<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY SELF "RFCthis">
]>


<rfc ipr="trust200902" docName="draft-fft-rats-eat-measured-component-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="EAT Measured Component">EAT Measured Component</title>

    <author initials="S." surname="Frost" fullname="Simon Frost">
      <organization>Arm</organization>
      <address>
        <email>Simon.Frost@arm.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>Hannes.Tschofenig@siemens.com</email>
      </address>
    </author>

    <date year="2024" month="March" day="03"/>

    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT</keyword> <keyword>measurements</keyword> <keyword>claim</keyword> <keyword>measured</keyword> <keyword>component</keyword>

    <abstract>


<?line 48?>

<t>This document defines a "measured components" format that can be used with the EAT Measurements claim.</t>



    </abstract>



  </front>

  <middle>


<?line 52?>

<section anchor="introduction"><name>Introduction</name>

<t><xref section="4.2.16" sectionFormat="of" target="I-D.ietf-rats-eat"/> defines a Measurements claim that:</t>

<ul empty="true"><li>
  <t>"[c]ontains descriptions, lists, evidence or measurements of the software that exists on the entity or any other measurable subsystem of the entity."</t>
</li></ul>

<t>This claim allows for different measurement formats, each identified by a different CoAP Content-Format (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
Initially, the only specified format is CoSWID of type "evidence", as per <xref section="2.9.4" sectionFormat="of" target="RFC9393"/>.</t>

<t>This document introduces the "measured components" format that can be used with the EAT Measurements claim in addition or as an alternative to CoSWID.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> <xref target="I-D.ietf-cbor-cddl-modules"/> <xref target="I-D.ietf-cbor-cddl-more-control"/> is used to describe the data formats.</t>

</section>
<section anchor="measured-component"><name>Information Model</name>

<t>A measured component information element includes the computed digest on the software or configuration payload, along with metadata that helps in identifying the measurement and the authorizing entity for component installation.</t>

<t><xref target="tab-mc-info-elems"/> describes the information model of a measured component.</t>

<texttable title="Measured Component Information Elements" anchor="tab-mc-info-elems">
      <ttcol align='left'>IE</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Requirement Level</ttcol>
      <c>Component Name</c>
      <c>The name given to a measured component. It is important that this name remains consistent across different releases to allow for better tracking of the same measured item across updates. When combined with a consistent versioning scheme, it enables better signaling from the appraisal procedure to the relying parties.</c>
      <c><bcp14>REQUIRED</bcp14></c>
      <c>Component Version</c>
      <c>A value representing the specific release or development version of the measured component.  Using Semantic Versioning is <bcp14>RECOMMENDED</bcp14>.</c>
      <c><bcp14>OPTIONAL</bcp14></c>
      <c>Digest Value</c>
      <c>Hash of the invariant part of the component that is loaded in memory at startup time.</c>
      <c><bcp14>REQUIRED</bcp14></c>
      <c>Digest Algorithm</c>
      <c>Hash algorithm used to compute the Digest Value.</c>
      <c><bcp14>REQUIRED</bcp14></c>
      <c>Signer</c>
      <c>A unique identifier of the entity authorizing installation of the measured component.</c>
      <c><bcp14>REQUIRED</bcp14></c>
      <c>Countersigners</c>
      <c>One or more unique identifiers of further authorizing entities for component installation</c>
      <c><bcp14>OPTIONAL</bcp14></c>
</texttable>

</section>
<section anchor="data-model"><name>Data Model</name>

<t>The data model is inspired by the "PSA software component" claim (<xref section="4.4.1" sectionFormat="of" target="I-D.tschofenig-rats-psa-token"/>), which has been slightly refactored to take into account the recommendations about new EAT claims design in <xref section="E" sectionFormat="of" target="I-D.ietf-rats-eat"/>.</t>

<t>The following types and semantics have been reused:</t>

<t><list style="symbols">
  <t>COSE Key Thumbprint <xref target="I-D.ietf-cose-key-thumbprint"/>, for signer and countersigners;</t>
  <t>CoSWID software name and version <xref target="RFC9393"/>, for component name and version;</t>
  <t>CoRIM digest <xref target="I-D.ietf-rats-corim"/>, for digest value and algorithm.</t>
</list></t>

<section anchor="cddl"><name>CDDL</name>

<t>The <spanx style="verb">measured-component</spanx> data item:</t>

<figure><sourcecode type="cddl"><![CDATA[
measured-component = [
  id:               component-id
  measurement:      corim.digest
  signer:           ckt
  ? countersigners: [ + ckt ]
]

; COSE Key Thumbprint
ckt = bytes

component-id = [
  name:      text
  ? version: version
]

;# import $version-scheme from rfc9393 as coswid

version = [
  val:      text 
  ? scheme: coswid.$version-scheme
]

; eventually: ";#import digest from rfcxxxx as corim"

corim.digest = [
  alg: (int / text)
  val: bytes
]
]]></sourcecode></figure>

<t>The CDDL extending the EAT Measurements format:</t>

<figure><sourcecode type="cddl"><![CDATA[
$mc-cbor = bstr .cbor measured-component
$mc-json = tstr .json measured-component

EAT CBOR (`.feature "cbor"`)
$measurements-body-cbor /= $mc-cbor            ; native
$measurements-body-cbor /= tstr .b64u $mc-json ; tunnel

; EAT JSON (`.feature "json"`)
$measurements-body-json /= $mc-json            ; native
$measurements-body-json /= tstr .b64u $mc-cbor ; tunnel
]]></sourcecode></figure>

<section anchor="cwt"><name>CWT</name>

<texttable>
      <ttcol align='left'>content-type (CoAP C-F equivalent)</ttcol>
      <ttcol align='left'>content-format</ttcol>
      <c><spanx style="verb">application/measured-component+cbor</spanx></c>
      <c><spanx style="verb">bytes .cbor measured-component</spanx></c>
      <c><spanx style="verb">application/measured-component+json</spanx></c>
      <c><spanx style="verb">text .b64u measured-component</spanx></c>
</texttable>

</section>
<section anchor="jwt"><name>JWT</name>

<texttable>
      <ttcol align='left'>content-type (CoAP C-F equivalent)</ttcol>
      <ttcol align='left'>content-format</ttcol>
      <c><spanx style="verb">application/measured-component+json</spanx></c>
      <c><spanx style="verb">text .json measured-component</spanx></c>
      <c><spanx style="verb">application/measured-component+cbor</spanx></c>
      <c><spanx style="verb">text .b64u measured-component</spanx></c>
</texttable>

</section>
</section>
</section>
<section anchor="examples"><name>Examples</name>

<t>(The examples are CBOR only.
JSON examples will be added in a future version of this document.)</t>

<t>The example in <xref target="ex-1"/> is a measured component with all the fields populated.</t>

<figure title="Complete Measured Component" anchor="ex-1"><sourcecode type="cbor-edn"><![CDATA[
[
  / id / [
    / name / "boot loader X",
    / version / [
      "1.2.3rc2",
      16384 / semver /
    ]
  ],
  / measurement / [
    / alg / "sha-256",
    / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31dbe7af4b37
              3431fc7d319da3'
  ],
  / signer / h'492e9b676c21f6012b1ceeb9032feb4141a880797355f6675
              015ec59c51ca1ec',
  / countersigners / [
    h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb814d6ff5
      7a8a5e'
  ]
]
]]></sourcecode></figure>

<t>The example in <xref target="ex-eat-1"/> is the same measured component as above but used as the format of a <spanx style="verb">measurements</spanx> claim in a EAT claims-set.</t>

<t>Note that the example uses a CoAP Content-Format value from the experimental range (65000), which will change to the value assigned by IANA for the <spanx style="verb">application/measured-component+cbor</spanx> Content-Format.</t>

<t>Note also that the array contains only one measured component, but additional entries could be added if the measured TCB is made of multiple, individually measured components.</t>

<figure title="EAT Measurements Claim using a Measured Component" anchor="ex-eat-1"><sourcecode type="cbor-edn"><![CDATA[
{
  273: [
    [
      65000, / using a CoAP C-F from the experimental range /
      <<
        [
          / id / [
            / name / "boot loader X",
            / version / [
              "1.2.3rc2",
              16384 / semver /
            ]
          ],
          / measurement / [
            / alg / "sha-256",
            / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31db
                      e7af4b373431fc7d319da3'
          ],
          / signer / h'492e9b676c21f6012b1ceeb9032feb4141a880797
                      355f6675015ec59c51ca1ec',
          / countersigners / [
            h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb
              814d6ff57a8a5e'
          ]
        ]
      >>
    ]
  ]
}
]]></sourcecode></figure>

</section>
<section anchor="seccons"><name>Security Considerations</name>

<t>TODO</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t><cref anchor="rfced">RFC Editor:</cref> replace "&SELF;" with the RFC number assigned to this document.</t>

<section anchor="media-types-registrations"><name>Media Types Registrations</name>

<t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>

<texttable title="Measured Component Media Types" anchor="tab-mc-regs">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Template</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c><spanx style="verb">mc+cbor</spanx></c>
      <c><spanx style="verb">application/measured-component+cbor</spanx></c>
      <c>&SELF;</c>
      <c><spanx style="verb">mc+json</spanx></c>
      <c><spanx style="verb">application/measured-component+json</spanx></c>
      <c>&SELF;</c>
</texttable>

<section anchor="applicationmeasured-componentcbor"><name><spanx style="verb">application/measured-component+cbor</spanx></name>

<dl spacing="compact">
  <dt>Type name:</dt>
  <dd>
    <t>application</t>
  </dd>
  <dt>Subtype name:</dt>
  <dd>
    <t>measured-component+cbor</t>
  </dd>
  <dt>Required parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Optional parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Encoding considerations:</dt>
  <dd>
    <t>binary (CBOR)</t>
  </dd>
  <dt>Security considerations:</dt>
  <dd>
    <t><xref target="seccons"/> of &SELF;</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Published specification:</dt>
  <dd>
    <t>&SELF;</t>
  </dd>
  <dt>Applications that use this media type:</dt>
  <dd>
    <t>Attesters, Verifiers and Relying Parties</t>
  </dd>
  <dt>Fragment identifier considerations:</dt>
  <dd>
    <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
  </dd>
  <dt>Person &amp; email address to contact for further information:</dt>
  <dd>
    <t>RATS WG mailing list (rats@ietf.org)</t>
  </dd>
  <dt>Intended usage:</dt>
  <dd>
    <t>COMMON</t>
  </dd>
  <dt>Restrictions on usage:</dt>
  <dd>
    <t>none</t>
  </dd>
  <dt>Author/Change controller:</dt>
  <dd>
    <t>IETF</t>
  </dd>
  <dt>Provisional registration:</dt>
  <dd>
    <t>no</t>
  </dd>
</dl>

</section>
<section anchor="applicationmeasured-componentjson"><name><spanx style="verb">application/measured-component+json</spanx></name>

<dl spacing="compact">
  <dt>Type name:</dt>
  <dd>
    <t>application</t>
  </dd>
  <dt>Subtype name:</dt>
  <dd>
    <t>measured-component+json</t>
  </dd>
  <dt>Required parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Optional parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Encoding considerations:</dt>
  <dd>
    <t>binary (JSON is UTF-8-encoded text)</t>
  </dd>
  <dt>Security considerations:</dt>
  <dd>
    <t><xref target="seccons"/> of &SELF;</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Published specification:</dt>
  <dd>
    <t>&SELF;</t>
  </dd>
  <dt>Applications that use this media type:</dt>
  <dd>
    <t>Attesters, Verifiers and Relying Parties</t>
  </dd>
  <dt>Fragment identifier considerations:</dt>
  <dd>
    <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
  </dd>
  <dt>Person &amp; email address to contact for further information:</dt>
  <dd>
    <t>RATS WG mailing list (rats@ietf.org)</t>
  </dd>
  <dt>Intended usage:</dt>
  <dd>
    <t>COMMON</t>
  </dd>
  <dt>Restrictions on usage:</dt>
  <dd>
    <t>none</t>
  </dd>
  <dt>Author/Change controller:</dt>
  <dd>
    <t>IETF</t>
  </dd>
  <dt>Provisional registration:</dt>
  <dd>
    <t>no</t>
  </dd>
</dl>

</section>
</section>
<section anchor="measured-component-content-format-registrations"><name>Measured Component Content-Format Registrations</name>

<t>IANA is requested to register two Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>, as follows:</t>

<texttable>
      <ttcol align='left'>Content-Type</ttcol>
      <ttcol align='left'>Content Coding</ttcol>
      <ttcol align='left'>ID</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>application/measured-component+cbor</c>
      <c>-</c>
      <c>TBD1</c>
      <c>&SELF;</c>
      <c>application/measured-component+json</c>
      <c>-</c>
      <c>TBD2</c>
      <c>&SELF;</c>
</texttable>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor="RFC7252">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>

<reference anchor="RFC8610">
  <front>
    <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="C. Vigano" initials="C." surname="Vigano"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2019"/>
    <abstract>
      <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8610"/>
  <seriesInfo name="DOI" value="10.17487/RFC8610"/>
</reference>

<reference anchor="RFC9165">
  <front>
    <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="December" year="2021"/>
    <abstract>
      <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
      <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:,, and for the construction of constants; / for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and for indicating the use of a non-basic feature in an instance.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9165"/>
  <seriesInfo name="DOI" value="10.17487/RFC9165"/>
</reference>


<reference anchor="I-D.ietf-cbor-cddl-modules">
   <front>
      <title>CDDL Module Structure</title>
      <author fullname="Carsten Bormann" initials="C." surname="Bormann">
         <organization>Universität Bremen TZI</organization>
      </author>
      <date day="18" month="December" year="2023"/>
      <abstract>
	 <t>   At the time of writing, the Concise Data Definition Language (CDDL)
   is defined by RFC 8610 and RFC 9165.  The latter has used the
   extension point provided in RFC 8610, the _control operator_.

   As CDDL is being used in larger projects, the need for corrections
   and additional features has become known that cannot be easily mapped
   into this single extension point.  Hence, there is a need for
   evolution of the base CDDL specification itself.

   The present document defines a backward- and forward-compatible way
   to add a module structure to CDDL.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-modules-01"/>
   
</reference>


<reference anchor="I-D.ietf-cbor-cddl-more-control">
   <front>
      <title>More Control Operators for CDDL</title>
      <author fullname="Carsten Bormann" initials="C." surname="Bormann">
         <organization>Universität Bremen TZI</organization>
      </author>
      <date day="26" month="February" year="2024"/>
      <abstract>
	 <t>   The Concise Data Definition Language (CDDL), standardized in RFC
   8610, provides &quot;control operators&quot; as its main language extension
   point.  RFCs have added to this extension point both in an
   application-specific and a more general way.

   The present document defines a number of additional generally
   applicable control operators for text conversion (Bytes, Integers,
   JSON, Printf-style formatting), operations on text, and deterministic
   encoding.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-more-control-03"/>
   
</reference>

<reference anchor="RFC9393">
  <front>
    <title>Concise Software Identification Tags</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
    <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
    <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
    <date month="June" year="2023"/>
    <abstract>
      <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9393"/>
  <seriesInfo name="DOI" value="10.17487/RFC9393"/>
</reference>


<reference anchor="I-D.ietf-rats-eat">
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
         </author>
      <author fullname="Jeremy O&#x27;Donoghue" initials="J." surname="O&#x27;Donoghue">
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname="Carl Wallace" initials="C." surname="Wallace">
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day="15" month="January" year="2024"/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-25"/>
   
</reference>


<reference anchor="I-D.ietf-cose-key-thumbprint">
   <front>
      <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
      <author fullname="Kohei Isobe" initials="K." surname="Isobe">
         <organization>SECOM CO., LTD.</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Transmute</organization>
      </author>
      <date day="23" month="October" year="2023"/>
      <abstract>
	 <t>   This specification defines a method for computing a hash value over a
   COSE Key. It defines which fields in a COSE Key structure are used in
   the hash computation, the method of creating a canonical form of the
   fields, and how to hash the byte sequence.  The resulting hash value
   can be used for identifying or selecting a key that is the subject of
   the thumbprint.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-key-thumbprint-04"/>
   
</reference>


<reference anchor="I-D.ietf-rats-corim">
   <front>
      <title>Concise Reference Integrity Manifest</title>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>arm</organization>
      </author>
      <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
         <organization>arm</organization>
      </author>
      <author fullname="Ned Smith" initials="N." surname="Smith">
         <organization>Intel</organization>
      </author>
      <author fullname="Wei Pan" initials="W." surname="Pan">
         <organization>Huawei Technologies</organization>
      </author>
      <date day="23" month="October" year="2023"/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies the information elements for representing Endorsements and
   Reference Values in CBOR format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-03"/>
   
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
  <front>
    <title>Media Types</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>

<reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
  <front>
    <title>Constrained RESTful Environments (CoRE) Parameters</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor="I-D.tschofenig-rats-psa-token">
   <front>
      <title>Arm&#x27;s Platform Security Architecture (PSA) Attestation Token</title>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Simon Frost" initials="S." surname="Frost">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Mathias Brossard" initials="M." surname="Brossard">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
         <organization>HP Labs</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>Linaro</organization>
      </author>
      <date day="21" month="February" year="2024"/>
      <abstract>
	 <t>   The Arm Platform Security Architecture (PSA) is a family of hardware
   and firmware security specifications, as well as open-source
   reference implementations, to help device makers and chip
   manufacturers build best-practice security into products.  Devices
   that are PSA compliant can produce attestation tokens as described in
   this memo, which are the basis for many different protocols,
   including secure provisioning and network access control.  This
   document specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by PSA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with ARM&#x27;s architecture.  It is not a
   standard nor a product of the IETF.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-22"/>
   
</reference>




    </references>


<?line 371?>

<section anchor="collected-cddl"><name>Collected CDDL</name>

<t>TODO</t>

</section>
<section anchor="open-issues"><name>Open Issues</name>

<t>The list of currently open issues for this documents can be found at <eref target="https://github.com/thomas-fossati/draft-fft-rats-eat-measured-component/issues"></eref>.</t>

<t><cref>Note to RFC Editor: please remove before publication.</cref></t>

</section>
<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank
TBD
for their comments, reviews and suggestions.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

