<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-eat-measured-component-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.26.0 -->
  <front>
    <title abbrev="EAT Measured Component">EAT Measured Component</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-measured-component-01"/>
    <author initials="S." surname="Frost" fullname="Simon Frost">
      <organization>Arm</organization>
      <address>
        <email>Simon.Frost@arm.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>Hannes.Tschofenig@siemens.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="07"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT</keyword>
    <keyword>measurements</keyword>
    <keyword>claim</keyword>
    <keyword>measured</keyword>
    <keyword>component</keyword>
    <abstract>
      <?line 63?>

<t>A measured component is a measurable object of an attester's target environment, that is, an object whose state can be sampled and digested.
Examples of measured components include the invariant part of firmware that is loaded in memory at startup time, a run-time integrity check, a file system object, or a CPU register.</t>
      <t>This document defines a "measured component" format that can be used with the EAT <tt>Measurements</tt> claim.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-fft-rats-eat-measured-component"/>.</t>
    </note>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="4.2.16" sectionFormat="of" target="I-D.ietf-rats-eat"/> defines a <tt>Measurements</tt> claim that:</t>
      <ul empty="true">
        <li>
          <t>"[c]ontains descriptions, lists, evidence or measurements of the software that exists on the entity or any other measurable subsystem of the entity."</t>
        </li>
      </ul>
      <t>This claim allows for different measurement formats, each identified by a different CoAP Content-Format (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
Currently, the only specified format is CoSWID of type "evidence", as per <xref section="2.9.4" sectionFormat="of" target="RFC9393"/>.</t>
      <t>This document introduces a "measured component" format that can be used with the EAT <tt>Measurements</tt> claim in addition to or as an alternative to CoSWID.</t>
      <t>The term "measured component" refers to any measurable object on a target environment, that is, an object whose state can be sampled and digested.
This includes, for example: the invariant part of a firmware component that is loaded in memory at startup time, a run-time integrity check (RTIC), a file system object, or a CPU register.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> <xref target="I-D.ietf-cbor-cddl-modules"/> <xref target="I-D.ietf-cbor-cddl-more-control"/> is used to describe the data formats.</t>
    </section>
    <section anchor="measured-component">
      <name>Information Model</name>
      <t>A "measured component" information element includes the digest of the component's sampled state along with metadata that helps in identifying the component.
Optionally, any entities responsible for signing the installed component can also be specified.</t>
      <t>The information model of a "measured component" is described in <xref target="tab-mc-info-elems"/>.</t>
      <table anchor="tab-mc-info-elems">
        <name>Measured Component Information Elements</name>
        <thead>
          <tr>
            <th align="left">IE</th>
            <th align="left">Description</th>
            <th align="left">Requirement Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Component Name</td>
            <td align="left">The name given to the measured component. It is important that this name remains consistent across different releases to allow for better tracking of the same measured item across updates. When combined with a consistent versioning scheme, it enables better signaling from the appraisal procedure to the relying parties.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Component Version</td>
            <td align="left">A value representing the specific release or development version of the measured component.  Using <eref target="https://semver.org/spec/v2.0.0.html">Semantic Versioning</eref> is <bcp14>RECOMMENDED</bcp14>.</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14></td>
          </tr>
          <tr>
            <td align="left">Digest Value</td>
            <td align="left">Hash of the measured component.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Digest Algorithm</td>
            <td align="left">Hash algorithm used to compute the Digest Value.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Signers</td>
            <td align="left">One or more unique identifiers of entities signing the measured component.</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14></td>
          </tr>
        </tbody>
      </table>
      <t>The format <bcp14>SHOULD</bcp14> also allow a limited amount of extensibility to accommodate profile-specific semantics.</t>
    </section>
    <section anchor="data-model">
      <name>Data Model</name>
      <t>The data model is inspired by the "PSA software component" claim (<xref section="4.4.1" sectionFormat="of" target="I-D.tschofenig-rats-psa-token"/>), which has been refactored to take into account the recommendations about new EAT claims design in <xref section="E" sectionFormat="of" target="I-D.ietf-rats-eat"/>.</t>
      <section anchor="the-measured-component-data-item">
        <name>The <tt>measured-component</tt> Data Item</name>
        <sourcecode type="cddl"><![CDATA[
;# import corim.digest from RFCYYYY as corim

measured-component = {
  id-label => component-id
  measurement-label => corim.digest
  ? signers-label => [ + signer-type ]
  ? flags-label => profile-flags
}

id-label = JC<"id", 1>
measurement-label = JC<"measurements", 2>
signers-label = JC<"signers", 3>
]]></sourcecode>
        <dl newline="true">
          <dt>"id" (index 1):</dt>
          <dd>
            <t>The measured component identifier encoded according to the format described in <xref target="component-id"/>.</t>
          </dd>
          <dt>"measurement" (index 2):</dt>
          <dd>
            <t>Digest value and algorithm, encoded using CoRIM digest format (<xref section="1.3.8" sectionFormat="of" target="I-D.ietf-rats-corim"/>).</t>
          </dd>
          <dt>"signers" (index 3):</dt>
          <dd>
            <t>One or more signing entities, see <xref target="signer"/>.</t>
          </dd>
          <dt>"profile-flags" (index 4):</dt>
          <dd>
            <t>a 64-bit field with profile-defined semantics, see <xref target="profile-flags"/>.</t>
          </dd>
        </dl>
        <section anchor="component-id">
          <name>Component Identifier</name>
          <sourcecode type="cddl"><![CDATA[
;# import sw-version-type from RFCXXXX as eat

component-id = [
  name:      text
  ? version: eat.sw-version-type
]
]]></sourcecode>
          <dl>
            <dt><tt>name</tt></dt>
            <dd>
              <t>A string that provides a human readable identifier for the component in question.  Format and adopted conventions depend on the component type.</t>
            </dd>
            <dt><tt>version</tt></dt>
            <dd>
              <t>A compound <tt>version</tt> data item that reuses encoding and semantics of <xref target="I-D.ietf-rats-eat"/> <tt>sw-version-type</tt>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="signer">
          <name>Signer</name>
          <t>A signer is an entity that digitally signs the measured component.
Typically, the signature is verified during installation or when the measured component is executed by the boot ROM, operating system, or application launcher.
For example, as in UEFI Secure Boot <xref target="UEFI2"/> and Arm Trusted Board Boot <xref target="TBBR-CLIENT"/>.
Another example may be the controlling entity in an app store.
It is important to note that a signer is different from the identity of the manufacturer of the component, such as would be found in a manifest like a payload CoSWID.</t>
          <t>A signer is associated with a public key.
It could be an X.509 certificate, a raw public key, a public key thumbprint, or some other identifier that can be uniquely associated with the signing entity.
In some cases, multiple parties may need to sign a component to indicate their endorsement or approval.
This could include roles such as a firmware update system, fleet owner, or third-party auditor.
The specific purpose of each signature may depend on the deployment, and the order of signers within the array could indicate meaning.</t>
          <t>If an EAT profile (<xref section="6" sectionFormat="of" target="I-D.ietf-rats-eat"/>) uses measured components, it <bcp14>MUST</bcp14> specify whether the <tt>signers</tt> field is used.
If it is used, the profile <bcp14>MUST</bcp14> also specify what each of the entries in the <tt>signers</tt> array represents, and how to interpret the corresponding <tt>signer-type</tt>.</t>
          <sourcecode type="cddl"><![CDATA[
signer-type = bytes
]]></sourcecode>
        </section>
        <section anchor="profile-flags">
          <name>Profile Flags</name>
          <t>This field contains at most 64-bit of profile-defined semantics.</t>
          <sourcecode type="cddl"><![CDATA[
profile-flags = bytes .size 4
]]></sourcecode>
          <t>If an EAT profile (<xref section="6" sectionFormat="of" target="I-D.ietf-rats-eat"/>) uses measured components, it <bcp14>MUST</bcp14> specify whether the <tt>profile-flags</tt> field is used.
If it is used, the profile <bcp14>MUST</bcp14> also specify how to interpret the 64 bits.</t>
        </section>
      </section>
      <section anchor="eat-measurements-format-extensions">
        <name>EAT <tt>measurements-format</tt> Extensions</name>
        <t>The CDDL in <xref target="fig-eat-plug"/> extends the <tt>$measurements-body-cbor</tt> and <tt>$measurements-body-json</tt> EAT sockets to add support for <tt>measured-component</tt>s to the <tt>Measurements</tt> claim.</t>
        <figure anchor="fig-eat-plug">
          <name>EAT measurements-format Extensions</name>
          <sourcecode type="cddl"><![CDATA[
mc-cbor = bytes .cbor measured-component
mc-json = text .json measured-component

; EAT CBOR (`.feature "cbor"`)
$measurements-body-cbor /= mc-cbor ; native
$measurements-body-cbor /= mc-json ; tunnel

; EAT JSON (`.feature "json"`)
$measurements-body-json /= mc-json            ; native
$measurements-body-json /= text .b64u mc-cbor ; tunnel
]]></sourcecode>
        </figure>
        <t>Each socket is extended with two new types: a "native" representation that is used when <tt>measured-component</tt> and the EAT have the same serialization (e.g., they are both CBOR), and a "tunnel" representation that is used when the serializations differ.</t>
      </section>
      <section anchor="measurements-format-for-cbor-eat">
        <name><tt>measurements-format</tt> for CBOR EAT</name>
        <t>The entries in <xref target="tab-mf-cbor"/> are the allowed <tt>content-type</tt> / <tt>content-format</tt> pairs when the <tt>measured-component</tt> is carried in a CBOR EAT.</t>
        <t>Note the use of the "native" and "tunnel" formats from <xref target="fig-eat-plug"/>, and how the associated CoAP Content-Format is used to describe the original serialization.</t>
        <table anchor="tab-mf-cbor">
          <name>measurement-format for EAT CWT</name>
          <thead>
            <tr>
              <th align="left">content-type (CoAP C-F equivalent)</th>
              <th align="left">content-format</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">
                <tt>mc-cbor</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">
                <tt>mc-json</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="measurements-format-for-json-eat">
        <name><tt>measurements-format</tt> for JSON EAT</name>
        <t><xref target="tab-mf-json"/> is the equivalent of <xref target="tab-mf-cbor"/> for JSON-serialized EAT.</t>
        <table anchor="tab-mf-json">
          <name>measurement-format for EAT JWT</name>
          <thead>
            <tr>
              <th align="left">content-type (CoAP C-F equivalent)</th>
              <th align="left">content-format</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">
                <tt>mc-json</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">
                <tt>tstr .b64u mc-cbor</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <ul empty="true">
        <li>
          <t><strong>NOTE:</strong>
The examples are CBOR only.
JSON examples will be added in a future version of this document.</t>
          <t>Tracking issue: https://github.com/ietf-rats-wg/draft-ietf-rats-eat-measured-component/issues/18</t>
        </li>
      </ul>
      <t>The example in <xref target="ex-1"/> is a measured component with all the fields populated.</t>
      <figure anchor="ex-1">
        <name>Complete Measured Component</name>
        <sourcecode type="cbor-edn"><![CDATA[
{
  / id / 1: [
    / name / "boot loader X",
    / version / [
      "1.2.3rc2",
      16384 / semver /
    ]
  ],
  / measurement / 2: [
    / alg / "sha-256",
    / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31dbe7af4b37
              3431fc7d319da3'
  ],
  / signers / 3: [
    h'492e9b676c21f6012b1ceeb9032feb4141a880797355f6675015ec59c5
      1ca1ec',
    h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb814d6ff5
      7a8a5e'
  ],
  / profile-flags / 4: h'00000101'
}
]]></sourcecode>
      </figure>
      <t>The example in <xref target="ex-eat-1"/> is the same measured component as above but used as the format of a <tt>measurements</tt> claim in a EAT claims-set.</t>
      <t>Note that the example uses a CoAP Content-Format value from the experimental range (65000), which will change to the value assigned by IANA for the <tt>application/measured-component+cbor</tt> Content-Format.</t>
      <t>Note also that the array contains only one measured component, but additional entries could be added if the measured TCB is made of multiple, individually measured components.</t>
      <figure anchor="ex-eat-1">
        <name>EAT Measurements Claim using a Measured Component</name>
        <sourcecode type="cbor-edn"><![CDATA[
{
  273: [
    [
      65000, / using a CoAP C-F from the experimental range /
      <<
        {
          / id / 1: [
            / name / "boot loader X",
            / version / [
              "1.2.3rc2",
              16384 / semver /
            ]
          ],
          / measurement / 2: [
            / alg / "sha-256",
            / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31db
                      e7af4b373431fc7d319da3'
          ],
          / signers / 3: [
            h'492e9b676c21f6012b1ceeb9032feb4141a880797355f66750
              15ec59c51ca1ec',
            h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb
              814d6ff57a8a5e'
          ]
        }
      >>
    ]
  ]
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="seccons">
      <name>Security and Privacy Considerations</name>
      <t>The Name and Version of a component could provide an attacker with detailed information about the running software and configuration settings of the device.
This information could also expose private details regarding the device.
The stability requirement for the component's Name could potentially enable tracking.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> replace "RFCthis" with the RFC number assigned to this document.</t>
      <section anchor="media-types-registrations">
        <name>Media Types Registrations</name>
        <t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="tab-mc-regs">
          <name>Measured Component Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>mc+cbor</tt></td>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>mc+json</tt></td>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <section anchor="applicationmeasured-componentcbor">
          <name><tt>application/measured-component+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>measured-component+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers and Relying Parties</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationmeasured-componentjson">
          <name><tt>application/measured-component+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>measured-component+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers and Relying Parties</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="measured-component-content-format-registrations">
        <name>Measured Component Content-Format Registrations</name>
        <t>IANA is requested to register two Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>, as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/measured-component+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/measured-component+json</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:.plus,.cat, and.det for the construction of constants;.abnf/.abnfb for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and.feature for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-cddl-modules">
          <front>
            <title>CDDL Module Structure</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Brendan Moran" initials="B." surname="Moran">
              <organization>Arm Limited</organization>
            </author>
            <date day="1" month="September" year="2024"/>
            <abstract>
              <t>   At the time of writing, the Concise Data Definition Language (CDDL)
   is defined by RFC 8610 and RFC 9165.  The latter has used the
   extension point provided in RFC 8610, the _control operator_.

   As CDDL is being used in larger projects, the need for features has
   become known that cannot be easily mapped into this single extension
   point.

   The present document defines a backward- and forward-compatible way
   to add a module structure to CDDL.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-modules-03"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-cddl-more-control">
          <front>
            <title>Concise Data Definition Language (CDDL): Additional Control Operators for the Conversion and Processing of Text</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="9" month="January" year="2025"/>
            <abstract>
              <t>   The Concise Data Definition Language (CDDL), standardized in RFC
   8610, provides "control operators" as its main language extension
   point.  RFCs have added to this extension point both in an
   application-specific and a more general way.

   The present document defines a number of additional generally
   applicable control operators for text conversion (Bytes, Integers,
   JSON, Printf-style formatting) and for an operation on text.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-more-control-08"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="18" month="October" year="2024"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-06"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="23" month="September" year="2024"/>
            <abstract>
              <t>   The Arm Platform Security Architecture (PSA) is a family of hardware
   and firmware security specifications, as well as open-source
   reference implementations, to help device makers and chip
   manufacturers build best-practice security into products.  Devices
   that are PSA compliant can produce attestation tokens as described in
   this memo, which are the basis for many different protocols,
   including secure provisioning and network access control.  This
   document specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by PSA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with Arm's architecture.  It is not a
   standard nor a product of the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-24"/>
        </reference>
        <reference anchor="RFC9393">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="UEFI2" target="https://uefi.org/sites/default/files/resources/UEFI_Spec_2_10_Aug29.pdf">
          <front>
            <title>Unified Extensible Firmware Interface (UEFI) Specification</title>
            <author>
              <organization>UEFI Forum, Inc.</organization>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
        <reference anchor="TBBR-CLIENT" target="https://developer.arm.com/documentation/den0006">
          <front>
            <title>Trusted Board Boot Requirements Client (TBBR-CLIENT) Armv8-A</title>
            <author>
              <organization>Arm Ltd</organization>
            </author>
            <date year="2018" month="September"/>
          </front>
          <seriesInfo name="ARM" value="DEN0006D"/>
        </reference>
      </references>
    </references>
    <?line 452?>

<section anchor="open-issues">
      <name>Open Issues</name>
      <t>The list of currently open issues for this documents can be found at <eref target="https://github.com/thomas-fossati/draft-fft-rats-eat-measured-component/issues"/>.</t>
      <t><cref>Note to RFC Editor: please remove before publication.</cref></t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
Carl Wallace,
Carsten Bormann,
Giridhar Mandyam
and
Laurence Lundblade
for providing comments, reviews and suggestions that greatly improved this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
