<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-uccs-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="Unprotected CWT Claims Sets">A CBOR Tag for Unprotected CWT Claims Sets</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-03"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="J." surname="O'Donoghue" fullname="Jeremy O'Donoghue">
      <organization abbrev="Qualcomm Technologies Inc.">Qualcomm Technologies Inc.</organization>
      <address>
        <postal>
          <street>279 Farnborough Road</street>
          <city>Farnborough</city>
          <code>GU14 7LS</code>
          <country>United Kingdom</country>
        </postal>
        <email>jodonogh@qti.qualcomm.com</email>
      </address>
    </author>
    <author initials="N." surname="Cam-Winget" fullname="Nancy Cam-Winget">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>3550 Cisco Way</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95134</code>
          <country>USA</country>
        </postal>
        <email>ncamwing@cisco.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Postfach 330440</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2022" month="July" day="11"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>CBOR Web Token (CWT, RFC 8392) Claims Sets sometimes do not need the
protection afforded by wrapping them into COSE, as is required for a true
CWT.  This specification defines a CBOR tag for such unprotected CWT
Claims Sets (UCCS) and discusses conditions for its proper use.</t>
      <!-- 
[^status]

[^status]:
    The present version (-03) 
 -->



    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-uccs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-uccs"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A CBOR Web Token (CWT) as specified by <xref target="RFC8392"/> is always wrapped in a
CBOR Object Signing and Encryption (COSE, <xref target="RFC8152"/>) envelope.
COSE provides -- amongst other things -- the end-to-end data origin
authentication and integrity protection employed by RFC 8392 and
optional encryption for CWTs.
Under the right circumstances (<xref target="secchan"/>),
though, a signature providing proof for authenticity and integrity can be
provided through the transfer protocol and thus omitted from the
information in a CWT without compromising the intended goal of authenticity
and integrity.
In other words, if communicating parties have a pre-existing security
association they can reuse it to provide authenticity and integrity
for their messages, enabling the basic principle of using resources
parsimoniously.
Specifically, if a mutually Secured Channel is established between two
remote peers, and if that Secure Channel provides the required
properties (as discussed below), it is possible to omit the protection
provided by COSE, creating a use case for unprotected CWT Claims Sets.
Similarly, if there is one-way authentication, the party that did not
authenticate may be in a position to send authentication information through
this channel that allows the already authenticated party to authenticate the
other party.</t>
      <t>This specification allocates a CBOR tag to mark Unprotected CWT Claims Sets
(UCCS) as such and discusses conditions for its proper use in the scope of
Remote ATtestation procedureS (RATS) and the conveyance of Evidence from an
Attester to a Verifier.</t>
      <t>This specification does not change <xref target="RFC8392"/>: A true CWT does not make use of
the tag allocated here; the UCCS tag is an alternative to using COSE
protection and a CWT tag.
Consequently, within the well-defined scope of a secured channel, it
can be acceptable and economic to use the contents of a CWT without
its COSE container and tag it with a UCCS CBOR tag for further
processing within that scope -- or to use the contents of a UCCS CBOR
tag for building a CWT to be signed by some entity that can vouch for
those contents.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The term Claim is used as in <xref target="RFC7519"/>.</t>
        <t>The terms Claim Key, Claim Value, and CWT Claims Set are used as in
<xref target="RFC8392"/>.</t>
        <t>The terms Attester, Attesting Environment and Verifier are used as in <xref target="I-D.ietf-rats-architecture"/>.</t>
        <dl>
          <dt>UCCS:</dt>
          <dd>
            <t>Unprotected CWT Claims Set(s); CBOR map(s) of Claims as defined by the CWT
Claims Registry that are composed of pairs of Claim Keys and Claim Values.</t>
          </dd>
          <dt>Secure Channel:</dt>
          <dd>
            <t>A protected communication channel between two peers that can ensure the same qualities
associated for UCCS conveyance as CWT conveyance without any additional protection.</t>
          </dd>
        </dl>
        <t>All terms referenced or defined in this section are capitalized in the remainder of
this document.</t>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="example-use-cases">
      <name>Example Use Cases</name>
      <t>Use cases involving the conveyance of Claims, in particular, remote attestation procedures (RATS, see
<xref target="I-D.ietf-rats-architecture"/>) require a standardized data definition and encoding format that can be transferred
and transported using different communication channels.  As these are Claims, <xref target="RFC8392"/> is
a suitable format. However, the way these Claims are secured depends on the deployment, the security
capabilities of the device, as well as their software stack.  For example, a Claim may be securely
stored and conveyed using a device's Trusted Execution Environment (TEE, see <xref target="I-D.ietf-teep-architecture"/>) or especially in some
resource constrained environments, the same process that provides the secure communication
transport is also the delegate to compose the Claim to be conveyed.  Whether it is a transfer
or transport, a Secure Channel is presumed to be used for conveying such UCCS.  The following sections
further describe the RATS usage scenario and corresponding requirements for UCCS deployment.</t>
    </section>
    <section anchor="secchan">
      <name>Characteristics of a Secure Channel</name>
      <t>A Secure Channel for the conveyance of UCCS needs to provide the security
properties that would otherwise be provided by COSE for a CWT.
In this regard, UCCS is similar in security considerations to JWTs <xref target="RFC8725"/>
using the algorithm "none".  RFC 8725 states:</t>
      <blockquote>
        <t>[...] if a JWT is cryptographically
protected end-to-end by a transport layer, such as TLS using
cryptographically current algorithms, there may be no need to apply another
layer of cryptographic protections to the JWT.  In such cases, the use of
the "none" algorithm can be perfectly acceptable.</t>
      </blockquote>
      <t>The security considerations discussed, e.g., in Sections <xref target="RFC8725" section="2.1" sectionFormat="bare"/>, <xref target="RFC8725" section="3.1" sectionFormat="bare"/>, and <xref target="RFC8725" section="3.2" sectionFormat="bare"/> of <xref target="RFC8725"/> apply in an analogous way to the use of UCCS as
elaborated on in this document.</t>
      <t>Secure Channels are often set up in a handshake protocol that mutually
derives a session key, where the handshake protocol establishes the
(identity and thus) authenticity of one or both ends of the communication.
The session key can
then be used to provide confidentiality and integrity of the transfer of
information inside the Secure Channel.  A well-known example of a such a
Secure Channel setup protocol is the TLS <xref target="RFC8446"/> handshake; the
TLS record protocol can then be used for secure conveyance.</t>
      <t>As UCCS were initially created for use in Remote ATtestation procedureS
(RATS) Secure Channels, the following subsection provides a discussion of
their use in these channels.  Where other environments are intended to be
used to convey UCCS, similar considerations need to be documented before
UCCS can be used.</t>
      <section anchor="uccs-and-remote-attestation-procedures-rats">
        <name>UCCS and Remote ATtestation procedureS (RATS)</name>
        <t>For the purposes of this section, the Verifier is the receiver of the UCCS
and the Attester is the provider of the UCCS.</t>
        <t>Secure Channels can be transient in nature. For the purposes of this
specification, the mechanisms used to establish a Secure Channel are out of
scope.</t>
        <t>As a minimum requirement in the scope of RATS Claims, the Verifier <bcp14>MUST</bcp14>
authenticate the Attester as part of the establishment of the Secure Channel.
Furthermore, the channel <bcp14>MUST</bcp14> provide integrity of the communication from the
Attester to the Verifier.
If confidentiality is also required, the receiving side needs to be
authenticated as well; this can be achieved if the Verifier and the Attester
mutually authenticate when establishing the Secure Channel.</t>
        <t>The extent to which a Secure Channel can provide assurances that UCCS
originate from a trustworthy attesting environment depends on the
characteristics of both the cryptographic mechanisms used to establish the
channel and the characteristics of the attesting environment itself.</t>
        <t>A Secure Channel established or maintained using weak cryptography
may not provide the assurance required by a relying party of the authenticity
and integrity of the UCCS.</t>
        <t>Ultimately, it is up to the Verifier's policy to determine whether to accept
a UCCS from the Attester and to the type of Secure Channel it must negotiate.
While the security considerations of the cryptographic algorithms used are similar
to COSE, the considerations of the secure channel should also adhere to the policy
configured at each of the Attester and the Verifier.  However, the policy controls
and definitions are out of scope for this document.</t>
        <t>Where the security assurance required of an attesting environment by a
relying party requires it, the attesting environment may be implemented
using techniques designed to provide enhanced protection from an attacker
wishing to tamper with or forge UCCS.  A possible approach might be to
implement the attesting environment in a hardened environment such as a
TEE <xref target="I-D.ietf-teep-architecture"/> or a TPM <xref target="TPM2"/>.</t>
        <t>When UCCS emerge from the Secure Channel and into the Verifier, the security
properties of the Secure Channel no longer apply and UCCS have the same properties
as any other unprotected data in the Verifier environment.
If the Verifier subsequently forwards UCCS, they are treated as though they originated within the Verifier.</t>
        <t>As with EATs nested in other EATs (Section <xref target="I-D.ietf-rats-eat" section="4.2.19.1.2" sectionFormat="bare">Nested Token</xref> of <xref target="I-D.ietf-rats-eat"/>), the Secure
Channel does not endorse fully formed CWTs transferred through it.
Effectively, the COSE envelope of a CWT shields the CWT Claims Set from the
endorsement of the Secure Channel.  (Note that EAT might add a nested UCCS
Claim, and this statement does not apply to UCCS nested into UCCS, only to
fully formed CWTs)</t>
      </section>
      <section anchor="privacy-preserving-channels">
        <name>Privacy Preserving Channels</name>
        <t>A Secure Channel which preserves the privacy of the Attester may provide
security properties equivalent to COSE, but only inside the life-span of the
session established.  In general, a Verifier cannot correlate UCCS received
in different sessions from the same attesting environment based on the
cryptographic mechanisms used when a privacy preserving Secure Channel is
employed.</t>
        <t>In the case of a Remote Attestation, the attester must consider whether any UCCS it returns over a privacy
preserving Secure Channel compromises the privacy in unacceptable ways.  As
an example, the use of the EAT UEID <xref target="I-D.ietf-rats-eat"/> Claim in UCCS over a privacy
preserving Secure Channel allows a verifier to correlate UCCS from a single
attesting environment across many Secure Channel sessions. This may be
acceptable in some use-cases (e.g. if the attesting environment is a
physical sensor in a factory) and unacceptable in others (e.g. if the
attesting environment is a device belonging to a child).</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>In the registry <xref target="IANA.cbor-tags"/>,
IANA is requested to allocate the tag in <xref target="tab-tag-values"/> from the
FCFS space, with the present document as the specification reference.</t>
      <table anchor="tab-tag-values">
        <name>Values for Tags</name>
        <thead>
          <tr>
            <th align="right">Tag</th>
            <th align="left">Data Item</th>
            <th align="left">Semantics</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="right">TBD601</td>
            <td align="left">map</td>
            <td align="left">Unprotected CWT Claims Set [RFCthis]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC8949"/> apply.
The security considerations of <xref target="RFC8392"/> need to be applied analogously,
replacing the role of COSE with that of the Secured Channel.</t>
      <t><xref target="secchan"/> discusses security considerations for Secure Channels, in which
UCCS might be used.
This document provides the CBOR tag definition for UCCS and a discussion
on security consideration for the use of UCCS in
Remote ATtestation procedureS (RATS).  Uses of UCCS outside the scope of
RATS are not covered by this document.  The UCCS specification - and the
use of the UCCS CBOR tag, correspondingly - is not intended for use in a
scope where a scope-specific security consideration discussion has not
been conducted, vetted and approved for that use.</t>
      <section anchor="general-considerations">
        <name>General Considerations</name>
        <t>Implementations of Secure Channels are often separate from the application
logic that has security requirements on them.  Similar security
considerations to those described in <xref target="I-D.ietf-cose-rfc8152bis-struct"/> for obtaining the
required levels of assurance include:</t>
        <ul spacing="normal">
          <li>Implementations need to provide sufficient protection for private or
secret key material used to establish or protect the Secure Channel.</li>
          <li>Using a key for more than one algorithm can leak information about the
key and is not recommended.</li>
          <li>An algorithm used to establish or protect the Secure Channel may have
limits on the number of times that a key can be used without leaking
information about the key.</li>
        </ul>
        <t>The Verifier needs to ensure that the management of key material used
establish or protect the Secure Channel is acceptable. This may include
factors such as:</t>
        <ul spacing="normal">
          <li>Ensuring that any permissions associated with key ownership are respected
in the establishment of the Secure Channel.</li>
          <li>Cryptographic algorithms are used appropriately.</li>
          <li>Key material is used in accordance with any usage restrictions such as
freshness or algorithm restrictions.</li>
          <li>Ensuring that appropriate protections are in place to address potential
traffic analysis attacks.</li>
        </ul>
      </section>
      <section anchor="aes-cbcmac">
        <name>AES-CBC_MAC</name>
        <ul spacing="normal">
          <li>A given key should only be used for messages of fixed or known length.</li>
          <li>Different keys should be used for authentication and encryption operations.</li>
          <li>A mechanism to ensure that IV cannot be modified is required.</li>
        </ul>
        <t><xref section="3.2.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="aes-gcm">
        <name>AES-GCM</name>
        <ul spacing="normal">
          <li>The key and nonce pair are unique for every encrypted message.</li>
          <li>The maximum number of messages to be encrypted for a given key is not exceeded.</li>
        </ul>
        <t><xref section="4.1.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="aes-ccm">
        <name>AES-CCM</name>
        <ul spacing="normal">
          <li>The key and nonce pair are unique for every encrypted message.</li>
          <li>The maximum number of messages to be encrypted for a given block cipher is not exceeded.</li>
          <li>The number of messages both successfully and unsuccessfully decrypted is used to
determine when rekeying is required.</li>
        </ul>
        <t><xref section="4.2.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="chacha20-and-poly1305">
        <name>ChaCha20 and Poly1305</name>
        <ul spacing="normal">
          <li>The nonce is unique for every encrypted message.</li>
          <li>The number of messages both successfully and unsuccessfully decrypted is used to
determine when rekeying is required.</li>
        </ul>
        <t><xref section="4.3.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/> contains a detailed explanation of these considerations.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8152" target="https://www.rfc-editor.org/info/rfc8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8725" target="https://www.rfc-editor.org/info/rfc8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="D. Hardt" initials="D." surname="Hardt">
              <organization/>
            </author>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas.  This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization abbrev="IANA">Internet Assigned Numbers Authority</organization>
            </author>
            <date day="19" month="September" year="2013"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-rats-architecture" target="https://www.ietf.org/archive/id/draft-ietf-rats-architecture-18.txt">
          <front>
            <title>Remote Attestation Procedures Architecture</title>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="14" month="June" year="2022"/>
            <abstract>
              <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-18"/>
        </reference>
        <reference anchor="I-D.ietf-teep-architecture" target="https://www.ietf.org/archive/id/draft-ietf-teep-architecture-17.txt">
          <front>
            <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
            <author fullname="Mingliang Pei">
              <organization>Broadcom</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Dave Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="David Wheeler">
              <organization>Amazon</organization>
            </author>
            <date day="19" month="April" year="2022"/>
            <abstract>
              <t>   A Trusted Execution Environment (TEE) is an environment that enforces
   that any code within that environment cannot be tampered with, and
   that any data used by such code cannot be read or tampered with by
   any code outside that environment.  This architecture document
   motivates the design and standardization of a protocol for managing
   the lifecycle of trusted applications running inside such a TEE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teep-architecture-17"/>
        </reference>
        <reference anchor="TPM2">
          <front>
            <title>Trusted Platform Module Library Specification, Family “2.0”, Level 00, Revision 01.59 ed., Trusted Computing Group</title>
            <author>
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat" target="https://www.ietf.org/archive/id/draft-ietf-rats-eat-14.txt">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <date day="10" month="July" year="2022"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a phone, IoT device, network equipment or such.  This claims set is
   used by a relying party, server or service to determine how much it
   wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.  To a large degree, all this document
   does is extend CWT and JWT.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-14"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-struct" target="https://www.ietf.org/archive/id/draft-ietf-cose-rfc8152bis-struct-15.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="1" month="February" year="2021"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   This document defines the CBOR Object Signing and Encryption (COSE)
   protocol.  This specification describes how to create and process
   signatures, message authentication codes, and encryption using CBOR
   for serialization.  This specification additionally describes how to
   represent cryptographic keys using CBOR.

   This document along with [I-D.ietf-cose-rfc8152bis-algs] obsoletes
   RFC8152.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-struct-15"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-algs" target="https://www.ietf.org/archive/id/draft-ietf-cose-rfc8152bis-algs-12.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="24" month="September" year="2020"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   THis document defines a set of algorithms that can be used with the
   CBOR Object Signing and Encryption (COSE) protocol RFC XXXX.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-algs-12"/>
        </reference>
        <reference anchor="RFC8747" target="https://www.rfc-editor.org/info/rfc8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC8693" target="https://www.rfc-editor.org/info/rfc8693">
          <front>
            <title>OAuth 2.0 Token Exchange</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="A. Nadalin" initials="A." surname="Nadalin">
              <organization/>
            </author>
            <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore">
              <organization/>
            </author>
            <date month="January" year="2020"/>
            <abstract>
              <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8693"/>
          <seriesInfo name="DOI" value="10.17487/RFC8693"/>
        </reference>
        <reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt">
              <organization/>
            </author>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
      </references>
    </references>
    <section anchor="cddl">
      <name>CDDL</name>
      <t><xref target="RFC8392"/> does not define CDDL for CWT Claims sets.</t>
      <t>This specification proposes using the definitions in <xref target="fig-claims-set"/>
for the claims set defined in <xref target="RFC8392"/>.  Note that these definitions
have been built such that they also can describe <xref target="RFC7519"/> claims sets by
disabling feature "cbor" and enabling feature "json", but this
flexibility is not the subject of the present specification.</t>
      <figure anchor="fig-claims-set">
        <name>CDDL definition for Claims-Set</name>
        <sourcecode type="cddl"><![CDATA[
Claims-Set = {
 * $$Claims-Set-Claims
 * Claim-Label .feature "extended-claims-label" => any
}
Claim-Label = int / text
string-or-uri = text

$$Claims-Set-Claims //= ( iss-claim-label => string-or-uri  )
$$Claims-Set-Claims //= ( sub-claim-label => string-or-uri  )
$$Claims-Set-Claims //= ( aud-claim-label => string-or-uri  )
$$Claims-Set-Claims //= ( exp-claim-label => ~time )
$$Claims-Set-Claims //= ( nbf-claim-label => ~time )
$$Claims-Set-Claims //= ( iat-claim-label => ~time )
$$Claims-Set-Claims //= ( cti-claim-label => bytes )

iss-claim-label = JC<"iss", 1>
sub-claim-label = JC<"sub", 2>
aud-claim-label = JC<"aud", 3>
exp-claim-label = JC<"exp", 4>
nbf-claim-label = JC<"nbf", 5>
iat-claim-label = JC<"iat", 6>
cti-claim-label = CBOR-ONLY<7>  ; jti in JWT: different name and text

JSON-ONLY<J> = J .feature "json"
CBOR-ONLY<C> = C .feature "cbor"
JC<J,C> = JSON-ONLY<J> / CBOR-ONLY<C>
]]></sourcecode>
      </figure>
      <t>Specifications that define additional claims should also supply
additions to the $$Claims-Set-Claims socket, e.g.:</t>
      <sourcecode type="cddl"><![CDATA[
; [RFC8747]
$$Claims-Set-Claims //= ( 8: CWT-cnf ) ; cnf
CWT-cnf = {
  (1: CWT-COSE-Key) //
  (2: CWT-Encrypted_COSE_Key) //
  (3: CWT-kid)
}

CWT-COSE-Key = COSE_Key
CWT-Encrypted_COSE_Key = COSE_Encrypt / COSE_Encrypt0
CWT-kid = bytes

; [RFC8693]
$$Claims-Set-Claims //= ( 9: CWT-scope ) ; scope
; TO DO: understand what this means:
; scope The scope of an access token as defined in [RFC6749].
; scope 9 byte string or text string [IESG] [RFC8693, Section 4.2]
CWT-scope = bytes / text

; [RFC-ietf-ace-oauth-authz-45, Section 5.10]
$$Claims-Set-Claims //= ( 38: CWT-ace-profile ) ; ace_profile
CWT-ace-profile = $CWT-ACE-Profiles /
  int .feature "ace_profile-extend"
; fill in from IANA registry
;   https://www.iana.org/assignments/ace/ace.xhtml#ace-profiles :
$CWT-ACE-Profiles /= 1 ; coap_dtls

$$Claims-Set-Claims //= ( 39: CWT-cnonce ) ; cnonce
CWT-cnonce = bytes

$$Claims-Set-Claims //= ( 40: CWT-exi ) ; exi
CWT-exi = uint ; in seconds (5.10.3)

;;; insert CDDL from 9052-to-be to complete these CDDL definitions.

]]></sourcecode>
    </section>
    <section anchor="example">
      <name>Example</name>
      <t>The example CWT Claims Set from <xref section="A.1" sectionFormat="of" target="RFC8392"/> can be turned into
an UCCS by enclosing it with a tag number TBD601:</t>
      <artwork><![CDATA[
 <TBD601>(
   {
     / iss / 1: "coap://as.example.com",
     / sub / 2: "erikw",
     / aud / 3: "coap://light.example.com",
     / exp / 4: 1444064944,
     / nbf / 5: 1443944944,
     / iat / 6: 1443944944,
     / cti / 7: h'0b71'
   }
 )
]]></artwork>
      <!--  LocalWords:  Attester Verifier UCCS decrypted rekeying JWT EATs
 -->
<!--  LocalWords:  Verifier's CWTs attester verifier FCFS
 -->

</section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t><contact fullname="Laurence Lundblade"/> suggested some improvements to the CDDL.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
