<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.25 (Ruby 3.0.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-uccs-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.11.1 -->
  <front>
    <title abbrev="Unprotected CWT Claims Sets">A CBOR Tag for Unprotected CWT Claims Sets</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-02"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="J." surname="O'Donoghue" fullname="Jeremy O'Donoghue">
      <organization abbrev="Qualcomm Technologies Inc.">Qualcomm Technologies Inc.</organization>
      <address>
        <postal>
          <street>279 Farnborough Road</street>
          <city>Farnborough</city>
          <code>GU14 7LS</code>
          <country>United Kingdom</country>
        </postal>
        <email>jodonogh@qti.qualcomm.com</email>
      </address>
    </author>
    <author initials="N." surname="Cam-Winget" fullname="Nancy Cam-Winget">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>3550 Cisco Way</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95134</code>
          <country>USA</country>
        </postal>
        <email>ncamwing@cisco.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Postfach 330440</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2022" month="January" day="12"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>CBOR Web Token (CWT, RFC 8392) Claims Sets sometimes do not need the
protection afforded by wrapping them into COSE, as is required for a true
CWT.  This specification defines a CBOR tag for such unprotected CWT
Claims Sets (UCCS) and discusses conditions for its proper use.</t>
      <t><cref anchor="status">The present version (-01) has a few editorial improvements over
-00 and attempts to address points from Thomas Fossati's
2021-03-16 review, for further discussion at IETF 111.</cref></t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-uccs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-uccs"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>A CBOR Web Token (CWT) as specified by <xref target="RFC8392" format="default"/> is always wrapped in a
CBOR Object Signing and Encryption (COSE, <xref target="RFC8152" format="default"/>) envelope.
COSE provides -- amongst other things -- the end-to-end data origin
authentication and integrity protection employed by RFC 8392 and
optional encryption for CWTs.
Under the right circumstances (<xref target="secchan" format="default"/>),
though, a signature providing proof for authenticity and integrity can be
provided through the transfer protocol and thus omitted from the
information in a CWT without compromising the intended goal of authenticity
and integrity.
In other words, if communicating parties have a pre-existing security
association they can reuse it to provide authenticity and integrity
for their messages, enabling the basic principle of using resources
parsimoniously.
Specifically, if a mutually Secured Channel is established between two
remote peers, and if that Secure Channel provides the required
properties (as discussed below), it is possible to omit the protection
provided by COSE, creating a use case for unprotected CWT Claims Sets.
Similarly, if there is one-way authentication, the party that did not
authenticate may be in a position to send authentication information through
this channel that allows the already authenticated party to authenticate the
other party.</t>
      <t>This specification allocates a CBOR tag to mark Unprotected CWT Claims Sets
(UCCS) as such and discusses conditions for its proper use in the scope of
Remote ATtestation procedureS (RATS) and the conveyance of Evidence from an
Attester to a Verifier.</t>
      <t>This specification does not change <xref target="RFC8392" format="default"/>: A true CWT does not make use of
the tag allocated here; the UCCS tag is an alternative to using COSE
protection and a CWT tag.
Consequently, within the well-defined scope of a secured channel, it
can be acceptable and economic to use the contents of a CWT without
its COSE container and tag it with a UCCS CBOR tag for further
processing within that scope -- or to use the contents of a UCCS CBOR
tag for building a CWT to be signed by some entity that can vouch for
those contents.</t>
      <section anchor="terminology" numbered="true" toc="default">
        <name>Terminology</name>
        <t>The term Claim is used as in <xref target="RFC7519" format="default"/>.</t>
        <t>The terms Claim Key, Claim Value, and CWT Claims Set are used as in
<xref target="RFC8392" format="default"/>.</t>
        <t>The terms Attester, Attesting Environment and Verifier are used as in <xref target="I-D.ietf-rats-architecture" format="default"/>.</t>
        <dl>
          <dt>
UCCS:  </dt>
          <dd>
            <t>Unprotected CWT Claims Set(s); CBOR map(s) of Claims as defined by the CWT
Claims Registry that are composed of pairs of Claim Keys and Claim Values.</t>
          </dd>
          <dt>
Secure Channel:  </dt>
          <dd>
            <t>A protected communication channel between two peers that can ensure the same qualities
associated for UCCS conveyance as CWT conveyance without any additional protection.</t>
          </dd>
        </dl>
        <t>All terms referenced or defined in this section are capitalized in the remainder of
this document.</t>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="example-use-cases" numbered="true" toc="default">
      <name>Example Use Cases</name>
      <t>Use cases involving the conveyance of Claims, in particular, remote attestation procedures (RATS, see
<xref target="I-D.ietf-rats-architecture" format="default"/>) require a standardized data definition and encoding format that can be transferred
and transported using different communication channels.  As these are Claims, <xref target="RFC8392" format="default"/> is
a suitable format. However, the way these Claims are secured depends on the deployment, the security
capabilities of the device, as well as their software stack.  For example, a Claim may be securely
stored and conveyed using a device's Trusted Execution Environment (TEE, see <xref target="I-D.ietf-teep-architecture" format="default"/>) or especially in some
resource constrained environments, the same process that provides the secure communication
transport is also the delegate to compose the Claim to be conveyed.  Whether it is a transfer
or transport, a Secure Channel is presumed to be used for conveying such UCCS.  The following sections
further describe the RATS usage scenario and corresponding requirements for UCCS deployment.</t>
    </section>
    <section anchor="secchan" numbered="true" toc="default">
      <name>Characteristics of a Secure Channel</name>
      <t>A Secure Channel for the conveyance of UCCS needs to provide the security
properties that would otherwise be provided by COSE for a CWT.
In this regard, UCCS is similar in security considerations to JWTs <xref target="RFC8725" format="default"/>
using the algorithm "none".  RFC 8725 states:</t>
      <blockquote>
        <t>[...] if a JWT is cryptographically
protected end-to-end by a transport layer, such as TLS using
cryptographically current algorithms, there may be no need to apply another
layer of cryptographic protections to the JWT.  In such cases, the use of
the "none" algorithm can be perfectly acceptable.</t>
      </blockquote>
      <t>The security considerations discussed, e.g., in Sections <xref target="RFC8725" section="2.1" sectionFormat="bare" format="default"/>, <xref target="RFC8725" section="3.1" sectionFormat="bare" format="default"/>, and <xref target="RFC8725" section="3.2" sectionFormat="bare" format="default"/> of <xref target="RFC8725" format="default"/> apply in an analogous way to the use of UCCS as
elaborated on in this document.</t>
      <t>Secure Channels are often set up in a handshake protocol that mutually
derives a session key, where the handshake protocol establishes the
(identity and thus) authenticity of one or both ends of the communication.
The session key can
then be used to provide confidentiality and integrity of the transfer of
information inside the Secure Channel.  A well-known example of a such a
Secure Channel setup protocol is the TLS <xref target="RFC8446" format="default"/> handshake; the
TLS record protocol can then be used for secure conveyance.</t>
      <t>As UCCS were initially created for use in Remote ATtestation procedureS
(RATS) Secure Channels, the following subsection provides a discussion of
their use in these channels.  Where other environments are intended to be
used to convey UCCS, similar considerations need to be documented before
UCCS can be used.</t>
      <section anchor="uccs-and-remote-attestation-procedures-rats" numbered="true" toc="default">
        <name>UCCS and Remote ATtestation procedureS (RATS)</name>
        <t>For the purposes of this section, the Verifier is the receiver of the UCCS
and the Attester is the provider of the UCCS.</t>
        <t>Secure Channels can be transient in nature. For the purposes of this
specification, the mechanisms used to establish a Secure Channel are out of
scope.</t>
        <t>As a minimum requirement in the scope of RATS Claims, the Verifier <bcp14>MUST</bcp14>
authenticate the Attester as part of the establishment of the Secure Channel.
Furthermore, the channel <bcp14>MUST</bcp14> provide integrity of the communication from the
Attester to the Verifier.
If confidentiality is also required, the receiving side needs to be
authenticated as well; this can be achieved if the Verifier and the Attester
mutually authenticate when establishing the Secure Channel.</t>
        <t>The extent to which a Secure Channel can provide assurances that UCCS
originate from a trustworthy attesting environment depends on the
characteristics of both the cryptographic mechanisms used to establish the
channel and the characteristics of the attesting environment itself.</t>
        <t>A Secure Channel established or maintained using weak cryptography
may not provide the assurance required by a relying party of the authenticity
and integrity of the UCCS.</t>
        <t>Ultimately, it is up to the Verifier's policy to determine whether to accept
a UCCS from the Attester and to the type of Secure Channel it must negotiate.
While the security considerations of the cryptographic algorithms used are similar
to COSE, the considerations of the secure channel should also adhere to the policy
configured at each of the Attester and the Verifier.  However, the policy controls
and definitions are out of scope for this document.</t>
        <t>Where the security assurance required of an attesting environment by a
relying party requires it, the attesting environment may be implemented
using techniques designed to provide enhanced protection from an attacker
wishing to tamper with or forge UCCS.  A possible approach might be to
implement the attesting environment in a hardened environment such as a
TEE <xref target="I-D.ietf-teep-architecture" format="default"/> or a TPM <xref target="TPM2" format="default"/>.</t>
        <t>When UCCS emerge from the Secure Channel and into the Verifier, the security
properties of the Secure Channel no longer apply and UCCS have the same properties
as any other unprotected data in the Verifier environment.
If the Verifier subsequently forwards UCCS, they are treated as though they originated within the Verifier.</t>
        <t>As with EATs nested in other EATs (<xref section="3.20.1.2" sectionFormat="of" target="I-D.ietf-rats-eat" format="default"/>), the Secure
Channel does not endorse fully formed CWTs transferred through it.
Effectively, the COSE envelope of a CWT shields the CWT Claims Set from the
endorsement of the Secure Channel.  (Note that EAT might add a nested UCCS
Claim, and this statement does not apply to UCCS nested into UCCS, only to
fully formed CWTs)</t>
      </section>
      <section anchor="privacy-preserving-channels" numbered="true" toc="default">
        <name>Privacy Preserving Channels</name>
        <t>A Secure Channel which preserves the privacy of the Attester may provide
security properties equivalent to COSE, but only inside the life-span of the
session established.  In general, a Verifier cannot correlate UCCS received
in different sessions from the same attesting environment based on the
cryptographic mechanisms used when a privacy preserving Secure Channel is
employed.</t>
        <t>In the case of a Remote Attestation, the attester must consider whether any UCCS it returns over a privacy
preserving Secure Channel compromises the privacy in unacceptable ways.  As
an example, the use of the EAT UEID <xref target="I-D.ietf-rats-eat" format="default"/> Claim in UCCS over a privacy
preserving Secure Channel allows a verifier to correlate UCCS from a single
attesting environment across many Secure Channel sessions. This may be
acceptable in some use-cases (e.g. if the attesting environment is a
physical sensor in a factory) and unacceptable in others (e.g. if the
attesting environment is a device belonging to a child).</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>In the registry <xref target="IANA.cbor-tags" format="default"/>,
IANA is requested to allocate the tag in <xref target="tab-tag-values" format="default"/> from the
FCFS space, with the present document as the specification reference.</t>
      <table anchor="tab-tag-values" align="center">
        <name>Values for Tags</name>
        <thead>
          <tr>
            <th align="right">Tag</th>
            <th align="left">Data Item</th>
            <th align="left">Semantics</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="right">TBD601</td>
            <td align="left">map</td>
            <td align="left">Unprotected CWT Claims Set [RFCthis]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC8949" format="default"/> apply.
The security considerations of <xref target="RFC8392" format="default"/> need to be applied analogously,
replacing the role of COSE with that of the Secured Channel.</t>
      <t><xref target="secchan" format="default"/> discusses security considerations for Secure Channels, in which
UCCS might be used.
This document provides the CBOR tag definition for UCCS and a discussion
on security consideration for the use of UCCS in
Remote ATtestation procedureS (RATS).  Uses of UCCS outside the scope of
RATS are not covered by this document.  The UCCS specification - and the
use of the UCCS CBOR tag, correspondingly - is not intended for use in a
scope where a scope-specific security consideration discussion has not
been conducted, vetted and approved for that use.</t>
      <section anchor="general-considerations" numbered="true" toc="default">
        <name>General Considerations</name>
        <t>Implementations of Secure Channels are often separate from the application
logic that has security requirements on them.  Similar security
considerations to those described in <xref target="I-D.ietf-cose-rfc8152bis-struct" format="default"/> for obtaining the
required levels of assurance include:</t>
        <ul spacing="normal">
          <li>Implementations need to provide sufficient protection for private or
secret key material used to establish or protect the Secure Channel.</li>
          <li>Using a key for more than one algorithm can leak information about the
key and is not recommended.</li>
          <li>An algorithm used to establish or protect the Secure Channel may have
limits on the number of times that a key can be used without leaking
information about the key.</li>
        </ul>
        <t>The Verifier needs to ensure that the management of key material used
establish or protect the Secure Channel is acceptable. This may include
factors such as:</t>
        <ul spacing="normal">
          <li>Ensuring that any permissions associated with key ownership are respected
in the establishment of the Secure Channel.</li>
          <li>Cryptographic algorithms are used appropriately.</li>
          <li>Key material is used in accordance with any usage restrictions such as
freshness or algorithm restrictions.</li>
          <li>Ensuring that appropriate protections are in place to address potential
traffic analysis attacks.</li>
        </ul>
      </section>
      <section anchor="aes-cbcmac" numbered="true" toc="default">
        <name>AES-CBC_MAC</name>
        <ul spacing="normal">
          <li>A given key should only be used for messages of fixed or known length.</li>
          <li>Different keys should be used for authentication and encryption operations.</li>
          <li>A mechanism to ensure that IV cannot be modified is required.</li>
        </ul>
        <t><xref section="3.2.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="aes-gcm" numbered="true" toc="default">
        <name>AES-GCM</name>
        <ul spacing="normal">
          <li>The key and nonce pair are unique for every encrypted message.</li>
          <li>The maximum number of messages to be encrypted for a given key is not exceeded.</li>
        </ul>
        <t><xref section="4.1.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="aes-ccm" numbered="true" toc="default">
        <name>AES-CCM</name>
        <ul spacing="normal">
          <li>The key and nonce pair are unique for every encrypted message.</li>
          <li>The maximum number of messages to be encrypted for a given block cipher is not exceeded.</li>
          <li>The number of messages both successfully and unsuccessfully decrypted is used to
determine when rekeying is required.</li>
        </ul>
        <t><xref section="4.2.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="chacha20-and-poly1305" numbered="true" toc="default">
        <name>ChaCha20 and Poly1305</name>
        <ul spacing="normal">
          <li>The nonce is unique for every encrypted message.</li>
          <li>The number of messages both successfully and unsuccessfully decrypted is used to
determine when rekeying is required.</li>
        </ul>
        <t><xref section="4.3.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/> contains a detailed explanation of these considerations.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8152" target="https://www.rfc-editor.org/info/rfc8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8725" target="https://www.rfc-editor.org/info/rfc8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="D. Hardt" initials="D." surname="Hardt">
              <organization/>
            </author>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas.  This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-rats-architecture" target="https://www.ietf.org/archive/id/draft-ietf-rats-architecture-14.txt">
          <front>
            <title>Remote Attestation Procedures Architecture</title>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="9" month="December" year="2021"/>
            <abstract>
              <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-14"/>
        </reference>
        <reference anchor="I-D.ietf-teep-architecture" target="https://www.ietf.org/archive/id/draft-ietf-teep-architecture-15.txt">
          <front>
            <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
            <author fullname="Mingliang Pei">
              <organization>Broadcom</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Dave Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="David Wheeler">
              <organization>Amazon</organization>
            </author>
            <date day="12" month="July" year="2021"/>
            <abstract>
              <t>   A Trusted Execution Environment (TEE) is an environment that enforces
   that any code within that environment cannot be tampered with, and
   that any data used by such code cannot be read or tampered with by
   any code outside that environment.  This architecture document
   motivates the design and standardization of a protocol for managing
   the lifecycle of trusted applications running inside such a TEE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teep-architecture-15"/>
        </reference>
        <reference anchor="TPM2">
          <front>
            <title>Trusted Platform Module Library Specification, Family “2.0”, Level 00, Revision 01.59 ed., Trusted Computing Group</title>
            <author>
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat" target="https://www.ietf.org/archive/id/draft-ietf-rats-eat-11.txt">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <date day="24" month="October" year="2021"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides a signed (attested) set of
   claims that describe state and characteristics of an entity,
   typically a device like a phone or an IoT device.  These claims are
   used by a Relying Party to determine how much it wishes to trust the
   entity.

   An EAT is either a CWT or JWT with some attestation-oriented claims.
   To a large degree, all this document does is extend CWT and JWT.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-11"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-struct" target="https://www.ietf.org/archive/id/draft-ietf-cose-rfc8152bis-struct-15.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="1" month="February" year="2021"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   This document defines the CBOR Object Signing and Encryption (COSE)
   protocol.  This specification describes how to create and process
   signatures, message authentication codes, and encryption using CBOR
   for serialization.  This specification additionally describes how to
   represent cryptographic keys using CBOR.

   This document along with [I-D.ietf-cose-rfc8152bis-algs] obsoletes
   RFC8152.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-struct-15"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-algs" target="https://www.ietf.org/archive/id/draft-ietf-cose-rfc8152bis-algs-12.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="24" month="September" year="2020"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   THis document defines a set of algorithms that can be used with the
   CBOR Object Signing and Encryption (COSE) protocol RFC XXXX.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-algs-12"/>
        </reference>
        <reference anchor="RFC8747" target="https://www.rfc-editor.org/info/rfc8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC8693" target="https://www.rfc-editor.org/info/rfc8693">
          <front>
            <title>OAuth 2.0 Token Exchange</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin">
              <organization/>
            </author>
            <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore">
              <organization/>
            </author>
            <date month="January" year="2020"/>
            <abstract>
              <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8693"/>
          <seriesInfo name="DOI" value="10.17487/RFC8693"/>
        </reference>
        <reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt">
              <organization/>
            </author>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
      </references>
    </references>
    <section anchor="cddl" numbered="true" toc="default">
      <name>CDDL</name>
      <t><xref target="RFC8392" format="default"/> does not define CDDL for CWT Claims sets.</t>
      <t>This specification proposes using the definitions in <xref target="fig-claims-set" format="default"/>
for the claims set defined in <xref target="RFC8392" format="default"/>.  Note that these definitions
have been built such that they also can describe <xref target="RFC7519" format="default"/> claims sets by
disabling feature "cbor" and enabling feature "json", but this
flexibility is not the subject of the present specification.</t>
      <figure anchor="fig-claims-set">
        <name>CDDL definition for Claims-Set</name>
        <sourcecode type="cddl"><![CDATA[
Claims-Set = {
 * $$Claims-Set-Claims
 * Claim-Label .feature "extended-claims-label" => any
}
Claim-Label = int / text
string-or-uri = text

$$Claims-Set-Claims //= ( iss-claim-label => string-or-uri  )
$$Claims-Set-Claims //= ( sub-claim-label => string-or-uri  )
$$Claims-Set-Claims //= ( aud-claim-label => string-or-uri  )
$$Claims-Set-Claims //= ( exp-claim-label => ~time )
$$Claims-Set-Claims //= ( nbf-claim-label => ~time )
$$Claims-Set-Claims //= ( iat-claim-label => ~time )
$$Claims-Set-Claims //= ( cti-claim-label => bytes )

iss-claim-label = JC<"iss", 1>
sub-claim-label = JC<"sub", 2>
aud-claim-label = JC<"aud", 3>
exp-claim-label = JC<"exp", 4>
nbf-claim-label = JC<"nbf", 5>
iat-claim-label = JC<"iat", 6>
cti-claim-label = CBOR-ONLY<7>  ; jti in JWT: different name and text

JSON-ONLY<J> = J .feature "json"
CBOR-ONLY<C> = C .feature "cbor"
JC<J,C> = JSON-ONLY<J> / CBOR-ONLY<C>
]]></sourcecode>
      </figure>
      <t>Specifications that define additional claims should also supply
additions to the $$Claims-Set-Claims socket, e.g.:</t>
      <sourcecode type="cddl"><![CDATA[
; [RFC8747]
$$Claims-Set-Claims //= ( 8: CWT-cnf ) ; cnf
CWT-cnf = {
  (1: CWT-COSE-Key) //
  (2: CWT-Encrypted_COSE_Key) //
  (3: CWT-kid)
}

CWT-COSE-Key = COSE_Key
CWT-Encrypted_COSE_Key = COSE_Encrypt / COSE_Encrypt0
CWT-kid = bytes

; [RFC8693]
$$Claims-Set-Claims //= ( 9: CWT-scope ) ; scope
; TO DO: understand what this means:
; scope The scope of an access token as defined in [RFC6749].
; scope 9 byte string or text string [IESG] [RFC8693, Section 4.2]
CWT-scope = bytes / text

; [RFC-ietf-ace-oauth-authz-45, Section 5.10]
$$Claims-Set-Claims //= ( 38: CWT-ace-profile ) ; ace_profile
CWT-ace-profile = $CWT-ACE-Profiles /
  int .feature "ace_profile-extend"
; fill in from IANA registry
;   https://www.iana.org/assignments/ace/ace.xhtml#ace-profiles :
$CWT-ACE-Profiles /= 1 ; coap_dtls

$$Claims-Set-Claims //= ( 39: CWT-cnonce ) ; cnonce
CWT-cnonce = bytes

$$Claims-Set-Claims //= ( 40: CWT-exi ) ; exi
CWT-exi = uint ; in seconds (5.10.3)

;;; insert CDDL from 9052-to-be to complete these CDDL definitions.

]]></sourcecode>
    </section>
    <section anchor="example" numbered="true" toc="default">
      <name>Example</name>
      <t>The example CWT Claims Set from <xref section="A.1" sectionFormat="of" target="RFC8392" format="default"/> can be turned into
an UCCS by enclosing it with a tag number TBD601:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
 <TBD601>(
   {
     / iss / 1: "coap://as.example.com",
     / sub / 2: "erikw",
     / aud / 3: "coap://light.example.com",
     / exp / 4: 1444064944,
     / nbf / 5: 1443944944,
     / iat / 6: 1443944944,
     / cti / 7: h'0b71'
   }
 )
]]></artwork>
      <!--  LocalWords:  Attester Verifier UCCS decrypted rekeying JWT EATs
 -->
<!--  LocalWords:  Verifier's CWTs attester verifier FCFS
 -->

</section>
    <section numbered="false" anchor="acknowledgements" toc="default">
      <name>Acknowledgements</name>
      <t>Laurence Lundblade suggested some improvements to the CDDL.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
