<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-iotops-mud-rats-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Muddy Rats">MUD-Based RATS Resources Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-mud-rats-00"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>Canada</country>
        </postal>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="May" day="26"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 59?>

<t>Manufacturer Usage Description (MUD) files and the MUD URIs that point to them are defined in RFC 8520.
This document introduces a new type of MUD file to be delivered in conjunction with a MUD file signature and/or to be referenced via a MUD URI embedded in other documents or messages, such as an IEEE 802.1AR Secure Device Identifier (DevID) or a CBOR Web Token (CWT).
These signed documents can be presented to other entities, e.g., a network management system or network path orchestrator.
If this entity also takes on the role of a verifier as defined by the IETF Remote ATtestation procedureS (RATS) architecture, this verifier can use the references included in the MUD file specified in this document to discover, for example, appropriate reference value providers, endorsement documents or endorsement distribution APIs, trust anchor stores, remote verifier services (sometimes referred to as Attestation Verification Services), or transparency logs.
All theses references in the MUD file pointing to resources and auxiliary RATS services can satisfy general RATS prerequisite by enabling discovery or improve discovery resilience of corresponding resources or services.</t>
    </abstract>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Verifiers, Endorsers, and Attesters are roles defined in the RATS Architecture <xref target="RFC9334"/>.
In the RATS architecture, the Relying Party roles depend on the Verifier to bear the burden of Evidence appraisal and to generate corresponding Attestation Results for them.
Attestation Results compose a believable chunk of information that can be digested by Relying Parities in order to assess an Attester's trustworthiness.
The assessment of a remote peer's trustworthiness is vital to determine whether any future protocol interaction between a Relying Party and a remote Attester can be considered secure.
To create these Attestation Results to be consumed by Relying Parties, the Attestation Evidence an Attester generates has to be appraised by one or more appropriate Verifiers.</t>
      <t>This document defines a procedure that enables the discovery of resources or services in support of RATS, including:</t>
      <ol spacing="normal" type="1">
        <li>Reference Values,</li>
        <li>Trust Anchors,</li>
        <li>Endorsements and Endorsement Distribution APIs,</li>
        <li>(remote) Verifier APIs,</li>
        <li>Transparency Logs, or</li>
        <li>Appraisal Policies.</li>
      </ol>
      <t>MUD URIs can be embedded in any data item that was signed with trusted key material.
One common way to establish trust in a signed data item is to associate the signing key material with a trust anchor via a certification path (see <xref target="RFC4949"/> for trust anchor and certification path).
This document defines the use of MUD URIs embedded in two types of signed data items that typically are trusted via certification paths:</t>
      <ol spacing="normal" type="1">
        <li>Secure Device Identifiers (IEEE 802.1AR DevIDs) as defined by <xref target="RFC8520"/> and</li>
        <li>Entity Attestation Tokens (EAT) as defined by <xref target="I-D.ietf-rats-eat"/>.</li>
      </ol>
      <t>DevIDs and EATs (essentially CWTs ) are two very prominent examples of "trustworthy documents" (TDs) with a binary format and the embedding of MUD URIs in theses TDs can be applied to other TD types, for example, Selective Disclosure CWTs <xref target="I-D.ietf-spice-sd-cwt"/>.
Other TDs are out-of-scope of this specification, though.
The TDs are typically enrolled on Attesters by manufacturers or provisioned by supply chain entities with appropriate authority.
The TDs can be presented to local Network Management Systems, AAA-services (e.g., via IEEE 802.1X), or other points of first contact (POFC), for example, <xref target="RFC8071"/>.
These POFC are typically trusted third parties (TTP) that can digest the TDs and then base trust decisions on the associated certification paths and trust anchors.
If a TD presented by the Attester is deemed to be trusted by a local trust authority, the MUD URI embedded is considered to be a trusted source for viable resources and services in support of remote attestation of the Attester.</t>
      <t>This specification does not define the shape or format of any resource or service that is referenced by the MUD file.
In support of a unified mechanism to categorize the formats of referenced resources, a conceptual message wrapper (CMW, <xref target="I-D.ietf-rats-msg-wrap"/> is used for each type of resource.
An example of a referenced resource is a CoRIM tag <xref target="I-D.ietf-rats-corim"/>.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="mud-uris-in-trusted-documents-tds">
      <name>MUD URIs in Trusted Documents (TDs)</name>
      <t>This document does neither modify nor augment the definition about how to compose a MUD URI.
The two types of trusted documents (TDs) covered by this specification are Secure Device Identifiers and Entity Attestation Tokens.</t>
      <section anchor="mud-uris-in-devids">
        <name>MUD URIs in DevIDs</name>
        <t><xref target="RFC8520"/> defines the format of how to embed MUD URIs in DevIDs and that specification is used in this document.</t>
      </section>
      <section anchor="eat-mud-uri">
        <name>MUD URIs in EATs</name>
        <t>To embed a MUD URI in an EAT, the <tt>mud-uri</tt> claim specified in this document <bcp14>MUST</bcp14> be used.</t>
      </section>
    </section>
    <section anchor="mud-file-signatures">
      <name>MUD File Signatures</name>
      <t>As the resources required by a Verifier's appraisal procedures have to be trustworthy, a MUD signature file for a corresponding MUD File <bcp14>MUST</bcp14> be available.
The MUD File <bcp14>MUST</bcp14> include a reference to its MUD signature file via the 'mud-signature' statement.
The MUD File Signature generation as specified in <xref section="13.1" sectionFormat="of" target="RFC8520"/> applies.
If a MUD file changed (i.e., the checking of the MUD File Signature fails) or the corresponding MUD File Signer certificate is expired (see <xref section="13.2" sectionFormat="of" target="RFC8520"/>, the reference in the changed MUD File <bcp14>MUST</bcp14> point to a new valid MUD Signature File and that new MUD File Signature <bcp14>MUST</bcp14> be available.
If a corresponding MUD File Signer certificate is expired (see <xref section="13.2" sectionFormat="of" target="RFC8520"/>) or a MUD File Signature referenced by a MUD File cannot be checked successfully, the MUD File <bcp14>MUST NOT</bcp14> be trusted.</t>
      <section anchor="mud-file-signer-in-devids">
        <name>MUD File Signer in DevIDs</name>
        <t><xref target="RFC8520"/> defines the format of how to embed a reference to the signing certificate in DevIDs and that specification applies to this specification.</t>
      </section>
      <section anchor="eat-mud-signer">
        <name>MUD File Signer in EATs</name>
        <t>To embed a reference to a MUD File Signer in an EAT, the <tt>mud-signer</tt> claim specified in this document <bcp14>MUST</bcp14> be used and the <tt>mud-uri</tt> claim <bcp14>MUST</bcp14> be present.
The value of the <tt>mud-signer</tt> claim is a CBOR byte-wrapped subject field of the signing certificate of the MUD File as specified in <xref section="11" sectionFormat="of" target="RFC8520"/>.</t>
      </section>
    </section>
    <section anchor="trusting-mud-uris-and-mud-files">
      <name>Trusting MUD URIs and MUD Files</name>
      <t>The level of assurance about the authenticity of a MUD URI embedded in a TD is based on the level of trust put into the corresponding trust anchor associated with the key material that signed the TD.
If it is not possible to establish a level of trust towards the entity that signed a TD, the embedded MUD URI <bcp14>SHOULD NOT</bcp14> be trusted.
In some usage scenarios it might suffice to trust a MUD File, if the referenced MUD File Signer's certificate is not expired, but that behavior is <bcp14>NOT RECOMMENDED</bcp14>.</t>
      <t>The level of assurance about the authenticity of a MUD file is based on the level of trust put into the entity that created the corresponding MUD File Signer's certificate.
If it is not possible to establish a level of trust into the corresponding trust anchor associated with the MUD Signer's certificate, the MUD File that references that MUD Signer <bcp14>MUST NOT</bcp14> be trusted.</t>
      <section anchor="trusting-rats-resources-referenced-by-a-mud-file">
        <name>Trusting RATS Resources Referenced by a MUD File</name>
        <t>Resources, e.g., RATS Conceptual Messages, that are referenced by a MUD File <bcp14>MUST</bcp14> be signed (e.g., via a COSE_Sign1 envelope).
The signing procedures, the format of corresponding identity documents, and the establishment of trust relationships associated with these resources are out-of-scope of this document.</t>
      </section>
    </section>
    <section anchor="specification-of-rats-mud-files-referenced-by-mud-uris">
      <name>Specification of RATS MUD Files Referenced by MUD URIs</name>
      <t>The MUD URI embedded in a TD presented by an Attester points to a MUD File.
MUD URIs typically point to a piece of data that is a YANG-modeled XML file with a structure specified in the style of a YANG module definition (<xref target="RFC7950"/> and corresponding updates: <xref target="RFC8342"/>, <xref target="RFC8526"/>).
This document specifies a YANG module augment definition for generic MUD files to create RATS MUD files.
The following definition <bcp14>MUST</bcp14> be used, if a MUD URI points to a RATS MUD file.</t>
      <section anchor="tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram <xref target="RFC8340"/> provides an overview of the data model for the "ietf-mud-rats" module augment.</t>
        <sourcecode markers="true"><![CDATA[

module: ietf-mud-rats
  augment /mud:mud:
    +--rw ras
    |  +--rw ras-uris*   inet:uri
    +--rw rim
    |  +--rw rim-uris*   inet:uri
    +--rw edt
       +--rw edt-uris*   inet:uri
]]></sourcecode>
      </section>
      <section anchor="yang-module">
        <name>YANG Module</name>
        <t>This YANG module has normative references to <xref target="RFC6991"/> and augments <xref target="RFC8520"/>.</t>
        <sourcecode type="YANG">
&lt;CODE BEGINS&gt; file ietf-mud-rats@2025-02-09.yang
module ietf-mud-rats {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-mud-rats";
  prefix "mud-rats";

  import ietf-mud {
    prefix "mud";
  }

  import ietf-inet-types {
    prefix "inet";
  }

  organization
    "IETF RATS (Remote ATtestation procedureS) Working Group";

  contact
    "WG Web: http://tools.ietf.org/wg/rats/
     WG List: rats@ietf.org
     Author: Eliot Lear &lt;lear@cisco.com&gt;
     Author: Henk Birkholz &lt;henk.birkholz@sit.fraunhofer.de&gt;";

  description
    "This YANG module augments the ietf-mud model to provide for three
     optional lists to enable Remote Attestation Procedures so that
     this device type may be used as a controller for other
     MUD-enabled devices.

     Copyright (c) 2020 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
      for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  revision 2020-03-09 {
    description
      "Initial proposed standard.";
       reference "RFC XXXX: MUD Extension to find RATS supply chain
       entity resources: remote attestation services, endorsement
       documents, and reference integrity measurement";
  }

  grouping mud-rats-grouping {
    description
      "Grouping to locate RATS services";
    container ras {
      description
        "Lists of Remote Attestation Service
         (RAS/Verifiers) candidates.";
      leaf-list ras-uris {
        type inet:uri;
        description
          "A list of Verifiers that can appraise evidence produced by
           the entity that presents a DevID including this MUD URI.";
      }
    }
    container rim {
      description
        "Lists of Reference Integrity Measurement (RIM) candidates.";
      leaf-list rim-uris {
        type inet:uri;
        description
          "A list of RIM CoSWID that provide reference integrity
           measurements represented as signed CoSWID using
           the CoSWID RIM extension.";
      }
    }
    container edt {
      description
        "List of Endorsements for Roots of Trusts (e.g. Endorsement
         Key Certificates).";
      leaf-list edt-uris {
        type inet:uri;
        description
          "A list of Endorsements that vouch for the characteristics
           of Roots of Trusts the entity possesses.";
      }
    }
  }
  augment "/mud:mud" {
    uses mud-rats-grouping;
    description
      "add mud-rats URI resources";
  }
}
&lt;CODE ENDS&gt;
</sourcecode>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations of RFC 9334 apply.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The trust model and Security Considerations of RFC 8520 and RFC 9334 apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> Please replace "RFCthis" with the RFC number assigned to this document.</t>
      <t><cref anchor="rfced_1">RFC Editor:</cref> This document uses the CPA (code point allocation) convention described in <xref target="I-D.bormann-cbor-draft-numbers"/>. For each usage of the term "CPA", please remove the prefix "CPA" from the indicated value and replace the residue with the value assigned by IANA; perform an analogous substitution for all other occurrences of the prefix "CPA" in the document. Finally, please remove this note.</t>
      <section anchor="iana-mud-uri">
        <name>CWT <tt>mud-uri</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-uri</tt> CBOR Web Token claim to the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> in the Standards Action Range as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-uri</li>
          <li>Claim Description: A CBOR byte-wrapped MUD URI as specified in <xref target="RFC8520"/></li>
          <li>JWT Claim Name: mud-uri</li>
          <li>Claim Key: CPA109</li>
          <li>Claim Value Type(s): CBOR byte string</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-signer">
        <name>CWT <tt>mud-signer</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> CBOR Web Token claim to the "CBOR Web Token (CWT) Claims" registry group <xref target="IANA.cwt"/> in the Standards Action Range as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-uri</li>
          <li>Claim Description: A CBOR byte-wrapped subject field of the signing certificate for a MUD file as specified in <xref target="RFC8520"/></li>
          <li>JWT Claim Name: mud-signer</li>
          <li>Claim Key: CPA110</li>
          <li>Claim Value Type(s): CBOR byte string</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-signer"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-uri-json">
        <name>JWT <tt>mud-uri</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> JSON Web Token Claim to the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-signer</li>
          <li>Claim Description: A MUD signer reference represented via a URI text string as defined by <xref target="RFC8520"/></li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
      <section anchor="iana-mud-signer-json">
        <name>JWT <tt>mud-signer</tt> Claim Registration</name>
        <t>IANA is requested to add the new <tt>mud-signer</tt> JSON Web Token Claim to the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>Claim Name: mud-signer</li>
          <li>Claim Description: A MUD signer reference represented via a URI text string as defined by <xref target="RFC8520"/></li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="eat-mud-uri"/> of RFCthis</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <seriesInfo name="DOI" value="10.17487/RFC6991"/>
            <seriesInfo name="RFC" value="6991"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <seriesInfo name="DOI" value="10.17487/RFC7950"/>
            <seriesInfo name="RFC" value="7950"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8071">
          <front>
            <title>NETCONF Call Home and RESTCONF Call Home</title>
            <seriesInfo name="DOI" value="10.17487/RFC8071"/>
            <seriesInfo name="RFC" value="8071"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This RFC presents NETCONF Call Home and RESTCONF Call Home, which enable a NETCONF or RESTCONF server to initiate a secure connection to a NETCONF or RESTCONF client, respectively.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <seriesInfo name="DOI" value="10.17487/RFC8340"/>
            <seriesInfo name="RFC" value="8340"/>
            <seriesInfo name="BCP" value="215"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8342"/>
            <seriesInfo name="RFC" value="8342"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8520"/>
            <seriesInfo name="RFC" value="8520"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8526">
          <front>
            <title>NETCONF Extensions to Support the Network Management Datastore Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC8526"/>
            <seriesInfo name="RFC" value="8526"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the Network Configuration Protocol (NETCONF) defined in RFC 6241 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFCs 6241 and 7950. The update to RFC 6241 adds new and operations and augments existing,, and operations. The update to RFC 7950 requires the usage of the YANG library (described in RFC 8525) by NETCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-14"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="21" month="May" year="2025"/>
            <abstract>
              <t>   Section 8 of RFC 9334 defines "conceptual messages" as abstract
   messages exchanged by RATS roles such as Evidence, Attestation
   Results, Endorsements, and Reference Values.  This document defines a
   "conceptual message" wrapper (CMW) format for any RATS conceptual
   message and describes a collection type that aggregates one or more
   CMWs into a single message.

   In addition, this document specifies a corresponding CBOR tag, JSON
   Web Tokens (JWT) and CBOR Web Tokens (CWT) claims, and an X.509
   extension.  These mechanisms enable the embedding of enveloped
   conceptual messages into CBOR-based protocols, web APIs, and PKIX
   protocols.  Moreover, a Media Type and a CoAP Content-Format are
   defined for transporting CMWs over HTTP, MIME, CoAP, and other
   Internet protocols.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-07"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <seriesInfo name="DOI" value="10.17487/RFC4949"/>
            <seriesInfo name="RFC" value="4949"/>
            <seriesInfo name="FYI" value="36"/>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-spice-sd-cwt">
          <front>
            <title>SPICE SD-CWT</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-spice-sd-cwt-03"/>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Rohan Mahy" initials="R." surname="Mahy">
              <organization>Rohan Mahy Consulting Services</organization>
            </author>
            <date day="2" month="March" year="2025"/>
            <abstract>
              <t>   This document describes a data minimization technique for use with
   CBOR Web Token (CWT).  The approach is based on Selective Disclosure
   JSON Web Token (SD-JWT), with changes to align with CBOR Object
   Signing and Encryption (COSE).

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.bormann-cbor-draft-numbers">
          <front>
            <title>Managing CBOR codepoints in Internet-Drafts</title>
            <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-draft-numbers-05"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="1" month="March" year="2025"/>
            <abstract>
              <t>   CBOR-based protocols often make use of numbers allocated in a
   registry.  During development of the protocols, those numbers may not
   yet be available.  This impedes the generation of data models and
   examples that actually can be used by tools.

   This short draft proposes a common way to handle these situations,
   without any changes to existing tools.  Also, in conjunction with the
   application-oriented EDN literal e'', a further reduction in
   editorial processing of CBOR examples around the time of approval can
   be achieved.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 360?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
