<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-uccs-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Unprotected CWT Claims Sets">A CBOR Tag for Unprotected CWT Claims Sets</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-04"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="J." surname="O'Donoghue" fullname="Jeremy O'Donoghue">
      <organization abbrev="Qualcomm Technologies Inc.">Qualcomm Technologies Inc.</organization>
      <address>
        <postal>
          <street>279 Farnborough Road</street>
          <city>Farnborough</city>
          <code>GU14 7LS</code>
          <country>United Kingdom</country>
        </postal>
        <email>jodonogh@qti.qualcomm.com</email>
      </address>
    </author>
    <author initials="N." surname="Cam-Winget" fullname="Nancy Cam-Winget">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>3550 Cisco Way</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95134</code>
          <country>USA</country>
        </postal>
        <email>ncamwing@cisco.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Postfach 330440</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2023" month="January" day="11"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>CBOR Web Token (CWT, RFC 8392) Claims Sets sometimes do not need the
protection afforded by wrapping them into COSE, as is required for a true
CWT.  This specification defines a CBOR tag for such unprotected CWT
Claims Sets (UCCS) and discusses conditions for its proper use.</t>
      <!--
[^status]

[^status]:
    The present version (-03)
 -->



    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-uccs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-uccs"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A CBOR Web Token (CWT) as specified by <xref target="RFC8392"/> is always wrapped in a
CBOR Object Signing and Encryption (COSE, <xref target="RFC8152"/>) envelope.
COSE provides -- amongst other things -- the end-to-end data origin
authentication and integrity protection employed by RFC 8392 and
optional encryption for CWTs.
Under the right circumstances (<xref target="secchan"/>),
though, a signature providing proof for authenticity and integrity can be
provided through the transfer protocol and thus omitted from the
information in a CWT without compromising the intended goal of authenticity
and integrity.
In other words, if communicating parties have a pre-existing security
association they can reuse it to provide authenticity and integrity
for their messages, enabling the basic principle of using resources
parsimoniously.
Specifically, if a mutually secured channel is established between two
remote peers, and if that secure channel provides the required
properties (as discussed below), it is possible to omit the protection
provided by COSE, creating a use case for unprotected CWT Claims Sets.
Similarly, if there is one-way authentication, the party that did not
authenticate may be in a position to send authentication information through
this channel that allows the already authenticated party to authenticate the
other party.</t>
      <t>This specification allocates a CBOR tag to mark Unprotected CWT Claims Sets
(UCCS) as such and discusses conditions for its proper use in the scope of
Remote Attestation Procedures (RATS) and the conveyance of Evidence from an
Attester to a Verifier.</t>
      <t>This specification does not change <xref target="RFC8392"/>: A true CWT does not make use of
the tag allocated here; the UCCS tag is an alternative to using COSE
protection and a CWT tag.
Consequently, within the well-defined scope of a secured channel, it
can be acceptable and economic to use the contents of a CWT without
its COSE container and tag it with a UCCS CBOR tag for further
processing within that scope -- or to use the contents of a UCCS CBOR
tag for building a CWT to be signed by some entity that can vouch for
those contents.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The term Claim is used as in <xref target="RFC7519"/>.</t>
        <t>The terms Claim Key, Claim Value, and CWT Claims Set are used as in
<xref target="RFC8392"/>.</t>
        <t>The terms Attester, Attesting Environment and Verifier are used as in <xref target="I-D.ietf-rats-architecture"/>.</t>
        <dl>
          <dt>UCCS:</dt>
          <dd>
            <t>Unprotected CWT Claims Set(s); CBOR map(s) of Claims as defined by the CWT
Claims Registry that are composed of pairs of Claim Keys and Claim Values.</t>
          </dd>
          <dt>secure channel:</dt>
          <dd>
            <t>A path for transferring data between two entities or components that
ensures confidentiality, integrity and replay protection, as well as
mutual authentication between the entities or components. The secure
channel may be provided using approved cryptographic, physical or
procedural methods, or a combination thereof <xref target="NIST-SP800-90Ar1"/>.
For the purposes of the present document, we focus on a protected communication
channel used for conveyance that can ensure the same qualities
associated for UCCS conveyance as CWT conveyance without any
additional protection.</t>
          </dd>
        </dl>
        <t>All terms referenced or defined in this section are capitalized in the remainder of
this document.</t>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="example-use-cases">
      <name>Example Use Cases</name>
      <t>Use cases involving the conveyance of Claims, in particular, Remote Attestation Procedures (RATS, see
<xref target="I-D.ietf-rats-architecture"/>) require a standardized data definition and encoding format that can be transferred
and transported using different communication channels.  As these are Claims, <xref target="RFC8392"/> is
a suitable format. However, the way these Claims are secured depends on the deployment, the security
capabilities of the device, as well as their software stack.  For example, a Claim may be securely
stored and conveyed using a device's Trusted Execution Environment (TEE, see <xref target="I-D.ietf-teep-architecture"/>) or especially in some
resource constrained environments, the same process that provides the secure communication
transport is also the delegate to compose the Claim to be conveyed.  Whether it is a transfer
or transport, a secure channel is presumed to be used for conveying such UCCS.  The following sections
further describe the RATS usage scenario and corresponding requirements for UCCS deployment.</t>
    </section>
    <section anchor="secchan">
      <name>Characteristics of a Secure Channel</name>
      <t>A secure channel for the conveyance of UCCS needs to provide the security
properties that would otherwise be provided by COSE for a CWT.
In this regard, UCCS is similar in security considerations to JWTs <xref target="RFC8725"/>
using the algorithm "none".  RFC 8725 states:</t>
      <blockquote>
        <t>[...] if a JWT is cryptographically
protected end-to-end by a transport layer, such as TLS using
cryptographically current algorithms, there may be no need to apply another
layer of cryptographic protections to the JWT.  In such cases, the use of
the "none" algorithm can be perfectly acceptable.</t>
      </blockquote>
      <t>The security considerations discussed, e.g., in Sections <xref target="RFC8725" section="2.1" sectionFormat="bare"/>, <xref target="RFC8725" section="3.1" sectionFormat="bare"/>, and <xref target="RFC8725" section="3.2" sectionFormat="bare"/> of <xref target="RFC8725"/> apply in an analogous way to the use of UCCS as
elaborated on in this document.</t>
      <t>Secure channels are often set up in a handshake protocol that mutually
derives a session key, where the handshake protocol establishes the
(identity and thus) authenticity of one or both ends of the communication.
The session key can
then be used to provide confidentiality and integrity of the transfer of
information inside the secure channel.  A well-known example of a such a
secure channel setup protocol is the TLS <xref target="RFC8446"/> handshake; the
TLS record protocol can then be used for secure conveyance.</t>
      <t>As UCCS were initially created for use in Remote Attestation Procedures
(RATS) secure channels, the following subsection provides a discussion of
their use in these channels.  Where other environments are intended to be
used to convey UCCS, similar considerations need to be documented before
UCCS can be used.</t>
      <section anchor="uccs-and-remote-attestation-procedures-rats">
        <name>UCCS and Remote Attestation Procedures (RATS)</name>
        <t>This section discusses use cases for UCCS in the context of RATS.</t>
        <section anchor="secure-channels-in-rats">
          <name>Secure Channels in RATS</name>
          <t>For the purposes of this section, the Verifier is the receiver of the UCCS
and the Attester is the provider of the UCCS.</t>
          <t>Secure channels can be transient in nature. For the purposes of this
specification, the mechanisms used to establish a secure channel are out of
scope.</t>
          <t>As a minimum requirement in the scope of RATS Claims, the Verifier <bcp14>MUST</bcp14>
authenticate the Attester as part of the establishment of the secure channel.
Furthermore, the channel <bcp14>MUST</bcp14> provide integrity of the communication from the
Attester to the Verifier.
If confidentiality is also required, the receiving side needs to be
authenticated as well; this can be achieved if the Verifier and the Attester
mutually authenticate when establishing the secure channel.</t>
          <t>The extent to which a secure channel can provide assurances that UCCS
originate from a trustworthy Attesting Environment depends on the
characteristics of both the cryptographic mechanisms used to establish the
channel and the characteristics of the Attesting Environment itself.</t>
          <t>A secure channel established or maintained using weak cryptography
may not provide the assurance required by a Relying Party of the authenticity
and integrity of the UCCS.</t>
          <t>Ultimately, it is up to the Verifier's policy to determine whether to accept
a UCCS from the Attester and to the type of secure channel it must negotiate.
While the security considerations of the cryptographic algorithms used are similar
to COSE, the considerations of the secure channel should also adhere to the policy
configured at each of the Attester and the Verifier.  However, the policy controls
and definitions are out of scope for this document.</t>
          <t>Where the security assurance required of an Attesting Environment by a
Relying Party requires it, the Attesting Environment may be implemented
using techniques designed to provide enhanced protection from an attacker
wishing to tamper with or forge UCCS.  A possible approach might be to
implement the Attesting Environment in a hardened environment such as a
TEE <xref target="I-D.ietf-teep-architecture"/> or a TPM <xref target="TPM2"/>.</t>
          <t>When UCCS emerge from the secure channel and into the Verifier, the security
properties of the secure channel no longer protect the UCCS, which now are subject to the same security properties
as any other unprotected data in the Verifier environment.
If the Verifier subsequently forwards UCCS, they are treated as though they originated within the Verifier.</t>
          <t>As with EATs nested in other EATs (Section <xref target="I-D.ietf-rats-eat" section="4.2.19.1.2" sectionFormat="bare">Nested Token</xref> of <xref target="I-D.ietf-rats-eat"/>), the secure
channel does not endorse fully formed CWTs transferred through it.
Effectively, the COSE envelope of a CWT shields the CWT Claims Set from the
endorsement of the secure channel.  (Note that EAT might add a nested UCCS
Claim, and this statement does not apply to UCCS nested into UCCS, only to
fully formed CWTs)</t>
        </section>
        <section anchor="delegated-attestation">
          <name>Delegated Attestation</name>
          <t>Another use case is that of a sub-Attester that has no signing keys (for example, to keep the implementation complexity to a minimum) and has a secure channel, such as a local IPC, to interact with a lead Attester (see Composite Device, <xref section="3.3" sectionFormat="of" target="I-D.ietf-rats-architecture"/>).
The sub-Attester produces a UCCS with the required CWT Claims Set and sends the UCCS through the secure channel to the lead Attester.
The lead Attester then computes a cryptographic hash of the UCCS and protects that hash using its signing key for Evidence, for example, using a Detached EAT Bundle (<xref section="5" sectionFormat="of" target="I-D.ietf-rats-eat"/>).</t>
        </section>
      </section>
      <section anchor="privacy-preserving-channels">
        <name>Privacy Preserving Channels</name>
        <t>A secure channel which preserves the privacy of the Attester may provide
security properties equivalent to COSE, but only inside the life-span of the
session established.  In general, a Verifier cannot correlate UCCS received
in different sessions from the same Attesting Environment based on the
cryptographic mechanisms used when a privacy preserving secure channel is
employed.</t>
        <t>In the case of a Remote Attestation, the Attester must consider whether any UCCS it returns over a privacy
preserving secure channel compromises the privacy in unacceptable ways.  As
an example, the use of the EAT UEID <xref target="I-D.ietf-rats-eat"/> Claim in UCCS over a privacy
preserving secure channel allows a verifier to correlate UCCS from a single
Attesting Environment across many secure channel sessions. This may be
acceptable in some use-cases (e.g. if the Attesting Environment is a
physical sensor in a factory) and unacceptable in others (e.g. if the
Attesting Environment is a device belonging to a child).</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>In the registry <xref target="IANA.cbor-tags"/>,
IANA is requested to allocate the tag in <xref target="tab-tag-values"/> from the
FCFS space, with the present document as the specification reference.</t>
      <table anchor="tab-tag-values">
        <name>Values for Tags</name>
        <thead>
          <tr>
            <th align="right">Tag</th>
            <th align="left">Data Item</th>
            <th align="left">Semantics</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="right">TBD601</td>
            <td align="left">map</td>
            <td align="left">Unprotected CWT Claims Set [RFCthis]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC8949"/> apply.
The security considerations of <xref target="RFC8392"/> need to be applied analogously,
replacing the function of COSE with that of the secured channel.</t>
      <t><xref target="secchan"/> discusses security considerations for secure channels, in which
UCCS might be used.
This document provides the CBOR tag definition for UCCS and a discussion
on security consideration for the use of UCCS in
Remote Attestation Procedures (RATS).  Uses of UCCS outside the scope of
RATS are not covered by this document.  The UCCS specification -- and the
use of the UCCS CBOR tag, correspondingly -- is not intended for use in a
scope where a scope-specific security consideration discussion has not
been conducted, vetted and approved for that use.</t>
      <section anchor="general-considerations">
        <name>General Considerations</name>
        <t>Implementations of secure channels are often separate from the application
logic that has security requirements on them.  Similar security
considerations to those described in <xref target="RFC9052"/> for obtaining the
required levels of assurance include:</t>
        <ul spacing="normal">
          <li>Implementations need to provide sufficient protection for private or
secret key material used to establish or protect the secure channel.</li>
          <li>Using a key for more than one algorithm can leak information about the
key and is not recommended.</li>
          <li>An algorithm used to establish or protect the secure channel may have
limits on the number of times that a key can be used without leaking
information about the key.</li>
          <li>Evidence in a UCCS conveyed in a secure channel generally cannot be
used to support trust in the credentials that were used to establish
that secure channel, as this would create a circular dependency.</li>
        </ul>
        <t>The Verifier needs to ensure that the management of key material used
establish or protect the secure channel is acceptable. This may include
factors such as:</t>
        <ul spacing="normal">
          <li>Ensuring that any permissions associated with key ownership are respected
in the establishment of the secure channel.</li>
          <li>Cryptographic algorithms are used appropriately.</li>
          <li>Key material is used in accordance with any usage restrictions such as
freshness or algorithm restrictions.</li>
          <li>Ensuring that appropriate protections are in place to address potential
traffic analysis attacks.</li>
        </ul>
      </section>
      <section anchor="aes-cbcmac">
        <name>AES-CBC_MAC</name>
        <ul spacing="normal">
          <li>A given key should only be used for messages of fixed or known length.</li>
          <li>Different keys should be used for authentication and encryption operations.</li>
          <li>A mechanism to ensure that IV cannot be modified is required.</li>
        </ul>
        <t><xref section="3.2.1" sectionFormat="of" target="RFC9053"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="aes-gcm">
        <name>AES-GCM</name>
        <ul spacing="normal">
          <li>The key and nonce pair are unique for every encrypted message.</li>
          <li>The maximum number of messages to be encrypted for a given key is not exceeded.</li>
        </ul>
        <t><xref section="4.1.1" sectionFormat="of" target="RFC9053"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="aes-ccm">
        <name>AES-CCM</name>
        <ul spacing="normal">
          <li>The key and nonce pair are unique for every encrypted message.</li>
          <li>The maximum number of messages to be encrypted for a given block cipher is not exceeded.</li>
          <li>The number of messages both successfully and unsuccessfully decrypted is used to
determine when rekeying is required.</li>
        </ul>
        <t><xref section="4.2.1" sectionFormat="of" target="RFC9053"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="chacha20-and-poly1305">
        <name>ChaCha20 and Poly1305</name>
        <ul spacing="normal">
          <li>The nonce is unique for every encrypted message.</li>
          <li>The number of messages both successfully and unsuccessfully decrypted is used to
determine when rekeying is required.</li>
        </ul>
        <t><xref section="4.3.1" sectionFormat="of" target="RFC9053"/> contains a detailed explanation of these considerations.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8152" target="https://www.rfc-editor.org/info/rfc8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8152"/>
            <seriesInfo name="RFC" value="8152"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC7519"/>
            <seriesInfo name="RFC" value="7519"/>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8725" target="https://www.rfc-editor.org/info/rfc8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <seriesInfo name="DOI" value="10.17487/RFC8725"/>
            <seriesInfo name="RFC" value="8725"/>
            <seriesInfo name="BCP" value="225"/>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="D. Hardt" initials="D." surname="Hardt">
              <organization/>
            </author>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas.  This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8392"/>
            <seriesInfo name="RFC" value="8392"/>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
          <format target="http://www.iana.org/assignments/cbor-tags" type="TXT"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <seriesInfo name="DOI" value="10.17487/RFC8446"/>
            <seriesInfo name="RFC" value="8446"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-architecture" target="https://www.ietf.org/archive/id/draft-ietf-rats-architecture-22.txt">
          <front>
            <title>Remote Attestation Procedures Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-22"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="September" year="2022"/>
            <abstract>
              <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teep-architecture" target="https://www.ietf.org/archive/id/draft-ietf-teep-architecture-19.txt">
          <front>
            <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-teep-architecture-19"/>
            <author fullname="Mingliang Pei" initials="M." surname="Pei">
              <organization>Broadcom</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Dave Wheeler" initials="D. M." surname="Wheeler">
              <organization>Amazon</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   A Trusted Execution Environment (TEE) is an environment that enforces
   that any code within that environment cannot be tampered with, and
   that any data used by such code cannot be read or tampered with by
   any code outside that environment.  This architecture document
   motivates the design and standardization of a protocol for managing
   the lifecycle of trusted applications running inside such a TEE.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="TPM2">
          <front>
            <title>Trusted Platform Module Library Specification, Family "2.0", Level 00, Revision 01.59 ed., Trusted Computing Group</title>
            <author>
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat" target="https://www.ietf.org/archive/id/draft-ietf-rats-eat-19.txt">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-19"/>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="19" month="December" year="2022"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine how much
   it wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need to be able to define basic security services for this data format.  This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.  </t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9053" target="https://www.rfc-editor.org/info/rfc9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9053"/>
            <seriesInfo name="RFC" value="9053"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052). </t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="NIST-SP800-90Ar1">
          <front>
            <title>Recommendation for Random Number Generation Using Deterministic Random Bit Generators</title>
            <seriesInfo name="DOI" value="10.6028/nist.sp.800-90ar1"/>
            <seriesInfo name="National Institute of Standards and Technology" value="report"/>
            <author fullname="Elaine B. Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="John M. Kelsey" initials="J." surname="Kelsey">
              <organization/>
            </author>
            <date month="June" year="2015"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="cddl">
      <name>CDDL</name>
      <t><xref target="RFC8392"/> does not define CDDL for CWT Claims Sets.</t>
      <t>This specification proposes using the definitions in <xref target="fig-claims-set"/>
for the CWT Claims Set defined in <xref target="RFC8392"/>.  Note that these definitions
have been built such that they also can describe <xref target="RFC7519"/> Claims sets by
disabling feature "cbor" and enabling feature "json", but this
flexibility is not the subject of the present specification.</t>
      <figure anchor="fig-claims-set">
        <name>CDDL definition for Claims-Set</name>
        <sourcecode type="cddl">
Claims-Set = {
 * $$Claims-Set-Claims
 * Claim-Label .feature "extended-claims-label" =&gt; any
}
Claim-Label = CBOR-ONLY&lt;int&gt; / text
string-or-uri = text

$$Claims-Set-Claims //= ( iss-claim-label =&gt; string-or-uri  )
$$Claims-Set-Claims //= ( sub-claim-label =&gt; string-or-uri  )
$$Claims-Set-Claims //= ( aud-claim-label =&gt; string-or-uri  )
$$Claims-Set-Claims //= ( exp-claim-label =&gt; ~time )
$$Claims-Set-Claims //= ( nbf-claim-label =&gt; ~time )
$$Claims-Set-Claims //= ( iat-claim-label =&gt; ~time )
$$Claims-Set-Claims //= ( cti-claim-label =&gt; bytes )

iss-claim-label = JC&lt;"iss", 1&gt;
sub-claim-label = JC&lt;"sub", 2&gt;
aud-claim-label = JC&lt;"aud", 3&gt;
exp-claim-label = JC&lt;"exp", 4&gt;
nbf-claim-label = JC&lt;"nbf", 5&gt;
iat-claim-label = JC&lt;"iat", 6&gt;
cti-claim-label = CBOR-ONLY&lt;7&gt;  ; jti in JWT: different name and text

JSON-ONLY&lt;J&gt; = J .feature "json"
CBOR-ONLY&lt;C&gt; = C .feature "cbor"
JC&lt;J,C&gt; = JSON-ONLY&lt;J&gt; / CBOR-ONLY&lt;C&gt;
</sourcecode>
      </figure>
      <t>Specifications that define additional Claims should also supply
additions to the $$Claims-Set-Claims socket, e.g.:</t>
      <sourcecode type="cddl">
; [RFC8747]
$$Claims-Set-Claims //= ( 8: CWT-cnf ) ; cnf
CWT-cnf = {
  (1: CWT-COSE-Key) //
  (2: CWT-Encrypted_COSE_Key) //
  (3: CWT-kid)
}

CWT-COSE-Key = COSE_Key
CWT-Encrypted_COSE_Key = COSE_Encrypt / COSE_Encrypt0
CWT-kid = bytes

; [RFC8693]
$$Claims-Set-Claims //= ( 9: CWT-scope ) ; scope
; TO DO: understand what this means:
; scope The scope of an access token as defined in [RFC6749].
; scope 9 byte string or text string [IESG] [RFC8693, Section 4.2]
CWT-scope = bytes / text

; [RFC-ietf-ace-oauth-authz-45, Section 5.10]
$$Claims-Set-Claims //= ( 38: CWT-ace-profile ) ; ace_profile
CWT-ace-profile = $CWT-ACE-Profiles /
  int .feature "ace_profile-extend"
; fill in from IANA registry
;   https://www.iana.org/assignments/ace/ace.xhtml#ace-profiles :
$CWT-ACE-Profiles /= 1 ; coap_dtls

$$Claims-Set-Claims //= ( 39: CWT-cnonce ) ; cnonce
CWT-cnonce = bytes

$$Claims-Set-Claims //= ( 40: CWT-exi ) ; exi
CWT-exi = uint ; in seconds (5.10.3)

;;; insert CDDL from 9052-to-be to complete these CDDL definitions.

</sourcecode>
    </section>
    <section anchor="example">
      <name>Example</name>
      <t>The example CWT Claims Set from <xref section="A.1" sectionFormat="of" target="RFC8392"/> can be turned into
an UCCS by enclosing it with a tag number TBD601:</t>
      <artwork><![CDATA[
 <TBD601>(
   {
     / iss / 1: "coap://as.example.com",
     / sub / 2: "erikw",
     / aud / 3: "coap://light.example.com",
     / exp / 4: 1444064944,
     / nbf / 5: 1443944944,
     / iat / 6: 1443944944,
     / cti / 7: h'0b71'
   }
 )
]]></artwork>
      <!--  LocalWords:  Attester Verifier UCCS decrypted rekeying JWT EATs
 -->
<!--  LocalWords:  Verifier's CWTs Attester Verifier FCFS
 -->

</section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t><contact fullname="Laurence Lundblade"/> suggested some improvements to the CDDL.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
