<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-iotops-mud-rats-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Muddy Rats">MUD-Based RATS Resources Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-mud-rats-01"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>Canada</country>
        </postal>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="C." surname="Liu" fullname="Chunchi Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="27"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 63?>

<t>Manufacturer Usage Description (MUD) files and the MUD URIs that point to them are defined in RFC 8520.
This document introduces a new type of MUD file to be delivered in conjunction with a MUD file signature and/or to be referenced via a MUD URI embedded in other documents or messages, such as an IEEE 802.1AR Secure Device Identifier (DevID) or a CBOR Web Token (CWT).
These signed documents can be presented to other entities, e.g., a network management system or network path orchestrator.
If this entity also takes on the role of a verifier as defined by the IETF Remote ATtestation procedureS (RATS) architecture, this verifier can use the references included in the MUD file specified in this document to discover, for example, appropriate reference value providers, endorsement documents or endorsement distribution APIs, trust anchor stores, remote verifier services (sometimes referred to as Attestation Verification Services), or transparency logs.
All theses references in the MUD file pointing to resources and auxiliary RATS services can satisfy general RATS prerequisite by enabling discovery or improve discovery resilience of corresponding resources or services.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Verifiers, Endorsers, and Attesters are roles defined in the RATS Architecture <xref target="RFC9334"/>.
In the RATS architecture, the Relying Party roles depend on the Verifier to bear the burden of Evidence appraisal and to generate corresponding Attestation Results for them.
Attestation Results compose a believable chunk of information that can be digested by Relying Parities in order to assess an Attester's trustworthiness.
The assessment of a remote peer's trustworthiness is vital to determine whether any future protocol interaction between a Relying Party and a remote Attester can be considered secure.
To create these Attestation Results to be consumed by Relying Parties, the Attestation Evidence an Attester generates has to be appraised by one or more appropriate Verifiers.</t>
      <t>This document defines a procedure that enables the discovery of resources or services in support of RATS, including:</t>
      <ol spacing="normal" type="1">
        <li>Reference Values,</li>
        <li>Trust Anchors,</li>
        <li>Endorsements and Endorsement Distribution APIs,</li>
        <li>(remote) Verifier APIs,</li>
        <li>Transparency Logs, or</li>
        <li>Appraisal Policies.</li>
      </ol>
      <t>MUD URIs can be embedded in any data item that was signed with trusted key material.
One common way to establish trust in a signed data item is to associate the signing key material with a trust anchor via a certification path (see <xref target="RFC4949"/> for trust anchor and certification path).
This document defines the use of MUD URIs embedded in two types of signed data items that typically are trusted via certification paths:</t>
      <ol spacing="normal" type="1">
        <li>Secure Device Identifiers (IEEE 802.1AR DevIDs) as defined by <xref target="RFC8520"/> and</li>
        <li>Entity Attestation Tokens (EAT) as defined by <xref target="I-D.ietf-rats-eat"/>.</li>
      </ol>
      <t>DevIDs and EATs (essentially CWTs ) are two very prominent examples of "trustworthy documents" (TDs) with a binary format and the embedding of MUD URIs in theses TDs can be applied to other TD types, for example, Selective Disclosure CWTs <xref target="I-D.ietf-spice-sd-cwt"/>.
Other TDs are out-of-scope of this specification, though.
The TDs are typically enrolled on Attesters by manufacturers or provisioned by supply chain entities with appropriate authority.
The TDs can be presented to local Network Management Systems, AAA-services (e.g., via IEEE 802.1X), or other points of first contact (POFC), for example, <xref target="RFC8071"/>.
These POFC are typically trusted third parties (TTP) that can digest the TDs and then base trust decisions on the associated certification paths and trust anchors.
If a TD presented by the Attester is deemed to be trusted by a local trust authority, the MUD URI embedded is considered to be a trusted source for viable resources and services in support of remote attestation of the Attester.</t>
      <t>This specification does not define the shape or format of any resource or service that is referenced by the MUD file.
In support of a unified mechanism to categorize the formats of referenced resources, a conceptual message wrapper (CMW, <xref target="I-D.ietf-rats-msg-wrap"/> is used for each type of resource.
An example of a referenced resource is a CoRIM tag <xref target="I-D.ietf-rats-corim"/>.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="mud-uris-in-trusted-documents-tds">
      <name>MUD URIs in Trusted Documents (TDs)</name>
      <t>This document does neither modify nor augment the definition about how to compose a MUD URI.
The two types of trusted documents (TDs) covered by this specification are Secure Device Identifiers and Entity Attestation Tokens.</t>
      <section anchor="mud-uris-in-devids">
        <name>MUD URIs in DevIDs</name>
        <t><xref target="RFC8520"/> defines the format of how to embed MUD URIs in DevIDs and that specification is used in this document.</t>
      </section>
      <section anchor="eat-mud-uri">
        <name>MUD URIs in EATs</name>
        <t>To embed a MUD URI in an EAT, the <tt>mud-uri</tt> claim specified in this document <bcp14>MUST</bcp14> be used.</t>
      </section>
    </section>
    <section anchor="mud-file-signatures">
      <name>MUD File Signatures</name>
      <t>As the resources required by a Verifier's appraisal procedures have to be trustworthy, a MUD signature file for a corresponding MUD File <bcp14>MUST</bcp14> be available.
The MUD File <bcp14>MUST</bcp14> include a reference to its MUD signature file via the 'mud-signature' statement.
The MUD File Signature generation as specified in <xref section="13.1" sectionFormat="of" target="RFC8520"/> applies.
If a MUD file changed (i.e., the checking of the MUD File Signature fails) or the corresponding MUD File Signer certificate is expired (see <xref section="13.2" sectionFormat="of" target="RFC8520"/>, the reference in the changed MUD File <bcp14>MUST</bcp14> point to a new valid MUD Signature File and that new MUD File Signature <bcp14>MUST</bcp14> be available.
If a corresponding MUD File Signer certificate is expired (see <xref section="13.2" sectionFormat="of" target="RFC8520"/>) or a MUD File Signature referenced by a MUD File cannot be checked successfully, the MUD File <bcp14>MUST NOT</bcp14> be trusted.</t>
      <section anchor="mud-file-signer-in-devids">
        <name>MUD File Signer in DevIDs</name>
        <t><xref target="RFC8520"/> defines the format of how to embed a reference to the signing certificate in DevIDs and that specification applies to this specification.</t>
      </section>
      <section anchor="eat-mud-signer">
        <name>MUD File Signer in EATs</name>
        <t>To embed a reference to a MUD File Signer in an EAT, the <tt>mud-signer</tt> claim specified in this document <bcp14>MUST</bcp14> be used and the <tt>mud-uri</tt> claim <bcp14>MUST</bcp14> be present.
The value of the <tt>mud-signer</tt> claim is a CBOR byte-wrapped subject field of the signing certificate of the MUD File as specified in <xref section="11" sectionFormat="of" target="RFC8520"/>.</t>
      </section>
    </section>
    <section anchor="trusting-mud-uris-and-mud-files">
      <name>Trusting MUD URIs and MUD Files</name>
      <t>The level of assurance about the authenticity of a MUD URI embedded in a TD is based on the level of trust put into the corresponding trust anchor associated with the key material that signed the TD.
If it is not possible to establish a level of trust towards the entity that signed a TD, the embedded MUD URI <bcp14>SHOULD NOT</bcp14> be trusted.
In some usage scenarios it might suffice to trust a MUD File, if the referenced MUD File Signer's certificate is not expired, but that behavior is <bcp14>NOT RECOMMENDED</bcp14>.</t>
      <t>The level of assurance about the authenticity of a MUD file is based on the level of trust put into the entity that created the corresponding MUD File Signer's certificate.
If it is not possible to establish a level of trust into the corresponding trust anchor associated with the MUD Signer's certificate, the MUD File that references that MUD Signer <bcp14>MUST NOT</bcp14> be trusted.</t>
      <section anchor="trusting-rats-resources-referenced-by-a-mud-file">
        <name>Trusting RATS Resources Referenced by a MUD File</name>
        <t>Resources, e.g., RATS Conceptual Messages, that are referenced by a MUD File <bcp14>MUST</bcp14> be signed (e.g., via a COSE_Sign1 envelope).
The signing procedures, the format of corresponding identity documents, and the establishment of trust relationships associated with these resources are out-of-scope of this document.</t>
      </section>
    </section>
    <section anchor="specification-of-rats-mud-files-referenced-by-mud-uris">
      <name>Specification of RATS MUD Files Referenced by MUD URIs</name>
      <t>The MUD URI embedded in a TD presented by an Attester points to a MUD File.
MUD URIs typically point to a piece of data that is a YANG-modeled XML file with a structure specified in the style of a YANG module definition (<xref target="RFC7950"/> and corresponding updates: <xref target="RFC8342"/>, <xref target="RFC8526"/>).
This document specifies a YANG module augment definition for generic MUD files to create RATS MUD files.
The following definition <bcp14>MUST</bcp14> be used, if a MUD URI points to a RATS MUD file.</t>
      <section anchor="tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram <xref target="RFC8340"/> provides an overview of the data model for the "ietf-mud-rats" module augment.</t>
        <sourcecode markers="true"><![CDATA[

module: ietf-mud-rats
  augment /mud:mud:
    +--rw ras
    |  +--rw ras-uris*   inet:uri
    +--rw rim
    |  +--rw rim-uris*   inet:uri
    +--rw edt
       +--rw edt-uris*   inet:uri
]]></sourcecode>
      </section>
      <section anchor="yang-module">
        <name>YANG Module</name>
        <t>This YANG module has normative references to <xref target="RFC6991"/> and augments <xref target="RFC8520"/>.</t>
        <sourcecode type="YANG">
&lt;CODE BEGINS&gt; file ietf-mud-rats@2025-02-09.yang
module ietf-mud-rats {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-mud-rats";
  prefix "mud-rats";

  import ietf-mud {
    prefix "mud";
  }

  import ietf-inet-types {
    prefix "inet";
  }

  organization
    "IETF RATS (Remote ATtestation procedureS) Working Group";

  contact
    "WG Web: http://tools.ietf.org/wg/rats/
     WG List: rats@ietf.org
     Author: Eliot Lear &lt;lear@cisco.com&gt;
     Author: Henk Birkholz &lt;henk.birkholz@sit.fraunhofer.de&gt;";

  description
    "This YANG module augments the ietf-mud model to provide for three
     optional lists to enable Remote Attestation Procedures so that
     this device type may be used as a controller for other
     MUD-enabled devices.

     Copyright (c) 2020 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
      for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  revision 2020-03-09 {
    description
      "Initial proposed standard.";
       reference "RFC XXXX: MUD Extension to find RATS supply chain
       entity resources: remote attestation services, endorsement
       documents, and reference integrity measurement";
  }

  grouping mud-rats-grouping {
    description
      "Grouping to locate RATS services";
    container ras {
      description
        "Lists of Remote Attestation Service
         (RAS/Verifiers) candidates.";
      leaf-list ras-uris {
        type inet:uri;
        description
          "A list of Verifiers that can appraise evidence produced by
           the entity that presents a DevID including this MUD URI.";
      }
    }
    container rim {
      description
        "Lists of Reference Integrity Measurement (RIM) candidates.";
      leaf-list rim-uris {
        type inet:uri;
        description
          "A list of RIM CoSWID that provide reference integrity
           measurements represented as signed CoSWID using
           the CoSWID RIM extension.";
      }
    }
    container edt {
      description
        "List of Endorsements for Roots of Trusts (e.g. Endorsement
         Key Certificates).";
      leaf-list edt-uris {
        type inet:uri;
        description
          "A list of Endorsements that vouch for the characteristics
           of Roots of Trusts the entity possesses.";
      }
    }
  }
  augment "/mud:mud" {
    uses mud-rats-grouping;
    description
      "add mud-rats URI resources";
  }
}
&lt;CODE ENDS&gt;
</sourcecode>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations of RFC 9334 apply.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The trust model and Security Considerations of RFC 8520 and RFC 9334 apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> Please replace "RFCthis" with the RFC number assigned to this document.</t>
      <t><cref anchor="rfced_1">RFC Editor:</cref> This document uses the CPA (code point allocation) convention described in <xref target="I-D.bormann-cbor-draft-numbers"/>. For each usage of the term "CPA", please remove the prefix "CPA" from the indicated value and replace the residue with the value assigned by IANA; perform an analogous substitution for all other occurrences of the prefix "CPA" in the document. Finally, please remove this note.</t>
      <section anchor="iana-mud-uri">
        <name>CWT <tt>mud-uri</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-uri</tt> CBOR Web Token claim to the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> in the Standards Action Range as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-uri</li>
          <li>Claim Description: A CBOR byte-wrapped MUD URI as specified in <xref target="RFC8520"/></li>
          <li>JWT Claim Name: mud-uri</li>
          <li>Claim Key: CPA109</li>
          <li>Claim Value Type(s): CBOR byte string</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-signer">
        <name>CWT <tt>mud-signer</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> CBOR Web Token claim to the "CBOR Web Token (CWT) Claims" registry group <xref target="IANA.cwt"/> in the Standards Action Range as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-uri</li>
          <li>Claim Description: A CBOR byte-wrapped subject field of the signing certificate for a MUD file as specified in <xref target="RFC8520"/></li>
          <li>JWT Claim Name: mud-signer</li>
          <li>Claim Key: CPA110</li>
          <li>Claim Value Type(s): CBOR byte string</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-signer"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-uri-json">
        <name>JWT <tt>mud-uri</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> JSON Web Token Claim to the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-signer</li>
          <li>Claim Description: A MUD signer reference represented via a URI text string as defined by <xref target="RFC8520"/></li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-signer-json">
        <name>JWT <tt>mud-signer</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> JSON Web Token Claim to the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-signer</li>
          <li>Claim Description: A MUD signer reference represented via a URI text string as defined by <xref target="RFC8520"/></li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <seriesInfo name="DOI" value="10.17487/RFC6991"/>
            <seriesInfo name="RFC" value="6991"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <seriesInfo name="DOI" value="10.17487/RFC7950"/>
            <seriesInfo name="RFC" value="7950"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8071">
          <front>
            <title>NETCONF Call Home and RESTCONF Call Home</title>
            <seriesInfo name="DOI" value="10.17487/RFC8071"/>
            <seriesInfo name="RFC" value="8071"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This RFC presents NETCONF Call Home and RESTCONF Call Home, which enable a NETCONF or RESTCONF server to initiate a secure connection to a NETCONF or RESTCONF client, respectively.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <seriesInfo name="DOI" value="10.17487/RFC8340"/>
            <seriesInfo name="RFC" value="8340"/>
            <seriesInfo name="BCP" value="215"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8342"/>
            <seriesInfo name="RFC" value="8342"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8520"/>
            <seriesInfo name="RFC" value="8520"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8526">
          <front>
            <title>NETCONF Extensions to Support the Network Management Datastore Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC8526"/>
            <seriesInfo name="RFC" value="8526"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the Network Configuration Protocol (NETCONF) defined in RFC 6241 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFCs 6241 and 7950. The update to RFC 6241 adds new and operations and augments existing,, and operations. The update to RFC 7950 requires the usage of the YANG library (described in RFC 8525) by NETCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-14"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="21" month="May" year="2025"/>
            <abstract>
              <t>   Section 8 of RFC 9334 defines "conceptual messages" as abstract
   messages exchanged by RATS roles such as Evidence, Attestation
   Results, Endorsements, and Reference Values.  This document defines a
   "conceptual message" wrapper (CMW) format for any RATS conceptual
   message and describes a collection type that aggregates one or more
   CMWs into a single message.

   In addition, this document specifies a corresponding CBOR tag, JSON
   Web Tokens (JWT) and CBOR Web Tokens (CWT) claims, and an X.509
   extension.  These mechanisms enable the embedding of enveloped
   conceptual messages into CBOR-based protocols, web APIs, and PKIX
   protocols.  Moreover, a Media Type and a CoAP Content-Format are
   defined for transporting CMWs over HTTP, MIME, CoAP, and other
   Internet protocols.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-07"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <seriesInfo name="DOI" value="10.17487/RFC4949"/>
            <seriesInfo name="RFC" value="4949"/>
            <seriesInfo name="FYI" value="36"/>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-spice-sd-cwt">
          <front>
            <title>SPICE SD-CWT</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-spice-sd-cwt-03"/>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Rohan Mahy" initials="R." surname="Mahy">
              <organization>Rohan Mahy Consulting Services</organization>
            </author>
            <date day="2" month="March" year="2025"/>
            <abstract>
              <t>   This document describes a data minimization technique for use with
   CBOR Web Token (CWT).  The approach is based on Selective Disclosure
   JSON Web Token (SD-JWT), with changes to align with CBOR Object
   Signing and Encryption (COSE).

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.bormann-cbor-draft-numbers">
          <front>
            <title>Managing CBOR codepoints in Internet-Drafts</title>
            <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-draft-numbers-05"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="1" month="March" year="2025"/>
            <abstract>
              <t>   CBOR-based protocols often make use of numbers allocated in a
   registry.  During development of the protocols, those numbers may not
   yet be available.  This impedes the generation of data models and
   examples that actually can be used by tools.

   This short draft proposes a common way to handle these situations,
   without any changes to existing tools.  Also, in conjunction with the
   application-oriented EDN literal e'', a further reduction in
   editorial processing of CBOR examples around the time of approval can
   be achieved.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 364?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
