<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-epoch-markers-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-epoch-markers-02"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <postal>
          <country>CH</country>
        </postal>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2025" month="October" day="09"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 91?>

<t>This document defines Epoch Markers as a means to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system known as the Epoch Bell.
Systems receiving Epoch Markers do not need to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a specific Epoch Marker establishes a new epoch that is shared among all recipients.
This document defines Epoch Marker types, including CBOR time tags, RFC 3161 TimeStampToken, and nonce-like structures.
It also defines a CWT Claim to embed Epoch Markers in RFC 8392 CBOR Web Tokens, which serve as vehicles for signed protocol messages.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <?line 100?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="RFC9334"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in distributed systems.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Actors in a system that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock, with these ticks being conveyed over the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.
This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "Epoch ID" values are defined as Epoch Marker types in this document to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While most Epoch Markers types are encoded in CBOR <xref target="STD94"/>, and many of the Epoch ID types are themselves encoded in CBOR, a prominent format in this space is the TimeStampToken (TST) defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
TSTs are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an Epoch ID type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp or the start of a new freshness epoch, respectively, and therefore other Epoch Marker types.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The default top-level structure of Epoch Markers described in this document is CBOR Web Tokens (CWT) <xref target="RFC8392"/>.
The present document specifies an extensible set of Epoch Marker types, along with the <tt>em</tt> CWT claim to include them in CWTs.
CWTs are signed using COSE <xref target="STD96"/> and benefit from wide tool support.
However, CWTs are not the only containers in which Epoch Markers can be embedded.
Epoch Markers can be included in any type of message that allows for the embedding of opaque bytes or CBOR data items.
Examples include the Collection CMW in <xref target="I-D.ietf-lamps-csr-attestation"/>, Evidence formats such as <xref target="TCG-CoEvidence"/> or <xref target="I-D.ietf-rats-eat"/>, Attestation Results formats such as <xref target="I-D.ietf-rats-ar4si"/>, or the CWT Claims Header Parameter of <xref target="I-D.ietf-scitt-architecture"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document makes use of the following terms from other documents:</t>
        <ul spacing="normal">
          <li>
            <t>"conceptual messages" as defined in <xref section="8" sectionFormat="of" target="RFC9334"/></t>
          </li>
          <li>
            <t>"freshness" and "epoch" as defined in <xref section="10" sectionFormat="of" target="RFC9334"/></t>
          </li>
          <li>
            <t>"handle" as defined in <xref section="6" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
          </li>
          <li>
            <t>"Time-Stamp Authority" as defined by <xref target="RFC3161"/></t>
          </li>
        </ul>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use the CBOR Extended Diagnostic Notation (EDN, <xref target="I-D.ietf-cbor-edn-literals"/>).</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in <xref section="10.3" sectionFormat="of" target="RFC9334"/> (the RATS architecture).</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models <xref target="I-D.ietf-rats-reference-interaction-models"/>.
In general, there are three major interaction models used in remote attestation:</t>
      <ul spacing="normal">
        <li>
          <t>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to <xref section="7.1" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
        <li>
          <t>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to <xref section="7.2" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
        <li>
          <t>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to <xref section="7.3" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
      </ul>
      <t>In all three interaction models, Epoch Markers can be used as content for the generic information element <tt>handle</tt> as introduced by <xref target="I-D.ietf-rats-reference-interaction-models"/>.
Handles are used to establish freshness in ad-hoc, unsolicited, and solicited distribution mechanisms of an Epoch Bell.
For example, an Epoch Marker can be used as a nonce in challenge-response remote attestation (e.g., for limiting the number of ad-hoc requests by a Verifier).
If embedded in a CWT, an Epoch Marker can be used as a <tt>handle</tt> by extracting the value of the <tt>em</tt> Claim or by using the complete CWT including an <tt>em</tt> Claim (e.g., functioning as a signed time-stamp token).
Using an Epoch Marker requires the challenger to acquire an Epoch Marker beforehand, which may introduce a sensible overhead compared to using a simple nonce.</t>
    </section>
    <section anchor="sec-epoch-markers">
      <name>Epoch Marker Structure</name>
      <t>Epoch Markers are tagged CBOR data items.
As a default, Epoch Markers are transported via the <tt>em</tt> Claim in CWTs.
In cases of challenge-response interactions that employ a nonce to show recentness, the <tt>em</tt> Claim can be paired with a <tt>Nonce</tt> Claim to bind the nonce with the Epoch Marker as a response message in an ad-hoc request.
This in fact means that it is possible to request an Epoch Marker via a challenge-response interaction using a nonce to then use the received CWT or the Epoch Marker included as a different nonce in a separate RATS reference interaction model.</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker types (tag numbers 2698x are suggested, not yet allocated)</name>
        <artwork type="cddl" align="left"><![CDATA[
epoch-marker = $tagged-epoch-id

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-time
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(epoch-tick)
$tagged-epoch-id /= #6.26983(epoch-tick-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
]]></artwork>
      </figure>
      <figure anchor="fig-epoch-marker-cwt">
        <name>Epoch Marker as a CWT Claim (CWT claim number 2000 is suggested, not yet allocated)</name>
        <artwork type="cddl" align="left"><![CDATA[
$$Claims-Set-Claims //= (&(em: 2000) => epoch-marker)
]]></artwork>
      </figure>
      <section anchor="epoch-payloads">
        <name>Epoch Marker Types</name>
        <t>This specification comes with a set of predefined Epoch Marker types.</t>
        <section anchor="cbor-time-tags">
          <name>CBOR Time Tags</name>
          <t>CBOR Time Tags are CBOR time representations choosing from CBOR tag 0 (<tt>tdate</tt>, RFC3339 time as a string), tag 1 (<tt>time</tt>, Posix time as int or float), or tag 1001 (extended time data item).</t>
          <sourcecode type="cddl"><![CDATA[
cbor-time = tdate / time / etime

etime = #6.1001({* (int/tstr) => any})
]]></sourcecode>
          <t>The CBOR Time Tag represents a freshly sourced timestamp represented as either <tt>time</tt> or <tt>tdate</tt>
(Sections <xref target="RFC8949" section="3.4.2" sectionFormat="bare"/> and <xref target="RFC8949" section="3.4.1" sectionFormat="bare"/> of RFC 8949 <xref target="STD94"/>, <xref section="D" sectionFormat="of" target="RFC8610"/>), or <tt>etime</tt> (<xref section="3" sectionFormat="of" target="RFC9581"/>).</t>
          <section anchor="creation">
            <name>Creation</name>
            <t>To generate the cbor-time value, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-time-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="cddl"><![CDATA[
classical-rfc3161-TST-info = bytes
]]></sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl>
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The DER-encoded TSTInfo generated by a <xref target="RFC3161"/> Time Stamping Authority.</t>
            </dd>
          </dl>
          <section anchor="creation-1">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as MessageImprint in its request to the TSA:</t>
            <sourcecode type="asn.1"><![CDATA[
SEQUENCE {
  SEQUENCE {
    OBJECT      2.16.840.1.101.3.4.2.1 (sha256)
    NULL
  }
  OCTET STRING
    BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F
}
]]></sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
            <t>The TimeStampToken obtained from the TSA <bcp14>MUST</bcp14> be stripped of the TSA signature.
Only the TSTInfo is to be kept the rest <bcp14>MUST</bcp14> be discarded.
The Epoch Bell COSE signature will replace the TSA signature.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t><cref anchor="issue">Issue tracked at:</cref> https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker/issues/18</t>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical <xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="cddl"><![CDATA[
TST-info-based-on-CBOR-time-tag = {
  &(version : 0) => v1
  &(policy : 1) => oid
  &(messageImprint : 2) => MessageImprint
  &(serialNumber : 3) => integer
  &(eTime : 4) => profiled-etime
  ? &(ordering : 5) => bool .default false
  ? &(nonce : 6) => integer
  ? &(tsa : 7) => GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 => ~time
  ? -8 => profiled-duration
  * int => any
}
profiled-duration = {* int => any}

GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]
; See Section 4.2.1.6 of RFC 5280 for type/value
]]></sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's policy under which the tst-info was produced.
Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.
Cf. messageImprint, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.
Cf. serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.
Cf. genTime, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="RFC9581"/>, indicated by CBOR tag 1001, profiled as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>
              <t>The "base time" is encoded using key 1, indicating Posix time as int or float.</t>
            </li>
            <li>
              <t>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time". The duration map
is profiled to disallow string keys. This is an optional field.</t>
            </li>
            <li>
              <t>The map <bcp14>MAY</bcp14> also contain one or more integer keys, which may encode
supplementary information <cref anchor="tf1">Allowing unsigned integer (i.e., critical) keys goes counter interoperability</cref>.</t>
            </li>
          </ul>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely based on the "base time".
This is an optional field, whose default value is "false".
Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.
Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint in identifying the name of the TSA.
Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data format.
Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.
Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
          <section anchor="creation-2">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as messageImprint in its request to the TSA:</t>
            <sourcecode type="cbor-diag"><![CDATA[
[
    / hashAlg   / -16, / sha-256 /
    / hashValue / h'BF4EE9143EF2329B1B778974AAD44506
                    4940B9CAE373C9E35A7B23361282698F'
]
]]></sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick">
          <name>Epoch Tick</name>
          <t>An Epoch Tick is a single opaque blob sent to multiple consumers.</t>
          <sourcecode type="cddl"><![CDATA[
; Epoch-Tick

epoch-tick = tstr / bstr / int
]]></sourcecode>
          <t>The following describes the epoch-tick type.</t>
          <dl>
            <dt>epoch-tick:</dt>
            <dd>
              <t>Either a string, a byte string, or an integer used by RATS roles within a trust domain as extra data (<tt>handle</tt>) included in conceptual messages <xref target="RFC9334"/>. Similarly to the use of nonces, this allows the conceptual messages to be associated with a certain epoch. However, unlike nonces (which require uniqueness), Epoch Markers can be used in multiple interactions by every consumer involved.</t>
            </dd>
          </dl>
          <section anchor="creation-3">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick-list">
          <name>Epoch Tick List</name>
          <t>A list of Epoch Ticks sent to multiple consumers.
The consumers use each Epoch Tick in the list sequentially.
Similarly to the use of nonces, this allows each interaction to be associated with a certain epoch. However, unlike nonces (which require uniqueness), Epoch Markers can be used in multiple interactions by every consumer involved.</t>
          <sourcecode type="cddl"><![CDATA[
; Epoch-Tick-List

epoch-tick-list = [ + epoch-tick ]
]]></sourcecode>
          <t>The following describes the Epoch Tick List type.</t>
          <dl>
            <dt>epoch-tick-list:</dt>
            <dd>
              <t>A sequence of byte strings used by RATS roles in trust domain as extra data (<tt>handle</tt>) in the generation of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch.
Each Epoch Tick in the list is used in a consecutive generation of a conceptual message.
Asserting freshness of a conceptual message including an Epoch Tick from the epoch-tick-list requires some state on the receiver side to assess if that Epoch Tick is the appropriate next unused Epoch Tick from the epoch-tick-list.</t>
            </dd>
          </dl>
          <section anchor="creation-4">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch Bell.</t>
          <sourcecode type="cddl"><![CDATA[
strictly-monotonic-counter = uint
]]></sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl>
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="sec-time-reqs">
        <name>Time Requirements</name>
        <t>Time <bcp14>MUST</bcp14> be sourced from a trusted clock (see <xref section="10.1" sectionFormat="of" target="RFC9334"/>).</t>
      </section>
      <section anchor="sec-nonce-reqs">
        <name>Nonce Requirements</name>
        <t>A nonce value used in a protocol or message to retrieve an Epoch Marker <bcp14>MUST</bcp14> be freshly generated.
The generated value <bcp14>MUST</bcp14> have at least 64 bits of entropy (before encoding).
The generated value <bcp14>MUST</bcp14> be generated via a cryptographically secure random number generator.</t>
        <t>A maximum nonce size of 512 bits is set to limit the memory requirements.
All receivers <bcp14>MUST</bcp14> be able to accommodate the maximum size.</t>
      </section>
    </section>
    <section anchor="sec-signature-reqs">
      <name>Signature Requirements</name>
      <t>The signature over an Epoch Marker <bcp14>MUST</bcp14> be generated by the Epoch Bell.
Conversely, applying the first signature to an Epoch Marker always makes the issuer of a signed message containing an Epoch Marker an Epoch Bell.</t>
    </section>
    <section anchor="sec-seccons">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR representation of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-epoch-tick"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-epoch-tick-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-iana-em-claim">
        <name> New EM CWT Claim</name>
        <t>This specification adds the following value to the "CBOR Web Token Claims" registry <xref target="IANA.cwt"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: em</t>
          </li>
          <li>
            <t>Claim Description: Epoch Marker</t>
          </li>
          <li>
            <t>Claim Key: 2000 (IANA: suggested assignment)</t>
          </li>
          <li>
            <t>Claim Value Type(s): CBOR array</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="sec-epoch-markers"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="new-media-type-applicationemcbor">
        <name>New Media Type <tt>application/em+cbor</tt></name>
        <t>IANA is requested to add the <tt>application/epoch-marker+cbor</tt> media types to the "Media Types" registry <xref target="IANA.media-types"/>, using the following template:</t>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>epoch-marker+cbor</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>no</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>no</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="sec-seccons"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>RATS Attesters, Verifiers, Endorsers and Reference-Value providers, and Relying Parties that need to transfer Epoch Markers payloads over HTTP(S), CoAP(S), and other transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="new-coap-content-format">
        <name>New CoAP Content-Format</name>
        <t>IANA is requested to register the following Content-Format ID in the "CoAP Content-Formats" registry, within the "Constrained RESTful Environments (CoRE) Parameters" registry group <xref target="IANA.core-parameters"/>:</t>
        <table align="left">
          <name>New CoAP Content Format</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/epoch-marker+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>If possible, TBD1 should be assigned in the 256..9999 range.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3161"/>
          <seriesInfo name="DOI" value="10.17487/RFC3161"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9054"/>
          <seriesInfo name="DOI" value="10.17487/RFC9054"/>
        </reference>
        <referencegroup anchor="STD94" target="https://www.rfc-editor.org/info/std94">
          <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
            <front>
              <title>Concise Binary Object Representation (CBOR)</title>
              <author fullname="C. Bormann" initials="C." surname="Bormann"/>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="December" year="2020"/>
              <abstract>
                <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
                <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="94"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD96" target="https://www.rfc-editor.org/info/std96">
          <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="August" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
                <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
          </reference>
          <reference anchor="RFC9338" target="https://www.rfc-editor.org/info/rfc9338">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="December" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9338"/>
            <seriesInfo name="DOI" value="10.17487/RFC9338"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9581">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="B. Gamari" initials="B." surname="Gamari"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <date month="August" year="2024"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR, RFC 8949) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>In CBOR, one point of extensibility is the definition of CBOR tags. RFC 8949 defines two tags for time: CBOR tag 0 (RFC 3339 time as a string) and tag 1 (POSIX time as int or float). Since then, additional requirements have become known. The present document defines a CBOR tag for time that allows a more elaborate representation of time, as well as related CBOR tags for duration and time period. This document is intended as the reference document for the IANA registration of the CBOR tags defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9581"/>
          <seriesInfo name="DOI" value="10.17487/RFC9581"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA 1.0, RPKI,
   GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles.
   C509 is deployed in different settings including, in-vehicle and
   vehicle-to-cloud communication, Unmanned Aircraft Systems (UAS), and
   Global Navigation Satellite System (GNSS).  When used to re-encode
   DER encoded X.509 certificates, the CBOR encoding can in many cases
   reduce the size of RFC 7925 profiled certificates by over 50% while
   also significantly reducing memory and code size compared to ASN.1.
   The CBOR encoded structure can alternatively be signed directly
   ("natively signed"), which does not require re-encoding for the
   signature to be verified.  The TLSA selectors registry defined in RFC
   6698 is extended to include C509 certificates.  The document also
   specifies C509 Certificate Requests, C509 COSE headers, a C509 TLS
   certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-15"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present -18
   // corrects a few omissions from -17; it is not intended to make
   // technical changes from -17.  It is intended for use as an input
   // document for the CBOR WG meeting at IETF 123.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-18"/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T" value="Recommendation X.690"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS) [RFC9334].  Three conveying mechanisms --
   Challenge/Response, Uni-Directional, and Streaming Remote Attestation
   -- are illustrated and defined.  Analogously, a general overview
   about the information elements typically used by corresponding
   conveyance protocols are highlighted.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-14"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-21"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="5" month="October" year="2025"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of RATS conceptual messages (see Section 8 of
   [RFC9334], such as Evidence, Endorsements and Attestation Results, in
   Certificate Signing Requests (CSRs), such as PKCS#10 or Certificate
   Request Message Format (CRMF) payloads.  This provides an elegant and
   automatable mechanism for transporting attestation data to a
   Certification Authority.

   Including Evidence, Endorsements and Attestation Results along with a
   CSR can help to improve the assessment of the security posture for
   the private key, and can help the Certification Authority to assess
   whether it satisfies the requested certificate profile.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-21"/>
        </reference>
        <reference anchor="TCG-CoEvidence" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Concise-Evidence-Binding-for-SPDM-Version-1.0-Revision-53_1August2023.pdf">
          <front>
            <title>TCG DICE Concise Evidence Binding for SPDM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2023" month="June"/>
          </front>
          <refcontent>Version 1.00</refcontent>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="15" month="August" year="2025"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-09"/>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
    </references>
    <?line 554?>

<section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an Epoch Marker with an <tt>etime</tt> as the Epoch Marker type.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR Epoch Marker based on `etime` (EDN)</name>
        <artwork type="cbor-diag" align="center"><![CDATA[
/ epoch-marker for
  1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
/ etime / 1001({
    1: 851042397,
  -10: "America/Los_Angeles",
  -11: { "u-ca": "hebrew" }
})
]]></artwork>
      </figure>
      <t>The encoded data item in CBOR pretty-printed form (hex with comments) is shown in <xref target="fig-ex-1-pretty"/>.</t>
      <figure anchor="fig-ex-1-pretty">
        <name>CBOR Epoch Marker based on `etime` (pretty hex)</name>
        <artwork type="cbor-pretty" align="center"><![CDATA[
d9 03e9                                 # tag(1001)
   a3                                   # map(3)
      01                                # unsigned(1)
      1a 32b9e05d                       # unsigned(851042397)
      29                                # negative(9)
      73                                # text(19)
         416d65726963612f4c6f735f416e67656c6573 # "America/Los_Angeles"
      2a                                # negative(10)
      a1                                # map(1)
         64                             # text(4)
            752d6361                    # "u-ca"
         66                             # text(6)
            686562726577                # "hebrew"
]]></artwork>
      </figure>
      <t>The example in <xref target="fig-ex-2"/> shows a CWT-signed Epoch Marker with <tt>epoch-tick</tt> as the Epoch Marker type.</t>
      <figure anchor="fig-ex-2">
        <name>CWT Epoch Marker based on `epoch-tick` (EDN)</name>
        <artwork type="cbor-diag" align="center"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

18([
  / protected / << {
    / alg / 1: -7 / ECDSA 256 /
  } >>,
  / unprotected / {},
  / payload / << {
    / iss / 1 : "ACME epoch bell", 
    / aud / 3 : "ACME protocol clients",
    / epoch marker / 2000: 26982(h'\
   482e829ad29ac6ea6eda2d47d1d93a002bf41d9d88710ba972c36e59038f78b3')
    / nbf / 5 : 1757929800,
    / exp / 4 : 1757929860
  } >>,
  / signature / h'face5190'
])
]]></artwork>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depicts the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="asn.1"><![CDATA[
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
]]></sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thank you <contact fullname="Ionuț Mihalcea"/>, for your fixes and improvements.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
