<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-uccs-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.5 -->
  <front>
    <title abbrev="Unprotected CWT Claims Sets">A CBOR Tag for Unprotected CWT Claims Sets</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-06"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="J." surname="O'Donoghue" fullname="Jeremy O'Donoghue">
      <organization abbrev="Qualcomm Technologies Inc.">Qualcomm Technologies Inc.</organization>
      <address>
        <postal>
          <street>279 Farnborough Road</street>
          <city>Farnborough</city>
          <code>GU14 7LS</code>
          <country>United Kingdom</country>
        </postal>
        <email>jodonogh@qti.qualcomm.com</email>
      </address>
    </author>
    <author initials="N." surname="Cam-Winget" fullname="Nancy Cam-Winget">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>3550 Cisco Way</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95134</code>
          <country>USA</country>
        </postal>
        <email>ncamwing@cisco.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Postfach 330440</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2023" month="August" day="02"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 82?>

<t>CBOR Web Token (CWT, RFC 8392) Claims Sets sometimes do not need the
protection afforded by wrapping them into COSE, as is required for a true
CWT.  This specification defines a CBOR tag for such unprotected CWT
Claims Sets (UCCS) and discusses conditions for its proper use.</t>
      <!--
[^status]

[^status]:
    The present version (-03)
 -->



    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-uccs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation procedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-uccs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 96?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A CBOR Web Token (CWT) as specified by <xref target="RFC8392"/> is always wrapped in a
CBOR Object Signing and Encryption (COSE, <xref target="RFC9052"/>) envelope.
COSE provides -- amongst other things -- end-to-end data origin
authentication and integrity protection employed by RFC 8392 as well as
optional encryption for CWTs.
Under the right circumstances (<xref target="secchan"/>),
though, a signature providing proof for authenticity and integrity can be
provided through the transfer protocol and thus omitted from the
information in a CWT without compromising the intended goal of authenticity
and integrity.
In other words, if communicating parties have a pre-existing security
association, they can reuse it to provide authenticity and integrity
for their messages, enabling the basic principle of using resources
parsimoniously.
Specifically, if a mutually secured channel is established between two
remote peers, and if that secure channel provides the required
properties (as discussed below), it is possible to omit the protection
provided by COSE, creating a use case for unprotected CWT Claims Sets.
Similarly, if there is one-way authentication, the party that did not
authenticate may be in a position to send authentication information through
this channel that allows the already authenticated party to authenticate the
other party.</t>
      <t>This specification allocates a CBOR tag to mark Unprotected CWT Claims Sets
(UCCS) as such and discusses conditions for its proper use in the scope of
Remote Attestation Procedures (RATS <xref target="RFC9334"/>) in the usage scenario that is the
conveyance of Evidence from an Attester to a Verifier.</t>
      <t>This specification does not change <xref target="RFC8392"/>: A true CWT does not make use of
the tag allocated here; the UCCS tag is an alternative to using COSE
protection and a CWT tag.
Consequently, within the well-defined scope of a secure channel, it
can be acceptable and economic to use the contents of a CWT without
its COSE container and tag it with a UCCS CBOR tag for further
processing within that scope -- or to use the contents of a UCCS CBOR
tag for building a CWT to be signed by some entity that can vouch for
those contents.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The term Claim is used as in <xref target="RFC7519"/>.</t>
        <t>The terms Claim Key, Claim Value, and CWT Claims Set are used as in
<xref target="RFC8392"/>.</t>
        <t>The terms Attester, Attesting Environment, Evidence, Relying Party and Verifier are used as in <xref target="RFC9334"/>.</t>
        <dl>
          <dt>UCCS:</dt>
          <dd>
            <t>Unprotected CWT Claims Set(s); CBOR map(s) of Claims as defined by the CWT
Claims Registry that are composed of pairs of Claim Keys and Claim Values.</t>
          </dd>
          <dt>Secure Channel:</dt>
          <dd>
            <t><xref target="NIST-SP800-90Ar1"/> defines a Secure Channel as follows:
</t>
            <aside>
              <!-- This really is a block quote, but RFCXMLv3 doesn't allow that -->
      <t>"A path for transferring data between two entities or components that
ensures confidentiality, integrity and replay protection, as well as
mutual authentication between the entities or components. The secure
channel may be provided using approved cryptographic, physical or
procedural methods, or a combination thereof"</t>
            </aside>
            <t>For the purposes of the present document, we focus on a protected communication
channel used for conveyance that can ensure the same qualities
associated for UCCS conveyance as CWT conveyance without any
additional protection.
Note that this means that, in specific cases, the Secure Channel as defined here
does not itself provide mutual authentication.  See <xref target="secchan"/>.</t>
          </dd>
        </dl>
        <t>All terms referenced or defined in this section are capitalized in the remainder of
this document.</t>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="deployment-and-usage-of-uccs">
      <name>Deployment and Usage of UCCS</name>
      <t>Usage scenarios involving the conveyance of Claims, in particular
RATS, require a standardized data definition and encoding format that
can be transferred
and transported using different communication channels.  As these are Claims, <xref target="RFC8392"/> is
a suitable format.  However, the way these Claims are secured depends on the deployment, the security
capabilities of the device, as well as their software stack.  For example, a Claim may be securely
stored and conveyed using a device's Trusted Execution Environment (TEE, see <xref target="RFC9397"/>) or
a Trusted Platform Module (TPM, see <xref target="TPM2"/>).
Especially in some resource constrained environments, the same process that provides the secure communication
transport is also the delegate to compose the Claim to be conveyed.  Whether it is a transfer
or transport, a Secure Channel is presumed to be used for conveying such UCCS.  The following sections
elaborate on Secure Channel characteristics in general and further describe RATS usage scenarios and
corresponding requirements for UCCS deployment.</t>
    </section>
    <section anchor="secchan">
      <name>Characteristics of a Secure Channel</name>
      <t>A Secure Channel for the conveyance of UCCS needs to provide the security
properties that would otherwise be provided by COSE for a CWT.
In this regard, UCCS is similar in security considerations to JWTs <xref target="RFC8725"/>
using the algorithm "none".  RFC 8725 states:</t>
      <blockquote>
        <t>[...] if a JWT is cryptographically
protected end-to-end by a transport layer, such as TLS using
cryptographically current algorithms, there may be no need to apply another
layer of cryptographic protections to the JWT.  In such cases, the use of
the "none" algorithm can be perfectly acceptable.</t>
      </blockquote>
      <t>The security considerations discussed, e.g., in Sections <xref target="RFC8725" section="2.1" sectionFormat="bare"/>, <xref target="RFC8725" section="3.1" sectionFormat="bare"/>, and <xref target="RFC8725" section="3.2" sectionFormat="bare"/> of <xref target="RFC8725"/> apply in an analogous way to the use of UCCS as
elaborated on in this document.</t>
      <t>Secure Channels are often set up in a handshake protocol that mutually
derives a session key, where the handshake protocol establishes the
(identity and thus) authenticity of one or both ends of the communication.
The session key can
then be used to provide confidentiality and integrity of the transfer of
information inside the Secure Channel.  A well-known example of a such a
Secure Channel setup protocol is the TLS <xref target="RFC8446"/> handshake; the
TLS record protocol can then be used for secure conveyance.</t>
      <t>As UCCS were initially created for use in RATS Secure Channels, the following
section provides a discussion of
their use in these channels.  Where other environments are intended to be
used to convey UCCS, similar considerations need to be documented before
UCCS can be used.</t>
    </section>
    <section anchor="uccs-and-remote-attestation-procedures-rats">
      <name>UCCS and Remote Attestation Procedures (RATS)</name>
      <t>This section describes three detailed usage scenarios for UCCS in the context of RATS.</t>
      <section anchor="evidence-conveyance">
        <name>Evidence Conveyance</name>
        <t>For the purposes of this section, the Verifier is the receiver of the UCCS
and the Attester is the provider of the UCCS.</t>
        <t>Secure Channels can be transient in nature.  For the purposes of this
specification, the mechanisms used to establish a Secure Channel are out of
scope.</t>
        <t>As a minimum requirement in the scope of RATS Claims, the Verifier <bcp14>MUST</bcp14>
authenticate the Attester as part of the establishment of the Secure Channel.
Furthermore, the channel <bcp14>MUST</bcp14> provide integrity of the communication from the
Attester to the Verifier.
If confidentiality is also required, the receiving side <bcp14>MUST</bcp14> be
authenticated as well; this can be achieved if the Verifier and the Attester
mutually authenticate when establishing the Secure Channel.</t>
        <t>The extent to which a Secure Channel can provide assurances that UCCS
originate from a trustworthy Attesting Environment depends on the
characteristics of both the cryptographic mechanisms used to establish the
channel and the characteristics of the Attesting Environment itself.</t>
        <t>A Secure Channel established or maintained using weak cryptography
may not provide the assurance required by a Relying Party of the authenticity
and integrity of the UCCS.</t>
        <t>Ultimately, it is up to the Verifier's policy to determine whether to accept
a UCCS from the Attester and to the type of Secure Channel it must negotiate.
While the security considerations of the cryptographic algorithms used are similar
to COSE, the considerations of the Secure Channel should also adhere to the policy
configured at each of the Attester and the Verifier.  However, the policy controls
and definitions are out of scope for this document.</t>
        <t>Where the security assurance required of an Attesting Environment by a
Relying Party requires it, the Attesting Environment <bcp14>SHOULD</bcp14> be implemented
using techniques designed to provide enhanced protection from an attacker
wishing to tamper with or forge UCCS.  A possible approach might be to
implement the Attesting Environment in a hardened environment such as a
TEE <xref target="RFC9397"/> or a TPM <xref target="TPM2"/>.</t>
        <t>When UCCS emerge from the Secure Channel and into the Verifier, the security
properties of the secure channel no longer protect the UCCS, which now are subject to the same security properties
as any other unprotected data in the Verifier environment.
If the Verifier subsequently forwards UCCS, they are treated as though they originated within the Verifier.</t>
        <t>As with EATs nested in other EATs (Section <xref target="I-D.ietf-rats-eat" section="4.2.18.3" sectionFormat="bare">Nested Tokens</xref> of <xref target="I-D.ietf-rats-eat"/>), the Secure
Channel does not endorse fully formed CWTs transferred through it.
Effectively, the COSE envelope of a CWT (or a nested EAT) shields the CWT Claims Set from the
endorsement of the secure channel.  (Note that EAT might add a nested UCCS
Claim, and this statement does not apply to UCCS nested into UCCS, only to
fully formed CWTs.)</t>
      </section>
      <section anchor="delegated-attestation">
        <name>Delegated Attestation</name>
        <t>Another usage scenario is that of a sub-Attester that has no signing keys (for example, to keep the implementation complexity to a minimum) and has a Secure Channel, such as a local IPC, to interact with a lead Attester (see Composite Device, <xref section="3.3" sectionFormat="of" target="RFC9334"/>).
The sub-Attester produces a UCCS with the required CWT Claims Set and sends the UCCS through the Secure Channel to the lead Attester.
The lead Attester then computes a cryptographic hash of the UCCS and
protects that hash using its signing key for Evidence, for example,
using a Detached-Submodule-Digest or Detached EAT Bundle (<xref section="5" sectionFormat="of" target="I-D.ietf-rats-eat"/>).</t>
      </section>
      <section anchor="privacy-preservation">
        <name>Privacy Preservation</name>
        <t>A Secure Channel which preserves the privacy of the Attester may provide
security properties equivalent to COSE, but only inside the life-span of the
session established.  In general, a Verifier cannot correlate UCCS received
in different sessions from the same Attesting Environment based on the
cryptographic mechanisms used when a privacy preserving Secure Channel is
employed.</t>
        <t>In the case of Remote Attestation, the Attester must consider whether any UCCS it returns over a privacy
preserving Secure Channel compromises the privacy in unacceptable ways.  As
an example, the use of the EAT UEID Claim <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-rats-eat"/> in UCCS over a privacy
preserving secure channel allows a verifier to correlate UCCS from a single
Attesting Environment across many Secure Channel sessions. This may be
acceptable in some use-cases (e.g., if the Attesting Environment is a
physical sensor in a factory) and unacceptable in others (e.g., if the
Attesting Environment is a user device belonging to a child).</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>In the CBOR Tags registry <xref target="IANA.cbor-tags"/> as defined in <xref section="9.2" sectionFormat="of" target="RFC8949"/>, IANA is requested to allocate the tag in <xref target="tab-tag-values"/> from
the Specification Required space (1+2 size), with the present document
as the specification reference.</t>
      <table anchor="tab-tag-values">
        <name>Values for Tags</name>
        <thead>
          <tr>
            <th align="right">Tag</th>
            <th align="left">Data Item</th>
            <th align="left">Semantics</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="right">TBD601</td>
            <td align="left">map (Claims-Set as per <xref target="cddl"/> of [RFCthis])</td>
            <td align="left">Unprotected CWT Claims Set [RFCthis]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC8949"/> apply.
The security considerations of <xref target="RFC8392"/> need to be applied analogously,
replacing the function of COSE with that of the Secure Channel.</t>
      <t><xref target="secchan"/> discusses security considerations for Secure Channels, in which
UCCS might be used.
This document provides the CBOR tag definition for UCCS and a discussion
on security consideration for the use of UCCS in RATS.  Uses of UCCS outside the scope of
RATS are not covered by this document.  The UCCS specification -- and the
use of the UCCS CBOR tag, correspondingly -- is not intended for use in a
scope where a scope-specific security consideration discussion has not
been conducted, vetted and approved for that use.</t>
      <section anchor="general-considerations">
        <name>General Considerations</name>
        <t>Implementations of Secure Channels are often separate from the application
logic that has security requirements on them.  Similar security
considerations to those described in <xref target="RFC9052"/> for obtaining the
required levels of assurance include:</t>
        <ul spacing="normal">
          <li>Implementations need to provide sufficient protection for private or
secret key material used to establish or protect the Secure Channel.</li>
          <li>Using a key for more than one algorithm can leak information about the
key and is not recommended.</li>
          <li>An algorithm used to establish or protect the Secure Channel may have
limits on the number of times that a key can be used without leaking
information about the key.</li>
          <li>Evidence in a UCCS conveyed in a Secure Channel generally cannot be
used to support trust in the credentials that were used to establish
that secure channel, as this would create a circular dependency.</li>
        </ul>
        <t>The Verifier needs to ensure that the management of key material used to
establish or protect the Secure Channel is acceptable. This may include
factors such as:</t>
        <ul spacing="normal">
          <li>Ensuring that any permissions associated with key ownership are respected
in the establishment of the Secure Channel.</li>
          <li>Using cryptographic algorithms appropriately.</li>
          <li>Using key material in accordance with any usage restrictions such as
freshness or algorithm restrictions.</li>
          <li>Ensuring that appropriate protections are in place to address potential
traffic analysis attacks.</li>
        </ul>
      </section>
      <section anchor="aes-cbcmac">
        <name>AES-CBC_MAC</name>
        <ul spacing="normal">
          <li>A given key should only be used for messages of fixed or known length.</li>
          <li>Different keys should be used for authentication and encryption operations.</li>
          <li>A mechanism to ensure that IV cannot be modified is required.</li>
        </ul>
        <t><xref section="3.2.1" sectionFormat="of" target="RFC9053"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="aes-gcm">
        <name>AES-GCM</name>
        <ul spacing="normal">
          <li>The key and nonce pair is unique for every encrypted message.</li>
          <li>The maximum number of messages to be encrypted for a given key is not exceeded.</li>
        </ul>
        <t><xref section="4.1.1" sectionFormat="of" target="RFC9053"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="aes-ccm">
        <name>AES-CCM</name>
        <ul spacing="normal">
          <li>The key and nonce pair is unique for every encrypted message.</li>
          <li>The maximum number of messages to be encrypted for a given block cipher is not exceeded.</li>
          <li>The number of messages both successfully and unsuccessfully decrypted is used to
determine when rekeying is required.</li>
        </ul>
        <t><xref section="4.2.1" sectionFormat="of" target="RFC9053"/> contains a detailed explanation of these considerations.</t>
      </section>
      <section anchor="chacha20-and-poly1305">
        <name>ChaCha20 and Poly1305</name>
        <ul spacing="normal">
          <li>The nonce is unique for every encrypted message.</li>
          <li>The number of messages both successfully and unsuccessfully decrypted is used to
determine when rekeying is required.</li>
        </ul>
        <t><xref section="4.3.1" sectionFormat="of" target="RFC9053"/> contains a detailed explanation of these considerations.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9397">
          <front>
            <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
            <author fullname="M. Pei" initials="M." surname="Pei"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="D. Wheeler" initials="D." surname="Wheeler"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>A Trusted Execution Environment (TEE) is an environment that enforces the following: any code within the environment cannot be tampered with, and any data used by such code cannot be read or tampered with by any code outside the environment. This architecture document discusses the motivation for designing and standardizing a protocol for managing the lifecycle of Trusted Applications running inside such a TEE.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9397"/>
          <seriesInfo name="DOI" value="10.17487/RFC9397"/>
        </reference>
        <reference anchor="TPM2">
          <front>
            <title>Trusted Platform Module Library Specification, Family “2.0”, Level 00, Revision 01.59 ed., Trusted Computing Group</title>
            <author>
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="30" month="June" year="2023"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine how much
   it wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-21"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="NIST-SP800-90Ar1">
          <front>
            <title>Recommendation for Random Number Generation Using Deterministic Random Bit Generators</title>
            <author fullname="Elaine B. Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="John M. Kelsey" initials="J." surname="Kelsey">
              <organization/>
            </author>
            <date month="June" year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-90ar1"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
    </references>
    <?line 412?>

<section anchor="cddl">
      <name>CDDL</name>
      <t><xref target="RFC8392"/> does not define CDDL for CWT Claims Sets.</t>
      <t>This specification proposes using the definitions in <xref target="fig-claims-set"/>
for the CWT Claims Set defined in <xref target="RFC8392"/>.  Note that these definitions
have been built such that they also can describe <xref target="RFC7519"/> Claims sets by
disabling feature "cbor" and enabling feature "json", but this
flexibility is not the subject of the present specification.</t>
      <figure anchor="fig-claims-set">
        <name>CDDL definition for Claims-Set</name>
        <sourcecode type="cddl"><![CDATA[
UCCS = #6.601(Claims-Set)

Claims-Set = {
 * $$Claims-Set-Claims
 * Claim-Label .feature "extended-claims-label" => any
}
Claim-Label = CBOR-ONLY<int> / text
string-or-uri = text

$$Claims-Set-Claims //= ( iss-claim-label => string-or-uri )
$$Claims-Set-Claims //= ( sub-claim-label => string-or-uri )
$$Claims-Set-Claims //= ( aud-claim-label => string-or-uri )
$$Claims-Set-Claims //= ( exp-claim-label => ~time )
$$Claims-Set-Claims //= ( nbf-claim-label => ~time )
$$Claims-Set-Claims //= ( iat-claim-label => ~time )
$$Claims-Set-Claims //= ( cti-claim-label => bytes )

iss-claim-label = JC<"iss", 1>
sub-claim-label = JC<"sub", 2>
aud-claim-label = JC<"aud", 3>
exp-claim-label = JC<"exp", 4>
nbf-claim-label = JC<"nbf", 5>
iat-claim-label = JC<"iat", 6>
cti-claim-label = CBOR-ONLY<7>  ; jti in JWT: different name and text

JSON-ONLY<J> = J .feature "json"
CBOR-ONLY<C> = C .feature "cbor"
JC<J,C> = JSON-ONLY<J> / CBOR-ONLY<C>
]]></sourcecode>
      </figure>
      <t>Specifications that define additional Claims should also supply
additions to the $$Claims-Set-Claims socket, e.g.:</t>
      <sourcecode type="cddl" name="uccs-additional-examples.cddl"><![CDATA[
; [RFC8747]
$$Claims-Set-Claims //= ( 8: CWT-cnf ) ; cnf
CWT-cnf = {
  (1: CWT-COSE-Key) //
  (2: CWT-Encrypted_COSE_Key) //
  (3: CWT-kid)
}

CWT-COSE-Key = COSE_Key
CWT-Encrypted_COSE_Key = COSE_Encrypt / COSE_Encrypt0
CWT-kid = bytes

;;; insert CDDL from RFC9052 to complete these CDDL definitions.
;# include RFC9052
]]></sourcecode>
    </section>
    <section anchor="example">
      <name>Example</name>
      <t>The example CWT Claims Set from <xref section="A.1" sectionFormat="of" target="RFC8392"/> can be turned into
an UCCS by enclosing it with a tag number TBD601:</t>
      <sourcecode type="cbor-diag"><![CDATA[
 601(
   {
     / iss / 1: "coap://as.example.com",
     / sub / 2: "erikw",
     / aud / 3: "coap://light.example.com",
     / exp / 4: 1444064944,
     / nbf / 5: 1443944944,
     / iat / 6: 1443944944,
     / cti / 7: h'0b71'
   }
 )
]]></sourcecode>
      <!--  LocalWords:  Attester Verifier UCCS decrypted rekeying JWT EATs
 -->
<!--  LocalWords:  Verifier's CWTs Attester Verifier FCFS
 -->

<?line 501?>

</section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t><contact fullname="Laurence Lundblade"/> suggested some improvements to the CDDL.
<contact fullname="Carl Wallace"/> provided a very useful review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
