<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-eat-measured-component-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EAT Measured Component">EAT Measured Component</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-measured-component-11"/>
    <author initials="S." surname="Frost" fullname="Simon Frost">
      <organization>Arm</organization>
      <address>
        <email>Simon.Frost@arm.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <date year="2026" month="February" day="04"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT</keyword>
    <keyword>measurements</keyword>
    <keyword>claim</keyword>
    <keyword>measured</keyword>
    <keyword>component</keyword>
    <abstract>
      <?line 73?>

<t>The term "measured component" refers to an object within the attester's target environment whose state can be sampled and typically digested using a cryptographic hash function.
Examples of measured components include firmware stored in flash memory, software loaded into memory at start time, data stored in a file system, or values in a CPU register.
This document provides the information model for the "measured component" and two associated data models.
This separation is intentional: the JSON and CBOR serializations, coupled with the media types and associated Constrained Application Protocol (CoAP) Content-Formats, enable the immediate use of the semantics within the Entity Attestation Token (EAT) framework.
Meanwhile, the information model can be reused in future specifications to provide additional serializations, for example using ASN.1.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-fft-rats-eat-measured-component"/>.</t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="4.2.16" sectionFormat="of" target="RFC9711"/> defines a <tt>Measurements</tt> claim that:</t>
      <ul empty="true">
        <li>
          <t>"[c]ontains descriptions, lists, evidence or measurements of the software that exists on the entity or any other measurable subsystem of the entity."</t>
        </li>
      </ul>
      <t>This claim allows for different measurement formats, each identified by a different CoAP Content-Format (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
Currently, the only specified format is Concise Software Identification (CoSWID) Tags of type "evidence", as per <xref section="2.9.4" sectionFormat="of" target="RFC9393"/>.
However, CoSWID is not suitable for measurements that cannot be anchored to a file system, such as those in early boot environments.
To address this gap, this document introduces a "measured component" format that can be used with the EAT <tt>Measurements</tt> claim alongside or instead of CoSWID.</t>
      <t>The term "measured component" refers to an object within the attester's target environment whose state can be sampled and typically digested using a cryptographic hash function.
This includes, for example: the invariant part of a firmware component that is loaded in memory at startup time, a run-time integrity check (RTIC), a file system object, or a CPU register.</t>
      <t>This document provides the information model for the "measured component" and two associated data models <xref target="RFC3444"/>.
This separation is intentional: the JSON and CBOR serializations, coupled with the media types and associated CoAP Content-Formats, enable the immediate use of the semantics within the EAT framework.
Meanwhile, the information model can be reused in future specifications to provide additional serializations, for example using ASN.1.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> <xref target="RFC9741"/> is used to describe the data formats.
This specification uses the following CDDL control operators: <tt>.b64u</tt> defined in <xref section="2.1" sectionFormat="of" target="RFC9741"/>, <tt>.json</tt> defined in <xref section="2.4" sectionFormat="of" target="RFC9741"/> and <tt>.cbor</tt> defined in <xref section="3.8.4" sectionFormat="of" target="RFC8610"/>.</t>
    </section>
    <section anchor="measured-component">
      <name>Information Model</name>
      <t>This section presents the information model of a "measured component".</t>
      <t>A "measured component" information element includes the component's sampled state (in digested or raw form) along with metadata that helps in identifying the component.
Optionally, any entities responsible for signing the installed component can also be specified.</t>
      <t>The information elements (IE) that constitute a "measured component" are described in <xref target="tab-mc-info-elems"/>.</t>
      <table anchor="tab-mc-info-elems">
        <name>Measured Component Information Elements</name>
        <thead>
          <tr>
            <th align="left">IE</th>
            <th align="left">Description</th>
            <th align="left">Requirement Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Component Name</td>
            <td align="left">The name given to the measured component. It is important that this name remains consistent across different releases to allow for better tracking of the same measured item across updates. When combined with a consistent versioning scheme, it enables better signalling from the appraisal procedure to the relying parties.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Component Version</td>
            <td align="left">A value representing the specific release or development version of the measured component.  Using Semantic Versioning <xref target="SEMVER"/> is <bcp14>RECOMMENDED</bcp14>.</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14></td>
          </tr>
          <tr>
            <td align="left">Digested or Raw Value</td>
            <td align="left">Either the raw value or the digested value of the measured component.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Digest Algorithm</td>
            <td align="left">Hash algorithm used to compute the Digest Value.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14> only if the value is in the digested form</td>
          </tr>
          <tr>
            <td align="left">Authorities</td>
            <td align="left">One or more entities that can authoritatively identify the component being measured.</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14></td>
          </tr>
        </tbody>
      </table>
      <t>A data model implementing this information model <bcp14>SHOULD</bcp14> also allow a limited amount of extensibility to accommodate profile-specific semantics.</t>
    </section>
    <section anchor="data-model">
      <name>Data Model</name>
      <t>This section presents coordinated JSON and CBOR data models that each implement the information model outlined in <xref target="measured-component"/>.</t>
      <t>The data model is inspired by the "PSA software component" claim (<xref section="4.4.1" sectionFormat="of" target="RFC9783"/>), which has been refactored to take into account the recommendations about the design of new EAT claims described in <xref section="E" sectionFormat="of" target="RFC9711"/>.</t>
      <t>CDDL is used to express rules and constraints of the data model for both JSON and CBOR.
These rules must be strictly followed when creating or validating "measured component" data items.
When there is variation between CBOR and JSON, the CDDL generic <tt>JC&lt;&gt;</tt>, defined in <xref section="D" sectionFormat="of" target="RFC9711"/>, is used.</t>
      <section anchor="common-types">
        <name> Common Types</name>
        <t>The following three basic types are used at various places within the measured component data model:</t>
        <sourcecode type="cddl"><![CDATA[
bytes-b64u = text .b64u bytes
bytes8 = bytes .size 8
bytes8-b64u = text .b64u bytes8
]]></sourcecode>
      </section>
      <section anchor="digest">
        <name>The <tt>digest</tt> Type</name>
        <t>A digest represents the result of a hashing operation together with the hash algorithm used.
The type of the digest algorithm identifier can be either <tt>int</tt> or <tt>text</tt> and is interpreted according to the <xref target="IANA.named-information"/> registry.
Specifically, <tt>int</tt> values are matched against "ID" entries and <tt>text</tt> values are matched against "Hash Name String" entries.
Whenever possible, using the <tt>int</tt> encoding is <bcp14>RECOMMENDED</bcp14>.</t>
        <sourcecode type="cddl"><![CDATA[
digest = [
  alg: (int / text)
  val: digest-value-type
]

digest-value-type = eat.JC<bytes-b64u, bytes>
]]></sourcecode>
      </section>
      <section anchor="the-measured-component-data-item">
        <name>The <tt>measured-component</tt> Data Item</name>
        <t>The <tt>measured-component</tt> data item is as follows:</t>
        <sourcecode type="cddl"><![CDATA[
measured-component = {
  component-id-label => component-id
  measurement
  ? authorities-label => [ + authority-id-type ]
  ? flags-label => flags-type
}

measurement //= ( digested-measurement-label => digest )
measurement //= ( raw-measurement-label => bytes )

authority-id-type = eat.JC<bytes-b64u, bytes>
flags-type = eat.JC<bytes8-b64u, bytes8>

component-id-label = eat.JC<"id", 1>
digested-measurement-label = eat.JC<"digested-measurement", 2>
raw-measurement-label = eat.JC<"raw-measurement", 5>
authorities-label = eat.JC<"authorities", 3>
flags-label = eat.JC<"flags", 4>
]]></sourcecode>
        <t>The members of the <tt>measured-component</tt> CBOR map / JSON object are:</t>
        <dl newline="true">
          <dt><tt>"id"</tt> (index 1):</dt>
          <dd>
            <t>The measured component identifier encoded according to the format described in <xref target="component-id"/>.</t>
          </dd>
          <dt><tt>"measurement"</tt>:</dt>
          <dd>
            <t>Either a digest value and digest algorithm (index 2), encoded using the digest format (<xref target="digest"/>), or the "raw" measurement (index 5), encoded as a byte string.
Note that, while the size of the digested form is constrained by the digest function, the size of the raw form can vary greatly depending on what is being measured (it could be a CPU register or an entire configuration blob, for example).
Therefore, a decoder implementation may decide to limit the amount of memory it allocates to this specific field.</t>
          </dd>
          <dt><tt>"authorities"</tt> (index 3):</dt>
          <dd>
            <t>One or more authorities, see <xref target="authority"/>.</t>
          </dd>
          <dt><tt>"flags"</tt> (index 4):</dt>
          <dd>
            <t>a 64-bit field with profile-defined semantics, see <xref target="profile-flags"/>.</t>
          </dd>
        </dl>
        <section anchor="component-id">
          <name>Component Identifier</name>
          <t>The <tt>component-id</tt> data item is as follows:</t>
          <sourcecode type="cddl"><![CDATA[
component-id = [
  name:      text
  ? version: version
]

;# import coswid.$version-scheme from rfc9393 as coswid

version = [
  val:      text
  ? scheme: coswid.$version-scheme
]
]]></sourcecode>
          <dl>
            <dt><tt>name</tt></dt>
            <dd>
              <t>A string that provides a human readable identifier for the component in question.  Format and adopted conventions depend on the component type.</t>
            </dd>
            <dt><tt>version</tt></dt>
            <dd>
              <t>A compound <tt>version</tt> data item that reuses the encoding and semantics of <xref target="RFC9711"/> <tt>sw-version-type</tt>, extending it to non-software components.</t>
            </dd>
          </dl>
        </section>
        <section anchor="authority">
          <name>Authority Identifier</name>
          <t>An authority is an entity that can authoritatively identify a given component by digitally signing it.
This signature is typically verified during installation (<xref section="7" sectionFormat="of" target="RFC9019"/>), or when the measured component is executed by the boot firmware, operating system, or application launcher, as in the case of Unified Extensible Firmware Interface (UEFI) Secure Boot <xref target="UEFI2"/> and Arm Trusted Board Boot <xref target="TBBR-CLIENT"/>.
Another example may be the controlling entity in an app store.
Note that this signature is in no way related to the attester's signature on the EAT-formatted evidence.</t>
          <t>An authority is identified by its signing public key.
It could be an X.509 certificate, a raw public key, a public key thumbprint, or some other identifier that can be uniquely associated with the signing entity.
In some cases, multiple parties may need to sign a component to indicate their endorsement or approval.
This could include roles such as a firmware update system, fleet owner, or third-party auditor.
The specific purpose of each signature may depend on the deployment, and the order of authorities within the array could indicate meaning.</t>
          <t>If an EAT profile (<xref section="6" sectionFormat="of" target="RFC9711"/>) uses measured components, it <bcp14>MUST</bcp14> specify whether the <tt>authorities</tt> field is used.
If it is used, the profile <bcp14>MUST</bcp14> also specify what each of the entries in the <tt>authorities</tt> array represents, and how to interpret the corresponding <tt>authority-id-type</tt>.</t>
          <t>The <tt>authority-id-type</tt> is defined as follows:</t>
          <sourcecode type="cddl"><![CDATA[
authority-id-type = eat.JC<bytes-b64u, bytes>
]]></sourcecode>
        </section>
        <section anchor="profile-flags">
          <name>Profile-specific Flags</name>
          <t>This optional field can contain up to 64 bits of profile-defined semantics, enabling a profile of this specification to encode additional information and extend the base type.
It can be used to carry information in fixed-size chunks, such as a bit mask or a single value within a predetermined set of codepoints.
Regardless of its internal structure, the size of this field is exactly 8 bytes.</t>
          <t>The <tt>flags-type</tt> is defined as follows:</t>
          <sourcecode type="cddl"><![CDATA[
flags-type = eat.JC<bytes8-b64u, bytes8>
]]></sourcecode>
          <t>If an EAT profile (<xref section="6" sectionFormat="of" target="RFC9711"/>) uses measured components, it <bcp14>MUST</bcp14> specify whether the <tt>flags</tt> field is used.
If it is used, the profile <bcp14>MUST</bcp14> also specify how to interpret the 64 bits.</t>
        </section>
      </section>
      <section anchor="eat-measurements-format-extensions">
        <name>EAT <tt>measurements-format</tt> Extensions</name>
        <t>The CDDL in <xref target="fig-eat-plug"/> extends the <tt>$measurements-body-cbor</tt> and <tt>$measurements-body-json</tt> EAT sockets to add support for <tt>measured-component</tt>s to the <tt>Measurements</tt> claim.</t>
        <figure anchor="fig-eat-plug">
          <name>EAT measurements-format Extensions</name>
          <sourcecode type="cddl"><![CDATA[
mc-cbor = bytes .cbor measured-component
mc-json = text .json measured-component

; EAT CBOR (`.feature "cbor"`)
$measurements-body-cbor /= mc-cbor ; native
$measurements-body-cbor /= mc-json ; tunnel

; EAT JSON (`.feature "json"`)
$measurements-body-json /= mc-json            ; native
$measurements-body-json /= text .b64u mc-cbor ; tunnel
]]></sourcecode>
        </figure>
        <t>Each socket is extended with two new types: a "native" representation that is used when <tt>measured-component</tt> and the EAT have the same serialization (e.g., they are both CBOR), and a "tunnel" representation that is used when the serializations differ.</t>
      </section>
      <section anchor="measurements-format-for-cbor-eat">
        <name><tt>measurements-format</tt> for CBOR EAT</name>
        <t>The entries in <xref target="tab-mf-cbor"/> are the allowed <tt>content-type</tt> / <tt>content-format</tt> pairs when the <tt>measured-component</tt> is carried in a CBOR EAT.</t>
        <t>Note the use of the "native" and "tunnel" formats from <xref target="fig-eat-plug"/>, and how the associated CoAP Content-Format is used to describe the original serialization.</t>
        <table anchor="tab-mf-cbor">
          <name>measurement-format for EAT CWT</name>
          <thead>
            <tr>
              <th align="left">content-type (CoAP C-F equivalent)</th>
              <th align="left">content-format</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">
                <tt>mc-cbor</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">
                <tt>mc-json</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="measurements-format-for-json-eat">
        <name><tt>measurements-format</tt> for JSON EAT</name>
        <t><xref target="tab-mf-json"/> is the equivalent of <xref target="tab-mf-cbor"/> for JSON-serialized EAT.</t>
        <table anchor="tab-mf-json">
          <name>measurement-format for EAT JWT</name>
          <thead>
            <tr>
              <th align="left">content-type (CoAP C-F equivalent)</th>
              <th align="left">content-format</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">
                <tt>mc-json</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">
                <tt>tstr .b64u mc-cbor</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="eat-profiles-and-measured-components">
        <name>EAT Profiles and Measured Components</name>
        <t>The semantics of the <tt>authorities</tt> and profile <tt>flags</tt> fields are defined by the applicable EAT profile, i.e., the profile of the wrapping EAT.</t>
        <t>If the profile of the EAT is not known to the consumer and one or more Measured Components within that EAT include <tt>authorities</tt> and/or profile <tt>flags</tt>, the consumer <bcp14>MUST</bcp14> reject the EAT.</t>
      </section>
      <section anchor="examples">
        <name>Examples</name>
        <t>The example in <xref target="ex-1"/> is a digested measured component with all the fields populated.</t>
        <figure anchor="ex-1">
          <name>Complete Measured Component</name>
          <sourcecode type="cbor-edn"><![CDATA[
{
  / id / 1: [
    / name / "boot loader X",
    / version / [
      "1.2.3rc2",
      16384 / semver /
    ]
  ],
  / measurement / 2: [
    / alg / "sha-256",
    / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31dbe7af4b37
              3431fc7d319da3'
  ],
  / authorities / 3: [
    h'492e9b676c21f6012b1ceeb9032feb4141a880797355f6675015ec59c5
      1ca1ec',
    h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb814d6ff5
      7a8a5e'
  ],
  / flags / 4: h'0000000000000101'
}
]]></sourcecode>
        </figure>
        <t>The example in <xref target="ex-eat-1"/> is the same measured component as above but used as the format of a <tt>measurements</tt> claim in a EAT claims-set.</t>
        <t>This example uses TBD1 as the <tt>content-type</tt> value of the <tt>measurements-format</tt> entry.
(This will change to the value assigned by IANA to the <tt>measured-component+cbor</tt> Content-Format.)</t>
        <t>Note that the array contains only one measured component, but additional entries could be added if the measured TCB is made of multiple, individually measured components.</t>
        <figure anchor="ex-eat-1">
          <name>EAT Measurements Claim using a Measured Component (CBOR)</name>
          <sourcecode type="cbor-edn"><![CDATA[
{
  273: [
    [
      TBD1, / measured-component+cbor /
      <<
        {
          / id / 1: [
            / name / "boot loader X",
            / version / [
              "1.2.3rc2",
              16384 / semver /
            ]
          ],
          / measurement / 2: [
            / alg / "sha-256",
            / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31db
                      e7af4b373431fc7d319da3'
          ],
          / authorities / 3: [
            h'492e9b676c21f6012b1ceeb9032feb4141a880797355f66750
              15ec59c51ca1ec',
            h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb
              814d6ff57a8a5e'
          ]
        }
      >>
    ]
  ]
}
]]></sourcecode>
        </figure>
        <t>The example in <xref target="ex-eat-2"/> illustrates the inclusion of a JSON measured component inside a JSON EAT.</t>
        <t>This example uses TBD2 as the <tt>content-type</tt> value of the <tt>measurements-format</tt> entry.
(This will change to the value assigned by IANA to the <tt>measured-component+json</tt> Content-Format.)</t>
        <figure anchor="ex-eat-2">
          <name>EAT Measurements Claim using a Measured Component (JSON)</name>
          <sourcecode type="cbor-edn"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "measurements": [
    [
      TBD2, / measured-component+json /
      "{ \"id\": [ \"boot loader X\", [ \"1.2.3rc2\", 16384 ] ], \"\
digested-measurement\": [ \"sha-256\", \"\
OZYAPUhvuR_7BW99A_KymSshWzHb569LNzQx_H0xnaM\" ], \"authorities\": [ \
\"SS6bZ2wh9gErHO65Ay_rQUGogHlzVfZnUBXsWcUcoew\", \"\
                   Qne7l7p7UVd6DTgVHT4ItAvflGdT9bW964FNb_V6il4\" ] }"
    ]
  ]
}
]]></sourcecode>
        </figure>
        <t>The example in <xref target="ex-2"/> is a measured component representing a boot loader identified by its path name:</t>
        <figure anchor="ex-2">
          <name>Digested Measured Component using File Path as Identifier</name>
          <sourcecode type="cbor-edn"><![CDATA[
{
  / id / 1: [
    / name / "/boot/loader.bin"
  ],
  / measurement / 2: [
    / alg / "sha-384",
    / val / h'66ec2fb4e02d8c8b3eee320e750d9389d66c52c51db11cc6
              9cc5e410816283ed60ba573795f5fcc85e513af57b3f6def'
  ],
  / flags / 4: h'0000000000000101'
}
]]></sourcecode>
        </figure>
        <t>The example in <xref target="ex-3"/> is a raw measured component.</t>
        <figure anchor="ex-3">
          <name>Raw Measured Component</name>
          <sourcecode type="cbor-edn"><![CDATA[
{
  / id / 1: [
    / name / "hardware-config"
  ],
  / measurement / 5: h'4f6d616861'
}
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>Please review Sections <xref target="RFC9711" section="9.1" sectionFormat="bare">Claim Trustworthiness</xref>, <xref target="RFC9711" section="9.4" sectionFormat="bare">Multiple EAT Consumers</xref> and <xref target="RFC9711" section="9.5" sectionFormat="bare">Detached EAT Bundle Digest Security Considerations</xref> of <xref target="RFC9711"/>; these considerations apply to this document as well.
Note that similar security considerations may apply when the Measured Component information model is serialized using different data models than the ones specified in this document.</t>
      <t>The Component Name and Component Version can give an attacker detailed information about the software running on a device and its configuration settings.
This information could offer an attacker valuable insights.</t>
      <t>Any textual fields (e.g., Component Name and Component Version) that are stored in a file, inserted into a database, or displayed to humans must be properly sanitized to prevent attacks and undesirable behavior.
Further discussion and references on this topic can be found in <xref section="7" sectionFormat="of" target="RFC9839"/>.</t>
      <t>If the component measurement is digested, the digest must be computed using a strong cryptographic hash function.</t>
    </section>
    <section anchor="privcons">
      <name>Privacy Considerations</name>
      <t>Please review Section <xref target="RFC9711" section="9.1" sectionFormat="bare">Multiple EAT Consumers</xref> of <xref target="RFC9711"/>; the differential encryption considerations discussed there also apply to this document.</t>
      <t>The Component Name and Component Version could reveal private information about a device and its owner.</t>
      <t>Additionally, the stability requirement of the Component Name could enable tracking.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> replace "RFCthis" with the RFC number assigned to this document.</t>
      <section anchor="media-types-registrations">
        <name>Media Types Registrations</name>
        <t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="tab-mc-regs">
          <name>Measured Component Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>measured-component+cbor</tt></td>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>measured-component+json</tt></td>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <section anchor="applicationmeasured-componentcbor">
          <name><tt>application/measured-component+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>measured-component+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers and Relying Parties</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationmeasured-componentjson">
          <name><tt>application/measured-component+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>measured-component+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers and Relying Parties</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="measured-component-content-format-registrations">
        <name>Measured Component Content-Format Registrations</name>
        <t>IANA is requested to register two Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>, as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/measured-component+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/measured-component+json</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>If possible, TBD1 and TBD2 should be assigned in the 256..9999 range.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:.plus,.cat, and.det for the construction of constants;.abnf/.abnfb for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and.feature for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="RFC9741">
          <front>
            <title>Concise Data Definition Language (CDDL): Additional Control Operators for the Conversion and Processing of Text</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point. RFCs have added to this extension point in both an application-specific and a more general way.</t>
              <t>The present document defines a number of additional generally applicable control operators for text conversion (bytes, integers, printf-style formatting, and JSON) and for an operation on text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9741"/>
          <seriesInfo name="DOI" value="10.17487/RFC9741"/>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="SEMVER" target="https://semver.org/spec/v2.0.0.html">
          <front>
            <title>Semantic Versioning 2.0.0</title>
            <author>
              <organization/>
            </author>
            <date year="2013"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.named-information" target="https://www.iana.org/assignments/named-information">
          <front>
            <title>Named Information</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3444">
          <front>
            <title>On the Difference between Information Models and Data Models</title>
            <author fullname="A. Pras" initials="A." surname="Pras"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="January" year="2003"/>
            <abstract>
              <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3444"/>
          <seriesInfo name="DOI" value="10.17487/RFC3444"/>
        </reference>
        <reference anchor="RFC9783">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="S. Frost" initials="S." surname="Frost"/>
            <author fullname="M. Brossard" initials="M." surname="Brossard"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Arm's Platform Security Architecture (PSA) is a family of hardware and firmware security specifications, along with open-source reference implementations, aimed at helping device makers and chip manufacturers integrate best-practice security into their products. Devices that comply with PSA can generate attestation tokens as described in this document, which serve as the foundation for various protocols, including secure provisioning and network access control. This document specifies the structure and semantics of the PSA attestation token.</t>
              <t>The PSA attestation token is a profile of the Entity Attestation Token (EAT). This specification describes the claims used in an attestation token generated by PSA-compliant systems, how these claims are serialized for transmission, and how they are cryptographically protected.</t>
              <t>This Informational document is published as an Independent Submission to improve interoperability with Arm's architecture. It is not a standard nor a product of the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9783"/>
          <seriesInfo name="DOI" value="10.17487/RFC9783"/>
        </reference>
        <reference anchor="RFC9393">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="RFC9839">
          <front>
            <title>Unicode Character Repertoire Subsets</title>
            <author fullname="T. Bray" initials="T." surname="Bray"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="August" year="2025"/>
            <abstract>
              <t>This document discusses subsets of the Unicode character repertoire for use in protocols and data formats and specifies three subsets recommended for use in IETF specifications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9839"/>
          <seriesInfo name="DOI" value="10.17487/RFC9839"/>
        </reference>
        <reference anchor="UEFI2" target="https://uefi.org/sites/default/files/resources/UEFI_Spec_2_10_Aug29.pdf">
          <front>
            <title>Unified Extensible Firmware Interface (UEFI) Specification</title>
            <author>
              <organization>UEFI Forum, Inc.</organization>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
        <reference anchor="TBBR-CLIENT" target="https://developer.arm.com/documentation/den0006">
          <front>
            <title>Trusted Board Boot Requirements Client (TBBR-CLIENT) Armv8-A</title>
            <author>
              <organization>Arm Ltd</organization>
            </author>
            <date year="2018" month="September"/>
          </front>
          <seriesInfo name="ARM" value="DEN0006D"/>
        </reference>
        <reference anchor="RFC9019">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="B. Moran" initials="B." surname="Moran"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="M. Meriac" initials="M." surname="Meriac"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
              <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9019"/>
          <seriesInfo name="DOI" value="10.17487/RFC9019"/>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
    </references>
    <?line 596?>

<section anchor="collected-cddl">
      <name>Collected CDDL</name>
      <t>This appendix contains all the CDDL definitions included in this specification.</t>
      <sourcecode type="cddl"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

measured-component = {
  component-id-label => component-id,
  measurement,
  ? authorities-label => [+ authority-id-type],
  ? flags-label => flags-type,
}
measurement //= (digested-measurement-label => digest // raw-\
                                          measurement-label => bytes)
authority-id-type = eat.JC<bytes-b64u, bytes>
flags-type = eat.JC<bytes8-b64u, bytes8>
component-id = [
  name: text,
  ? version: version,
]
version = [
  val: text,
  ? scheme: coswid.$version-scheme,
]
digest = [
  alg: int / text,
  val: digest-value-type,
]
digest-value-type = eat.JC<bytes-b64u, bytes>
bytes-b64u = text .b64u bytes
bytes8 = bytes .size 8
bytes8-b64u = text .b64u bytes8
component-id-label = eat.JC<"id", 1>
digested-measurement-label = eat.JC<"digested-measurement", 2>
raw-measurement-label = eat.JC<"raw-measurement", 5>
authorities-label = eat.JC<"authorities", 3>
flags-label = eat.JC<"flags", 4>
mc-cbor = bytes .cbor measured-component
mc-json = text .json measured-component
$measurements-body-cbor /= mc-cbor / mc-json
$measurements-body-json /= mc-json / text .b64u mc-cbor
eat.JSON-ONLY<J> = J .feature "json"
eat.CBOR-ONLY<C> = C .feature "cbor"
eat.JC<J, C> = eat.JSON-ONLY<J> / eat.CBOR-ONLY<C>
coswid.$version-scheme /= coswid.multipartnumeric / coswid.\
multipartnumeric-suffix / coswid.alphanumeric / coswid.decimal / \
                                           coswid.semver / int / text
coswid.multipartnumeric = 1
coswid.multipartnumeric-suffix = 2
coswid.alphanumeric = 3
coswid.decimal = 4
coswid.semver = 16384
]]></sourcecode>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The list of currently open issues for this documents can be found at <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-eat-measured-component/issues"/>.</t>
      <t><cref>Note to RFC Editor: please remove before publication.</cref></t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
Carl Wallace,
Carsten Bormann,
Deb Cooley,
Dionna Glaze,
Esko Dijk,
Giridhar Mandyam,
Henry Thompson,
Houda Labiod,
<contact fullname="Ionuț Mihalcea"/>,
Joe Salowey,
Jun Zhang,
Laurence Lundblade,
Michael Richardson,
Muhammad Usama Sardar
and
Yogesh Deshpande
for providing comments, reviews and suggestions that greatly improved this document.</t>
      <t>The authors would also like to thank Ken Takayama for providing an implementation of this specification in the veraison/eat package.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
