<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.36 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-eat-media-type-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="EAT Media Types">EAT Media Types</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-media-type-03"/>
    <author initials="L." surname="Lundblade" fullname="Laurence Lundblade">
      <organization>Security Theory LLC</organization>
      <address>
        <email>lgl@securitytheory.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer Institute for Secure Information Technology</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>arm</organization>
      <address>
        <email>thomas.fossati@arm.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="04"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT, media type</keyword>
    <abstract>
      <?line 53?>

<t>Payloads used in Remote Attestation Procedures may require an associated media
type for their conveyance, for example when used in RESTful APIs.</t>
      <t>This memo defines media types to be used for Entity Attestation Tokens (EAT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-eat-mt"/>.</t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Payloads used in Remote Attestation Procedures <xref target="RATS-Arch"/> may require an
associated media type for their conveyance, for example when used in RESTful
APIs (<xref target="fig-api-sd"/>).</t>
      <figure anchor="fig-api-sd">
        <name>Conveying RATS conceptual messages in REST APIs using EAT</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="288" width="536" viewBox="0 0 536 288" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 24,64 L 24,272" fill="none" stroke="black"/>
              <path d="M 48,32 L 48,64" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,64" fill="none" stroke="black"/>
              <path d="M 256,64 L 256,272" fill="none" stroke="black"/>
              <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
              <path d="M 440,32 L 440,64" fill="none" stroke="black"/>
              <path d="M 488,64 L 488,272" fill="none" stroke="black"/>
              <path d="M 528,32 L 528,64" fill="none" stroke="black"/>
              <path d="M 8,32 L 48,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 304,32" fill="none" stroke="black"/>
              <path d="M 440,32 L 528,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 48,64" fill="none" stroke="black"/>
              <path d="M 216,64 L 304,64" fill="none" stroke="black"/>
              <path d="M 440,64 L 528,64" fill="none" stroke="black"/>
              <path d="M 256,112 L 480,112" fill="none" stroke="black"/>
              <path d="M 264,160 L 488,160" fill="none" stroke="black"/>
              <path d="M 32,208 L 256,208" fill="none" stroke="black"/>
              <path d="M 24,240 L 248,240" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="488,112 476,106.4 476,117.6" fill="black" transform="rotate(0,480,112)"/>
              <polygon class="arrowhead" points="272,160 260,154.4 260,165.6" fill="black" transform="rotate(180,264,160)"/>
              <polygon class="arrowhead" points="256,240 244,234.4 244,245.6" fill="black" transform="rotate(0,248,240)"/>
              <polygon class="arrowhead" points="40,208 28,202.4 28,213.6" fill="black" transform="rotate(180,32,208)"/>
              <g class="text">
                <text x="28" y="52">RP</text>
                <text x="260" y="52">Attester</text>
                <text x="484" y="52">Verifier</text>
                <text x="284" y="84">POST</text>
                <text x="336" y="84">/verify</text>
                <text x="320" y="100">EAT(Evidence)</text>
                <text x="440" y="132">200</text>
                <text x="468" y="132">OK</text>
                <text x="344" y="148">EAT(Attestation</text>
                <text x="444" y="148">Results)</text>
                <text x="180" y="180">POST</text>
                <text x="224" y="180">/auth</text>
                <text x="112" y="196">EAT(Attestation</text>
                <text x="212" y="196">Results)</text>
                <text x="48" y="228">201</text>
                <text x="96" y="228">Created</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
.----.                    .----------.                .----------.
| RP |                    | Attester |                | Verifier |
'-+--'                    '----+-----'                '-----+----'
  |                            | POST /verify               |
  |                            | EAT(Evidence)              |
  |                            +--------------------------->|
  |                            |                     200 OK |
  |                            |   EAT(Attestation Results) |
  |                            |<---------------------------+
  |                 POST /auth |                            |
  |   EAT(Attestation Results) |                            |
  |<---------------------------+                            |
  | 201 Created                |                            |
  +--------------------------->|                            |
  |                            |                            |
  |                            |                            |
]]></artwork>
        </artset>
      </figure>
      <t>This memo defines media types to be used for Entity Attestation Token (EAT)
<xref target="EAT"/> payloads independently of the RATS Conceptual Message in which they
manifest themselves.  The objective is to give protocol, API and application
designers a number of readily available and reusable media types for
integrating EAT-based messages in their flows, for example when using HTTP
<xref target="BUILD-W-HTTP"/> or CoAP <xref target="REST-IoT"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>This document uses the terms and concepts defined in <xref target="RATS-Arch"/>.</t>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="eat-types">
      <name>EAT Types</name>
      <t><xref target="fig-eat-types"/> illustrates the six EAT wire formats and how they relate to
each other.  <xref target="EAT"/> defines four of them (CWT, JWT and Detached EAT Bundle in
its JSON and CBOR flavours), whilst <xref target="UCCS"/> defines the remaining two: UCCS
and UJCS.</t>
      <figure anchor="fig-eat-types">
        <name>EAT Types</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="544" width="520" viewBox="0 0 520 544" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,432 L 8,464" fill="none" stroke="black"/>
              <path d="M 72,64 L 72,424" fill="none" stroke="black"/>
              <path d="M 120,48 L 120,64" fill="none" stroke="black"/>
              <path d="M 120,112 L 120,128" fill="none" stroke="black"/>
              <path d="M 120,176 L 120,192" fill="none" stroke="black"/>
              <path d="M 120,240 L 120,256" fill="none" stroke="black"/>
              <path d="M 120,304 L 120,320" fill="none" stroke="black"/>
              <path d="M 120,368 L 120,384" fill="none" stroke="black"/>
              <path d="M 128,432 L 128,464" fill="none" stroke="black"/>
              <path d="M 176,32 L 176,48" fill="none" stroke="black"/>
              <path d="M 176,96 L 176,112" fill="none" stroke="black"/>
              <path d="M 184,160 L 184,176" fill="none" stroke="black"/>
              <path d="M 184,224 L 184,240" fill="none" stroke="black"/>
              <path d="M 184,288 L 184,304" fill="none" stroke="black"/>
              <path d="M 184,352 L 184,368" fill="none" stroke="black"/>
              <path d="M 240,512 L 240,528" fill="none" stroke="black"/>
              <path d="M 272,360 L 272,448" fill="none" stroke="black"/>
              <path d="M 328,496 L 328,512" fill="none" stroke="black"/>
              <path d="M 336,256 L 336,288" fill="none" stroke="black"/>
              <path d="M 352,368 L 352,400" fill="none" stroke="black"/>
              <path d="M 360,496 L 360,528" fill="none" stroke="black"/>
              <path d="M 368,224 L 368,256" fill="none" stroke="black"/>
              <path d="M 368,288 L 368,320" fill="none" stroke="black"/>
              <path d="M 384,128 L 384,256" fill="none" stroke="black"/>
              <path d="M 384,296 L 384,368" fill="none" stroke="black"/>
              <path d="M 384,408 L 384,432" fill="none" stroke="black"/>
              <path d="M 400,64 L 400,256" fill="none" stroke="black"/>
              <path d="M 400,288 L 400,360" fill="none" stroke="black"/>
              <path d="M 416,496 L 416,528" fill="none" stroke="black"/>
              <path d="M 424,368 L 424,400" fill="none" stroke="black"/>
              <path d="M 440,256 L 440,288" fill="none" stroke="black"/>
              <path d="M 472,288 L 472,312" fill="none" stroke="black"/>
              <path d="M 472,352 L 472,368" fill="none" stroke="black"/>
              <path d="M 136,32 L 176,32" fill="none" stroke="black"/>
              <path d="M 88,48 L 120,48" fill="none" stroke="black"/>
              <path d="M 184,48 L 384,48" fill="none" stroke="black"/>
              <path d="M 120,64 L 160,64" fill="none" stroke="black"/>
              <path d="M 136,96 L 176,96" fill="none" stroke="black"/>
              <path d="M 72,112 L 120,112" fill="none" stroke="black"/>
              <path d="M 184,112 L 368,112" fill="none" stroke="black"/>
              <path d="M 120,128 L 160,128" fill="none" stroke="black"/>
              <path d="M 136,160 L 184,160" fill="none" stroke="black"/>
              <path d="M 72,176 L 120,176" fill="none" stroke="black"/>
              <path d="M 192,176 L 240,176" fill="none" stroke="black"/>
              <path d="M 120,192 L 168,192" fill="none" stroke="black"/>
              <path d="M 240,192 L 280,192" fill="none" stroke="black"/>
              <path d="M 304,208 L 352,208" fill="none" stroke="black"/>
              <path d="M 136,224 L 184,224" fill="none" stroke="black"/>
              <path d="M 240,224 L 280,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 120,240" fill="none" stroke="black"/>
              <path d="M 192,240 L 240,240" fill="none" stroke="black"/>
              <path d="M 120,256 L 168,256" fill="none" stroke="black"/>
              <path d="M 336,256 L 440,256" fill="none" stroke="black"/>
              <path d="M 440,272 L 456,272" fill="none" stroke="black"/>
              <path d="M 136,288 L 184,288" fill="none" stroke="black"/>
              <path d="M 336,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 72,304 L 120,304" fill="none" stroke="black"/>
              <path d="M 192,304 L 240,304" fill="none" stroke="black"/>
              <path d="M 120,320 L 168,320" fill="none" stroke="black"/>
              <path d="M 240,320 L 280,320" fill="none" stroke="black"/>
              <path d="M 456,320 L 496,320" fill="none" stroke="black"/>
              <path d="M 304,336 L 352,336" fill="none" stroke="black"/>
              <path d="M 136,352 L 184,352" fill="none" stroke="black"/>
              <path d="M 240,352 L 280,352" fill="none" stroke="black"/>
              <path d="M 456,352 L 496,352" fill="none" stroke="black"/>
              <path d="M 72,368 L 120,368" fill="none" stroke="black"/>
              <path d="M 192,368 L 240,368" fill="none" stroke="black"/>
              <path d="M 352,368 L 424,368" fill="none" stroke="black"/>
              <path d="M 120,384 L 168,384" fill="none" stroke="black"/>
              <path d="M 432,384 L 456,384" fill="none" stroke="black"/>
              <path d="M 352,400 L 424,400" fill="none" stroke="black"/>
              <path d="M 8,432 L 128,432" fill="none" stroke="black"/>
              <path d="M 128,448 L 368,448" fill="none" stroke="black"/>
              <path d="M 8,464 L 128,464" fill="none" stroke="black"/>
              <path d="M 144,496 L 192,496" fill="none" stroke="black"/>
              <path d="M 256,496 L 328,496" fill="none" stroke="black"/>
              <path d="M 360,496 L 416,496" fill="none" stroke="black"/>
              <path d="M 144,528 L 192,528" fill="none" stroke="black"/>
              <path d="M 240,528 L 312,528" fill="none" stroke="black"/>
              <path d="M 360,528 L 416,528" fill="none" stroke="black"/>
              <path d="M 136,32 C 127.16936,32 120,39.16936 120,48" fill="none" stroke="black"/>
              <path d="M 88,48 C 79.16936,48 72,55.16936 72,64" fill="none" stroke="black"/>
              <path d="M 384,48 C 392.83064,48 400,55.16936 400,64" fill="none" stroke="black"/>
              <path d="M 160,64 C 168.83064,64 176,56.83064 176,48" fill="none" stroke="black"/>
              <path d="M 136,96 C 127.16936,96 120,103.16936 120,112" fill="none" stroke="black"/>
              <path d="M 368,112 C 376.83064,112 384,119.16936 384,128" fill="none" stroke="black"/>
              <path d="M 160,128 C 168.83064,128 176,120.83064 176,112" fill="none" stroke="black"/>
              <path d="M 136,160 C 127.16936,160 120,167.16936 120,176" fill="none" stroke="black"/>
              <path d="M 240,176 C 248.83064,176 256,183.16936 256,192" fill="none" stroke="black"/>
              <path d="M 168,192 C 176.83064,192 184,184.83064 184,176" fill="none" stroke="black"/>
              <path d="M 240,192 C 231.16936,192 224,199.16936 224,208" fill="none" stroke="black"/>
              <path d="M 280,192 C 288.83064,192 296,199.16936 296,208" fill="none" stroke="black"/>
              <path d="M 352,208 C 360.83064,208 368,215.16936 368,224" fill="none" stroke="black"/>
              <path d="M 136,224 C 127.16936,224 120,231.16936 120,240" fill="none" stroke="black"/>
              <path d="M 240,224 C 231.16936,224 224,216.83064 224,208" fill="none" stroke="black"/>
              <path d="M 280,224 C 288.83064,224 296,216.83064 296,208" fill="none" stroke="black"/>
              <path d="M 240,240 C 248.83064,240 256,232.83064 256,224" fill="none" stroke="black"/>
              <path d="M 168,256 C 176.83064,256 184,248.83064 184,240" fill="none" stroke="black"/>
              <path d="M 456,272 C 464.83064,272 472,279.16936 472,288" fill="none" stroke="black"/>
              <path d="M 136,288 C 127.16936,288 120,295.16936 120,304" fill="none" stroke="black"/>
              <path d="M 240,304 C 248.83064,304 256,311.16936 256,320" fill="none" stroke="black"/>
              <path d="M 168,320 C 176.83064,320 184,312.83064 184,304" fill="none" stroke="black"/>
              <path d="M 240,320 C 231.16936,320 224,327.16936 224,336" fill="none" stroke="black"/>
              <path d="M 280,320 C 288.83064,320 296,327.16936 296,336" fill="none" stroke="black"/>
              <path d="M 456,320 C 447.16936,320 440,327.16936 440,336" fill="none" stroke="black"/>
              <path d="M 496,320 C 504.83064,320 512,327.16936 512,336" fill="none" stroke="black"/>
              <path d="M 352,336 C 360.83064,336 368,328.83064 368,320" fill="none" stroke="black"/>
              <path d="M 136,352 C 127.16936,352 120,359.16936 120,368" fill="none" stroke="black"/>
              <path d="M 240,352 C 231.16936,352 224,344.83064 224,336" fill="none" stroke="black"/>
              <path d="M 280,352 C 288.83064,352 296,344.83064 296,336" fill="none" stroke="black"/>
              <path d="M 456,352 C 447.16936,352 440,344.83064 440,336" fill="none" stroke="black"/>
              <path d="M 496,352 C 504.83064,352 512,344.83064 512,336" fill="none" stroke="black"/>
              <path d="M 240,368 C 248.83064,368 256,360.83064 256,352" fill="none" stroke="black"/>
              <path d="M 168,384 C 176.83064,384 184,376.83064 184,368" fill="none" stroke="black"/>
              <path d="M 456,384 C 464.83064,384 472,376.83064 472,368" fill="none" stroke="black"/>
              <path d="M 368,448 C 376.83064,448 384,440.83064 384,432" fill="none" stroke="black"/>
              <path d="M 144,496 C 135.16936,496 128,503.16936 128,512" fill="none" stroke="black"/>
              <path d="M 192,496 C 200.83064,496 208,503.16936 208,512" fill="none" stroke="black"/>
              <path d="M 256,496 C 247.16936,496 240,503.16936 240,512" fill="none" stroke="black"/>
              <path d="M 144,528 C 135.16936,528 128,520.83064 128,512" fill="none" stroke="black"/>
              <path d="M 192,528 C 200.83064,528 208,520.83064 208,512" fill="none" stroke="black"/>
              <path d="M 312,528 C 320.83064,528 328,520.83064 328,512" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="480,312 468,306.4 468,317.6" fill="black" transform="rotate(90,472,312)"/>
              <polygon class="arrowhead" points="440,384 428,378.4 428,389.6" fill="black" transform="rotate(180,432,384)"/>
              <polygon class="arrowhead" points="408,360 396,354.4 396,365.6" fill="black" transform="rotate(90,400,360)"/>
              <polygon class="arrowhead" points="392,408 380,402.4 380,413.6" fill="black" transform="rotate(270,384,408)"/>
              <polygon class="arrowhead" points="392,296 380,290.4 380,301.6" fill="black" transform="rotate(270,384,296)"/>
              <polygon class="arrowhead" points="312,336 300,330.4 300,341.6" fill="black" transform="rotate(180,304,336)"/>
              <polygon class="arrowhead" points="312,208 300,202.4 300,213.6" fill="black" transform="rotate(180,304,208)"/>
              <polygon class="arrowhead" points="280,360 268,354.4 268,365.6" fill="black" transform="rotate(270,272,360)"/>
              <polygon class="arrowhead" points="200,368 188,362.4 188,373.6" fill="black" transform="rotate(180,192,368)"/>
              <polygon class="arrowhead" points="200,304 188,298.4 188,309.6" fill="black" transform="rotate(180,192,304)"/>
              <polygon class="arrowhead" points="200,240 188,234.4 188,245.6" fill="black" transform="rotate(180,192,240)"/>
              <polygon class="arrowhead" points="200,176 188,170.4 188,181.6" fill="black" transform="rotate(180,192,176)"/>
              <polygon class="arrowhead" points="192,112 180,106.4 180,117.6" fill="black" transform="rotate(180,184,112)"/>
              <polygon class="arrowhead" points="192,48 180,42.4 180,53.6" fill="black" transform="rotate(180,184,48)"/>
              <polygon class="arrowhead" points="80,424 68,418.4 68,429.6" fill="black" transform="rotate(90,72,424)"/>
              <g class="text">
                <text x="148" y="52">UJCS</text>
                <text x="148" y="116">UCCS</text>
                <text x="152" y="180">JWT</text>
                <text x="260" y="212">Crypto</text>
                <text x="152" y="244">CWT</text>
                <text x="388" y="276">Claims-Set</text>
                <text x="152" y="308">BUN-J</text>
                <text x="260" y="340">Bundle</text>
                <text x="476" y="340">Digest</text>
                <text x="152" y="372">BUN-C</text>
                <text x="388" y="388">submod</text>
                <text x="68" y="452">Nested-Token</text>
                <text x="76" y="516">Legenda:</text>
                <text x="168" y="516">Process</text>
                <text x="268" y="516">Wire</text>
                <text x="304" y="516">Fmt</text>
                <text x="388" y="516">CDDL</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
               .-----.
         .----+ UJCS |<-------------------------.
        |     '-----'                            |
        |                                        |
        |      .-----.                           |
        +-----+ UCCS |<-----------------------.  |
        |     '-----'                          | |
        |                                      | |
        |      .------.                        | |
        +-----+  JWT  |<------.                | |
        |     '------'      .--+---.           | |
        |                  | Crypto |<------.  | |
        |      .------.     '--+---'         | | |
        +-----+  CWT  |<------'              | | |
        |     '------'                   .---+-+-+----.
        |                                | Claims-Set +--.
        |      .------.                  '---+---+----'   |
        +-----+ BUN-J |<------.              | ^ |        v
        |     '------'      .--+---.         | | |     .------.
        |                  | Bundle |<------'  | |    | Digest |
        |      .------.     '--+---'           | v     '--+---'
        +-----+ BUN-C |<------'  ^         .---+----.     |
        |     '------'           |         | submod |<---'
        |                        |         '--------'
        v                        |             ^
.--------------.                 |             |
| Nested-Token +-----------------+------------'
'--------------'

                .-------.     .---------.   .------.
     Legenda:  | Process |   | Wire Fmt |   | CDDL |
                '-------'    '---------'    '------'
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="a-media-type-parameter-for-eat-profiles">
      <name>A Media Type Parameter for EAT Profiles</name>
      <t>EAT is an open and flexible format.  To improve interoperability, <xref section="6" sectionFormat="of" target="EAT"/> defines the concept of EAT profiles.  Profiles are used to constrain
the parameters that producers and consumers of a specific EAT profile need to
understand in order to interoperate.  For example: the number and type of
claims, which serialisation format, the supported signature schemes, etc.  EATs
carry an in-band profile identifier using the <tt>eat_profile</tt> claim (see
<xref section="4.3.2" sectionFormat="of" target="EAT"/>).  The value of the <tt>eat_profile</tt> claim is either an
OID or a URI.</t>
      <t>The media types defined in this document include an optional <tt>eat_profile</tt>
parameter that can be used to mirror the homonymous claim of the transported
EAT.  Exposing the EAT profile at the API layer allows API routers to dispatch
payloads directly to the profile-specific processor without having to snoop
into the request bodies.  This design also provides a finer-grained and
scalable type system that matches the inherent extensibility of EAT.  The
expectation being that a certain EAT profile automatically obtains a media type
derived from the base (e.g., <tt>application/eat+cwt)</tt> by populating the
<tt>eat_profile</tt> parameter with the corresponding OID or URL.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-rest-req"/> illustrates the usage of EAT media types for
transporting attestation evidence as well as negotiating the acceptable format
of the attestation result.</t>
      <figure anchor="fig-rest-req">
        <name>Example REST Verification API (request)</name>
        <sourcecode type="http-message"><![CDATA[
# NOTE: '\' line wrapping per RFC 8792

POST /challenge-response/v1/session/1234567890 HTTP/1.1
Host: verifier.example
Accept: application/eat+cwt; eat_profile="tag:ar4si.example,2021"
Content-Type: application/eat+cwt; \
              eat_profile="tag:evidence.example,2022"

[ CBOR-encoded EAT w/ eat_profile="tag:evidence.example,2022" ]
]]></sourcecode>
      </figure>
      <t>The example in <xref target="fig-rest-rsp"/> illustrates the usage of EAT media types for
transporting attestation results.</t>
      <figure anchor="fig-rest-rsp">
        <name>Example REST Verification API (response)</name>
        <sourcecode type="http-message"><![CDATA[
# NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 200 OK
Content-Type: application/eat+cwt; \
              eat_profile="tag:ar4si.example,2021"

[ CBOR-encoded EAT w/ eat_profile="tag:ar4si.example,2021" ]
]]></sourcecode>
      </figure>
      <t>In both cases, a tag URI <xref target="RFC4151"/> identifying the profile is carried as an
explicit parameter.</t>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>The security consideration of <xref target="EAT"/> and <xref target="UCCS"/> apply in full.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="to-be-removed">RFC Editor: please replace RFCthis with this RFC number and remove this note.</cref></t>
      <section anchor="cwt-structured-syntax-suffix">
        <name><tt>+cwt</tt> Structured Syntax Suffix</name>
        <t>IANA is requested to register the <tt>+cwt</tt> structured syntax suffix in the
"Structured Syntax Suffixes" registry <xref target="IANA.media-type-structured-suffix"/> in
the manner described in <xref target="MediaTypes"/>, which can be used to indicate that the
media type is encoded as a CWT.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <dl spacing="compact">
            <dt>Name:</dt>
            <dd>
              <t>CBOR Web Token (CWT)</t>
            </dd>
            <dt>+suffix:</dt>
            <dd>
              <t>+cwt</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t><xref target="CWT"/></t>
            </dd>
            <dt>Encoding Considerations:</dt>
            <dd>
              <t>binary</t>
            </dd>
            <dt>Interoperability Considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Fragment Identifier Considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers specified for +cwt <bcp14>SHOULD</bcp14> be
as specified for <tt>application/cwt</tt>.  (At publication of this document, there
is no fragment identification syntax defined for <tt>application/cwt</tt>.)</t>
            </dd>
            <dt>Security Considerations:</dt>
            <dd>
              <t>See <xref section="8" sectionFormat="of" target="CWT"/></t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org), or IETF Security Area (saag@ietf.org)</t>
            </dd>
            <dt>Author/Change Controller:</dt>
            <dd>
              <t>Remote ATtestation ProcedureS (RATS) Working Group.
The IESG has change control over this registration.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="media-type">
        <name>Media Types</name>
        <t>IANA is requested to add the following media types to the
"Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table align="left" anchor="new-media-type">
          <name>New Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">EAT CWT</td>
              <td align="left">application/eat+cwt</td>
              <td align="left">RFCthis, <xref target="media-type-eat-cwt"/></td>
            </tr>
            <tr>
              <td align="left">EAT JWT</td>
              <td align="left">application/eat+jwt</td>
              <td align="left">RFCthis, <xref target="media-type-eat-jwt"/></td>
            </tr>
            <tr>
              <td align="left">Detached EAT Bundle CBOR</td>
              <td align="left">application/eat-bun+cbor</td>
              <td align="left">RFCthis, <xref target="media-type-deb-cbor"/></td>
            </tr>
            <tr>
              <td align="left">Detached EAT Bundle JSON</td>
              <td align="left">application/eat-bun+json</td>
              <td align="left">RFCthis, <xref target="media-type-deb-json"/></td>
            </tr>
            <tr>
              <td align="left">EAT UCCS</td>
              <td align="left">application/eat-ucs+cbor</td>
              <td align="left">RFCthis, <xref target="media-type-ucs-cbor"/></td>
            </tr>
            <tr>
              <td align="left">EAT UJCS</td>
              <td align="left">application/eat-ucs+json</td>
              <td align="left">RFCthis, <xref target="media-type-ucs-json"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="media-type-eat-cwt">
        <name>application/eat+cwt Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat+cwt</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="seccons"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t><cref>maybe</cref></t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-eat-jwt">
        <name>application/eat+jwt Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat+jwt</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>8bit</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="seccons"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t><cref>maybe</cref></t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-deb-cbor">
        <name>application/eat-bun+cbor Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-bun+cbor</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="seccons"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t><cref>maybe</cref></t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-deb-json">
        <name>application/eat-bun+json Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-bun+json</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>Same as <xref target="RFC7159"/></t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="seccons"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t><cref>maybe</cref></t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-ucs-cbor">
        <name>application/eat-ucs+cbor Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-ucs+cbor</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="seccons"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t><cref>maybe</cref></t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-ucs-json">
        <name>application/eat-ucs+json Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-ucs+json</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>Same as <xref target="RFC7159"/></t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="seccons"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t><cref>maybe</cref></t>
          </dd>
        </dl>
      </section>
      <section anchor="content-format">
        <name>Content-Format</name>
        <aside>
          <t><strong>Issue</strong>: for symmetry reasons we may need a way to pass the profile
information when using content formats too. Early proposal for a new CoAP
option: <xref target="I-D.fossati-core-parametrized-cf"/></t>
        </aside>
        <t>IANA is requested to register a Content-Format number in the
"CoAP Content-Formats" sub-registry, within
the "Constrained RESTful Environments (CoRE) Parameters"
Registry <xref target="IANA.core-parameters"/>, as follows:</t>
        <table align="left">
          <name>New Content-Formats</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/eat+cwt</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat+jwt</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-bun+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD3</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-bun+json</td>
              <td align="left">-</td>
              <td align="left">TBD4</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-ucs+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD5</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-ucs+json</td>
              <td align="left">-</td>
              <td align="left">TBD6</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>TBD1..6 are to be assigned from the space 256..999.</t>
        <t>In the registry as defined by <xref section="12.3" sectionFormat="of" target="CoAP"/> at the time of writing,
the column "Content-Type" is called "Media type" and the column "Content
Coding" is called "Encoding".  <cref anchor="remove">RFC editor: please remove this paragraph.</cref></t>
      </section>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <t><cref anchor="remove-sec">RFC editor: please remove this section</cref></t>
      <section anchor="cl-02">
        <name> -02</name>
        <ul spacing="normal">
          <li>Update references</li>
          <li>Register +cwt SSS
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/14">Issue#14</eref>)</li>
          <li>Move from eat-jwt to eat+jwt
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/14">Issue#14</eref>)</li>
          <li>Move from eat-cwt to eat+cwt
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/14">Issue#14</eref>)</li>
        </ul>
      </section>
      <section anchor="cl-01">
        <name> -01</name>
        <ul spacing="normal">
          <li>Rename <tt>profile</tt> to <tt>eat_profile</tt> for consistency with EAT
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/4">Issue#4</eref>)</li>
          <li>The DEB acronym is gone: shorthand is now "bun" from bundle
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/8">Issue#8</eref>)</li>
          <li>Incorporate editorial suggestions from Carl and Dave
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/7">Issue#7</eref>,
<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/9">Issue#9</eref>)</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="EAT">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="30" month="June" year="2023"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine how much
   it wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-21"/>
        </reference>
        <reference anchor="CWT">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="UCCS">
          <front>
            <title>A CBOR Tag for Unprotected CWT Claims Sets</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="1" month="February" year="2023"/>
            <abstract>
              <t>   CBOR Web Token (CWT, RFC 8392) Claims Sets sometimes do not need the
   protection afforded by wrapping them into COSE, as is required for a
   true CWT.  This specification defines a CBOR tag for such unprotected
   CWT Claims Sets (UCCS) and discusses conditions for its proper use.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-05"/>
        </reference>
        <reference anchor="CoAP">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="MediaTypes">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-type-structured-suffix" target="https://www.iana.org/assignments/media-type-structured-suffix">
          <front>
            <title>Structured Syntax Suffixes</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RATS-Arch">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <referencegroup anchor="BUILD-W-HTTP">
          <reference anchor="RFC9205" target="https://www.rfc-editor.org/info/rfc9205">
            <front>
              <title>Building Protocols with HTTP</title>
              <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
              <date month="June" year="2022"/>
              <abstract>
                <t>Applications often use HTTP as a substrate to create HTTP-based APIs. This document specifies best practices for writing specifications that use HTTP to define new application protocols. It is written primarily to guide IETF efforts to define application protocols using HTTP for deployment on the Internet but might be applicable in other situations.</t>
                <t>This document obsoletes RFC 3205.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="56"/>
            <seriesInfo name="RFC" value="9205"/>
            <seriesInfo name="DOI" value="10.17487/RFC9205"/>
          </reference>
        </referencegroup>
        <reference anchor="REST-IoT">
          <front>
            <title>Guidance on RESTful Design for Internet of Things Systems</title>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Matthias Kovatsch" initials="M." surname="Kovatsch">
              <organization>Siemens</organization>
            </author>
            <author fullname="Klaus Hartke" initials="K." surname="Hartke">
         </author>
            <date day="11" month="January" year="2023"/>
            <abstract>
              <t>   This document gives guidance for designing Internet of Things (IoT)
   systems that follow the principles of the Representational State
   Transfer (REST) architectural style.  This document is a product of
   the IRTF Thing-to-Thing Research Group (T2TRG).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-rest-iot-11"/>
        </reference>
        <reference anchor="RFC4151">
          <front>
            <title>The 'tag' URI Scheme</title>
            <author fullname="T. Kindberg" initials="T." surname="Kindberg"/>
            <author fullname="S. Hawke" initials="S." surname="Hawke"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document describes the "tag" Uniform Resource Identifier (URI) scheme. Tag URIs (also known as "tags") are designed to be unique across space and time while being tractable to humans. They are distinct from most other URIs in that they have no authoritative resolution mechanism. A tag may be used purely as an entity identifier. Furthermore, using tags has some advantages over the common practice of using "http" URIs as identifiers for non-HTTP-accessible resources. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4151"/>
          <seriesInfo name="DOI" value="10.17487/RFC4151"/>
        </reference>
        <reference anchor="I-D.fossati-core-parametrized-cf">
          <front>
            <title>Parametrized Content-Format for CoAP</title>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>arm</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="17" month="October" year="2022"/>
            <abstract>
              <t>   This document specifies a "parametrized" CoAP Content-Format data
   item that allows supplementing a Content-Format with additional media
   type parameters.

   This document also defines two new CoAP Options, Parmetrized-Content-
   Format and Parametrized-Multi-Valued-Accept, that build upon the
   "parametrized" Content-Format data item to work around some of the
   limitations of the existing Accept and Content-Format Options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-core-parametrized-cf-01"/>
        </reference>
      </references>
    </references>
    <?line 648?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thank you
Carl Wallace,
Dave Thaler,
Michael Richardson
for your comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
