<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.5) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY SELF "RFCthis">
]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-suit-report-18" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SUIT Reports">Secure Reporting of SUIT Update Status</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>

    <date year="2025" month="December" day="09"/>

    <area>Security</area>
    <workgroup>SUIT</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 62?>

<t>The Software Update for the Internet of Things (SUIT) manifest provides
a way for many different update and boot
workflows to be described by a common format.
This document specifies a lightweight feedback mechanism that
allows a developer in possession of a manifest to reconstruct the
decisions made and actions performed by a manifest processor.</t>



    </abstract>



  </front>

  <middle>


<?line 71?>

<section anchor="introduction"><name>Introduction</name>

<t>This document specifies a
logging container, specific to Software Update for the Internet of Things (SUIT) Manifests (<xref target="I-D.ietf-suit-manifest"/>)
that creates a lightweight feedback mechanism for
developers in the event that an update or boot fails in the manifest
processor. In this way, it provides the necessary link between the
Status Tracker Client and the Status Tracker Server as defined in
<xref section="2.3" sectionFormat="of" target="RFC9019"/>.</t>

<t>A SUIT Manifest Processor can fail to install or boot an update for many
reasons. Frequently, the error codes generated by such systems fail to
provide developers with enough information to find root causes and
produce corrective actions, resulting in extra effort to reproduce
failures. Logging the results of each SUIT command can simplify this
process.</t>

<t>While it is possible to report the results of SUIT commands through
existing logging or attestation mechanisms, this comes with several
drawbacks:</t>

<t><list style="symbols">
  <t>data inflation, particularly when designed for text-based logging</t>
  <t>missing information elements</t>
  <t>missing support for multiple components</t>
</list></t>

<t>The CBOR objects defined in this document allow devices to:</t>

<t><list style="symbols">
  <t>report a trace of how an update was performed</t>
  <t>report expected vs. actual values for critical checks</t>
  <t>describe the installation of complex multi-component architectures</t>
  <t>describe the measured properties of a system</t>
  <t>report the exact reason for a parsing failure</t>
</list></t>

</section>
<section anchor="terminology"><name>Conventions and Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>The terms "Author", "Recipient", and "Manifest" are defined in 
<xref section="2" sectionFormat="of" target="I-D.ietf-suit-manifest"/>.</t>

<t>Additionally, this document uses the term
Boot: initialization of an executable image. Although this
document refers to boot, any boot-specific operations described
are equally applicable to starting an executable in an OS context.</t>

</section>
<section anchor="suit-record"><name>The SUIT_Record</name>

<t>The SUIT_Record is a record of a decision taken by the Manifest Processor.
It contains the information that the Manifest Processor used to make the
decision. The decision can be inferred from this information, so it is not
included.
If the developer has a copy of the
manifest, then they need little information to reconstruct what the
manifest processor has done. They need any data that influences
the control flow of the manifest. The manifest only supports the
following control flow primitives:</t>

<t><list style="symbols">
  <t>Set Component</t>
  <t>Set/Override Parameters</t>
  <t>Try-Each</t>
  <t>Run Sequence</t>
  <t>Conditions</t>
</list></t>

<t>Of these, only conditions change the behavior of the processor from the
default, and then only when the condition fails.</t>

<t>To reconstruct the flow of a manifest, a developer needs
a list of metadata about failed conditions:</t>

<t><list style="symbols">
  <t>the current manifest</t>
  <t>the current Command Sequence (<xref section="5.3.3" sectionFormat="of" target="I-D.ietf-suit-manifest"/>)</t>
  <t>the offset into the current Command Sequence</t>
  <t>the current component index</t>
  <t>the "reason" for failure</t>
</list></t>

<t>Most conditions compare a parameter to an actual value, so the "reason"
is typically the actual value.</t>

<t>Since it is possible that a non-condition command (directive) may fail in an
exceptional circumstance,
a failure code for a non condition command must be communicated to the developer. However,
a failed directive will terminate processing of the manifest. To accommodate
for a failed command and for explicit "completion," an additional "result"
element is included as well; however, this is included in the SUIT_Report (<xref target="suit-report"/>).
In the case of a command failure,
the failure reason is typically a numeric error code. However, these error
codes need to be standardised in order to be useful.</t>

<t>This approach effectively compacts the log of operations taken using the SUIT Manifest
as a dictionary. This enables a full reconstruction of the log using a matching
decompaction tool. The following CDDL (<xref target="RFC8610"/>) shows the structure of a SUIT_Record.</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Record = [
    suit-record-manifest-id        : [* uint ],
    suit-record-manifest-section   : int,
    suit-record-section-offset     : uint,
    suit-record-component-index    : uint,
    suit-record-properties         : SUIT_Parameters,
    $$SUIT_Record_Extensions
]
]]></sourcecode></figure>

<t>suit-record-manifest-id is used to identify which manifest contains the
command that caused the record to be generated. The manifest id is a
list of integers that form a walk of the manifest tree, starting at the
root. An empty list indicates that the command was contained in the
root manifest. If the list is not empty, the command was contained in
one of the root manifest's dependencies, or nested even further below
that.</t>

<t>For example, suppose that the root manifest has 3 dependencies
and each of those dependencies has 2 dependencies of its own:</t>

<t><list style="symbols">
  <t>Root  <list style="symbols">
      <t>Dependency A (index 0)      <list style="symbols">
          <t>Dependency AA (index 0,0)</t>
          <t>Dependency AB (index 0,1)</t>
        </list></t>
      <t>Dependency B (index 1)      <list style="symbols">
          <t>Dependency BA (index 1,0)</t>
          <t>Dependency BB (index 1,1)</t>
        </list></t>
      <t>Dependency C (index 2)      <list style="symbols">
          <t>Dependency CA (index 2,0)</t>
          <t>Dependency CB (index 2,1)</t>
        </list></t>
    </list></t>
</list></t>

<t>A suit-record-manifest-id of [1,0] would indicate that the current command was
contained within Dependency BA. Similarly, a suit-record-manifest-id of [2,1]
would indicate Dependency CB</t>

<t>suit-record-manifest-section indicates which Command Sequence of the manifest was
active. Only the "top level" Command Sequences, with entries in the Manifest are
identified by this element. These are:</t>

<t><list style="symbols">
  <t>suit-validate = 7</t>
  <t>suit-load = 8</t>
  <t>suit-invoke = 9</t>
  <t>suit-dependency-resolution  = 15</t>
  <t>suit-payload-fetch = 16</t>
  <t>suit-candidate-verification = 18</t>
  <t>suit-install = 20</t>
</list></t>

<t>This list may be extended through extensions to the SUIT_Manifest.</t>

<t>suit-record-manifest-section is used in addition to an offset so that the developer can
index into severable Command Sequences in a predictable way. The value of this
element is the value of the key that identified the Command Sequence in the
manifest.</t>

<t>suit-record-section-offset is the number of bytes into the current
Command Sequence at which the current command is located.</t>

<t>suit-record-component-index is the index of the component that was
specified at the time that the report was generated. This field is
necessary due to the availability of set-current-component values of
True and a list of components. Both of these values cause the manifest
processor to loop over commands using a series of component-ids, so the
developer needs to know which was selected when the command executed.</t>

<t>suit-record-properties contains any measured properties that led to the
command failure.
For example, this could be the actual value of a SUIT_Digest or
class identifier. This is encoded in a SUIT_Parameters block as defined
in <xref section="8.4.8" sectionFormat="of" target="I-D.ietf-suit-manifest"/>.</t>

</section>
<section anchor="suit-report"><name>The SUIT_Report</name>

<t>The SUIT_Report is a SUIT-specific logging container. It contains
the SUIT_Records needed to reconstruct the decisions made by a
Manifest Processor as well as references to the Manifest being 
processed, the result of processing, and an optional capability
report.</t>

<t>Some metadata is common to all records, such as the root manifest:
the manifest that is the entry-point for the manifest processor. This
metadata is aggregated with a list of SUIT_Records as defined in 
<xref target="suit-record"/>. The SUIT_Report
may also contain a list of any System Properties that were measured
and reported, and a reason for a failure if one occurred.
The following CDDL describes the structure of a SUIT_Report and
a SUIT_Reference:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Report = {
  suit-reference              => SUIT_Reference,
  ? suit-report-nonce         => bstr,
  suit-report-records         => \
        \[ * SUIT_Record / system-property-claims \],
  suit-report-result          => true / {
    suit-report-result-code   => int,
    suit-report-result-record => SUIT_Record,
    suit-report-result-reason => SUIT_Report_Reasons,
  },
  ? suit-report-capability-report => SUIT_Capability_Report,
  $$SUIT_Report_Extensions
}

system-property-claims = {
  system-component-id => SUIT_Component_Identifier,
  + SUIT_Parameters,
}

SUIT_Reference = [
    suit-report-manifest-uri  : tstr,
    suit-report-manifest-digest : SUIT_Digest,
]
]]></sourcecode></figure>

<t>Further details for each element appear in subsequent sections: the
encoding of <spanx style="verb">suit-report-records</spanx> is defined in <xref target="suit-report-records"/>,
the result semantics in <xref target="suit-report-result"/>, and the optional
capability report in <xref target="capabilities"/>.</t>

<t>The suit-reference provides a reference URI and digest for a suit
manifest. The URI <bcp14>MUST</bcp14> exactly match the suit-reference-uri
(<xref section="8.4.3" sectionFormat="of" target="I-D.ietf-suit-manifest"/>) that is provided in the
manifest. The digest is the digest of the manifest, exactly as reported in
SUIT_Authentication, element 0 (<xref section="8.3" sectionFormat="of" target="I-D.ietf-suit-manifest"/>).</t>

<t>NOTE: The digest is used
in preference to other identifiers in the manifest because it allows
a manifest to be uniquely identified (collision resistance) whereas
other identifiers, such as the sequence number, can collide,
particularly in scenarios with multiple trusted signers.</t>

<t>suit-report-nonce provides a container for freshness or replay
protection information. This field <bcp14>MAY</bcp14> be omitted where the suit-report
is authenticated within a container that provides freshness already.
For example, attestation evidence typically contains a proof of
freshness.</t>

<t>suit-report-manifest-digest provides a SUIT_Digest (as defined in
<xref section="10" sectionFormat="of" target="I-D.ietf-suit-manifest"/>) that is the characteristic digest of the
Root manifest. This digest <bcp14>MUST</bcp14> be the same digest as is held in
the first element of SUIT_Authentication in the referenced
Manifest_Envelope.</t>

<t>suit-report-manifest-uri provides the reference URI that was provided in
the root manifest.</t>

<section anchor="suit-report-records"><name>suit-report-records</name>

<t>suit-report-records is a list of 0 or more SUIT_Records or
system-property-claims. Because SUIT_Records are only generated on failure,
in simple cases this can be an empty list. SUIT_Records and
suit-system-property-claims are merged into a single list because this
reduces the overhead for a constrained node that generates this report.
The use of a single log allows report generators to use simple
memory management. Because the system-property-claims
are encoded as maps and SUIT_Records are encoded as lists, a recipient need
only filter the CBOR Type-5 entries from suit-report-records to obtain all 
system-property-claims.</t>

<t>System Properties can be extracted from suit-report-records by filtering
suit-report-records for maps. System Properties are a list of measured
or asserted properties
of the system that creates the SUIT_Report. These properties are scoped by
component identifier. Because this list is expected to be constructed on
the fly by a constrained node, component identifiers may appear more than
once. A recipient may convert the result to a more conventional structure:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Record_System_Properties = {
  * component-id => {
    + SUIT_Parameters,
  }
}
]]></sourcecode></figure>

</section>
<section anchor="suit-report-result"><name>suit-report-result</name>

<t>suit-report-result provides a mechanism to show that the SUIT procedure
completed successfully (value is true) or why it failed (value is a map
of an error code and a SUIT_Record).</t>

<t>suit-report-result-reason gives a high-level explanation of the failure.
These reasons are intended for interoperable implementations. The reasons
are divided into a small number of groups:</t>

<t><list style="symbols">
  <t>suit-report-reason-cbor-parse: a parsing error was encountered by the
CBOR parser.</t>
  <t>suit-report-reason-cose-unsupported: an unsupported COSE (<xref target="RFC9052"/>) structure or
header was encountered.</t>
  <t>suit-report-reason-alg-unsupported: an unsupported COSE algorithm was
encountered.</t>
  <t>suit-report-reason-unauthorised: Signature/MAC verification failed.</t>
  <t>suit-report-reason-command-unsupported: an unsupported command was
encountered.</t>
  <t>suit-report-reason-component-unsupported: The manifest declared a
component/prefix that does not exist.</t>
  <t>suit-report-reason-component-unauthorised: The manifest declared a
component that is not accessible by the signer.</t>
  <t>suit-report-reason-parameter-unsupported: The manifest used a
parameter that does not exist.</t>
  <t>suit-report-reason-severing-unsupported: The manifest used severable fields
but the Manifest Processor does not support them.</t>
  <t>suit-report-reason-condition-failed: A condition failed with soft-
failure off.</t>
  <t>suit-report-reason-operation-failed: A command failed (e.g.,
download/copy/swap/write)</t>
  <t>suit-report-reason-invoke-pending: Invocation is about to be attempted
and the final outcome is not yet known.</t>
</list></t>

<t>The suit-report-result-code reports an internal error code that is
provided for debugging reasons. This code is not intended for
interoperability.</t>

<t>The suit-report-result-record indicates the exact point in the manifest
or manifest dependency tree where the error occurred.</t>

<t>NOTE: Some deployments use <spanx style="verb">SUIT_Command_Invoke</spanx>, which can transfer
control to invoked code that never returns to the Manifest Processor.
When a SUIT_Report is produced for remote attestation, implementations
often need to sign the report before attempting the invoke. Signing with
an unconditional "success" result would be misleading if the invocation
ultimately fails. Implementers can leave the invoke outcome
implicit—allowing a verifier to infer that execution was handed off—or,
when the result must be reported before invocation, use
<spanx style="verb">suit-report-reason-invoke-pending</spanx> to signal that invocation is about to
occur without asserting a final outcome.</t>

<t>suit-report-capability-report provides a mechanism to report the capabilities of the Manifest Processor. The SUIT_Capability_Report is described in <xref target="capabilities"/>. The capability report is optional to include in the SUIT_Report, according to an application-specific policy. While the SUIT_Capability_Report is not expected to be very large, applications should ensure that they only report capabilities when necessary in order to conserve bandwidth. A capability report is not necessary except when:</t>

<t><list style="numbers" type="1">
  <t>A client explicitly requests the capability report, or</t>
  <t>A manifest attempts to use a capability that the Manifest Processor does not implement.</t>
</list></t>

</section>
</section>
<section anchor="attestation"><name>Attestation</name>

<t>Where Remote Attestation (see <xref target="RFC9334"/>, the RATS Architecture) is in use, the RATS Verifier (Verifier hereafter) requires a set of
Attestation Evidence. Attestation Evidence contains Evidence Claims about the Attester. These Evidence Claims
contain measurements about the Attester. Many of these measurements are the same measurements that are generated in SUIT,
which means that a SUIT_Report contains most of the Claims and some of the Endorsements that a Verifier requires.</t>

<t>Using a SUIT_Manifest and a SUIT_Report improves a Verifier's ability to 
appraise the trustworthiness of a remote device.
Remote attestation is done by using the SUIT_Envelope
along with the SUIT_Report in Evidence to reconstruct the state of the device at boot time.
Additionally, by including SUIT_Report data as telemetry (i.e., debug/failure information) next to measurements in Evidence, both types of Evidence data can be notarized via verifiable data structure, such as an append-only log (<xref section="3" sectionFormat="of" target="I-D.ietf-scitt-architecture"/>) using the same conceptual message.</t>

<t>For the SUIT_Report to be usable as Attestation Evidence, the environment that
generated the SUIT_Report also needs to be measured. Typically, this means that
the software that executes the commands in the Manifest (the Manifest
Processor) must be measured; similarly, the piece of software that assembles
the measurements, taken by the Manifest Processor, into the SUIT_Report (the
Report Generator) must also be measured. Any bootloaders or operating systems
that facilitate the running of the Manifest Processor or Report Generator also need
to be measured in order to demonstrate the integrity of the measuring environment.</t>

<t>Therefore, if a Remote Attestation format that conveys Attestation Evidence, such as an Entity Attestation Token (EAT, see <xref target="RFC9711"/>), contains a SUIT_Report, then it <bcp14>MUST</bcp14> also include an integrity measurement of the Manifest Processor, the Report Generator and any bootloader or OS environment that ran before or during the 
execution of both.</t>

<t>If Reference Values (<xref section="8.3" sectionFormat="of" target="RFC9334"/>) required by the Verifier are delivered in a SUIT_Envelope, this codifies the delivery of appraisal information to the Verifier:</t>

<t><list style="symbols">
  <t>The Firmware Distributor:
  <list style="symbols">
      <t>sends the SUIT_Envelope to the Verifier without payload or text, but with Reference Values</t>
      <t>sends the SUIT_Envelope to the Recipient without Reference Values, or text, but with payload</t>
    </list></t>
  <t>The Recipient:
  <list style="symbols">
      <t>Installs the firmware as described in the SUIT_Manifest and generates a SUIT_Report, which is encapsulated in an EAT by the installer and sent to the Firmware Distributor.</t>
      <t>Boots the firmware as described in the SUIT_Manifest and creates a SUIT_Report, which is encapsulated in an EAT by the installer and sent to the Firmware Distributor.</t>
    </list></t>
  <t>The Firmware Distributor sends both reports to the Verifier (separately or together)</t>
  <t>The Verifier:
  <list style="symbols">
      <t>Reconstructs the state of the device using the manifest</t>
      <t>Compares this state to the Reference Values</t>
      <t>Returns an Attestation Report to the Firmware Distributor</t>
    </list></t>
</list></t>

<t>This approach simplifies the design of the bootloader since it is able to use an append-only log. It allows a Verifier to validate this report against signed Reference Values that is provided by the firmware author, which simplifies the delivery chain of verification information to the Verifier.</t>

<t>For a Verifier to consume the SUIT_Report, it requires a copy of the
SUIT_Manifest. The Verifier then replays the SUIT_Manifest, using the
SUIT_Report to resolve whether each condition is met. It identifies each
measurement that is required by attestation policy and records this
measurement as a Claim (<xref section="4" sectionFormat="of" target="RFC9711"/>). It evaluates whether the SUIT_Report
correctly matches the SUIT_Manifest as an element of evaluating
trustworthiness. For example there are several indicators that would show
that a SUIT_Report does not match a SUIT_Manifest. If any of the following
(not an exhaustive list) occur, then the Manifest Processor that created the
report is not trustworthy:</t>

<t><list style="symbols">
  <t>Hash of SUIT_Manifest at suit-report-manifest-uri does not match suit-report-manifest-digest</t>
  <t>A SUIT_Record is issued for a SUIT_Command_Sequence that does not exist 
in the SUIT_Manifest at suit-report-manifest-uri.</t>
  <t>A SUIT_Record is identified at an offset that is not a condition and does
not have a reporting policy that would indicate a SUIT_Record is needed.</t>
</list></t>

<t>Many architectures require multiple Verifiers, for example where one Verifier
handles hardware trust, and another handles software trust, especially the
evaluation of software authenticity and freshness. Some Verifiers may not
be capable of processing a SUIT_Report and, for separation of roles, it
may be preferable to divide that responsibility. In this case, the Verifier
of the SUIT_Report should perform an Evidence Transformation
<xref target="I-D.ietf-rats-evidence-trans"/> and
produce general purpose Measurement Results Claims that can be consumed by a
downstream Verifier, for example a Verifying Relying Party, that does not
understand SUIT_Reports.</t>

</section>
<section anchor="capabilities"><name>Capability Reporting</name>

<t>Because SUIT is extensible, a manifest author must know what capabilities a device has available. To enable this, a capability report is a set of lists that define which commands, parameters, algorithms, and component IDs are supported by a manifest processor.</t>

<t>The CDDL for a SUIT_Capability_Report follows:</t>

<figure><sourcecode type="~CDDL"><![CDATA[
SUIT_Capability_Report = {
  suit-component-capabilities  => [+ SUIT_Component_Capability ]
  suit-command-capabilities          => [+ int],
  suit-parameters-capabilities       => [+ int],
  suit-crypt-algo-capabilities       => [+ int],
  ? suit-envelope-capabilities       => [+ int],
  ? suit-manifest-capabilities       => [+ int],
  ? suit-common-capabilities         => [+ int],
  ? suit-text-capabilities           => [+ int],
  ? suit-text-component-capabilities => [+ int],
  ? suit-dependency-capabilities     => [+ int],
  * [+int]                           => [+ int],
  $$SUIT_Capability_Report_Extensions
}

SUIT_Component_Capability = [*bstr,?true]
]]></sourcecode></figure>

<t>A SUIT_Component_Capability is similar to a SUIT_Component_ID, with one difference: it may optionally be terminated by a CBOR 'true' which acts as a wild-card match for any component with a prefix matching the SUIT_Component_Capability leading up to the 'true.' This feature is for use with filesystem storage, key value stores, or any other arbitrary-component-id storage systems.</t>

<t>When reporting capabilities, it is <bcp14>OPTIONAL</bcp14> to report capabilities that are declared mandatory by the SUIT Manifest <xref target="I-D.ietf-suit-manifest"/>. Capabilities defined by extensions <bcp14>MUST</bcp14> be reported.</t>

<t>Additional capability reporting can be added as follows: if a manifest element does not exist in this map, it can be added by specifying the CBOR path to the manifest element in an array and using this as the key. For example SUIT_Dependencies, as described in <xref section="5.2.2" sectionFormat="of" target="I-D.ietf-suit-trust-domains"/>,  could have an extension added, which was key 3 in the SUIT_Dependencies map. This capability would be reported as: [3, 3, 1] =&gt; [3], where the key consists of the key for SUIT_Manifest (3), the key for SUIT_Common (3), and the key for SUIT_Dependencies (1). Then the value indicates that this manifest processor supports the extension (3).</t>

</section>
<section anchor="eat"><name>EAT Claim</name>

<t>The Entity Attestation Token (EAT, see <xref target="RFC9711"/>) is a secure container for conveying
Attestation Evidence, such as measurements, and Attestation Results.
The SUIT_Report is a form of measurement done by the SUIT Manifest Processor as it attempts to invoke a manifest or install a manifest. As a result, the SUIT_Report can be captured in an EAT measurements type.</t>

<t>The log-based structure of the SUIT_Report is not conducive to processing by a
typical Relying Party: it contains only a list of waypoints through the SUIT
Manifest--unless system parameter records are included--and requires additional 
information (the SUIT_Manifest) to reconstruct the values that must have been
present at each test. A Verifier in posession of the SUIT_Manifest can reconstruct 
the measurements that would produce the waypoints in the SUIT_Report. The Verifier 
<bcp14>SHOULD</bcp14> convert a SUIT_Report into a more consumable version of the EAT claim by, for 
example, constructing a measurement results claim that contains the digest of a 
component, the Vendor ID and Class ID of a component, etc.</t>

</section>
<section anchor="container"><name>SUIT_Report Container</name>

<t>Transmission of the SUIT_Report <bcp14>MUST</bcp14> satisfy the requirements of <xref section="4.3.16" sectionFormat="of" target="RFC9124"/>: REQ.SEC.REPORTING.</t>

<t>Status reports from the device to any remote system <bcp14>MUST</bcp14> be performed over an authenticated, confidential channel in order to prevent modification or spoofing of the reports.</t>

<t>As a result, the SUIT_Report <bcp14>MUST</bcp14> be transported using one of the following methods:</t>

<t><list style="symbols">
  <t>As part of a larger document that provides authenticity guarantees, such as within a <spanx style="verb">measurements</spanx> claim in an Entity Attestation Token (EAT, <xref section="4.2.16" sectionFormat="of" target="RFC9711"/>).</t>
  <t>As the payload of a message transmitted over a communication security protocol, such as DTLS <xref target="RFC9147"/>.</t>
  <t>Encapsulated within a secure container, such as a COSE structure. In the case of COSE, the container <bcp14>MUST</bcp14> be either a <spanx style="verb">COSE_Encrypt0</spanx> or <spanx style="verb">COSE_Sign1</spanx> structure. The SUIT_Report <bcp14>MUST</bcp14> be the sole payload, as illustrated by the CDDL fragment below.</t>
</list></t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Report_Protected /= SUIT_Report_COSE_Sign1 \
                         .and SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_Sign1_Tagged \
                         .and SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0 \
                         .and SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0_Tagged \
                         .and SUIT_COSE_Profiles

SUIT_Report_COSE_Sign1_Tagged = #6.18(SUIT_Report_COSE_Sign1)
SUIT_Report_COSE_Sign1 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    signature : bstr
]
SUIT_Report_COSE_MAC0_Tagged = #6.17(SUIT_Report_COSE_MAC0)
SUIT_Report_COSE_MAC0 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    tag : bstr
]
SUIT_Report_Unprotected = SUIT_Report / SUIT_Report_COSE_Encrypt0
SUIT_Report_COSE_Encrypt0 = COSE_Encrypt0
]]></sourcecode></figure>

<t>Note that SUIT_Report_COSE_Sign1 and SUIT_Report_COSE_MAC0 <bcp14>MUST</bcp14> be combined with a SUIT_COSE_Profiles from <xref target="I-D.ietf-suit-mti"/> using the CDDL .and directive. The SUIT_Report_COSE_Encrypt0 carries a ciphertext payload that <bcp14>MUST</bcp14> contain just the ciphertext obtained by encrypting the following CDDL:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Report_plaintext = bstr .cbor SUIT_Report
]]></sourcecode></figure>

<t>SUIT_COSE_Profiles, which use AES-CTR encryption, are not integrity protected and authenticated. For this purpose, SUIT_Report_Protected defines authenticated containers with an encrypted payload.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<t>IANA is requested to rename the overall SUIT registry group (https://www.iana.org/assignments/suit/suit.xhtml) "Software Update for the Internet of Things (SUIT)".</t>

<t>IANA is requested to allocate a CBOR tag for each of the following items. Please see <xref target="cbor-tag"/> for further details.</t>

<t><list style="symbols">
  <t>SUIT_Report_Protected</t>
  <t>SUIT_Reference</t>
  <t>SUIT_Capability_Report</t>
</list></t>

<t>IANA is requested to allocate a CoAP content-format <xref target="RFC7252"/> and a media-type for SUIT_Report <xref target="media-type"/>. Please see <xref target="media-type"/> and <xref target="coap-cf"/> for further details.</t>

<t>IANA is also requested to add the following registries to the SUIT registry group (https://www.iana.org/assignments/suit/suit.xhtml).</t>

<t><list style="symbols">
  <t>SUIT_Report Elements <xref target="iana-suit-report-elements"/></t>
  <t>SUIT_Record Elements <xref target="iana-suit-record-elements"/></t>
  <t>SUIT_Report Reasons <xref target="iana-suit-report-reasons"/></t>
  <t>SUIT_Capability_Report Elements <xref target="iana-suit-capability-report"/></t>
</list></t>

<t>For each of these registries, registration policy is:</t>

<t><list style="symbols">
  <t>-256 to 255: Standards Action</t>
  <t>-65536 to 257, 256 to 65535: Specification Required</t>
  <t>-4294967296 to -65537, 65536 to 4294967295: First Come First Served</t>
</list></t>

<t>Requests in the Standards Action and Specification Required ranges <bcp14>MUST</bcp14> also
undergo designated expert review as described below; this guidance supplements
the normal IANA processing for those policies.</t>

<section anchor="expert-review-instructions"><name>Expert Review Instructions</name>

<t>The IANA registries established in this document allow values to be added based on expert review. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason, so they should be given substantial latitude.</t>

<t>Expert reviewers should take into consideration the following points:</t>

<t><list style="symbols">
  <t>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments. The zones tagged as private use are intended for testing purposes and closed environments; code points in other ranges should not be assigned for testing.</t>
  <t>Specifications are required for the standards track range of point assignment. Specifications should exist for all other ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</t>
  <t>Experts should take into account the expected usage of fields when approving point assignment. The fact that there is a range for standards track documents does not mean that a standards track document cannot have points assigned outside of that range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
</list></t>

</section>
<section anchor="media-type"><name>Media Type Registration</name>

<section anchor="applicationsuit-reportcose"><name>application/suit-report+cose</name>

<t>IANA is requested to register application/suit-report+cose as a media type for the SUIT_Report.</t>

<dl spacing="compact">
  <dt>Type name:</dt>
  <dd>
    <t>application</t>
  </dd>
  <dt>Subtype name:</dt>
  <dd>
    <t>suit-report+cose</t>
  </dd>
  <dt>Required parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Optional parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Encoding considerations:</dt>
  <dd>
    <t>binary (CBOR)</t>
  </dd>
  <dt>Security considerations:</dt>
  <dd>
    <t><xref target="seccons"/> of &SELF;</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>SUIT Reports are encoded as CBOR and optionally wrapped in any COSE structure (e.g., COSE_Sign1, COSE_Mac0, COSE_Encrypt0). Receivers must be able to identify and process the COSE envelope used and support compatible COSE algorithms for validation or decryption. All versioning and structure are self-describing within the CBOR SUIT_Report format, and no media-type parameters are used for negotiation. Interoperability therefore depends on shared deployment profiles that specify the expected COSE protections and algorithms. Comprehension of a SUIT Report is dependent on obtaining a matching SUIT Manifest. The structure is effectively opaque if the matching SUIT Manifest cannot be sourced.</t>
  </dd>
  <dt>Published specification:</dt>
  <dd>
    <t>&SELF;</t>
  </dd>
  <dt>Applications that use this media type:</dt>
  <dd>
    <t>SUIT Manifest Processor, SUIT Manifest Distributor, SUIT Manifest Author, RATS Attesters, RATS Verifiers</t>
  </dd>
  <dt>Fragment identifier considerations:</dt>
  <dd>
    <t>The syntax and semantics of fragment identifiers are as specified for "application/cose".</t>
  </dd>
  <dt>Person &amp; email address to contact for further information:</dt>
  <dd>
    <t>SUIT WG mailing list (suit@ietf.org)</t>
  </dd>
  <dt>Intended usage:</dt>
  <dd>
    <t>COMMON</t>
  </dd>
  <dt>Restrictions on usage:</dt>
  <dd>
    <t>none</t>
  </dd>
  <dt>Author/Change controller:</dt>
  <dd>
    <t>IETF</t>
  </dd>
  <dt>Provisional registration:</dt>
  <dd>
    <t>no</t>
  </dd>
</dl>

</section>
</section>
<section anchor="coap-cf"><name>CoAP Content-Format Registration</name>

<t>IANA is requested to assign a CoAP Content-Format ID for the SUIT_Report media type in the "CoAP Content-Formats" registry, from the "IETF Review with Expert Review or IESG Approval with Expert Review" space (256..9999), within the "CoRE Parameters" registry group <xref target="RFC7252"/> <xref target="IANA.core-parameters"/>:</t>

<texttable>
      <ttcol align='left'>Content Type</ttcol>
      <ttcol align='left'>Content Coding</ttcol>
      <ttcol align='left'>ID</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>application/suit-report+cose</c>
      <c>&#160;</c>
      <c>TBA</c>
      <c>&SELF;</c>
</texttable>

</section>
<section anchor="cbor-tag"><name>CBOR Tag Registration</name>

<t>IANA is requested to allocate a tag in the "CBOR Tags" registry <xref target="IANA.cbor-tags"/>, preferably in the Specification Required range:</t>

<texttable>
      <ttcol align='left'>Tag</ttcol>
      <ttcol align='left'>Data Item</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c>TBA</c>
      <c>array</c>
      <c>SUIT_Report_Protected</c>
      <c>TBA</c>
      <c>array</c>
      <c>SUIT_Reference</c>
      <c>TBA</c>
      <c>map</c>
      <c>SUIT_Capability_Report</c>
</texttable>

</section>
<section anchor="iana-suit-report-elements"><name>SUIT_Report Elements</name>

<t>IANA is requested to create a new registry for SUIT_Report Elements.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>2</c>
      <c>Nonce</c>
      <c>suit-report-nonce</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>3</c>
      <c>Records</c>
      <c>suit-report-records</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>4</c>
      <c>Result</c>
      <c>suit-report-result</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>5</c>
      <c>Result Code</c>
      <c>suit-report-result-code</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>6</c>
      <c>Result Record</c>
      <c>suit-report-result-record</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>7</c>
      <c>Result Reason</c>
      <c>suit-report-result-reason</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>8</c>
      <c>Capability Report</c>
      <c>suit-report-capability-report</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>99</c>
      <c>Reference</c>
      <c>suit-reference</c>
      <c><xref target="suit-report"/> of &SELF;</c>
</texttable>

</section>
<section anchor="iana-suit-record-elements"><name>SUIT_Record Elements</name>

<t>IANA is requested to create a new registry for SUIT_Record Elements.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>Manifest ID</c>
      <c>suit-record-manifest-id</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>1</c>
      <c>Manifest Section</c>
      <c>suit-record-manifest-section</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>2</c>
      <c>Section Offset</c>
      <c>suit-record-section-offset</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>3</c>
      <c>Component Index</c>
      <c>suit-record-component-index</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>4</c>
      <c>Record Properties</c>
      <c>suit-record-properties</c>
      <c><xref target="suit-record"/> of &SELF;</c>
</texttable>

</section>
<section anchor="iana-suit-report-reasons"><name>SUIT_Report Reasons</name>

<t>IANA is requested to create a new registry for SUIT_Report Reasons.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>Result OK</c>
      <c>suit-report-reason-ok</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>1</c>
      <c>CBOR Parse Failure</c>
      <c>suit-report-reason-cbor-parse</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>2</c>
      <c>Unsupported COSE Structure or Header</c>
      <c>suit-report-reason-cose-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>3</c>
      <c>Unsupported COSE Algorithm</c>
      <c>suit-report-reason-alg-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>4</c>
      <c>Signature / MAC verification failed</c>
      <c>suit-report-reason-unauthorised</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>5</c>
      <c>Unsupported SUIT Command</c>
      <c>suit-report-reason-command-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>6</c>
      <c>Unsupported SUIT Component</c>
      <c>suit-report-reason-component-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>7</c>
      <c>Unauthorized SUIT Component</c>
      <c>suit-report-reason-component-unauthorised</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>8</c>
      <c>Unsupported SUIT Parameter</c>
      <c>suit-report-reason-parameter-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>9</c>
      <c>Severing Unsupported</c>
      <c>suit-report-reason-severing-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>10</c>
      <c>Condition Failed</c>
      <c>suit-report-reason-condition-failed</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>11</c>
      <c>Operation Failed</c>
      <c>suit-report-reason-operation-failed</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>12</c>
      <c>Invocation Pending</c>
      <c>suit-report-reason-invoke-pending</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
</texttable>

</section>
<section anchor="iana-suit-capability-report"><name> SUIT Capability Report Elements</name>

<t>IANA is requested to create a new registry for SUIT Capability Report Elements.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <ttcol align='left'>&#160;</ttcol>
      <c>1</c>
      <c>Components</c>
      <c>suit-component-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>2</c>
      <c>Commands</c>
      <c>suit-command-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>3</c>
      <c>Parameters</c>
      <c>suit-parameters-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>4</c>
      <c>Cryptographic Algorithms</c>
      <c>suit-crypt-algo-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>5</c>
      <c>Envelope Elements</c>
      <c>suit-envelope-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>6</c>
      <c>Manifest Elements</c>
      <c>suit-manifest-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>7</c>
      <c>Common Elements</c>
      <c>suit-common-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>8</c>
      <c>Text Elements</c>
      <c>suit-text-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>9</c>
      <c>Component Text Elements</c>
      <c>suit-text-component-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>10</c>
      <c>Dependency Capabilities</c>
      <c>suit-dependency-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
</texttable>

</section>
</section>
<section anchor="seccons"><name>Security Considerations</name>

<t>The SUIT_Report serves four primary security objectives:</t>

<t><list style="symbols">
  <t>Validated Identity</t>
  <t>Integrity</t>
  <t>Replay protection</t>
  <t>Confidentiality</t>
</list></t>

<t>The mechanisms for achieving these protections are outlined in <xref target="container"/>.</t>

<t>Ideally, a SUIT_Report <bcp14>SHOULD</bcp14> be conveyed as part of a remote attestation procedure,
such as embeding it in EAT tokens that represent RATS conceptual messages. This approach ensures that the SUIT_Report
is cryptographically bound to the environment (hardware, software, or both) in
which it was generated, thereby strengthening its authenticity.</t>

<t>A SUIT_Report may disclose sensitive information about the device on which it
were produced. In such cases, the SUIT_Report <bcp14>MUST</bcp14> be encrypted, as specified in
<xref target="container"/>.</t>

<t>Furthermore, failure reports, particularly those involving cryptographic operations,
can unintentionally reveal insights into system weaknesses or vulnerabilities. As such,
SUIT_Reports <bcp14>SHOULD</bcp14> be encrypted whenever possible, to minimize the risk of information
leakage.</t>

<t>In addition to these core security requirements, operational considerations must be taken
into account. When a SUIT_Report is included within another protocol message (e.g., inside
an encrypted EAT), care must be taken to avoid inadvertently leaking information and
to uphold the principle of least privilege. For example, in many EAT-based remote attestation flows,
the Verifier may not require the full SUIT_Report. Similarly, the Relying Party might not
need access to it either.</t>

<t>To support least-privilege access, the SUIT_Report should be independently encrypted, even
when the transport or enclosing token is also encrypted. This layered encryption ensures that
only authorized entities can access the contents of the SUIT_Report.</t>

<t>In other scenarios, the EAT Verifier might require full access to a SUIT_Report.
For example, the SUIT_Report must be accessible in its entirety for the EAT Verifier
to extract or convert the SUIT_Report content into specific EAT claims, such as <spanx style="verb">measres</spanx>
(Measurement Results). A typical case
involves translating a successful <spanx style="verb">suit-condition-image</spanx> check into a digest-based claim within
the EAT.</t>

<t>When applying cryptographic protection to the SUIT_Report, the same algorithm profile used for
the corresponding SUIT manifest <bcp14>SHOULD</bcp14> be reused. The available algorithm profiles are detailed
in <xref target="I-D.ietf-suit-mti"/>. If using the same profile is not feasible (e.g., due to constraints
imposed by <spanx style="verb">suit-sha256-hsslms-a256kw-a256ctr</spanx>), then a profile offering comparable security
strength <bcp14>SHOULD</bcp14> be selected—for instance, <spanx style="verb">suit-sha256-esp256-ecdh-a128ctr</spanx>.</t>

<t>In exceptional cases, if no suitable profile can be applied, the necessity of disabling a SUIT_Report functionality altogether might arise.</t>

<t>SUIT_Reports may expose information about the user to the Verifier, Firmware Distributor, or Manifest Author. Implementors <bcp14>MUST</bcp14> carefully consider user consent in the reporting system.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank Dave Thaler for his feedback.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="I-D.ietf-suit-manifest">
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname="Brendan Moran" initials="B." surname="Moran">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
      </author>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Koen Zandberg" initials="K." surname="Zandberg">
         <organization>Inria</organization>
      </author>
      <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day="28" month="May" year="2025"/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an Internet of Things (IoT) device), where to find
   the code/data, the devices to which it applies, and cryptographic
   information protecting the manifest.  Software updates and Trusted
   Invocation both tend to use sequences of common operations, so the
   manifest encodes those sequences of operations, rather than declaring
   the metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-manifest-34"/>
   
</reference>
<reference anchor="RFC9019">
  <front>
    <title>A Firmware Update Architecture for Internet of Things</title>
    <author fullname="B. Moran" initials="B." surname="Moran"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="D. Brown" initials="D." surname="Brown"/>
    <author fullname="M. Meriac" initials="M." surname="Meriac"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
      <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9019"/>
  <seriesInfo name="DOI" value="10.17487/RFC9019"/>
</reference>
<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>
<reference anchor="RFC9711">
  <front>
    <title>The Entity Attestation Token (EAT)</title>
    <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
    <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
    <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
    <author fullname="C. Wallace" initials="C." surname="Wallace"/>
    <date month="April" year="2025"/>
    <abstract>
      <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
      <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9711"/>
  <seriesInfo name="DOI" value="10.17487/RFC9711"/>
</reference>
<reference anchor="RFC8610">
  <front>
    <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="C. Vigano" initials="C." surname="Vigano"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2019"/>
    <abstract>
      <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8610"/>
  <seriesInfo name="DOI" value="10.17487/RFC8610"/>
</reference>
<reference anchor="RFC8792">
  <front>
    <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <author fullname="Q. Wu" initials="Q." surname="Wu"/>
    <date month="June" year="2020"/>
    <abstract>
      <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8792"/>
  <seriesInfo name="DOI" value="10.17487/RFC8792"/>
</reference>
<reference anchor="RFC9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>

<reference anchor="I-D.ietf-suit-mti">
   <front>
      <title>Cryptographic Algorithms for Internet of Things (IoT) Devices</title>
      <author fullname="Brendan Moran" initials="B." surname="Moran">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
         <organization>Nordic Semiconductor</organization>
      </author>
      <author fullname="Akira Tsukamoto" initials="A." surname="Tsukamoto">
         <organization>Openchip &amp; Software Technologies, S.L.</organization>
      </author>
      <date day="22" month="July" year="2025"/>
      <abstract>
	 <t>   The SUIT manifest, as defined in &quot;A Manifest Information Model for
   Firmware Updates in Internet of Things (IoT) Devices&quot; (RFC 9124),
   provides a flexible and extensible format for describing how firmware
   and software updates are to be fetched, verified, decrypted, and
   installed on resource-constrained devices.  To ensure the security of
   these update processes, the manifest relies on cryptographic
   algorithms for functions such as digital signature verification,
   integrity checking, and confidentiality.

   This document defines cryptographic algorithm profiles for use with
   the Software Updates for Internet of Things (SUIT) manifest.  These
   profiles specify sets of algorithms to promote interoperability
   across implementations.

   Given the diversity of IoT deployments and the evolving cryptographic
   landscape, algorithm agility is essential.  This document groups
   algorithms into named profiles to accommodate varying levels of
   device capabilities and security requirements.  These profiles
   support the use cases laid out in the SUIT architecture, published in
   &quot;A Firmware Update Architecture for Internet of Things&quot; (RFC 9019).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-mti-23"/>
   
</reference>
<reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
  <front>
    <title>Concise Binary Object Representation (CBOR) Tags</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
<reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
  <front>
    <title>Constrained RESTful Environments (CoRE) Parameters</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.ietf-suit-trust-domains">
   <front>
      <title>Software Update for the Internet of Things (SUIT) Manifest Extensions for Multiple Trust Domain</title>
      <author fullname="Brendan Moran" initials="B." surname="Moran">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Ken Takayama" initials="K." surname="Takayama">
         <organization>SECOM CO., LTD.</organization>
      </author>
      <date day="22" month="July" year="2025"/>
      <abstract>
	 <t>   A device has more than one trust domain when it enables delegation of
   different rights to mutually distrusting entities for use for
   different purposes or Components in the context of firmware or
   software update.  This specification describes extensions to the
   Software Update for the Internet of Things (SUIT) Manifest format for
   use in deployments with multiple trust domains.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-trust-domains-12"/>
   
</reference>

<reference anchor="I-D.ietf-scitt-architecture">
   <front>
      <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
         <organization>Microsoft Research</organization>
      </author>
      <author fullname="Cedric Fournet" initials="C." surname="Fournet">
         <organization>Microsoft Research</organization>
      </author>
      <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
         <organization>ARM</organization>
      </author>
      <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
      <date day="10" month="October" year="2025"/>
      <abstract>
	 <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
   
</reference>

<reference anchor="I-D.ietf-rats-evidence-trans">
   <front>
      <title>Evidence Transformations</title>
      <author fullname="Fabrizio Damato" initials="F." surname="Damato">
         <organization>AMD</organization>
      </author>
      <author fullname="Andrew Draper" initials="A." surname="Draper">
         <organization>Independent</organization>
      </author>
      <author fullname="Ned Smith" initials="N." surname="Smith">
         <organization>Independent</organization>
      </author>
      <date day="17" month="October" year="2025"/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester to decide if continued
   interaction is warrented.  Evidence structures can vary making
   appraisals challenging for Verifiers.  Verifiers need to understand
   Evidence encoding formats and some of the Evidence semantics to
   appraise it.  Consequently, Evidence may require format
   transformation to an internal representation that preserves original
   semantics.  This document specifies Evidence transformation methods
   for DiceTcbInfo, concise evidence, and SPDM measurements block
   structures.  These Evidence structures are converted to the CoRIM
   internal representation and follow CoRIM defined appraisal
   procedures.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-evidence-trans-02"/>
   
</reference>
<reference anchor="RFC9124">
  <front>
    <title>A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices</title>
    <author fullname="B. Moran" initials="B." surname="Moran"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <date month="January" year="2022"/>
    <abstract>
      <t>Vulnerabilities with Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism that is also suitable for constrained devices. Ensuring that devices function and remain secure over their service lifetime requires such an update mechanism to fix vulnerabilities, update configuration settings, and add new functionality.</t>
      <t>One component of such a firmware update is a concise and machine-processable metadata document, or manifest, that describes the firmware image(s) and offers appropriate protection. This document describes the information that must be present in the manifest.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9124"/>
  <seriesInfo name="DOI" value="10.17487/RFC9124"/>
</reference>
<reference anchor="RFC9147">
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9147"/>
  <seriesInfo name="DOI" value="10.17487/RFC9147"/>
</reference>
<reference anchor="RFC7252">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>



    </references>

</references>


<?line 818?>

<section anchor="full-cddl"><name>Full CDDL</name>
<t>In order to create a valid SUIT_Report document the structure of the corresponding CBOR message <bcp14>MUST</bcp14> adhere to the following CDDL (<xref target="RFC8610"/>) data definition.</t>

<t>To be valid, the following CDDL <bcp14>MUST</bcp14> have the COSE CDDL appended to it. The COSE CDDL can be obtained by following the directions in <xref section="1.4" sectionFormat="of" target="RFC9052"/>. It must also have the CDDL from <xref target="I-D.ietf-suit-mti"/> appended to it. This CDDL is line-wrapped per <xref target="RFC8792"/>.</t>

<figure><sourcecode type="CDDL"><![CDATA[
; NOTE: '\' line wrapping per RFC 8792
=============== NOTE: '\' line wrapping per RFC 8792 ================

SUIT_Report_Tool_Tweak /= SUIT_start
SUIT_Report_Tool_Tweak /= SUIT_Report_Protected
SUIT_Report_Protected /= SUIT_COSE_tool_tweak

SUIT_Report_Protected /= SUIT_Report_COSE_Sign1 .and \
                                                   SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_Sign1_Tagged .and \
                                                   SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0 .and \
                                                   SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0_Tagged .and \
                                                   SUIT_COSE_Profiles

SUIT_Report_COSE_Sign1_Tagged = #6.18(SUIT_Report_COSE_Sign1)
SUIT_Report_COSE_Sign1 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    signature : bstr
]
SUIT_Report_COSE_MAC0_Tagged = #6.17(SUIT_Report_COSE_MAC0)
SUIT_Report_COSE_MAC0 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    tag : bstr
]
SUIT_Report_Unprotected = SUIT_Report / SUIT_Report_COSE_Encrypt0
SUIT_Report_COSE_Encrypt0 = COSE_Encrypt0

SUIT_Report = {
  suit-reference              => SUIT_Reference,
  ? suit-report-nonce         => bstr,
  suit-report-records         => [
    * SUIT_Record / system-property-claims ],
  suit-report-result          => true / {
    suit-report-result-code   => int,
    suit-report-result-record => SUIT_Record,
    suit-report-result-reason => SUIT_Report_Reasons,
  },
  ? suit-report-capability-report => SUIT_Capability_Report,
  $$SUIT_Report_Extensions
}

SUIT_Reference = [
    suit-report-manifest-uri : tstr,
    suit-report-manifest-digest : SUIT_Digest
]

SUIT_Record = [
    suit-record-manifest-id        : [* uint ],
    suit-record-manifest-section   : int,
    suit-record-section-offset     : uint,
    suit-record-component-index    : uint,
    suit-record-properties         : {*$$SUIT_Parameters},
    $$SUIT_Record_Extensions
]

system-property-claims = {
  system-component-id => SUIT_Component_Identifier,
  + $$SUIT_Parameters,
}

SUIT_Capability_Report = {
  suit-component-capabilities  => [+ SUIT_Component_Capability]
  suit-command-capabilities          => [+ int],
  suit-parameters-capabilities       => [+ int],
  suit-crypt-algo-capabilities       => [+ int],
  ? suit-envelope-capabilities       => [+ int],
  ? suit-manifest-capabilities       => [+ int],
  ? suit-common-capabilities         => [+ int],
  ? suit-text-capabilities           => [+ int],
  ? suit-text-component-capabilities => [+ int],
  ? suit-dependency-capabilities     => [+ int],
  * [+int]                           => [+ int],
  $$SUIT_Capability_Report_Extensions
}

SUIT_Component_Capability = [*bstr,?true]

suit-report-nonce = 2
suit-report-records = 3
suit-report-result = 4
suit-report-result-code = 5
suit-report-result-record = 6
suit-report-result-reason = 7
suit-report-capability-report = 8
suit-reference = 99

system-component-id = 0

suit-record-manifest-id = 0
suit-record-manifest-section = 1
suit-record-section-offset = 2
suit-record-component-index = 3
suit-record-properties = 4

SUIT_Report_Reasons /= suit-report-reason-ok
SUIT_Report_Reasons /= suit-report-reason-cbor-parse
SUIT_Report_Reasons /= suit-report-reason-cose-unsupported
SUIT_Report_Reasons /= suit-report-reason-alg-unsupported
SUIT_Report_Reasons /= suit-report-reason-unauthorised
SUIT_Report_Reasons /= suit-report-reason-command-unsupported
SUIT_Report_Reasons /= suit-report-reason-component-unsupported
SUIT_Report_Reasons /= suit-report-reason-component-unauthorised
SUIT_Report_Reasons /= suit-report-reason-parameter-unsupported
SUIT_Report_Reasons /= suit-report-reason-severing-unsupported
SUIT_Report_Reasons /= suit-report-reason-condition-failed
SUIT_Report_Reasons /= suit-report-reason-operation-failed
SUIT_Report_Reasons /= suit-report-reason-invoke-pending

suit-report-reason-ok = 0
suit-report-reason-cbor-parse = 1
suit-report-reason-cose-unsupported = 2
suit-report-reason-alg-unsupported = 3
suit-report-reason-unauthorised = 4
suit-report-reason-command-unsupported = 5
suit-report-reason-component-unsupported = 6
suit-report-reason-component-unauthorised = 7
suit-report-reason-parameter-unsupported = 8
suit-report-reason-severing-unsupported = 9
suit-report-reason-condition-failed = 10
suit-report-reason-operation-failed = 11
suit-report-reason-invoke-pending = 12

suit-component-capabilities        = 1
suit-command-capabilities          = 2
suit-parameters-capabilities       = 3
suit-crypt-algo-capabilities       = 4
suit-envelope-capabilities         = 5
suit-manifest-capabilities         = 6
suit-common-capabilities           = 7
suit-text-capabilities             = 8
suit-text-component-capabilities   = 9
suit-dependency-capabilities       = 10
  
]]></sourcecode></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

