<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-rats-mud-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Muddy Rats">MUD-Based RATS Resources Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-rats-mud-01"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>Canada</country>
        </postal>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="February" day="22"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 59?>

<t>Manufacturer Usage Description (MUD) files and the MUD URIs that point to them are defined in RFC 8520.
This document introduces a new type of MUD file to be delivered in conjunction with a MUD file signature and/or to be referenced via a MUD URI embedded in other documents or messages, such as an IEEE 802.1AR Secure Device Identifier (DevID) or a CBOR Web Token (CWT).
These signed documents can be presented to other entities, e.g., a network management system or network path orchestrator.
If this entity also takes on the role of a verifier as defined by the IETF Remote ATtestation procedureS (RATS) architecture, this verifier can use the references included in the MUD file specified in this document to discover, for example, appropriate reference value providers, endorsement documents or endorsement distribution APIs, trust anchor stores, remote verifier services (sometimes referred to as Attestation Verification Services), or transparency logs.
All theses references in the MUD file pointing to resources and auxiliary RATS services can satisfy general RATS prerequisite by enabling discovery or improve discovery resilience of corresponding resources or services.</t>
    </abstract>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Verifiers, Endorsers, and Attesters are roles defined in the RATS Architecture <xref target="RFC9334"/>.
In the RATS architecture, the Relying Party roles depend on the Verifier to bear the burden of Evidence appraisal and to generate corresponding Attestation Results for them.
Attestation Results compose a believable chunk of information that can be digested by Relying Parities in order to assess an Attester's trustworthiness.
The assessment of a remote peer's trustworthiness is vital to determine whether any future protocol interaction between a Relying Party and a remote Attester can be considered secure.
To create these Attestation Results to be consumed by Relying Parties, the Attestation Evidence an Attester generates has to be appraised by one or more appropriate Verifiers.</t>
      <t>This document defines a procedure that enables the discovery of resources or services in support of RATS, including:</t>
      <ol spacing="normal" type="1">
        <li>Reference Values,</li>
        <li>Trust Anchors,</li>
        <li>Endorsements and Endorsement Distribution APIs,</li>
        <li>(remote) Verifier APIs,</li>
        <li>Transparency Logs, or</li>
        <li>Appraisal Policies.</li>
      </ol>
      <t>MUD URIs can be embedded in any data item that was signed with trusted key material.
One common way to establish trust in a signed data item is to associate the signing key material with a trust anchor via a certification path (see <xref target="RFC4949"/> for trust anchor and certification path).
This document defines the use of MUD URIs embedded in two types of signed data items that typically are trusted via certification paths:</t>
      <ol spacing="normal" type="1">
        <li>Secure Device Identifiers (IEEE 802.1AR DevIDs) as defined by <xref target="RFC8520"/> and</li>
        <li>Entity Attestation Tokens (EAT) as defined by <xref target="I-D.ietf-rats-eat"/>.</li>
      </ol>
      <t>DevIDs and EATs (essentially CWTs ) are two very prominent examples of "trustworthy documents" (TDs) with a binary format and the embedding of MUD URIs in theses TDs can be applied to other TD types, for example, Selective Disclosure CWTs <xref target="I-D.ietf-spice-sd-cwt"/>.
Other TDs are out-of-scope of this specification, though.
The TDs are typically enrolled on Attesters by manufacturers or provisioned by supply chain entities with appropriate authority.
The TDs can be presented to local Network Management Systems, AAA-services (e.g., via IEEE 802.1X), or other points of first contact (POFC), for example, <xref target="RFC8071"/>.
These POFC are typically trusted third parties (TTP) that can digest the TDs and then base trust decisions on the associated certification paths and trust anchors.
If a TD presented by the Attester is deemed to be trusted by a local trust authority, the MUD URI embedded is considered to be a trusted source for viable resources and services in support of remote attestation of the Attester.</t>
      <t>This specification does not define the shape or format of any resource or service that is referenced by the MUD file.
In support of a unified mechanism to categorize the formats of referenced resources, a conceptual message wrapper (CMW, <xref target="I-D.ietf-rats-msg-wrap"/> is used for each type of resource.
An example of a referenced resource is a CoRIM tag <xref target="I-D.ietf-rats-corim"/>.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="mud-uris-in-trusted-documents-tds">
      <name>MUD URIs in Trusted Documents (TDs)</name>
      <t>This document does neither modify nor augment the definition about how to compose a MUD URI.
The two types of trusted documents (TDs) covered by this specification are Secure Device Identifiers and Entity Attestation Tokens.</t>
      <section anchor="mud-uris-in-devids">
        <name>MUD URIs in DevIDs</name>
        <t><xref target="RFC8520"/> defines the format of how to embed MUD URIs in DevIDs and that specification is used in this document.</t>
      </section>
      <section anchor="eat-mud-uri">
        <name>MUD URIs in EATs</name>
        <t>To embed a MUD URI in an EAT, the <tt>mud-uri</tt> claim specified in this document <bcp14>MUST</bcp14> be used.</t>
      </section>
    </section>
    <section anchor="mud-file-signatures">
      <name>MUD File Signatures</name>
      <t>As the resources required by a Verifier's appraisal procedures have to be trustworthy, a MUD signature file for a corresponding MUD File <bcp14>MUST</bcp14> be available.
The MUD File <bcp14>MUST</bcp14> include a reference to its MUD signature file via the 'mud-signature' statement.
The MUD File Signature generation as specified in <xref section="13.1" sectionFormat="of" target="RFC8520"/> applies.
If a MUD file changed (i.e., the checking of the MUD File Signature fails) or the corresponding MUD File Signer certificate is expired (see <xref section="13.2" sectionFormat="of" target="RFC8520"/>, the reference in the changed MUD File <bcp14>MUST</bcp14> point to a new valid MUD Signature File and that new MUD File Signature <bcp14>MUST</bcp14> be available.
If a corresponding MUD File Signer certificate is expired (see <xref section="13.2" sectionFormat="of" target="RFC8520"/>) or a MUD File Signature referenced by a MUD File cannot be checked successfully, the MUD File <bcp14>MUST NOT</bcp14> be trusted.</t>
      <section anchor="mud-file-signer-in-devids">
        <name>MUD File Signer in DevIDs</name>
        <t><xref target="RFC8520"/> defines the format of how to embed a reference to the signing certificate in DevIDs and that specification applies to this specification.</t>
      </section>
      <section anchor="eat-mud-signer">
        <name>MUD File Signer in EATs</name>
        <t>To embed a reference to a MUD File Signer in an EAT, the <tt>mud-signer</tt> claim specified in this document <bcp14>MUST</bcp14> be used and the <tt>mud-uri</tt> claim <bcp14>MUST</bcp14> be present.
The value of the <tt>mud-signer</tt> claim is a CBOR byte-wrapped subject field of the signing certificate of the MUD File as specified in <xref section="11" sectionFormat="of" target="RFC8520"/>.</t>
      </section>
    </section>
    <section anchor="trusting-mud-uris-and-mud-files">
      <name>Trusting MUD URIs and MUD Files</name>
      <t>The level of assurance about the authenticity of a MUD URI embedded in a TD is based on the level of trust put into the corresponding trust anchor associated with the key material that signed the TD.
If it is not possible to establish a level of trust towards the entity that signed a TD, the embedded MUD URI <bcp14>SHOULD NOT</bcp14> be trusted.
In some usage scenarios it might suffice to trust a MUD File, if the referenced MUD File Signer's certificate is not expired, but that behavior is <bcp14>NOT RECOMMENDED</bcp14>.</t>
      <t>The level of assurance about the authenticity of a MUD file is based on the level of trust put into the entity that created the corresponding MUD File Signer's certificate.
If it is not possible to establish a level of trust into the corresponding trust anchor associated with the MUD Signer's certificate, the MUD File that references that MUD Signer <bcp14>MUST NOT</bcp14> be trusted.</t>
      <section anchor="trusting-rats-resources-referenced-by-a-mud-file">
        <name>Trusting RATS Resources Referenced by a MUD File</name>
        <t>Resources, e.g., RATS Conceptual Messages, that are referenced by a MUD File <bcp14>MUST</bcp14> be signed (e.g., via a COSE_Sign1 envelope).
The signing procedures, the format of corresponding identity documents, and the establishment of trust relationships associated with these resources are out-of-scope of this document.</t>
      </section>
    </section>
    <section anchor="specification-of-rats-mud-files-referenced-by-mud-uris">
      <name>Specification of RATS MUD Files Referenced by MUD URIs</name>
      <t>The MUD URI embedded in a TD presented by an Attester points to a MUD File.
MUD URIs typically point to a piece of data that is a YANG-modeled XML file with a structure specified in the style of a YANG module definition (<xref target="RFC7950"/> and corresponding updates: <xref target="RFC8342"/>, <xref target="RFC8526"/>).
This document specifies a YANG module augment definition for generic MUD files to create RATS MUD files.
The following definition <bcp14>MUST</bcp14> be used, if a MUD URI points to a RATS MUD file.</t>
      <section anchor="tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram <xref target="RFC8340"/> provides an overview of the data model for the "ietf-mud-rats" module augment.</t>
        <sourcecode markers="true"><![CDATA[

module: ietf-mud-rats
  augment /mud:mud:
    +--rw ras
    |  +--rw ras-uris*   inet:uri
    +--rw rim
    |  +--rw rim-uris*   inet:uri
    +--rw edt
       +--rw edt-uris*   inet:uri
]]></sourcecode>
      </section>
      <section anchor="yang-module">
        <name>YANG Module</name>
        <t>This YANG module has normative references to <xref target="RFC6991"/> and augments <xref target="RFC8520"/>.</t>
        <sourcecode type="YANG">
&lt;CODE BEGINS&gt; file ietf-mud-rats@2025-02-09.yang
module ietf-mud-rats {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-mud-rats";
  prefix "mud-rats";

  import ietf-mud {
    prefix "mud";
  }

  import ietf-inet-types {
    prefix "inet";
  }

  organization
    "IETF RATS (Remote ATtestation procedureS) Working Group";

  contact
    "WG Web: http://tools.ietf.org/wg/rats/
     WG List: rats@ietf.org
     Author: Eliot Lear &lt;lear@cisco.com&gt;
     Author: Henk Birkholz &lt;henk.birkholz@sit.fraunhofer.de&gt;";

  description
    "This YANG module augments the ietf-mud model to provide for three
     optional lists to enable Remote Attestation Procedures so that
     this device type may be used as a controller for other
     MUD-enabled devices.

     Copyright (c) 2020 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
      for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  revision 2020-03-09 {
    description
      "Initial proposed standard.";
       reference "RFC XXXX: MUD Extension to find RATS supply chain
       entity resources: remote attestation services, endorsement
       documents, and reference integrity measurement";
  }

  grouping mud-rats-grouping {
    description
      "Grouping to locate RATS services";
    container ras {
      description
        "Lists of Remote Attestation Service
         (RAS/Verifiers) candidates.";
      leaf-list ras-uris {
        type inet:uri;
        description
          "A list of Verifiers that can appraise evidence produced by
           the entity that presents a DevID including this MUD URI.";
      }
    }
    container rim {
      description
        "Lists of Reference Integrity Measurement (RIM) candidates.";
      leaf-list rim-uris {
        type inet:uri;
        description
          "A list of RIM CoSWID that provide reference integrity
           measurements represented as signed CoSWID using
           the CoSWID RIM extension.";
      }
    }
    container edt {
      description
        "List of Endorsements for Roots of Trusts (e.g. Endorsement
         Key Certificates).";
      leaf-list edt-uris {
        type inet:uri;
        description
          "A list of Endorsements that vouch for the characteristics
           of Roots of Trusts the entity possesses.";
      }
    }
  }
  augment "/mud:mud" {
    uses mud-rats-grouping;
    description
      "add mud-rats URI resources";
  }
}
&lt;CODE ENDS&gt;
</sourcecode>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations of RFC 9334 apply.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The trust model and Security Considerations of RFC 8520 and RFC 9334 apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> Please replace "RFCthis" with the RFC number assigned to this document.</t>
      <t><cref anchor="rfced_1">RFC Editor:</cref> This document uses the CPA (code point allocation) convention described in <xref target="I-D.bormann-cbor-draft-numbers"/>. For each usage of the term "CPA", please remove the prefix "CPA" from the indicated value and replace the residue with the value assigned by IANA; perform an analogous substitution for all other occurrences of the prefix "CPA" in the document. Finally, please remove this note.</t>
      <section anchor="iana-mud-uri">
        <name>CWT <tt>mud-uri</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-uri</tt> CBOR Web Token claim to the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> in the Standards Action Range as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-uri</li>
          <li>Claim Description: A CBOR byte-wrapped MUD URI as specified in <xref target="RFC8520"/></li>
          <li>JWT Claim Name: mud-uri</li>
          <li>Claim Key: CPA109</li>
          <li>Claim Value Type(s): CBOR byte string</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-signer">
        <name>CWT <tt>mud-signer</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> CBOR Web Token claim to the "CBOR Web Token (CWT) Claims" registry group <xref target="IANA.cwt"/> in the Standards Action Range as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-uri</li>
          <li>Claim Description: A CBOR byte-wrapped subject field of the signing certificate for a MUD file as specified in <xref target="RFC8520"/></li>
          <li>JWT Claim Name: mud-signer</li>
          <li>Claim Key: CPA110</li>
          <li>Claim Value Type(s): CBOR byte string</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-signer"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-uri-json">
        <name>JWT <tt>mud-uri</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> JSON Web Token Claim to the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-signer</li>
          <li>Claim Description: A MUD signer reference represented via a URI text string as defined by <xref target="RFC8520"/></li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-signer-json">
        <name>JWT <tt>mud-signer</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> JSON Web Token Claim to the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-signer</li>
          <li>Claim Description: A MUD signer reference represented via a URI text string as defined by <xref target="RFC8520"/></li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <seriesInfo name="DOI" value="10.17487/RFC6991"/>
            <seriesInfo name="RFC" value="6991"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <seriesInfo name="DOI" value="10.17487/RFC7950"/>
            <seriesInfo name="RFC" value="7950"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8071">
          <front>
            <title>NETCONF Call Home and RESTCONF Call Home</title>
            <seriesInfo name="DOI" value="10.17487/RFC8071"/>
            <seriesInfo name="RFC" value="8071"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This RFC presents NETCONF Call Home and RESTCONF Call Home, which enable a NETCONF or RESTCONF server to initiate a secure connection to a NETCONF or RESTCONF client, respectively.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <seriesInfo name="DOI" value="10.17487/RFC8340"/>
            <seriesInfo name="RFC" value="8340"/>
            <seriesInfo name="BCP" value="215"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8342"/>
            <seriesInfo name="RFC" value="8342"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8520"/>
            <seriesInfo name="RFC" value="8520"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8526">
          <front>
            <title>NETCONF Extensions to Support the Network Management Datastore Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC8526"/>
            <seriesInfo name="RFC" value="8526"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the Network Configuration Protocol (NETCONF) defined in RFC 6241 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFCs 6241 and 7950. The update to RFC 6241 adds new and operations and augments existing,, and operations. The update to RFC 7950 requires the usage of the YANG library (described in RFC 8525) by NETCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-11"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This document defines the RATS conceptual message wrapper (CMW)
   format, a type of encapsulation format that can be used for any RATS
   messages, such as Evidence, Attestation Results, Endorsements, and
   Reference Values.  Additionally, the document describes a collection
   type that enables the aggregation of one or more CMWs into a single
   message.

   This document also defines corresponding CBOR tag, JSON Web Tokens
   (JWT) and CBOR Web Tokens (CWT) claims, as well as an X.509
   extension.  These allow embedding the wrapped conceptual messages
   into CBOR-based protocols, web APIs, and PKIX protocols.  In
   addition, a Media Type and a CoAP Content-Format are defined for
   transporting CMWs in HTTP, MIME, CoAP and other Internet protocols.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-06"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="18" month="October" year="2024"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <seriesInfo name="DOI" value="10.17487/RFC4949"/>
            <seriesInfo name="RFC" value="4949"/>
            <seriesInfo name="FYI" value="36"/>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-spice-sd-cwt">
          <front>
            <title>SPICE SD-CWT</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-spice-sd-cwt-02"/>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Rohan Mahy" initials="R." surname="Mahy">
              <organization>Rohan Mahy Consulting Services</organization>
            </author>
            <date day="4" month="December" year="2024"/>
            <abstract>
              <t>   This document describes a data minimization technique for use with
   CBOR Web Token (CWT).  The approach is based on Selective Disclosure
   JSON Web Token (SD-JWT), with changes to align with CBOR Object
   Signing and Encryption (COSE).

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.bormann-cbor-draft-numbers">
          <front>
            <title>Managing CBOR codepoints in Internet-Drafts</title>
            <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-draft-numbers-04"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="29" month="August" year="2024"/>
            <abstract>
              <t>   CBOR-based protocols often make use of numbers allocated in a
   registry.  During development of the protocols, those numbers may not
   yet be available.  This impedes the generation of data models and
   examples that actually can be used by tools.

   This short draft proposes a common way to handle these situations,
   without any changes to existing tools.  Also, in conjunction with the
   application-oriented EDN literal e'', a further reduction in
   editorial processing of CBOR examples around the time of approval can
   be achieved.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 360?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
