model" removeInRFC="true">
      <name>CDDL Model</name>
      <figure anchor="fig-cddl-model">
        <name>CDDL model</name>
        <artwork type="CDDL" align="left"><![CDATA[
; EDHOC Information
methods = 1
cipher_suites = 2
cred_types = 6
id_cred_types = 7
app_prof = 23

; EDHOC Application Profiles
APP-PROF-MINIMAL-CS-2 = 0
APP-PROF-MINIMAL-CS-0 = 1
APP-PROF-BASIC-CS-2-X509 = 2
APP-PROF-BASIC-CS-0-X509 = 3
APP-PROF-BASIC-CS-2-C509 = 4
APP-PROF-BASIC-CS-0-C509 = 5
APP-PROF-INTERMEDIATE-CS-2 = 6
APP-PROF-INTERMEDIATE-CS-0 = 7
APP-PROF-EXTENSIVE = 8

; COSE Header Parameters
c5t = 22
c5c = 25

; EDHOC Authentication Credential Types
c509_cert = 3
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>Revised order of sections.</t>
          </li>
          <li>
            <t>Use of parameters aligned with corresponding updates in draft-ietf-ace-edhoc-oscore-profile.</t>
          </li>
          <li>
            <t>EAD item "Supported EDHOC application profiles":  </t>
            <ul spacing="normal">
              <li>
                <t>It can be used only in a critical way.</t>
              </li>
              <li>
                <t>Improved semantics of ead_value.</t>
              </li>
              <li>
                <t>Content restrictions to avoid inconsistent information.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Use of the parameter "app_prof" in draft-ietf-ace-edhoc-oscore-profile:  </t>
            <ul spacing="normal">
              <li>
                <t>Improved co-existence with other parameters.</t>
              </li>
              <li>
                <t>Content restrictions to avoid inconsistent information.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Error handling:  </t>
            <ul spacing="normal">
              <li>
                <t>EAD item "Supported EDHOC application profiles" occurring multiple times in EDHOC message_1 or message_2.</t>
              </li>
              <li>
                <t>EAD item "Supported EDHOC application profiles" in EDHOC message_3 or message_4.</t>
              </li>
              <li>
                <t>Invalid ead_value in EAD item "Supported EDHOC application profiles".</t>
              </li>
              <li>
                <t>Invalid information in EDHOC error message with new error code.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Fixed encoding of ERR_INFO for the EDHOC error message with the new error code.</t>
          </li>
          <li>
            <t>EDHOC_Application_Profile object  </t>
            <ul spacing="normal">
              <li>
                <t>Clarified scope.</t>
              </li>
              <li>
                <t>Clarified meaning of boolean parameters that are non-prescriptive.</t>
              </li>
              <li>
                <t>Forbid the presence of the element "trust_anchors".</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Advertisement of Supported EDHOC Application Profiles using SVCB Resource Records.</t>
          </li>
          <li>
            <t>Updated integer abbreviations for the EDHOC_Information parameters.</t>
          </li>
          <li>
            <t>Editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Clarified motivation in the abstract and introduction.</t>
          </li>
          <li>
            <t>Moved definition of EDHOC_Information parameters to draft-ietf-ace-edhoc-oscore-profile.</t>
          </li>
          <li>
            <t>Renamed ed-idep-t x as ed-epid-t.</t>
          </li>
          <li>
            <t>Content-Format abbreviated as "ct" (not "cf").</t>
          </li>
          <li>
            <t>CBOR abbreviation of "app_prof" changed to 23.</t>
          </li>
          <li>
            <t>Added preamble on identifying application profiles by Profile ID.</t>
          </li>
          <li>
            <t>Defined target attributes "ed-ta-*" for specifying supported trust anchors.</t>
          </li>
          <li>
            <t>Defined new EAD item and error code to advertise supported EDHOC application profiles.</t>
          </li>
          <li>
            <t>Defined how to handle non admitted parameters.</t>
          </li>
          <li>
            <t>Renamed well-known EDHOC application profiles.</t>
          </li>
          <li>
            <t>Updated IANA considerations:  </t>
            <ul spacing="normal">
              <li>
                <t>Suggested range 0-255 for CoAP Content-Format ID.</t>
              </li>
              <li>
                <t>Requested registration for target attributes "ed-ta-*".</t>
              </li>
              <li>
                <t>Removed requests for registration of removed parameters.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Updated references.</t>
          </li>
          <li>
            <t>Editorial improvements.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Geovane Fedrecheski"/>, <contact fullname="Michael Richardson"/>, <contact fullname="Göran Selander"/>, and <contact fullname="Brian Sipos"/> for their feedback and comments.</t>
      <t>The target attributes "ed-ta-*" for specifying supported trust anchors build on a proposal originally described in <xref target="I-D.serafin-lake-ta-hint"/>.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
