<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tiloca-lake-app-profiles-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="EDHOC Application Profiles">Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-tiloca-lake-app-profiles-00"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The lightweight authenticated key exchange protocol EDHOC requires certain parameters to be agreed out-of-band, in order to ensure its successful completion. To this end, application profiles specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. This document defines a number of means to coordinate the use and discovery of EDHOC application profiles. Also, it defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles. Finally, it defines a well-known EDHOC application profile.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://gitlab.com/crimson84/draft-tiloca-lake-app-profiles"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="I-D.ietf-lake-edhoc"/> is a lightweight authenticated key exchange protocol, especially intended for use in constrained scenarios.</t>
      <t>In order to successfully run EDHOC, the two peers acting as Initiator and Responder have to agree on certain parameters. Some of those are in-band and communicated through the protocol execution, during which a few of them may even be negotiated. However, other parameters have to be known out-of-band, before running the EDHOC protocol.</t>
      <t>As discussed in <xref section="8" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>, applications are expected to define EDHOC application profiles, which specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. In particular, an EDHOC application profile may include both in-band and out-of-band parameters.</t>
      <t>This document defines a number of means to coordinate the use and discovery of EDHOC application profiles, that is:</t>
      <ul spacing="normal">
        <li>The new IANA registry "EDHOC Application Profiles" defined in <xref target="iana-edhoc-application-profiles"/>, where to register identifiers of EDHOC application profiles.</li>
        <li>The new target attribute "ed-prof" defined in <xref target="web-linking"/>, which can be used in a web link <xref target="RFC8288"/> to an EDHOC resource. This can be used, for instance, in a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/>, see <xref section="A.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> as well as <xref target="I-D.ietf-core-oscore-edhoc"/>.</li>
        <li>Additional parameters for the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. These are defined in <xref target="sec-edhoc-information-parameters"/> and include the new parameter "app_prof", which can be used, for example, in the EDHOC and OSCORE profile of the ACE framework <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> to indicate the EDHOC application profiles supported by a Resource Server.</li>
      </ul>
      <t>Furthermore, this document defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles (see <xref target="sec-app-profile-cbor"/>), as well as a well-known EDHOC application profile (see <xref target="sec-well-known-app-profile"/>).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>The reader is expected to be familiar with terms and concepts defined in EDHOC <xref target="I-D.ietf-lake-edhoc"/>, and with the use of EDHOC with CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> defined in <xref target="I-D.ietf-core-oscore-edhoc"/>.</t>
        <t>Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and Concise Data Definition Language (CDDL) <xref target="RFC8610"/> are used in this document. CDDL predefined type names, especially bstr for CBOR byte strings and tstr for CBOR text strings, are used extensively in this document.</t>
      </section>
    </section>
    <section anchor="web-linking">
      <name>Web Linking</name>
      <t><xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/> defines a number of target attributes that can be used in a web link <xref target="RFC8288"/> with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). This is the case, e.g., when using a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> as defined in <xref section="A.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>. This allows a client to obtain relevant pieces of information from the EDHOC application profile(s) to be used with a certain EDHOC resource.</t>
      <t>In the same spirit, this section defines the following additional parameter, which can be optionally specified as a target attribute with the same name in the link to the respective EDHOC resource, or as filter criteria in a discovery request from a client.</t>
      <ul spacing="normal">
        <li>'ed-prof', specifying an EDHOC application profile supported by the server. This parameter MUST specify a single value, which is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document. This parameter MAY occur multiple times, with each occurrence specifying an EDHOC application profile.</li>
      </ul>
      <t>When specifying the parameter 'ed-prof' in a link to an EDHOC resource, the target attribute rt="core.edhoc" MUST be included.</t>
      <t>If a link to an EDHOC resource includes occurrences of the target attribute 'ed-prof', the link MUST NOT include other target attributes that provide information pertaining to an EDHOC application profile (see, e.g., <xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/>), which, if present, MUST be ignored by the recipient.</t>
      <t>The example in <xref target="fig-web-link-example"/> shows how a CoAP client discovers two EDHOC resources at a CoAP server, obtaining information elements from the respective application profile. The Link Format notation from <xref section="5" sectionFormat="of" target="RFC6690"/> is used.</t>
      <t>The example assumes the existence of an EDHOC application profile identified by the integer Profile ID 500, which is supported by the EDHOC resource at /edhoc-alt.</t>
      <figure anchor="fig-web-link-example">
        <name>The Web Link.</name>
        <artwork align="center"><![CDATA[
REQ: GET /.well-known/core

RES: 2.05 Content
    </sensors/temp>;osc,
    </sensors/light>;if=sensor,
    </.well-known/edhoc>;rt=core.edhoc;ed-csuite=0;ed-csuite=2;
        ed-method=0;ed-cred-t=1;ed-cred-t=3;ed-idcred-t=4;
        ed-i;ed-r;ed-comb-req,
    </edhoc-alt>;rt=core.edhoc;ed-prof=500
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-edhoc-information-parameters">
      <name>EDHOC_Information Parameters</name>
      <t><xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines the EDHOC_Information object, as including information that guides two peers towards executing the EDHOC protocol, and defines an initial set of its parameters.</t>
      <t>This document defines the following new parameters of the EDHOC_Information object. These are summarized in <xref target="fig-cbor-key-edhoc-params"/> and described further below.</t>
      <figure anchor="fig-cbor-key-edhoc-params">
        <name>EDHOC_Information Parameters</name>
        <artwork align="center"><![CDATA[
+---------------+-------+--------+----------------+-------------------+
| Name          | CBOR  | CBOR   | Registry       | Description       |
|               | Value | Type   |                |                   |
+---------------+-------+--------+----------------+-------------------+
| cred_types    | 9     | int /  | EDHOC          | Set of supported  |
|               |       | array  | Authentication | types of          |
|               |       | of int | Credential     | authentication    |
|               |       |        | Types Registry | credentials for   |
|               |       |        |                | EDHOC             |
+---------------+-------+--------+----------------+-------------------+
| id_cred_types | 10    | int /  | COSE Header    | Set of supported  |
|               |       | tstr / | Parameters     | types of          |
|               |       | array  | Registry       | authentication    |
|               |       | of int |                | credential        |
|               |       | or of  |                | identifiers for   |
|               |       | tstr   |                | EDHOC             |
+---------------+-------+--------+----------------+-------------------+
| eads          | 11    | uint / | EDHOC External | Set of supported  |
|               |       | array  | Authorization  | EDHOC External    |
|               |       | of     | Data Registry  | Authorization     |
|               |       | uint   |                | Data (EAD) items  |
+---------------+-------+--------+----------------+-------------------+
| initiator     | 12    | simple |                | Support for the   |
|               |       | value  |                | EDHOC Initiator   |
|               |       | "true" |                | role              |
|               |       | or     |                |                   |
|               |       | "false"|                |                   |
+---------------+-------+--------+----------------+-------------------+
| responder     | 13    | simple |                | Support for the   |
|               |       | value  |                | EDHOC Responder   |
|               |       | "true" |                | role              |
|               |       | or     |                |                   |
|               |       | "false"|                |                   |
+---------------+-------+--------+----------------+-------------------+
| app_prof      | 14    | int /  | EDHOC          | Set of supported  |
|               |       | array  | Application    | EDHOC Application |
|               |       | of int | Profiles       | Profiles          |
|               |       |        | Registry       |                   |
+---------------+-------+--------+----------------+-------------------+
]]></artwork>
      </figure>
      <ul spacing="normal">
        <li>cred_types: This parameter specifies a set of supported types of authentication credentials for EDHOC (see <xref section="3.5.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). If the set is composed of a single type of authentication credential, this is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one type of authentication credential. In JSON, the "cred_types" value is an integer or an array of integers. In CBOR, "cred_types" is an integer or an array of integers, and has label 9. The integer values are taken from the "EDHOC Authentication Credential Types" registry defined in <xref target="I-D.ietf-core-oscore-edhoc"/>.</li>
        <li>id_cred_types: This parameter specifies a set of supported types of authentication credential identifiers for EDHOC (see <xref section="3.5.3" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). If the set is composed of a single type of authentication credential identifier, this is encoded as an integer or a text string. Otherwise, the set is encoded as an array, where each array element encodes one type of authentication credential identifier, as an integer or a text string. In JSON, the "id_cred_types" value is an integer, or a text string, or an array of integers and text strings. In CBOR, "id_cred_types" is an integer or a text string, or an array of integers and text strings, and has label 10. The integer or text string values are taken from the 'Label' column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/>.</li>
        <li>eads: This parameter specifies a set of supported EDHOC External Authorization Data (EAD) items, identified by their ead_label (see <xref section="3.8" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). If the set is composed of a single ead_label, this is encoded as an unsigned integer. Otherwise, the set is encoded as an array of unsigned integers, where each array element encodes one ead_label. In JSON, the "eads" value is an unsigned integer or an array of unsigned integers. In CBOR, "eads" is an unsigned integer or an array of unsigned integers, and has label 11. The unsigned integer values are taken from the 'Label' column of the "EDHOC External Authorization Data" registry defined in <xref target="I-D.ietf-lake-edhoc"/>.</li>
        <li>initiator: This parameter specifies whether the EDHOC Initiator role is supported. In JSON, the "initiator" value is a boolean. In CBOR, "initiator" is the simple value "true" (0xf5) or "false" (0xf4), and has label 12.</li>
        <li>responder: This parameter specifies whether the EDHOC Responder role is supported. In JSON, the "responder" value is a boolean. In CBOR, "responder" is the simple value "true" (0xf5) or "false" (0xf4), and has label 13.</li>
        <li>app_prof: This parameter specifies a set of supported EDHOC application profiles, identified by their Profile ID. If the set is composed of a single EDHOC application profile, its Profile ID is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one Profile ID. In JSON, the "app_prof" value is an integer or an array of integers. In CBOR, "app_prof" is an integer or an array of integers, and has label 14. The integer values are taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</li>
      </ul>
      <section anchor="use-in-the-edhoc-and-oscore-profile-of-the-ace-framework">
        <name>Use in the EDHOC and OSCORE Profile of the ACE Framework</name>
        <t>[ NOTE:</t>
        <t>Consider whether to move the content of this section into <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>]</t>
        <t><xref section="3.2" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines how the EDHOC_Information object can be used within the workflow of the EDHOC and OSCORE transport profile of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>.</t>
        <t>In particular, the AS-to-C Access Token Response can include the parameter "edhoc_info", with value an EDHOC_Information object. This allows the ACE Authorization Server (AS) to provide the ACE Client (C) with information about how to run the EDHOC protocol with the ACE Resource Server (RS) for which the Access Token is issued.</t>
        <t>In such a case, the EDHOC_Information object above can include the parameter "app_prof" defined in this document. This parameter indicates a set of EDHOC application profiles associated with the EDHOC resource to use at the RS, which is either implied or specified by the parameter "uri_path" within the same EDHOC_Information object.</t>
        <t>If the EDHOC_Information object specified as value of "edhoc_info" includes the "app_prof" parameter, the object MUST NOT include other parameters that provide information pertaining to an EDHOC application profile. Such parameters MUST be ignored by C, if present in an EDHOC_Information object that also includes the "app_prof" parameter.</t>
        <t>At the time of writing this document, such parameters are:</t>
        <ul spacing="normal">
          <li>"methods", "cipher_suites", "message_4", "comb_req", "osc_ms_len", "osc_salt_len", and "osc_version", defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</li>
          <li>"cred_types", "id_cred_types", "eads", "initiator", and "responder", defined in <xref target="sec-edhoc-information-parameters"/> of this document.</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-app-profile-cbor">
      <name>Representation of an EDHOC Application Profile</name>
      <t>This section defines the EDHOC_Application_Profile object, which can be used as a canonical representation of EDHOC application profiles for their description, distribution, and storage.</t>
      <t>An EDHOC_Application_Profile object is encoded as a CBOR map <xref target="RFC8949"/>. Each element of the CBOR map is an element of the CBOR-encoded EDHOC_Information object defined in <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>, and thus uses the corresponding CBOR abbreviations from the 'CBOR Value' column of the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The CBOR map encoding the EDHOC application profile MUST include the element "app_prof" defined in this document. Its value is the unique identifier of the EDHOC application profile in question, taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in this document, and encoded as a CBOR integer.</t>
      <t>The following elements defined for the EDHOC_Information object MUST also be present: "methods" and "cred_types".</t>
      <t>The following elements defined for the EDHOC_Information object MUST NOT be present: "id" and "uri_path".</t>
      <t>The CBOR map MAY include other elements defined for the EDHOC_Information object. Consistently with Sections <xref target="I-D.ietf-lake-edhoc" section="8" sectionFormat="bare"/> and <xref target="I-D.ietf-lake-edhoc" section="A.1" sectionFormat="bare"/> of <xref target="I-D.ietf-lake-edhoc"/> and with <xref section="5.4" sectionFormat="of" target="RFC8613"/>:</t>
      <ul spacing="normal">
        <li>If the element "cipher_suites" is not present in the CBOR map, this indicates that the EDHOC application profile uses the EDHOC cipher suites 2 and 3.</li>
        <li>If the element "id_cred_types" is not present in the CBOR map, this indicates that the EDHOC application profile uses "kid" as type of authentication credential identifiers for EDHOC.</li>
        <li>If the element "osc_ms_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE <xref target="RFC8613"/>, the size of the OSCORE Master Secret in bytes is equal to the size of the key length for the application AEAD Algorithm of the selected cipher suite for the EDHOC session.</li>
        <li>If the element "osc_salt_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the size of the OSCORE Master Salt in bytes is 8.</li>
        <li>If the element "osc_version" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the OSCORE Version Number has value 1.</li>
        <li>The absence of any other elements in the CBOR map MUST NOT result in assuming any value.</li>
      </ul>
      <t>If an element is present in the CBOR map and the information that it specifies is intrinsically a set of one or more co-existing alternatives, then all the specified alternatives apply for the EDHOC application profile in question.</t>
      <t>For example, the element "cipher_suites" with value the CBOR array [0, 2] means that, in order to adhere to the EDHOC application profile in question, an EDHOC peer has to implement both the EDHOC cipher suites 0 and 2, because either of them can be used by another EDHOC peer also adhering to the same EDHOC application profile.</t>
      <t>The CDDL grammar describing the EDHOC_Application_Profile object is:</t>
      <artwork><![CDATA[
EDHOC_Application_Profile = {
      1 => int / array,    ; methods
      9 => int,            ; cred_types
     12 => int,            ; app_prof
   * int / tstr => any
}
]]></artwork>
      <t>[ NOTE:</t>
      <t>Based on Sections <xref target="I-D.ietf-lake-edhoc" section="3.9" sectionFormat="bare"/> and <xref target="I-D.ietf-lake-edhoc" section="F" sectionFormat="bare"/> of <xref target="I-D.ietf-lake-edhoc"/>, further parameters can be added to the EDHOC_Information object defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>, and then used for the EDHOC_Application_Profile defined in this document. For example:</t>
      <ul spacing="normal">
        <li>The way(s) to express the identity of endpoints within authentication credentials, e.g., EUI-64.</li>
        <li>
          <t>The transport(s) to use for EDHOC. How to indicate that? It is actually about multiple pieces of information, often transport-dependent.  </t>
          <t>
For example, if CoAP is indicated, it should be said over what CoAP is in turn transported, if any of the EDHOC-related CoAP Content-Format has to be indicated, etc. See, for instance, point 1 in Sections <xref target="I-D.ietf-lake-edhoc" section="3.9" sectionFormat="bare"/> and <xref target="I-D.ietf-lake-edhoc" section="F" sectionFormat="bare"/> of <xref target="I-D.ietf-lake-edhoc"/>.  </t>
          <t>
This might require another registry about "transport suites" to be used with EDHOC, each of which registered with a unique identifier, specifying the transport protocol together with additional (transport-dependent) pieces of information.</t>
        </li>
      </ul>
      <t>]</t>
    </section>
    <section anchor="sec-well-known-app-profile">
      <name>Well-known EDHOC Application Profile</name>
      <t>TBD</t>
      <t>[ NOTE:</t>
      <t>This well-known EDHOC application profile is <em>not</em> intended to be a "default" profile to use, in case no other indication is provided to the EDHOC peers.</t>
      <t>With particular reference to using EDHOC with CoAP, it must <em>not</em> be silently assumed that, unless otherwise indicated, the EDHOC resource at /.well-known/edhoc is used according to such a well-known profile.</t>
      <t>If this well-known EDHOC application profile was treated as a "default" profile, it might be suggesting what is generally mandatory to implement, which is instead limited to what is already defined by the compliance requirements in <xref section="8" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> (i.e., simply support for "kid" as type of credential identifier, as well as for cipher suites 2 and 3).</t>
      <t>That is, this well-known EDHOC application profile is <em>not</em> intended to practically replace the compliance requirements from <xref section="8" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>, which defines what is a de-facto, unnamed default EDHOC application profile.</t>
      <t>Instead, this well-known EDHOC application profile should reflect what is the most common and expected way to use EDHOC.</t>
      <t>]</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-media-type">
        <name>Media Type Registrations</name>
        <t>IANA is asked to register the media type "application/edhoc-app-profile+cbor-seq". This registration follows the procedures specified in <xref target="RFC6838"/>.</t>
        <t>Type name: application</t>
        <t>Subtype name: edhoc-app-profile+cbor-seq</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: Must be encoded as a CBOR sequence <xref target="RFC8742"/> of CBOR maps. Each element of each CBOR map is also defined as an element of the CBOR-encoded EDHOC_Information object from <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>Security considerations: See <xref target="sec-security-considerations"/> of [RFC-XXXX].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [RFC-XXXX]</t>
        <t>Applications that use this media type: Applications that need to describe, distribute, and store a representation of an EDHOC application profile (see <xref section="3.9" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>).</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information: N/A</t>
        <t>Person &amp; email address to contact for further information: LAKE WG mailing list (lake@ietf.org) or IETF Applications and Real-Time Area (art@ietf.org)</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: None</t>
        <t>Author/Change controller: IETF</t>
        <t>Provisional registration: No</t>
      </section>
      <section anchor="iana-content-type">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is asked to add the following entry to the "CoAP Content-Formats" registry within the "CoRE Parameters" registry group.</t>
        <t>Content Type: application/edhoc-app-profile+cbor-seq</t>
        <t>Content Coding: -</t>
        <t>ID: TBD</t>
        <t>Reference: [RFC-XXXX]</t>
      </section>
      <section anchor="iana-edhoc-application-profiles">
        <name>EDHOC Application Profiles Registry</name>
        <t>IANA is requested to create a new "EDHOC Application Profiles" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="I-D.ietf-lake-edhoc"/>.</t>
        <t>The registry uses the "Expert Review" registration procedure <xref target="RFC8126"/>. Expert Review guidelines are provided in <xref target="iana-expert-review"/>. Values in this registry are covered by different registration policies as indicated. It should be noted that, in addition to the expert review, some portions of the registry require a specification, potentially a Standards Track RFC, to be supplied as well.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Profile ID: This field contains the value used to identify the EDHOC application profile. These values MUST be unique. The value can be an unsigned integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>:  </t>
            <ul spacing="normal">
              <li>Integer values from -24 to 23 are designated as "Standards Action With Expert Review".</li>
              <li>Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required".</li>
              <li>Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</li>
            </ul>
          </li>
          <li>Name: This field contains the name of the EDHOC application profile.</li>
          <li>Description: This field contains a short description of the EDHOC application profile.</li>
          <li>Reference: This field contains a pointer to the public specification for the EDHOC application profile.</li>
        </ul>
      </section>
      <section anchor="iana-target-attributes">
        <name>Target Attributes Registry</name>
        <t>IANA is asked to register the following entry in the "Target Attributes" registry within the "CoRE Parameters" registry group, as per <xref target="I-D.ietf-core-target-attr"/>.</t>
        <ul spacing="normal">
          <li>Attribute Name: ed-prof</li>
          <li>Brief Description: A supported EDHOC application profile</li>
          <li>Change Controller: IETF</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-edhoc-information-registry">
        <name>EDHOC Information Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <ul spacing="normal">
          <li>Name: cred_types</li>
          <li>CBOR Value: 9</li>
          <li>CBOR Type: int / array of int</li>
          <li>Registry: EDHOC Authentication Credential Types Registry</li>
          <li>Description: Set of supported types of authentication credentials for EDHOC</li>
          <li>Specification: [RFC-XXXX], <xref target="I-D.ietf-lake-edhoc"/></li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>Name: id_cred_types</li>
          <li>CBOR Value: 10</li>
          <li>CBOR Type: int / tstr / array of int or of tstr</li>
          <li>Registry: COSE Header Parameters Registry</li>
          <li>Description: Set of supported types of authentication credential identifiers for EDHOC</li>
          <li>Specification: [RFC-XXXX], <xref target="I-D.ietf-lake-edhoc"/></li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>Name: eads</li>
          <li>CBOR Value: 11</li>
          <li>CBOR Type: uint / array of uint</li>
          <li>Registry: EDHOC External Authorizaton Data Registry</li>
          <li>Description: Set of supported EDHOC External Authorization Data (EAD) items</li>
          <li>Specification: [RFC-XXXX], <xref target="I-D.ietf-lake-edhoc"/></li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>Name: initiator</li>
          <li>CBOR Value: 12</li>
          <li>CBOR Type: simple value "true" / simple value "false"</li>
          <li>Registry: -</li>
          <li>Description: Support for the EDHOC Initiator role</li>
          <li>Specification: [RFC-XXXX], <xref target="I-D.ietf-lake-edhoc"/></li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>Name: responder</li>
          <li>CBOR Value: 13</li>
          <li>CBOR Type: simple value "true" / simple value "false"</li>
          <li>Registry: -</li>
          <li>Description: Support for the EDHOC Responder role</li>
          <li>Specification: [RFC-XXXX], <xref target="I-D.ietf-lake-edhoc"/></li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>Name: app_prof</li>
          <li>CBOR Value: 14</li>
          <li>CBOR Type: int / array of int</li>
          <li>Registry: EDHOC Application Profiles Registry</li>
          <li>Description: Set of supported EDHOC Application Profiles</li>
          <li>Specification: [RFC-XXXX], <xref target="I-D.ietf-lake-edhoc"/></li>
        </ul>
      </section>
      <section anchor="iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>The IANA registry established in this document is defined as "Expert Review". This section gives some general guidelines for what the experts should be looking for; but they are being designated as experts for a reason, so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts need to make sure that registered identifiers indicate an EDHOC application profile that is clearly defined in the corresponding specification. Identifiers of EDHOC application profiles that do not meet these objective of clarity and completeness must not be registered.</li>
          <li>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. The zones tagged as "Private Use" are intended for testing purposes and closed environments. Code points in other ranges should not be assigned for testing.</li>
          <li>Specifications are required for the "Standards Action With Expert Review" range of point assignment. Specifications should exist for "Specification Required" ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</li>
          <li>Experts should take into account the expected usage of fields when approving point assignment. The fact that there is a range for Standards Track documents does not mean that a Standards Track document cannot have points assigned outside of that range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC6690">
        <front>
          <title>Constrained RESTful Environments (CoRE) Link Format</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <date month="August" year="2012"/>
          <abstract>
            <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6690"/>
        <seriesInfo name="DOI" value="10.17487/RFC6690"/>
      </reference>
      <reference anchor="RFC6838">
        <front>
          <title>Media Type Specifications and Registration Procedures</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <author fullname="T. Hansen" initials="T." surname="Hansen"/>
          <date month="January" year="2013"/>
          <abstract>
            <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="13"/>
        <seriesInfo name="RFC" value="6838"/>
        <seriesInfo name="DOI" value="10.17487/RFC6838"/>
      </reference>
      <reference anchor="RFC7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="RFC8126">
        <front>
          <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
          <author fullname="M. Cotton" initials="M." surname="Cotton"/>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <author fullname="T. Narten" initials="T." surname="Narten"/>
          <date month="June" year="2017"/>
          <abstract>
            <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
            <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
            <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="26"/>
        <seriesInfo name="RFC" value="8126"/>
        <seriesInfo name="DOI" value="10.17487/RFC8126"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC8288">
        <front>
          <title>Web Linking</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
          <date month="October" year="2017"/>
          <abstract>
            <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
            <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8288"/>
        <seriesInfo name="DOI" value="10.17487/RFC8288"/>
      </reference>
      <reference anchor="RFC8610">
        <front>
          <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="C. Vigano" initials="C." surname="Vigano"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8610"/>
        <seriesInfo name="DOI" value="10.17487/RFC8610"/>
      </reference>
      <reference anchor="RFC8613">
        <front>
          <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <date month="July" year="2019"/>
          <abstract>
            <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
            <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8613"/>
        <seriesInfo name="DOI" value="10.17487/RFC8613"/>
      </reference>
      <reference anchor="RFC8742">
        <front>
          <title>Concise Binary Object Representation (CBOR) Sequences</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="February" year="2020"/>
          <abstract>
            <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
            <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8742"/>
        <seriesInfo name="DOI" value="10.17487/RFC8742"/>
      </reference>
      <reference anchor="RFC8949">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="RFC9200">
        <front>
          <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
          <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9200"/>
        <seriesInfo name="DOI" value="10.17487/RFC9200"/>
      </reference>
      <reference anchor="I-D.ietf-lake-edhoc">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Francesca Palombini" initials="F." surname="Palombini">
            <organization>Ericsson AB</organization>
          </author>
          <date day="25" month="August" year="2023"/>
          <abstract>
            <t>   This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a
   very compact and lightweight authenticated Diffie-Hellman key
   exchange with ephemeral keys.  EDHOC provides mutual authentication,
   forward secrecy, and identity protection.  EDHOC is intended for
   usage in constrained scenarios and a main use case is to establish an
   OSCORE security context.  By reusing COSE for cryptography, CBOR for
   encoding, and CoAP for transport, the additional code size can be
   kept very low.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-22"/>
      </reference>
      <reference anchor="I-D.ietf-core-target-attr">
        <front>
          <title>CoRE Target Attributes Registry</title>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <date day="11" month="October" year="2023"/>
          <abstract>
            <t>   The Constrained RESTful Environments (CoRE) specifications apply Web
   technologies to constrained environments.  One important such
   technology is Web Linking (RFC 8288), which CoRE specifications use
   as the basis for a number of discovery protocols, such as the Link
   Format (RFC 6690) in CoAP's Resource Discovery Protocol (Section 7.2
   of RFC7252) and the Resource Directory (RD, RFC 9176).

   Web Links can have target attributes, the names of which are not
   generally coordinated by the Web Linking specification (Section 2.2
   of RFC 8288).  This document introduces an IANA registry for
   coordinating names of target attributes when used in CoRE.  It
   updates the RD Parameters IANA Registry created by RFC 9176 to
   coordinate with this registry.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-target-attr-06"/>
      </reference>
      <reference anchor="I-D.ietf-core-oscore-edhoc">
        <front>
          <title>Using EDHOC with CoAP and OSCORE</title>
          <author fullname="Francesca Palombini" initials="F." surname="Palombini">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Rikard Höglund" initials="R." surname="Höglund">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
            <organization>Fraunhofer AISEC</organization>
          </author>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson</organization>
          </author>
          <date day="13" month="October" year="2023"/>
          <abstract>
            <t>   The lightweight authenticated key exchange protocol EDHOC can be run
   over CoAP and used by two peers to establish an OSCORE Security
   Context.  This document details this use of the EDHOC protocol, by
   specifying a number of additional and optional mechanisms.  These
   especially include an optimization approach for combining the
   execution of EDHOC with the first OSCORE transaction.  This
   combination reduces the number of round trips required to set up an
   OSCORE Security Context and to complete an OSCORE transaction using
   that Security Context.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-09"/>
      </reference>
      <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson</organization>
          </author>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE</organization>
          </author>
          <author fullname="Rikard Höglund" initials="R." surname="Höglund">
            <organization>RISE</organization>
          </author>
          <date day="23" month="October" year="2023"/>
          <abstract>
            <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an OAuth 2.0 Client and Resource
   Server, and it binds an authentication credential of the Client to an
   OAuth 2.0 access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-03"/>
      </reference>
      <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
        <front>
          <title>COSE Header Parameters</title>
          <author>
            <organization>IANA</organization>
          </author>
          <date/>
        </front>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/> and <contact fullname="Göran Selander"/> for their feedback and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
