<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-msg-wrap-23" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="RATS CMW">RATS Conceptual Messages Wrapper (CMW)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-23"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization>Independent</organization>
      <address>
        <email>ned.smith.ietf@outlook.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="D." surname="Glaze" fullname="Dionna Glaze">
      <organization>Google LLC</organization>
      <address>
        <email>dionnaglaze@google.com</email>
      </address>
    </author>
    <date year="2025" month="December" day="11"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>evidence</keyword>
    <keyword>attestation results</keyword>
    <keyword>endorsements</keyword>
    <keyword>reference values</keyword>
    <abstract>
      <?line 99?>

<t>The Conceptual Messages introduced by the RATS architecture (RFC 9334) are protocol-agnostic data units that are conveyed between RATS roles during remote attestation procedures.
Conceptual Messages describe the meaning and function of such data units within RATS data flows without specifying a wire format, encoding, transport mechanism, or processing details.
The initial set of Conceptual Messages is defined in Section 8 of RFC 9334 and includes Evidence, Attestation Results, Endorsements, Reference Values, and Appraisal Policies.</t>
      <t>This document introduces the Conceptual Message Wrapper (CMW) that provides a common structure to encapsulate these messages.
It defines a dedicated CBOR tag, corresponding JSON Web Token (JWT) and CBOR Web Token (CWT) claims, and an X.509 extension.</t>
      <t>This allows CMWs to be used in CBOR-based protocols, web APIs using JWTs and CWTs, and PKIX artifacts like X.509 certificates.
Additionally, the draft defines a media type and a CoAP content format to transport CMWs over protocols like HTTP, MIME, and CoAP.</t>
      <t>The goal is to improve the interoperability and flexibility of remote attestation protocols.
Introducing a shared message format such as CMW enables consistent support for different attestation message types, evolving message
serialization formats without breaking compatibility, and avoiding the need to redefine how messages are handled within each protocol.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap"/>.</t>
    </note>
  </front>
  <middle>
    <?line 115?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Conceptual Messages introduced by the Remote ATtestation procedureS (RATS) architecture <xref target="RFC9334"/> are protocol-agnostic data units that are conveyed between RATS roles during remote attestation procedures.
Conceptual Messages describe the meaning and function of such data units within RATS data flows without specifying a wire format, encoding, transport mechanism, or processing details.
The initial set of Conceptual Messages is defined in <xref section="8" sectionFormat="of" target="RFC9334"/> and includes Evidence, Attestation Results, Endorsements, Reference Values, and Appraisal Policies.</t>
      <t>Each conceptual message can have multiple claims encoding and serialization
formats (<xref section="9" sectionFormat="of" target="RFC9334"/>). Throughout their lifetime, RATS
conceptual messages are typically transported over different protocols.
For example,</t>
      <ul spacing="normal">
        <li>
          <t>In a "background-check" topology (<xref section="5.2" sectionFormat="of" target="RFC9334"/>), Evidence (e.g., EAT <xref target="RFC9711"/>) first flows from the Attester to the Relying Party (RP) and then from the Relying Party to the Verifier, each leg following a separate protocol path. See <xref target="topo-1"/>.</t>
        </li>
      </ul>
      <figure anchor="topo-1">
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="192" width="344" viewBox="0 0 344 192" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,144 L 8,176" fill="none" stroke="black"/>
              <path d="M 112,144 L 112,176" fill="none" stroke="black"/>
              <path d="M 232,32 L 232,64" fill="none" stroke="black"/>
              <path d="M 232,144 L 232,176" fill="none" stroke="black"/>
              <path d="M 264,72 L 264,144" fill="none" stroke="black"/>
              <path d="M 336,32 L 336,64" fill="none" stroke="black"/>
              <path d="M 336,144 L 336,176" fill="none" stroke="black"/>
              <path d="M 232,32 L 336,32" fill="none" stroke="black"/>
              <path d="M 232,64 L 336,64" fill="none" stroke="black"/>
              <path d="M 8,144 L 112,144" fill="none" stroke="black"/>
              <path d="M 232,144 L 256,144" fill="none" stroke="black"/>
              <path d="M 272,144 L 336,144" fill="none" stroke="black"/>
              <path d="M 112,160 L 224,160" fill="none" stroke="black"/>
              <path d="M 240,160 L 248,160" fill="none" stroke="black"/>
              <path d="M 8,176 L 112,176" fill="none" stroke="black"/>
              <path d="M 232,176 L 336,176" fill="none" stroke="black"/>
              <path d="M 248,160 C 256.83064,160 264,152.83064 264,144" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="272,72 260,66.4 260,77.6" fill="black" transform="rotate(270,264,72)"/>
              <polygon class="arrowhead" points="232,160 220,154.4 220,165.6" fill="black" transform="rotate(0,224,160)"/>
              <g class="text">
                <text x="284" y="52">Verifier</text>
                <text x="288" y="100">EAT</text>
                <text x="292" y="116">over</text>
                <text x="292" y="132">REST</text>
                <text x="328" y="132">API</text>
                <text x="60" y="164">Attester</text>
                <text x="316" y="164">RP</text>
                <text x="136" y="180">EAT</text>
                <text x="172" y="180">over</text>
                <text x="208" y="180">TLS</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
                            .------------.
                            |  Verifier  |
                            '------------'
                                ^
                                | EAT
                                | over
                                | REST API
.------------.              .---|--------.
|  Attester  +------------->|--'      RP |
'------------' EAT over TLS '------------'
]]></artwork>
        </artset>
      </figure>
      <ul spacing="normal">
        <li>
          <t>In a "passport" topology (<xref section="5.1" sectionFormat="of" target="RFC9334"/>), an attestation result payload (e.g., EAT Attestation Result (EAR) <xref target="I-D.ietf-rats-ear"/>) is initially sent from the Verifier to the Attester, and later, via a different channel, from the Attester to the Relying Party.  See <xref target="topo-2"/>.</t>
        </li>
      </ul>
      <figure anchor="topo-2">
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="344" viewBox="0 0 344 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 8,144 L 8,176" fill="none" stroke="black"/>
              <path d="M 80,64 L 80,136" fill="none" stroke="black"/>
              <path d="M 112,32 L 112,64" fill="none" stroke="black"/>
              <path d="M 112,144 L 112,176" fill="none" stroke="black"/>
              <path d="M 232,144 L 232,176" fill="none" stroke="black"/>
              <path d="M 336,144 L 336,176" fill="none" stroke="black"/>
              <path d="M 8,32 L 112,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 112,64" fill="none" stroke="black"/>
              <path d="M 8,144 L 112,144" fill="none" stroke="black"/>
              <path d="M 232,144 L 336,144" fill="none" stroke="black"/>
              <path d="M 112,160 L 224,160" fill="none" stroke="black"/>
              <path d="M 8,176 L 112,176" fill="none" stroke="black"/>
              <path d="M 232,176 L 336,176" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="232,160 220,154.4 220,165.6" fill="black" transform="rotate(0,224,160)"/>
              <polygon class="arrowhead" points="88,136 76,130.4 76,141.6" fill="black" transform="rotate(90,80,136)"/>
              <g class="text">
                <text x="60" y="52">Verifier</text>
                <text x="56" y="84">EAR</text>
                <text x="52" y="100">over</text>
                <text x="20" y="116">REST</text>
                <text x="56" y="116">API</text>
                <text x="60" y="164">Attester</text>
                <text x="284" y="164">RP</text>
                <text x="136" y="180">EAR</text>
                <text x="172" y="180">over</text>
                <text x="208" y="180">TLS</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
 .------------.
 |  Verifier  |
 '--------+---'
      EAR |
     over |
 REST API |
          v
 .------------.              .------------.
 |  Attester  +------------->|     RP     |
 '------------' EAR over TLS '------------'
]]></artwork>
        </artset>
      </figure>
      <t>By using the CMW format outlined in this document, protocol designers can avoid the need
to update protocol specifications to accommodate different conceptual messages and
serialization formats used by various attestation technologies. This approach streamlines
the implementation process for developers, enabling easier support for diverse attestation
technologies. For instance, a Relying Party application implementer does not need to parse
attestation-related messages, such as Evidence from Attesters on IoT devices with Trusted
Platform Modules (TPM) or servers using confidential computing hardware like Intel Trust
Domain Extensions (TDX). Instead, they can leverage the CMW format, remaining agnostic
to the specific attestation technology.</t>
      <t>A further design goal is extensibility.
This means that adding support for new conceptual messages and new attestation technologies should not change the core of the processor, and that a CMW stack can be designed to offer a plug-in interface for both encoding and decoding.
To achieve this, the format must provide consistent message encapsulation and explicit typing.
These features allow for selecting the appropriate message handler based on its type identifier.
An opaque message can then be passed between the core and the handler.</t>
      <t>This document defines two encapsulation formats for RATS conceptual
messages that aim to achieve the goals stated above.</t>
      <t>These encapsulation formats have been specifically designed to possess the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>They are self-describing, which means that they can convey precise typing information without relying on the framing provided by the embedding protocol or the storage system.</t>
        </li>
        <li>
          <t>They are based on media types <xref target="RFC6838"/>, which allows the cost of their registration to be spread across numerous usage scenarios.</t>
        </li>
      </ul>
      <t>A protocol designer could use these formats, for example, to convey
Evidence, Endorsements and Reference Values in certificates and CRLs
extensions (<xref target="DICE-arch"/>), to embed Attestation Results or Evidence as
first-class authentication credentials in TLS handshake messages
<xref target="I-D.fossati-tls-attestation"/> <xref target="I-D.fossati-seat-expat"/>, to transport attestation-related payloads in RESTful APIs,
or for stable storage of Attestation Results in the form of file system
objects.</t>
      <t>This document also defines corresponding CBOR tag, JSON Web Tokens (JWT) and CBOR Web Tokens (CWT) claims, as well as an X.509 extension.
These allow embedding the wrapped conceptual messages into CBOR-based protocols, web APIs, and PKIX formats and protocols.
In addition, a Media Type and a CoAP Content-Format are defined for transporting CMWs in HTTP, MIME, CoAP and other Internet protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> <xref target="RFC9741"/> is used to describe the
data formats.</t>
      <t>The reader is assumed to be familiar with the vocabulary and concepts
defined in <xref target="RFC9334"/>.</t>
      <t>This document reuses the terms defined in <xref section="2" sectionFormat="of" target="RFC9193"/>
(e.g., "Content-Type").</t>
    </section>
    <section anchor="conceptual-message-wrappers">
      <name>Conceptual Message Wrappers</name>
      <t>A RATS Conceptual Message Wrapper (CMW) has a tree structure.
Leaf nodes are of type "Record" (<xref target="type-n-val"/>), or "Tag" (<xref target="cbor-tag"/>).
Intermediate nodes are of type "Collection" (<xref target="cmw-coll"/>); they hold together multiple CMW items.</t>
      <t>The following snippet outlines the productions associated with the top-level types.</t>
      <sourcecode type="cddl"><![CDATA[
start = cmw

cmw = json-cmw / cbor-cmw

json-cmw = json-record / json-collection
cbor-cmw = cbor-record / cbor-collection / $cbor-tag
]]></sourcecode>
      <t>The complete CDDL can be found in <xref target="collected-cddl"/>.</t>
      <t><xref target="webtokens"/> and <xref target="x509"/> describe the transport of CMWs using CBOR and JSON Web Tokens and PKIX formats, including Certificate Signing Requests (CSRs), X.509 Certificates, and Certificate Revocation Lists (CRLs).</t>
      <t>This document only defines an encapsulation, not a security format.
It is the responsibility of the Attester to ensure that the CMW contents have the necessary security protection.
Security considerations are discussed in <xref target="seccons"/>.</t>
      <section anchor="type-n-val">
        <name>Record CMW</name>
        <t>The format of the Record CMW is shown in <xref target="fig-cddl-record"/>.
The JSON <xref target="STD90"/> and CBOR <xref target="STD94"/> representations are provided separately.
Both the <tt>json-record</tt> and <tt>cbor-record</tt> have the same fields except for slight differences in the types discussed below.</t>
        <figure anchor="fig-cddl-record">
          <name>CDDL definition of the Record CMW</name>
          <artwork type="cddl" align="left"><![CDATA[
json-record = [
  type: media-type
  value: base64url-string
  ? ind: uint .bits cm-type
]

cbor-record = [
  type: coap-content-format-type / media-type
  value: bytes
  ? ind: uint .bits cm-type
]
]]></artwork>
        </figure>
        <t>Each contains two or three members:</t>
        <dl newline="true">
          <dt><tt>type</tt>:</dt>
          <dd>
            <t>Either a text string representing a Content-Type (e.g., an EAT media type
<xref target="RFC9782"/>) or an unsigned integer corresponding to a CoAP Content-Format
ID (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
The latter is not used in the JSON serialization.</t>
          </dd>
          <dt><tt>value</tt>:</dt>
          <dd>
            <t>The RATS conceptual message serialized according to the
value defined in the type member.
When using JSON, the value field <bcp14>MUST</bcp14> be encoded as Base64 using the URL and
filename safe alphabet (<xref section="5" sectionFormat="of" target="RFC4648"/>) without padding.
This always applies, even if the conceptual message format is already textual (e.g., a JWT EAT).
When using CBOR, the value field <bcp14>MUST</bcp14> be encoded as a CBOR byte string.</t>
          </dd>
          <dt><tt>ind</tt>:</dt>
          <dd>
            <t>An optional bitmap with a maximum size of 4 bytes that indicates which conceptual message types are
carried in the <tt>value</tt> field.  Any combination (i.e., any value between
1 and 2<sup>32</sup>-1 inclusive) is allowed.  Only five bits are registered in this document, so, the acceptable values are currently limited to 1 to 31.  This is useful only if the <tt>type</tt> is
potentially ambiguous and there is no further context available to the
CMW consumer to decide.  For example, this might be the case if the base
media type is not profiled (e.g., <tt>application/eat+cwt</tt>), if the <tt>value</tt>
field contains multiple conceptual messages with different types (e.g.,
both Reference Values and Endorsements within the same <tt>application/rim+cose</tt>), or if the same profile identifier is
shared by different conceptual messages.
The value <bcp14>MUST</bcp14> be non-zero. The absence of conceptual message indicator information is indicated by omitting the <tt>ind</tt> field entirely.
For further details, see <xref target="cm-type"/>.</t>
          </dd>
        </dl>
        <section anchor="cm-type">
          <name>CM Type</name>
          <t>The <tt>cm-type</tt> type is the control type for the <tt>ind</tt> field.
As such, it indicates which bits are allowed to be set in the <tt>ind</tt> byte string.</t>
          <figure anchor="fig-cddl-cm-type">
            <name>CDDL definition of the CM Type</name>
            <artwork type="cddl" align="left"><![CDATA[
cm-type = &(
  reference-values: 0
  endorsements: 1
  evidence: 2
  attestation-results: 3
  appraisal-policy: 4
)
]]></artwork>
          </figure>
          <t>The <tt>cm-type</tt> as defined by this document has five allowed values: Reference Values, Endorsements, Evidence, Attestation Results, and Appraisal Policy, as defined in <xref section="8" sectionFormat="of" target="RFC9334"/>.
Note that an Appraisal Policy may refer to the appraisal of Evidence or Attestation Results, depending on whether the consumer of the conceptual message is a Verifier or a Relying Party.</t>
          <t>It is recommended that future specifications extending the RATS Conceptual Messages set add new values to the <tt>cm-type</tt> using the process defined in <xref target="iana-ind-ext"/>.</t>
        </section>
      </section>
      <section anchor="cbor-tag">
        <name>Tag CMW</name>
        <t>Tag CMWs derive their tag numbers from a corresponding CoAP Content-Format ID using the <tt>TN()</tt> transform defined in <xref section="B" sectionFormat="of" target="RFC9277"/>.
Such CBOR tag numbers are in range [1668546817, 1668612095].</t>
        <t>The RATS conceptual message is first serialized according to the Content-Format ID and then encoded as a CBOR byte string, to which the TN-derived tag number is prepended.</t>
        <t>The Tag CMW is defined in <xref target="fig-cddl-cbor-tag"/> using two different macros.
One for CBOR-encoded types, the other for all other types.
Both macros take the CBOR tag number <tt>tn</tt> as a parameter.
The <tt>tag-cm-cbor</tt> macro takes the CDDL definition of the associated conceptual message <tt>fmt</tt> as a second parameter.</t>
        <figure anchor="fig-cddl-cbor-tag">
          <name>CDDL definition of the Tag CMW macros</name>
          <artwork type="cddl" align="left"><![CDATA[
tag-cm-cbor<tn, fmt> = #6.<tn>(bytes .cbor fmt)

tag-cm-data<tn> = #6.<tn>(bytes)
]]></artwork>
        </figure>
        <section anchor="how-to-plug-in-a-new-tag-cmw">
          <name>How To Plug in a New Tag CMW</name>
          <t>To plug a new Tag CMW into the CDDL defined in <xref target="collected-cddl"/>, the <tt>$cbor-tag</tt> type socket must be extended with a new instance of the Tag CMW macro (i.e., one of <tt>tag-cm-cbor</tt> or <tt>tag-cm-data</tt>).</t>
          <t>For instance, if a conceptual message of type <tt>my-evidence</tt> has a TN-derived CBOR tag <tt>1668612069</tt>, <tt>$cbor-tag</tt> would be extended as follows:</t>
          <sourcecode type="cddl"><![CDATA[
$cbor-tag /= tag-cm-cbor<1668612069, my-evidence>

my-evidence = {
  &(eat_nonce: 10) => bytes .size (8..64)
}
]]></sourcecode>
          <t>Instead, if a (non-CBOR) conceptual message has a TN-derived CBOR tag <tt>1668612070</tt>, <tt>$cbor-tag</tt> would be extended as follows:</t>
          <sourcecode type="cddl"><![CDATA[
$cbor-tag /= tag-cm-data<1668612070>
]]></sourcecode>
          <t>The socket is initialized as described in <xref target="fig-9277-tags"/>.</t>
        </section>
      </section>
      <section anchor="cmw-coll">
        <name>Collection CMW</name>
        <t>Layered Attesters and composite devices (Sections <xref target="RFC9334" section="3.2" sectionFormat="bare"/> and <xref target="RFC9334" section="3.3" sectionFormat="bare"/> of <xref target="RFC9334"/>) generate Evidence that consists of multiple parts.
For example, in data center servers, it is not uncommon for separate attesting environments (AE) to serve a subsection of the entire machine.
One AE might measure and attest to what was booted on the main CPU, while another AE might measure and attest to what was booted on a SmartNIC plugged into a PCIe slot, and a third AE might measure and attest to what was booted on the machine's GPU.
To allow aggregation of multiple, potentially non-homogeneous evidence formats collected from different AEs, this document defines a Collection CMW as a container that holds several CMW items, each with a label that is unique within the scope of the Collection.</t>
        <t>Although originally designed to support layered Attester and composite device use cases, the Collection CMW can be adapted for other scenarios that require the aggregation of RATS conceptual messages.
For instance, Collections may be used to group Endorsements, Reference Values, Attestation Results, and more.
A single Collection CMW can contain a mix of different message types, and it can also be used to carry messages related to multiple devices simultaneously.</t>
        <t>The Collection CMW (<xref target="fig-cddl-collection"/>) is defined as a CBOR map or JSON object containing CMW values.
The position of a <tt>cmw</tt> entry in the <tt>cmw-collection</tt> is not significant.
Labels can be strings (or integers in the CBOR serialization) that serve as a mnemonic for different conceptual messages in the Collection.</t>
        <figure anchor="fig-cddl-collection">
          <name>CDDL definition of the Collection CMW</name>
          <artwork type="cddl" align="left"><![CDATA[
json-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: text) => json-cmw
}

cbor-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: (int / text)) => cbor-cmw
}
]]></artwork>
        </figure>
        <t>A Collection <bcp14>MUST</bcp14> have at least one CMW entry.</t>
        <t>The <tt>"__cmwc_t"</tt> key is reserved for associating an optional type with the overall Collection and <bcp14>MUST NOT</bcp14> be used for any purpose other than described here.</t>
        <t>The value of the <tt>"__cmwc_t"</tt> key is either a Uniform Resource Identifier (URI) or an object identifier (OID).
The OID is always absolute and never relative.
The URI <bcp14>MUST</bcp14> be in the absolute form (<xref section="4.3" sectionFormat="of" target="RFC3986"/>).</t>
        <t>The <tt>"__cmwc_t"</tt> key functions similar to an EAT profile claim (see <xref section="4.3.2" sectionFormat="of" target="RFC9711"/>), but at a higher level.
It can be used to indicate basics like CBOR serialization and COSE algorithms just as a profile in EAT does.
It provides a namespace in which the collection labels are interpreted.
At the higher level, it can be used to describe the allowed CMW collection assembly (this is somewhat parallel to the way EAT profiles indicate which claims are required and/or allowed).
For an example of a <tt>"__cmwc_t"</tt> that is defined for a bundle of endorsements and reference values, see <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-rats-corim"/>.</t>
        <t>Since the Collection CMW is recursive (a Collection CMW is itself a CMW), implementations <bcp14>MAY</bcp14> limit the allowed depth of nesting.</t>
        <ul empty="true">
          <li>
            <t>Implementation note: An API that uses CMW may support a discoverable "max-cmw-depth" attribute, allowing applications to advertise their own limits.
Also, a protocol using CMW may require its users to specify a minimum depth.
The exact details of how such a limit is discovered or set are out of scope of this document.</t>
          </li>
        </ul>
      </section>
      <section anchor="demuxing">
        <name>Demuxing</name>
        <t>The split in the JSON/CBOR decoding path is expected to occur via the media type or content format (see <xref target="iana-mt"/> and <xref target="iana-cf"/>, respectively), or via the container context of the embedded CMW (see <xref target="iana-cwt"/> and <xref target="iana-jwt"/> for CWT/JWT, and <xref target="iana-smi"/> for X.509).</t>
        <t>The following pseudocode illustrates how a one-byte look-ahead is sufficient to determine how to decode the remaining byte buffer.</t>
        <artwork><![CDATA[
func exampleCMWTypeDemux(b []byte) CMWType {
  if len(b) == 0 {
    return Unknown
  }

  switch b[0] {
  case 0x82: // 2-elements cbor-record (w/o ind field)
  case 0x83: // 3-elements cbor-record (w/ ind field)
  case 0x9f: // start of cbor-record using indefinite-length encoding
    return CBORRecord
  case 0xda: // tag-cm-cbor (CBOR Tag in the TN range)
    return CBORTag
  case 0x5b: // ASCII '[', start of json-record
    return JSONRecord
  case 0x7b: // ASCII '{', start of json-collection
    return JSONCollection
  case 0xa0..0xbb: // CBOR map start values, start of cbor-collection
  case 0xbf:       // ditto
    return CBORCollection
  }

  return Unknown
}
]]></artwork>
        <t>This code is provided for informational purposes only.
It is not expected that implementations will follow this demuxing strategy.</t>
      </section>
    </section>
    <section anchor="crypto">
      <name>Cryptographic Protection of CMWs</name>
      <t>This section highlights a number of mechanisms through which protocol designers can add data origin authentication, integrity, and, if used with a challenge-response protocol, anti-replay protection when employing CMWs.
These properties must be evaluated carefully in the context of the overall security model of the protocol.</t>
      <section anchor="signed-cbor-cmw">
        <name>Signing CBOR CMW using COSE Sign1</name>
        <t>A CBOR CMW can be signed using COSE <xref target="STD96"/>.
A <tt>signed-cbor-cmw</tt> is a <tt>COSE_Sign1</tt> with the following layout:</t>
        <sourcecode type="cddl"><![CDATA[
signed-cbor-cmw = [
  protected: bytes .cbor signed-cbor-cmw-protected-hdr
  unprotected: signed-cbor-cmw-unprotected-hdr
  payload: bytes .cbor cbor-cmw
  signature: bytes
]
]]></sourcecode>
        <t>The payload <bcp14>MUST</bcp14> be the CBOR-encoded Tag, Record, or Collection CMW.</t>
        <sourcecode type="cddl"><![CDATA[
signed-cbor-cmw-protected-hdr = {
  1 => int                            ; alg
  3 => "application/cmw+cbor" / 10000 ; cty
  * cose.label => cose.values
}

signed-cbor-cmw-unprotected-hdr = {
  * cose.label => cose.values
}

cose.label = int / text
cose.values = any

; Note: 10000 is a placeholder for the CoAP C-F codepoint corresponding
; to 'application/cmw+cbor'.  This CDDL fragment needs to be updated
; (and this note removed) once the relevant C-F codepoint has been
; assigned by IANA.
]]></sourcecode>
        <t>The protected header <bcp14>MUST</bcp14> include the signature algorithm identifier.
The protected header <bcp14>MUST</bcp14> include either the content type <tt>application/cmw+cbor</tt> or the CoAP Content-Format TBD1.
Other header parameters <bcp14>MAY</bcp14> be added to the header buckets, for example a <tt>kid</tt> that identifies the signing key.</t>
      </section>
      <section anchor="signed-json-cmw">
        <name>Signing JSON CMW using JWS</name>
        <t>A JSON CMW can be signed using JSON Web Signature (JWS) <xref target="RFC7515"/>.
A <tt>signed-json-cmw</tt> uses either the Flattened JSON Serialization (<xref section="7.2.2" sectionFormat="of" target="RFC7515"/>) or the Compact Serialization (<xref section="3.1" sectionFormat="of" target="RFC7515"/>).</t>
        <sourcecode type="cddl"><![CDATA[
signed-json-cmw = jws-flattened-json / jws-compact

jws-flattened-json = {
  "protected": protected
  ? "header": unprotected
  "payload": payload
  "signature": signature
}

jws-compact =
  (((protected .cat ".") .cat payload) .cat ".") .cat signature

protected = text .b64u (text .json signed-json-cmw-protected-hdr)
unprotected = text .b64u (text .json signed-json-cmw-unprotected-hdr)
payload = text .b64u (text .json json-cmw)
signature = text .b64u bytes
]]></sourcecode>
        <t>The payload <bcp14>MUST</bcp14> be the JSON-encoded Record, or Collection CMW.</t>
        <sourcecode type="cddl"><![CDATA[
signed-json-cmw-protected-hdr = {
  "alg": text
  "cty": "application/cmw+json"
  * text => text
}

signed-json-cmw-unprotected-hdr = {
  * text => text
}
]]></sourcecode>
        <t>The protected header <bcp14>MUST</bcp14> include the signature algorithm identifier and the content type <tt>application/cmw+json</tt>.
Other header parameters <bcp14>MAY</bcp14> be added to the header buckets, for example a <tt>kid</tt> that identifies the signing key.</t>
      </section>
      <section anchor="webtokens">
        <name>Transporting CMW in COSE and JOSE Web Tokens</name>
        <t>To facilitate the embedding of CMWs in CBOR-based protocols and web APIs, this document defines two <tt>"cmw"</tt> claims for use with JSON Web Tokens (JWT) and CBOR Web Tokens (CWT).</t>
        <t>The definitions for these claims can be found in <xref target="iana-jwt"/> and <xref target="iana-cwt"/>, respectively.</t>
        <section anchor="encoding-requirements">
          <name>Encoding Requirements</name>
          <t>A Collection CMW carried in a <tt>"cmw"</tt> JWT claim <bcp14>MUST</bcp14> be a <tt>json-collection</tt>.
A Collection CMW carried in a <tt>"cmw"</tt> CWT claim <bcp14>MUST</bcp14> be a <tt>cbor-collection</tt>.</t>
          <t>A Record CMW carried in a <tt>"cmw"</tt> JWT claim <bcp14>MUST</bcp14> be a <tt>json-record</tt>.
A Record CMW carried in a <tt>"cmw"</tt> CWT claim <bcp14>MUST</bcp14> be a <tt>cbor-record</tt>.</t>
        </section>
      </section>
      <section anchor="x509">
        <name>Transporting CMW in PKIX Formats</name>
        <t>CMW may need to be transported in PKIX formats, such as Certificate Signing Requests (CSRs) or in X.509 Certificates and Certificate Revocation Lists (CRLs).</t>
        <t>The use of CMW in CSRs is documented in <xref target="I-D.ietf-lamps-csr-attestation"/>, while one of the possible applications in X.509 Certificates and CRLs is detailed in Section 6.1 of <xref target="DICE-arch"/>.</t>
        <t>This section outlines the CMW extension designed to carry CMW objects.
<xref target="privcons"/> discusses some privacy considerations related to the transport of CMW in X.509 formats.</t>
        <t>The CMW extension <bcp14>MAY</bcp14> be included in X.509 Certificates, CRLs <xref target="RFC5280"/>, and CSRs.</t>
        <t>The CMW extension <bcp14>MUST</bcp14> be identified by the following object identifier:</t>
        <sourcecode type="asn.1"><![CDATA[
id-pe-cmw  OBJECT IDENTIFIER ::=
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-pe(1) 35 }
]]></sourcecode>
        <t>This extension <bcp14>SHOULD NOT</bcp14> be marked critical.
In cases where the wrapped Conceptual Message is essential for granting resource access, and there is a risk that legacy relying parties would bypass crucial controls, it is acceptable to mark the extension as critical.</t>
        <t>The CMW extension has the following syntax:</t>
        <sourcecode type="asn.1"><![CDATA[
CMW ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING
}
]]></sourcecode>
        <t>The CMW <bcp14>MUST</bcp14> include the serialized CMW object in either JSON or CBOR format, utilizing the appropriate CHOICE entry.</t>
        <t>The DER-encoded <xref target="X.690"/> CMW is the value of the OCTET STRING for the extnValue field of the extension.</t>
        <section anchor="asn1-x509">
          <name>ASN.1 Module</name>
          <t>This section provides an ASN.1 module <xref target="X.680"/> for the CMW extension, following the conventions established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
          <sourcecode type="asn.1"><![CDATA[
CMWExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-cmw-extn(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) } ;

-- CMW Extension

ext-CMW EXTENSION ::= {
  SYNTAX CMW
  IDENTIFIED BY id-pe-cmw }

-- CMW Extension OID

id-pe-cmw  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 35 }

-- CMW Extension Syntax

CMW ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING
}

END
]]></sourcecode>
        </section>
        <section anchor="compatibility-with-trusted-computing-group-tcg-conceptualmessagewrapper">
          <name>Compatibility with Trusted Computing Group (TCG) <tt>ConceptualMessageWrapper</tt></name>
          <t>Section 6.1.8 of <xref target="DICE-arch"/> specifies the ConceptualMessageWrapper (CMW) format and its corresponding object identifier.
The CMW format outlined in <xref target="DICE-arch"/> permits only a subset of the CMW grammar defined in this document.
In particular, the Collection format cannot be encoded using TCG CMWs.</t>
        </section>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The (equivalent) examples in <xref target="ex-ja"/>, <xref target="ex-ca"/>, and <xref target="ex-ct"/> assume that
the Media-Type-Name <tt>application/vnd.example.rats-conceptual-msg</tt> has been
registered alongside a corresponding CoAP Content-Format ID <tt>64999</tt> <xref target="RFC9876"/>.  The
CBOR tag <tt>1668612070</tt> is derived applying the <tt>TN()</tt> transform as described in
<xref target="cbor-tag"/>.</t>
      <t>All the examples focus on the wrapping aspects.
The wrapped messages are not instances of real Conceptual Messages.</t>
      <section anchor="ex-ja">
        <name>JSON-encoded Record</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  "I0faVQ"
]
]]></sourcecode>
      </section>
      <section anchor="ex-ca">
        <name>CBOR-encoded Record</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  64999,
  h'2347da55'
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
82             # array(2)
   19 fde7     # unsigned(64999)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
        <t>Note that a Media-Type-Name can also be used with the CBOR-encoded Record form,
for example if it is known that the receiver cannot handle CoAP
Content-Formats, or (unlike the case in point) if a CoAP Content-Format
ID has not been registered.</t>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  h'2347da55'
]
]]></sourcecode>
      </section>
      <section anchor="ex-ct">
        <name>CBOR-encoded Tag CMW</name>
        <sourcecode type="cbor-diag"><![CDATA[
1668612070(h'2347da55')
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
da 6374ffe6    # tag(1668612070)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
      </section>
      <section anchor="ex-ca-ind">
        <name>CBOR-encoded Record with explicit CM indicator</name>
        <t>This is an example of a signed CoRIM (Concise Reference Integrity Manifest) <xref target="I-D.ietf-rats-corim"/> with an explicit <tt>ind</tt> value of <tt>0b0000_0011</tt> (3), indicating that the wrapped message contains both Reference Values and Endorsements.</t>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/rim+cose",
  h'd28440a044d901f5a040',
  3
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

83                                      # array(3)
   74                                   # text(20)
      6170706c69636174696f6e2f72696d2b636f7365 # "application/rim+\
                                                                cose"
   4a                                   # bytes(10)
      d28440a044d901f5a040              # "҄@\xA0D\xD9\u0001\xF5\xA0\
                                                                   @"
   03                                   # unsigned(3)
]]></artwork>
      </section>
      <section anchor="cbor-encoded-collection">
        <name>CBOR-encoded Collection</name>
        <t>The following example is a CBOR-encoded Collection CMW that assembles conceptual messages from three attesters: Evidence for attesters A and B and Attestation Results for attester C.
It is given an explicit <tt>"__cmwc_t"</tt> using the URI form.</t>
        <artwork><![CDATA[
{
  "__cmwc_t": "tag:example.com,2024:composite-attester",
  / attester A / 0: [
    64999,
    h'2347da55',
    4
  ],
  / attester B / 1: 1668612070(h'2347da55'),
  / attester C / 2: [
    "application/eat+jwt",
    h'2e2e2e',
    8
  ]
}
]]></artwork>
      </section>
      <section anchor="json-encoded-collection">
        <name>JSON-encoded Collection</name>
        <t>The following example is a JSON-encoded Collection CMW that assembles Evidence from two attesters.</t>
        <artwork><![CDATA[
{
  "__cmwc_t": "tag:example.com,2024:another-composite-attester",
  "attester A": [
    "application/eat-ucs+json",
    "e30K",
    4
  ],
  "attester B": [
    "application/eat-ucs+cbor",
    "oA",
    4
  ]
}
]]></artwork>
      </section>
      <section anchor="use-in-jwt">
        <name>Use in JWT</name>
        <t>The following example shows the use of the <tt>"cmw"</tt> JWT claim to transport a Collection CMW in a JWT Claims Set <xref target="RFC7519"/>:</t>
        <artwork><![CDATA[
{
  "cmw": {
    "__cmwc_t": "tag:example.com,2024:another-composite-attester",
    "attester A": [
      "application/eat-ucs+json",
      "e30K",
      4
    ],
    "attester B": [
      "application/eat-ucs+cbor",
      "oA",
      4
    ]
  },
  "iss": "evidence collection daemon",
  "exp": 1300819380
}
]]></artwork>
      </section>
    </section>
    <section anchor="collected-cddl">
      <name>Collected CDDL</name>
      <t>This section contains all the CDDL definitions included in this specification.</t>
      <sourcecode type="cddl"><![CDATA[
start = cmw

cmw = json-cmw / cbor-cmw

json-cmw = json-record / json-collection
cbor-cmw = cbor-record / cbor-collection / $cbor-tag

json-record = [
  type: media-type
  value: base64url-string
  ? ind: uint .bits cm-type
]

cbor-record = [
  type: coap-content-format-type / media-type
  value: bytes
  ? ind: uint .bits cm-type
]

tag-cm-cbor<tn, fmt> = #6.<tn>(bytes .cbor fmt)

tag-cm-data<tn> = #6.<tn>(bytes)

json-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: text) => json-cmw
}

cbor-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: (int / text)) => cbor-cmw
}

media-type = text .abnf ("Content-Type" .cat Content-Type-ABNF)
base64url-string = text .regexp "[A-Za-z0-9_-]+"

coap-content-format-type = uint .size 2

oid = text .regexp "([0-2])((\\.0)|(\\.[1-9][0-9]*))*"

cm-type = &(
  reference-values: 0
  endorsements: 1
  evidence: 2
  attestation-results: 3
  appraisal-policy: 4
)

Content-Type-ABNF = '

Content-Type   = Media-Type-Name *( *SP ";" *SP parameter )
parameter      = token "=" ( token / quoted-string )

token          = 1*tchar
tchar          = "!" / "#" / "$" / "%" / "&" / "\'" / "*"
               / "+" / "-" / "." / "^" / "_" / "`" / "|" / "~"
               / DIGIT / ALPHA
quoted-string  = %x22 *( qdtext / quoted-pair ) %x22
qdtext         = SP / %x21 / %x23-5B / %x5D-7E
quoted-pair    = "\\" ( SP / VCHAR )

Media-Type-Name = type-name "/" subtype-name

type-name = restricted-name
subtype-name = restricted-name

restricted-name = restricted-name-first *126restricted-name-chars
restricted-name-first  = ALPHA / DIGIT
restricted-name-chars  = ALPHA / DIGIT / "!" / "#" /
                         "$" / "&" / "-" / "^" / "_"
restricted-name-chars =/ "." ; Characters before first dot always
                             ; specify a facet name
restricted-name-chars =/ "+" ; Characters after last plus always
                             ; specify a structured syntax suffix

DIGIT     =  %x30-39           ; 0 - 9
POS-DIGIT =  %x31-39           ; 1 - 9
ALPHA     =  %x41-5A / %x61-7A ; A - Z / a - z
SP        =  %x20
VCHAR     =  %x21-7E           ; printable ASCII (no SP)
'

signed-cbor-cmw = [
  protected: bytes .cbor signed-cbor-cmw-protected-hdr
  unprotected: signed-cbor-cmw-unprotected-hdr
  payload: bytes .cbor cbor-cmw
  signature: bytes
]

signed-cbor-cmw-protected-hdr = {
  1 => int                            ; alg
  3 => "application/cmw+cbor" / 10000 ; cty
  * cose.label => cose.values
}

signed-cbor-cmw-unprotected-hdr = {
  * cose.label => cose.values
}

cose.label = int / text
cose.values = any


signed-json-cmw = jws-flattened-json / jws-compact

jws-flattened-json = {
  "protected": protected
  ? "header": unprotected
  "payload": payload
  "signature": signature
}

jws-compact =
  (((protected .cat ".") .cat payload) .cat ".") .cat signature

signed-json-cmw-protected-hdr = {
  "alg": text
  "cty": "application/cmw+json"
  * text => text
}

signed-json-cmw-unprotected-hdr = {
  * text => text
}

protected = text .b64u (text .json signed-json-cmw-protected-hdr)
unprotected = text .b64u (text .json signed-json-cmw-unprotected-hdr)
payload = text .b64u (text .json json-cmw)
signature = text .b64u bytes

$cbor-tag /= tag-cm-cbor<1668547091, cbor-collection>
$cbor-tag /= tag-cm-cbor<1668547092, signed-cbor-cmw>

$cbor-tag /= tag-cm-data<1668547093> ; bytes(cmw+json collection)
$cbor-tag /= tag-cm-data<1668547094> ; bytes(cmw+jws)

]]></sourcecode>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><cref anchor="rfced">RFC Editor:</cref> Please remove the entire section before publication, as well as the reference to RFC 7942.</t>
      <t>This section records the status of known implementations of the protocol
defined by this specification at the time of posting of this Internet-Draft,
and is based on a proposal described in <xref target="RFC7942"/>.
The description of implementations in this section is intended to assist the
IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not
imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here
that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of
available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups to
assign due consideration to documents that have the benefit of running code,
which may serve as evidence of valuable experimentation and feedback that have
made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see
fit".</t>
      <section anchor="project-veraison">
        <name>Project Veraison</name>
        <t>The organization responsible for these implementations is Project Veraison, a
Linux Foundation project hosted at the Confidential Computing Consortium.</t>
        <t>The organization hosts two libraries which allow encoding, decoding, and
manipulation of CMW payloads: one for the Golang ecosystem
(<eref target="https://github.com/veraison/cmw"/>), and one for Rust
(<eref target="https://github.com/veraison/rust-cmw"/>).
These implementations cover all the features presented in this draft.
The maturity level is alpha.
The license is Apache 2.0.
The developers can be contacted on the Zulip channel:
<eref target="https://veraison.zulipchat.com/#narrow/stream/383526-CMW/"/>.</t>
      </section>
    </section>
    <section anchor="privcons">
      <name>Privacy Considerations</name>
      <t>The privacy considerations outlined in <xref section="11" sectionFormat="of" target="RFC9334"/> are fully applicable.
In particular, when a CMW contains Personally Identifying Information (PII), which is the case for Evidence and sometimes for other conceptual messages as well, care must be taken to prevent unintended recipients from accessing it.
Generally, utilizing secure channels between the parties exchanging CMWs can help address or mitigate these concerns.
A specific scenario arises when a public key certificate is issued based on Evidence information provided by the certificate requestor to the issuing Certification Authority (CA).
For instance, an individual seeking a publicly-trusted code signing certificate may be willing to disclose the details of the hardware where their code signing keys are stored (e.g., HSM model, patch level, etc.).
However, they likely do not want this information to be publicly accessible.
Applications that intend to publicly "broadcast" Evidence claims received from a third party via X.509 Certificates should define a Certificate Practices Statement <xref target="RFC3647"/> that clearly specifies the circumstances under which the CA can include such data in the issued certificate.
Note that the aforementioned consideration does not apply to cases where X.509 Certificates are explicitly designed as a security envelope for Evidence claims, such as in <xref target="DICE-arch"/>.</t>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>The security considerations discussed in <xref section="12.2" sectionFormat="of" target="RFC9334"/> concerning the protection of conceptual messages are fully applicable.
The following subsections provide further elaboration on these points, particularly in relation to Collection CMWs.</t>
      <section anchor="cmw-protection">
        <name>CMW Protection</name>
        <t>CMW Records, Tags, and Collections alone do not offer authenticity, integrity protection, or confidentiality.
It is the responsibility of the designer for each use case to determine the necessary security properties and implement them accordingly.</t>
        <t>RATS conceptual messages are typically secured using cryptography.
If the messages are already protected, no additional security requirements are imposed by this encapsulation.
If an adversary attempts to modify the payload encapsulation, it will result in incorrect processing of the encapsulated message, leading to an error.
If the messages are not protected, additional security must be added at a different layer.
For example, a <tt>cbor-record</tt> containing an Unprotected CWT Claims Set (UCCS) <xref target="RFC9781"/> can be signed as described in <xref target="signed-cbor-cmw"/>.</t>
        <t><xref target="crypto"/> describes a number of methods that can be used to add cryptographic protection to CMW.</t>
      </section>
      <section anchor="seccons-coll">
        <name>Using Collection CMWs for Evidence of Composite or Layered Devices</name>
        <t>When a Collection CMW is used to encapsulate Evidence for composite or layered attestation of a single device, all Evidence messages within the CMW <bcp14>MUST</bcp14> be cryptographically bound together to prevent an attacker from replacing Evidence from a compromised device with that from a non-compromised device.
If the Collection CMW is not protected from tampering by external security measures (such as object security primitives) or internal mechanisms (such as intra-item binding), an attacker could manipulate the Collection's contents to deceive the Verifier into accepting bogus Evidence as genuine.</t>
        <t>Authenticity and integrity protection is expected to be provided by the underlying attestation technology.
For example, key material used to sign/bind an entire Collection CMW should be an attestation key, handled as described in <xref section="12.1" sectionFormat="of" target="RFC9334"/>.
The binding does not necessarily have to be a signature over the Collection CMW, it might also be achieved through identifiers, linking claims (e.g., nonces) across CMW collection items, signing or hashing between the members of the Collection.
It is the responsibility of the Attester who creates the Collection CMW to ensure that the contents of the Collection are integrity-protected.</t>
      </section>
      <section anchor="integrating-cmw-into-protocols">
        <name>Integrating CMW into Protocols</name>
        <t>When CMW is integrated into some hosting protocol (for example, attested CSR <xref target="I-D.ietf-lamps-csr-attestation"/> or attested TLS <xref target="I-D.fossati-tls-attestation"/> <xref target="I-D.fossati-seat-expat"/>), it is up to that hosting protocol to describe how CMW is intended to be used and how it fits into the overall security model.</t>
        <t>Such an analysis should consider the types of conceptual messages allowed, including the permitted combinations, the protection requirements, the interface with the hosting protocol, and any other security-relevant aspect arising from the interaction between the CMW assembly and the hosting protocol.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced_1">RFC Editor:</cref> Please replace "RFCthis" with the RFC number assigned to this document.</t>
      <t><cref anchor="rfced_2">RFC Editor:</cref> This document uses the CPA (code point allocation) convention described in <xref target="I-D.bormann-cbor-draft-numbers"/>. For each usage of the term "CPA", please remove the prefix "CPA" from the indicated value and replace the residue with the value assigned by IANA; perform an analogous substitution for all other occurrences of the prefix "CPA" in the document. Finally, please remove this note.</t>
      <section anchor="iana-cwt">
        <name>CWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>JWT Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Key: CPA299</t>
          </li>
          <li>
            <t>Claim Value Type(s): CBOR map, CBOR array, or CBOR tag</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/>, <xref target="cmw-coll"/> and <xref target="cbor-tag"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-jwt">
        <name>JWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "JSON Web Token Claims" registry of the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="jws-structured-syntax-suffix">
        <name><tt>+jws</tt> Structured Syntax Suffix</name>
        <t>IANA is requested to register the <tt>+jws</tt> structured syntax suffix in the "Structured Syntax Suffixes" registry <xref target="IANA.media-type-structured-suffix"/> in the manner described in <xref target="RFC6838"/>, which can be used to indicate that the media type is encoded as JSON Web Signature (JWS) <xref target="RFC7515"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <dl spacing="compact">
            <dt>Name:</dt>
            <dd>
              <t>JSON Web Signature (JWS)</t>
            </dd>
            <dt>+suffix:</dt>
            <dd>
              <t>+jws</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t><xref target="RFC7515"/></t>
            </dd>
            <dt>Encoding Considerations:</dt>
            <dd>
              <t>binary; values are represented as a JSON Object or as a series of base64url-encoded values each separated from the next by a single period ('.') character.</t>
            </dd>
            <dt>Interoperability Considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Fragment Identifier Considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Security Considerations:</dt>
            <dd>
              <t>See <xref section="10" sectionFormat="of" target="RFC7515"/></t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org), or IETF Security Area (saag@ietf.org)</t>
            </dd>
            <dt>Author/Change Controller:</dt>
            <dd>
              <t>Remote ATtestation ProcedureS (RATS) Working Group.
The IETF has change control over this registration.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="iana-ind-ext">
        <name>RATS Conceptual Message Wrapper (CMW) Indicators Registry</name>
        <t>This specification defines a new "RATS Conceptual Message Wrapper (CMW) Indicators" registry, with "IETF Review" policy (<xref section="4.8" sectionFormat="of" target="BCP26"/>).</t>
        <t>The objective is to register CMW Indicator values for all RATS Conceptual Messages (see <xref section="8" sectionFormat="of" target="RFC9334"/>).</t>
        <t>This registry is to be added to the Remote Attestation Procedures (RATS) registry group at <xref target="IANA.rats"/>.</t>
        <t>Indicator values should be added in ascending order, with no gaps between them.</t>
        <t>Acceptable values correspond to the RATS conceptual messages defined by the RATS architecture <xref target="RFC9334"/> and any updates to it.</t>
        <section anchor="structure-of-entries">
          <name>Structure of Entries</name>
          <t>Each entry in the registry must include:</t>
          <dl newline="true">
            <dt>Indicator value:</dt>
            <dd>
              <t>A number corresponding to the bit position in the <tt>ind</tt> bitmap (<xref target="type-n-val"/>).</t>
            </dd>
            <dt>Conceptual Message name:</dt>
            <dd>
              <t>A text string describing the RATS conceptual message this indicator corresponds to.</t>
            </dd>
            <dt>Reference:</dt>
            <dd>
              <t>A reference to an IETF-stream RFC.</t>
            </dd>
          </dl>
          <t>The initial registrations for the registry are detailed in <xref target="tab-ind-regs"/>.</t>
          <table anchor="tab-ind-regs">
            <name>CMW Indicators Registry Initial Contents</name>
            <thead>
              <tr>
                <th align="left">Indicator value</th>
                <th align="left">Conceptual Message name</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Reference Values</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Endorsements</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Evidence</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Attestation Results</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">Appraisal Policy</td>
                <td align="left">
                  <xref target="cm-type"/> of RFCthis</td>
              </tr>
              <tr>
                <td align="left">5-31</td>
                <td align="left">Unassigned</td>
                <td align="left"> </td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="iana-mt">
        <name>Media Types</name>
        <t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="tab-mt-regs">
          <name>CMW Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>cmw+cbor</tt></td>
              <td align="left">
                <tt>application/cmw+cbor</tt></td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+json</tt></td>
              <td align="left">
                <tt>application/cmw+json</tt></td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+cose</tt></td>
              <td align="left">
                <tt>application/cmw+cose</tt></td>
              <td align="left">
                <xref target="signed-cbor-cmw"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+jws</tt></td>
              <td align="left">
                <tt>application/cmw+jws</tt></td>
              <td align="left">
                <xref target="signed-json-cmw"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <section anchor="applicationcmwcbor">
          <name><tt>application/cmw+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwjson">
          <name><tt>application/cmw+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwcose">
          <name><tt>application/cmw+cose</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+cose</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)  Note that the <tt>cose-type</tt> parameter is explicitly not supported, as it is understood to be <tt>"cose-sign1"</tt>.</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwjws">
          <name><tt>application/cmw+jws</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+jws</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>8bit; values are represented as a JSON Object or as a series of base64url-encoded values each separated from the next by a single period ('.') character.</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="iana-cf">
        <name>CoAP Content-Formats</name>
        <t>IANA is requested to register the following Content-Format IDs in the "CoAP Content-Formats" registry, within the "Constrained RESTful Environments (CoRE) Parameters" registry group <xref target="IANA.core-parameters"/>:</t>
        <table align="left" anchor="tab-cf-regs">
          <name>New CoAP Content Formats</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/cmw+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+json</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+cose</td>
              <td align="left">-</td>
              <td align="left">TBD3</td>
              <td align="left">
                <xref target="signed-cbor-cmw"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+jws</td>
              <td align="left">-</td>
              <td align="left">TBD4</td>
              <td align="left">
                <xref target="signed-json-cmw"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>If possible, TBD1, TBD2, TBD3 and TBD4 should be assigned in the 256..9999 range.</t>
        <section anchor="registering-new-coap-content-formats-for-parameterized-cmw-media-types">
          <name>Registering new CoAP Content-Formats for Parameterized CMW Media Types</name>
          <t>New CoAP Content-Formats can be created based on parameterized instances of the <tt>application/cmw+json</tt>, <tt>application/cmw+cbor</tt>, <tt>application/cmw+cose</tt> and <tt>application/cmw+jws</tt> media types.</t>
          <t>When assigning a new CoAP Content-Format ID for a CMW media type that utilizes the <tt>cmwc_t</tt> parameter, the registrar must check (directly or through the Designated Expert) that:</t>
          <ul spacing="normal">
            <li>
              <t>The corresponding CMW is a Collection (<xref target="cmw-coll"/>), and</t>
            </li>
            <li>
              <t>The <tt>cmwc_t</tt> value is either a (non-relative) OID or an absolute URI.</t>
            </li>
          </ul>
        </section>
        <section anchor="rfc9277-cbor-tags">
          <name>RFC9277 CBOR Tags</name>
          <t>Registering the CoAP Content-Formats listed in <xref target="tab-cf-regs"/> automatically allocates CBOR Tags in the range [1668546817, 1668612095], using the <tt>TN()</tt> transform defined in <xref section="B" sectionFormat="of" target="RFC9277"/>.
The allocated CBOR Tag numbers and the corresponding data items are listed in <xref target="tab-9277-tags"/>.</t>
          <table align="left" anchor="tab-9277-tags">
            <name>TN-derived CBOR Tags</name>
            <thead>
              <tr>
                <th align="left">Tag Number</th>
                <th align="left">Tag Content</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">1668547091</td>
                <td align="left">
                  <tt>bytes .cbor cbor-cmw</tt></td>
              </tr>
              <tr>
                <td align="left">1668547092</td>
                <td align="left">bytes-wrapped <tt>json-cmw</tt></td>
              </tr>
              <tr>
                <td align="left">1668547093</td>
                <td align="left">
                  <tt>bytes .cbor signed-cbor-cmw</tt></td>
              </tr>
              <tr>
                <td align="left">1668547094</td>
                <td align="left">bytes-wrapped <tt>signed-json-cmw</tt></td>
              </tr>
            </tbody>
          </table>
          <t><xref target="fig-9277-tags"/> extends the <tt>$cbor-tag</tt> socket defined in <xref target="cbor-tag"/> to add the definitions of the associated Tag CMWs.
Note that CMWs in Tag and Record form are excluded from the productions.
This is because they can already be represented as a CMW, so the extra wrapping would be redundant.</t>
          <figure anchor="fig-9277-tags">
            <name>Tag CMW definitions</name>
            <sourcecode type="cddl"><![CDATA[
$cbor-tag /= tag-cm-cbor<1668547091, cbor-collection>
$cbor-tag /= tag-cm-cbor<1668547092, signed-cbor-cmw>
$cbor-tag /= tag-cm-data<1668547093> ; bytes(cmw+json collection)
$cbor-tag /= tag-cm-data<1668547094> ; bytes(cmw+jws)
]]></sourcecode>
          </figure>
        </section>
      </section>
      <section anchor="iana-smi">
        <name>New SMI Numbers Registrations</name>
        <t>IANA has assigned an object identifier (OID) for the CMW extension defined in <xref target="x509"/> in the "SMI Security for PKIX Certificate Extension" registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry group as follows:</t>
        <table align="left">
          <name>New CMW Extension OID</name>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">35</td>
              <td align="left">id-pe-cmw</td>
              <td align="left">
                <xref target="x509"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>IANA is requested to assign an object identifier (OID) for the ASN.1 Module defined in <xref target="asn1-x509"/> in the "SMI Security for PKIX Module Identifier" registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry group:</t>
        <table align="left">
          <name>New ASN.1 Module OID</name>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">id-mod-cmw-extn</td>
              <td align="left">
                <xref target="asn1-x509"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="STD90">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:.plus,.cat, and.det for the construction of constants;.abnf/.abnfb for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and.feature for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="RFC9741">
          <front>
            <title>Concise Data Definition Language (CDDL): Additional Control Operators for the Conversion and Processing of Text</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point. RFCs have added to this extension point in both an application-specific and a more general way.</t>
              <t>The present document defines a number of additional generally applicable control operators for text conversion (bytes, integers, printf-style formatting, and JSON) and for an operation on text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9741"/>
          <seriesInfo name="DOI" value="10.17487/RFC9741"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="BCP26">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>International Telephone and Telegraph
Consultative Committee</organization>
            </author>
            <date month="July" year="2002"/>
          </front>
          <seriesInfo name="CCITT" value="Recommendation X.680"/>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>ASN.1 encoding rules: Specification of basic encoding Rules (BER), Canonical encoding rules (CER) and Distinguished encoding rules (DER)</title>
            <author>
              <organization>International Telephone and Telegraph
Consultative Committee</organization>
            </author>
            <date month="July" year="2002"/>
          </front>
          <seriesInfo name="CCITT" value="Recommendation X.690"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-type-structured-suffix" target="https://www.iana.org/assignments/media-type-structured-suffix">
          <front>
            <title>Structured Syntax Suffixes</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.rats" target="https://www.iana.org/assignments/rats">
          <front>
            <title>Remote Attestation Procedures (RATS)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.smi-numbers" target="https://www.iana.org/assignments/smi-numbers">
          <front>
            <title>Structure of Management Information (SMI) Numbers (MIB Module Registrations)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3647">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework</title>
            <author fullname="S. Chokhani" initials="S." surname="Chokhani"/>
            <author fullname="W. Ford" initials="W." surname="Ford"/>
            <author fullname="R. Sabett" initials="R." surname="Sabett"/>
            <author fullname="C. Merrill" initials="C." surname="Merrill"/>
            <author fullname="S. Wu" initials="S." surname="Wu"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>This document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates. In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement. This document supersedes RFC 2527.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3647"/>
          <seriesInfo name="DOI" value="10.17487/RFC3647"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC9193">
          <front>
            <title>Sensor Measurement Lists (SenML) Fields for Indicating Data Value Content-Format</title>
            <author fullname="A. Keränen" initials="A." surname="Keränen"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Sensor Measurement Lists (SenML) media types support multiple types of values, from numbers to text strings and arbitrary binary Data Values. In order to facilitate processing of binary Data Values, this document specifies a pair of new SenML fields for indicating the content format of those binary Data Values, i.e., their Internet media type, including parameters as well as any content codings applied.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9193"/>
          <seriesInfo name="DOI" value="10.17487/RFC9193"/>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="RFC9782">
          <front>
            <title>Entity Attestation Token (EAT) Media Types</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>The payloads used in Remote ATtestation procedureS (RATS) may require an associated media type for their conveyance, for example, when the payloads are used in RESTful APIs.</t>
              <t>This memo defines media types to be used for Entity Attestation Tokens (EATs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9782"/>
          <seriesInfo name="DOI" value="10.17487/RFC9782"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ear">
          <front>
            <title>EAT Attestation Results</title>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco</organization>
            </author>
            <author fullname="Sergei Trofimov" initials="S." surname="Trofimov">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="24" month="July" year="2025"/>
            <abstract>
              <t>   This document defines the EAT Attestation Result (EAR) message
   format.

   EAR is used by a verifier to encode the result of the appraisal over
   an attester's evidence.  It embeds an AR4SI's "trustworthiness
   vector" to present a normalized view of the evaluation results, thus
   easing the task of defining and computing authorization policies by
   relying parties.  Alongside the trustworthiness vector, EAR provides
   contextual information bound to the appraisal process.  This allows a
   relying party (or an auditor) to reconstruct the frame of reference
   in which the trustworthiness vector was originally computed.  EAR
   supports simple devices with one attester as well as composite
   devices that are made of multiple attesters, allowing the state of
   each attester to be separately examined.  EAR can also accommodate
   registered and unregistered extensions.  It can be serialized and
   protected using either CWT or JWT.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ear-01"/>
        </reference>
        <reference anchor="RFC9781">
          <front>
            <title>A Concise Binary Object Representation (CBOR) Tag for Unprotected CBOR Web Token Claims Sets (UCCS)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document defines the Unprotected CWT Claims Set (UCCS), a data format for representing a CBOR Web Token (CWT) Claims Set without protecting it by a signature, Message Authentication Code (MAC), or encryption. UCCS enables the use of CWT claims in environments where protection is provided by other means, such as secure communication channels or trusted execution environments. This specification defines a CBOR tag for UCCS and describes the UCCS format, its encoding, and its processing considerations. It also discusses security implications of using unprotected claims sets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9781"/>
          <seriesInfo name="DOI" value="10.17487/RFC9781"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="30" month="April" year="2025"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-09"/>
        </reference>
        <reference anchor="I-D.fossati-seat-expat">
          <front>
            <title>Remote Attestation with Exported Authenticators</title>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Muhammad Usama Sardar" initials="M. U." surname="Sardar">
              <organization>TU Dresden</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This specification defines a method for two parties in a
   communication interaction to exchange Evidence and Attestation
   Results using exported authenticators, as defined in [RFC9261].
   Additionally, it introduces the cmw_attestation extension, which
   allows attestation credentials to be included directly in the
   Certificate message sent during the Exported Authenticator-based
   post-handshake authentication.  The approach supports both the
   passport and background check models from the RATS architecture while
   ensuring that attestation remains bound to the underlying
   communication channel.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-seat-expat-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="5" month="October" year="2025"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of RATS conceptual messages (see Section 8 of
   [RFC9334], such as Evidence, Endorsements and Attestation Results, in
   Certificate Signing Requests (CSRs), such as PKCS#10 or Certificate
   Request Message Format (CRMF) payloads.  This provides an elegant and
   automatable mechanism for transporting attestation data to a
   Certification Authority.

   Including Evidence, Endorsements and Attestation Results along with a
   CSR can help to improve the assessment of the security posture for
   the private key, and can help the Certification Authority to assess
   whether it satisfies the requested certificate profile.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-21"/>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Independent</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-09"/>
        </reference>
        <reference anchor="DICE-arch" target="https://trustedcomputinggroup.org/wp-content/uploads/DICE-Attestation-Architecture-Version-1.1-Revision-18_pub.pdf">
          <front>
            <title>DICE Attestation Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC9876">
          <front>
            <title>Updates to the IANA Registration Procedures for Constrained Application Protocol (CoAP) Content-Formats</title>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="E. Dijk" initials="E." surname="Dijk"/>
            <date month="November" year="2025"/>
            <abstract>
              <t>This document updates RFC 7252 by modifying the registration procedures for the "CoAP Content-Formats" IANA registry, within the "Constrained RESTful Environments (CoRE) Parameters" registry group. This document also introduces a new column, "Media Type", to the registry. Furthermore, this document reserves Content-Format identifiers 64998 and 64999 for use in documentation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9876"/>
          <seriesInfo name="DOI" value="10.17487/RFC9876"/>
        </reference>
        <reference anchor="I-D.bormann-cbor-draft-numbers">
          <front>
            <title>Managing CBOR codepoints in Internet-Drafts</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   CBOR-based protocols often make use of numbers allocated in a
   registry.  During development of the protocols, those numbers may not
   yet be available.  This impedes the generation of data models and
   examples that actually can be used by tools.

   This short draft proposes a common way to handle these situations,
   without any changes to existing tools.  Also, in conjunction with the
   application-oriented EDN literal e'', a further reduction in
   editorial processing of CBOR examples around the time of approval can
   be achieved.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-draft-numbers-06"/>
        </reference>
      </references>
    </references>
    <?line 1389?>

<section anchor="registering-and-using-cmws">
      <name>Registering and Using CMWs</name>
      <t><xref target="fig-howto-cmw"/> describes the registration preconditions for using
CMWs in either Record CMW or Tag CMW forms.
When using Collection CMW, the preconditions apply for each entry in the Collection.</t>
      <figure anchor="fig-howto-cmw">
        <name>How To Create a CMW</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="480" width="344" viewBox="0 0 344 480" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 40,48 L 40,80" fill="none" stroke="black"/>
              <path d="M 56,176 L 56,424" fill="none" stroke="black"/>
              <path d="M 80,96 L 80,152" fill="none" stroke="black"/>
              <path d="M 80,168 L 80,424" fill="none" stroke="black"/>
              <path d="M 96,144 L 96,176" fill="none" stroke="black"/>
              <path d="M 104,256 L 104,288" fill="none" stroke="black"/>
              <path d="M 120,96 L 120,144" fill="none" stroke="black"/>
              <path d="M 168,192 L 168,232" fill="none" stroke="black"/>
              <path d="M 168,304 L 168,376" fill="none" stroke="black"/>
              <path d="M 184,48 L 184,80" fill="none" stroke="black"/>
              <path d="M 200,48 L 200,80" fill="none" stroke="black"/>
              <path d="M 224,96 L 224,144" fill="none" stroke="black"/>
              <path d="M 240,256 L 240,288" fill="none" stroke="black"/>
              <path d="M 248,144 L 248,176" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,152" fill="none" stroke="black"/>
              <path d="M 264,168 L 264,424" fill="none" stroke="black"/>
              <path d="M 288,176 L 288,424" fill="none" stroke="black"/>
              <path d="M 296,48 L 296,80" fill="none" stroke="black"/>
              <path d="M 56,32 L 168,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 280,32" fill="none" stroke="black"/>
              <path d="M 56,96 L 168,96" fill="none" stroke="black"/>
              <path d="M 216,96 L 280,96" fill="none" stroke="black"/>
              <path d="M 112,128 L 232,128" fill="none" stroke="black"/>
              <path d="M 72,160 L 104,160" fill="none" stroke="black"/>
              <path d="M 240,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 112,192 L 232,192" fill="none" stroke="black"/>
              <path d="M 120,240 L 224,240" fill="none" stroke="black"/>
              <path d="M 120,304 L 224,304" fill="none" stroke="black"/>
              <path d="M 112,384 L 248,384" fill="none" stroke="black"/>
              <path d="M 96,416 L 232,416" fill="none" stroke="black"/>
              <path d="M 24,432 L 336,432" fill="none" stroke="black"/>
              <path d="M 8,464 L 320,464" fill="none" stroke="black"/>
              <path d="M 8,464 L 24,432" fill="none" stroke="black"/>
              <path d="M 96,416 L 112,384" fill="none" stroke="black"/>
              <path d="M 232,416 L 248,384" fill="none" stroke="black"/>
              <path d="M 320,464 L 336,432" fill="none" stroke="black"/>
              <path d="M 56,32 C 47.16936,32 40,39.16936 40,48" fill="none" stroke="black"/>
              <path d="M 168,32 C 176.83064,32 184,39.16936 184,48" fill="none" stroke="black"/>
              <path d="M 216,32 C 207.16936,32 200,39.16936 200,48" fill="none" stroke="black"/>
              <path d="M 280,32 C 288.83064,32 296,39.16936 296,48" fill="none" stroke="black"/>
              <path d="M 56,96 C 47.16936,96 40,88.83064 40,80" fill="none" stroke="black"/>
              <path d="M 168,96 C 176.83064,96 184,88.83064 184,80" fill="none" stroke="black"/>
              <path d="M 216,96 C 207.16936,96 200,88.83064 200,80" fill="none" stroke="black"/>
              <path d="M 280,96 C 288.83064,96 296,88.83064 296,80" fill="none" stroke="black"/>
              <path d="M 112,128 C 103.16936,128 96,135.16936 96,144" fill="none" stroke="black"/>
              <path d="M 232,128 C 240.83064,128 248,135.16936 248,144" fill="none" stroke="black"/>
              <path d="M 72,160 C 63.16936,160 56,167.16936 56,176" fill="none" stroke="black"/>
              <path d="M 104,160 C 112.83064,160 120,152.83064 120,144" fill="none" stroke="black"/>
              <path d="M 240,160 C 231.16936,160 224,152.83064 224,144" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,167.16936 288,176" fill="none" stroke="black"/>
              <path d="M 112,192 C 103.16936,192 96,184.83064 96,176" fill="none" stroke="black"/>
              <path d="M 232,192 C 240.83064,192 248,184.83064 248,176" fill="none" stroke="black"/>
              <path d="M 120,240 C 111.16936,240 104,247.16936 104,256" fill="none" stroke="black"/>
              <path d="M 224,240 C 232.83064,240 240,247.16936 240,256" fill="none" stroke="black"/>
              <path d="M 120,304 C 111.16936,304 104,296.83064 104,288" fill="none" stroke="black"/>
              <path d="M 224,304 C 232.83064,304 240,296.83064 240,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="296,424 284,418.4 284,429.6" fill="black" transform="rotate(90,288,424)"/>
              <polygon class="arrowhead" points="272,424 260,418.4 260,429.6" fill="black" transform="rotate(90,264,424)"/>
              <path class="jump" d="M 264,168 C 258,168 258,152 264,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="176,376 164,370.4 164,381.6" fill="black" transform="rotate(90,168,376)"/>
              <polygon class="arrowhead" points="176,232 164,226.4 164,237.6" fill="black" transform="rotate(90,168,232)"/>
              <polygon class="arrowhead" points="88,424 76,418.4 76,429.6" fill="black" transform="rotate(90,80,424)"/>
              <path class="jump" d="M 80,168 C 74,168 74,152 80,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="64,424 52,418.4 52,429.6" fill="black" transform="rotate(90,56,424)"/>
              <g class="text">
                <text x="72" y="52">Reuse</text>
                <text x="136" y="52">EAT/CoRIM</text>
                <text x="244" y="52">Register</text>
                <text x="72" y="68">media</text>
                <text x="128" y="68">type(s)</text>
                <text x="224" y="68">new</text>
                <text x="264" y="68">media</text>
                <text x="56" y="84">+</text>
                <text x="96" y="84">profile</text>
                <text x="228" y="84">type</text>
                <text x="172" y="148">Register</text>
                <text x="152" y="164">new</text>
                <text x="188" y="164">CoAP</text>
                <text x="172" y="180">Content-Format</text>
                <text x="168" y="260">Automatically</text>
                <text x="140" y="276">derive</text>
                <text x="188" y="276">CBOR</text>
                <text x="128" y="292">tag</text>
                <text x="184" y="292">[RFC9277]</text>
                <text x="152" y="404">Tag</text>
                <text x="184" y="404">CMW</text>
                <text x="148" y="452">Record</text>
                <text x="192" y="452">CMW</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
     .---------------.   .---------.
    | Reuse EAT/CoRIM | | Register  |
    | media type(s)   | | new media |
    | + profile       | | type      |
     `---+----+------'   `-+----+--'
         |    |            |    |
         |  .-+------------+-.  |
         | |  |  Register  |  | |
       .-(-+-'   new CoAP   `-+-(-.
      |  | |  Content-Format  | |  |
      |  |  `-------+--------'  |  |
      |  |          |           |  |
      |  |          v           |  |
      |  |   .--------------.   |  |
      |  |  | Automatically  |  |  |
      |  |  | derive CBOR    |  |  |
      |  |  | tag [RFC9277]  |  |  |
      |  |   `------+-------'   |  |
      |  |          |           |  |
      |  |          |           |  |
      |  |          |           |  |
      |  |          v           |  |
      |  |   .----------------. |  |
      |  |  /    Tag CMW     /  |  |
      v  v `----------------'   v  v
  .--------------------------------------.
 /             Record CMW               /
`--------------------------------------'
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The list of currently open issues for this document can be found at
<eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap/issues"/>.</t>
      <t><cref anchor="rfced_3">RFC Editor:</cref> please remove before publication.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
Alexey Melnikov,
Amanda Baber,
Benjamin Schwartz,
Brian Campbell,
Carl Wallace,
Carsten Bormann,
<contact fullname="Christian Amsüss"/>,
Dave Thaler,
Deb Cooley,
<contact fullname="Éric Vyncke"/>,
<contact fullname="Ionuț Mihalcea"/>,
Mahesh Jethanandani,
Michael B. Jones,
Mike Ounsworth,
Michael StJohns,
Mike Bishop,
Mohamed Boucadair,
Mohit Sethi,
Orie Steele,
Paul Howard,
Peter Yee,
Russ Housley,
Steven Bellock,
Tim Bray,
Tom Jones,
and
Usama Sardar
for their reviews and suggestions.</t>
      <t>The definition of a Collection CMW has been modelled on a proposal originally made by Simon Frost for an EAT-based Evidence collection type.  The Collection CMW aims at superseding it by generalizing the allowed Evidence formats.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="L." surname="Lundblade" fullname="Laurence Lundblade">
        <organization>Security Theory LLC</organization>
        <address>
          <email>lgl@securitytheory.com</email>
        </address>
      </contact>
      <t>Laurence made significant contributions to enhancing the security requirements and considerations for Collection CMWs.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
