<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fft-rats-eat-measured-component-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="EAT Measured Component">EAT Measured Component</title>
    <seriesInfo name="Internet-Draft" value="draft-fft-rats-eat-measured-component-03"/>
    <author initials="S." surname="Frost" fullname="Simon Frost">
      <organization>Arm</organization>
      <address>
        <email>Simon.Frost@arm.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>Hannes.Tschofenig@siemens.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="11"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT</keyword>
    <keyword>measurements</keyword>
    <keyword>claim</keyword>
    <keyword>measured</keyword>
    <keyword>component</keyword>
    <abstract>
      <?line 63?>

<t>A measured component is a measurable object of an attester's target environment, that is, an object whose state can be sampled and digested.
Examples of measured components include the invariant part of firmware that is loaded in memory at startup time, a run-time integrity check, a file system object, or a CPU register.</t>
      <t>This document defines a "measured component" format that can be used with the EAT <tt>Measurements</tt> claim.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-fft-rats-eat-measured-component"/>.</t>
    </note>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="4.2.16" sectionFormat="of" target="I-D.ietf-rats-eat"/> defines a <tt>Measurements</tt> claim that:</t>
      <ul empty="true">
        <li>
          <t>"[c]ontains descriptions, lists, evidence or measurements of the software that exists on the entity or any other measurable subsystem of the entity."</t>
        </li>
      </ul>
      <t>This claim allows for different measurement formats, each identified by a different CoAP Content-Format (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
Currently, the only specified format is CoSWID of type "evidence", as per <xref section="2.9.4" sectionFormat="of" target="RFC9393"/>.</t>
      <t>This document introduces a "measured component" format that can be used with the EAT <tt>Measurements</tt> claim in addition to or as an alternative to CoSWID.</t>
      <t>The term "measured component" refers to any measurable object on a target environment, that is, an object whose state can be sampled and digested.
This includes, for example: the invariant part of a firmware component that is loaded in memory at startup time, a run-time integrity check (RTIC), a file system object, or a CPU register.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> <xref target="I-D.ietf-cbor-cddl-modules"/> <xref target="I-D.ietf-cbor-cddl-more-control"/> is used to describe the data formats.</t>
    </section>
    <section anchor="measured-component">
      <name>Information Model</name>
      <t>A "measured component" information element includes the digest of the component's sampled state along with metadata that helps in identifying the component.
Optionally, any entities responsible for signing the installed component can also be specified.</t>
      <t>The information model of a "measured component" is described in <xref target="tab-mc-info-elems"/>.</t>
      <table anchor="tab-mc-info-elems">
        <name>Measured Component Information Elements</name>
        <thead>
          <tr>
            <th align="left">IE</th>
            <th align="left">Description</th>
            <th align="left">Requirement Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Component Name</td>
            <td align="left">The name given to the measured component. It is important that this name remains consistent across different releases to allow for better tracking of the same measured item across updates. When combined with a consistent versioning scheme, it enables better signaling from the appraisal procedure to the relying parties.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Component Version</td>
            <td align="left">A value representing the specific release or development version of the measured component.  Using <eref target="https://semver.org/spec/v2.0.0.html">Semantic Versioning</eref> is <bcp14>RECOMMENDED</bcp14>.</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14></td>
          </tr>
          <tr>
            <td align="left">Digest Value</td>
            <td align="left">Hash of the measured component.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Digest Algorithm</td>
            <td align="left">Hash algorithm used to compute the Digest Value.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Signers</td>
            <td align="left">One or more unique identifiers of entities signing the measured component.</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="data-model">
      <name>Data Model</name>
      <t>The data model is inspired by the "PSA software component" claim (<xref section="4.4.1" sectionFormat="of" target="I-D.tschofenig-rats-psa-token"/>), which has been refactored to take into account the recommendations about new EAT claims design in <xref section="E" sectionFormat="of" target="I-D.ietf-rats-eat"/>.</t>
      <section anchor="the-measured-component-data-item">
        <name>The <tt>measured-component</tt> Data Item</name>
        <sourcecode type="cddl"><![CDATA[
;# import digest from RFCYYYY as corim

measured-component = [
  id:           component-id
  measurement:  corim.digest
  ? signers:    [ + signer-type ]
]
]]></sourcecode>
        <dl newline="true">
          <dt><tt>id</tt></dt>
          <dd>
            <t>The measured component identifier encoded according to the format described in <xref target="component-id"/>.</t>
          </dd>
          <dt><tt>measurement</tt></dt>
          <dd>
            <t>Digest value and algorithm, encoded using CoRIM digest format (<xref section="1.3.8" sectionFormat="of" target="I-D.ietf-rats-corim"/>).</t>
          </dd>
          <dt><tt>signers</tt></dt>
          <dd>
            <t>One or more signing entities, see <xref target="signer"/>.</t>
          </dd>
        </dl>
        <section anchor="component-id">
          <name>Component Identifier</name>
          <sourcecode type="cddl"><![CDATA[
;# import sw-version-type from RFCXXXX as eat

component-id = [
  name:      text
  ? version: eat.sw-version-type
]
]]></sourcecode>
          <dl>
            <dt><tt>name</tt></dt>
            <dd>
              <t>A string that provides a human readable identifier for the component in question.  Format and adopted conventions depend on the component type.</t>
            </dd>
            <dt><tt>version</tt></dt>
            <dd>
              <t>A compound <tt>version</tt> data item that reuses encoding and semantics of <xref target="I-D.ietf-rats-eat"/> <tt>sw-version-type</tt>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="signer">
          <name>Signer</name>
          <t>A signer is an entity that digitally signs the measured component. For example, as in UEFI Secure Boot <xref target="UEFI2"/> and Arm Trusted Board Boot <xref target="TBBR-CLIENT"/>.
A signer is associated with a public key.
It could be an X.509 certificate, a raw public key, a public key thumbprint, or some other identifier that can be uniquely associated with the signing entity.
In some cases, multiple parties may need to sign a component to indicate their endorsement or approval.
This could include roles such as a firmware update system, fleet owner, or third-party auditor.
The specific purpose of each signature may depend on the deployment, and the order of signers within the array could indicate meaning.</t>
          <t>If an EAT profile (<xref section="6" sectionFormat="of" target="I-D.ietf-rats-eat"/>) uses measured components, it <bcp14>MUST</bcp14> specify whether the <tt>signers</tt> field is used.
If it is used, the profile <bcp14>MUST</bcp14> also specify what each of the entries in the <tt>signers</tt> array represents, and how to interpret the corresponding <tt>signer-type</tt>.</t>
          <sourcecode type="cddl"><![CDATA[
signer-type = bytes
]]></sourcecode>
        </section>
      </section>
      <section anchor="eat-measurements-format-extensions">
        <name>EAT <tt>measurements-format</tt> Extensions</name>
        <t>The CDDL in <xref target="fig-eat-plug"/> extends the <tt>$measurements-body-cbor</tt> and <tt>$measurements-body-json</tt> EAT sockets to add support for <tt>measured-component</tt>s to the <tt>Measurements</tt> claim.</t>
        <figure anchor="fig-eat-plug">
          <name>EAT measurements-format Extensions</name>
          <sourcecode type="cddl"><![CDATA[
mc-cbor = bstr .cbor measured-component
mc-json = tstr .json measured-component

; EAT CBOR (`.feature "cbor"`)
$measurements-body-cbor /= mc-cbor            ; native
$measurements-body-cbor /= tstr .b64u mc-json ; tunnel

; EAT JSON (`.feature "json"`)
$measurements-body-json /= mc-json            ; native
$measurements-body-json /= tstr .b64u mc-cbor ; tunnel
]]></sourcecode>
        </figure>
        <t>Each socket is extended with two new types: a "native" representation that is used when <tt>measured-component</tt> and the EAT have the same serialization (e.g., they are both CBOR), and a "tunnel" representation that is used when the serializations differ.</t>
      </section>
      <section anchor="measurements-format-for-cbor-eat">
        <name><tt>measurements-format</tt> for CBOR EAT</name>
        <t>The entries in <xref target="tab-mf-cbor"/> are the allowed <tt>content-type</tt> / <tt>content-format</tt> pairs when the <tt>measured-component</tt> is carried in a CBOR EAT.</t>
        <t>Note the use of the "native" and "tunnel" formats from <xref target="fig-eat-plug"/>, and how the associated CoAP Content-Format is used to describe the original serialization.</t>
        <table anchor="tab-mf-cbor">
          <name>measurement-format for EAT CWT</name>
          <thead>
            <tr>
              <th align="left">content-type (CoAP C-F equivalent)</th>
              <th align="left">content-format</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">
                <tt>mc-cbor</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">
                <tt>tstr .b64u mc-json</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="measurements-format-for-json-eat">
        <name><tt>measurements-format</tt> for JSON EAT</name>
        <t><xref target="tab-mf-json"/> is the equivalent of <xref target="tab-mf-cbor"/> for JSON-serialized EAT.</t>
        <table anchor="tab-mf-json">
          <name>measurement-format for EAT JWT</name>
          <thead>
            <tr>
              <th align="left">content-type (CoAP C-F equivalent)</th>
              <th align="left">content-format</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">
                <tt>mc-json</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">
                <tt>tstr .b64u mc-cbor</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>(The examples are CBOR only.
JSON examples will be added in a future version of this document.)</t>
      <t>The example in <xref target="ex-1"/> is a measured component with all the fields populated.</t>
      <figure anchor="ex-1">
        <name>Complete Measured Component</name>
        <sourcecode type="cbor-edn"><![CDATA[
[
  / id / [
    / name / "boot loader X",
    / version / [
      "1.2.3rc2",
      16384 / semver /
    ]
  ],
  / measurement / [
    / alg / "sha-256",
    / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31dbe7af4b37
              3431fc7d319da3'
  ],
  / signers / [
    h'492e9b676c21f6012b1ceeb9032feb4141a880797355f6675015ec59c5
      1ca1ec',
    h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb814d6ff5
      7a8a5e'
  ]
]
]]></sourcecode>
      </figure>
      <t>The example in <xref target="ex-eat-1"/> is the same measured component as above but used as the format of a <tt>measurements</tt> claim in a EAT claims-set.</t>
      <t>Note that the example uses a CoAP Content-Format value from the experimental range (65000), which will change to the value assigned by IANA for the <tt>application/measured-component+cbor</tt> Content-Format.</t>
      <t>Note also that the array contains only one measured component, but additional entries could be added if the measured TCB is made of multiple, individually measured components.</t>
      <figure anchor="ex-eat-1">
        <name>EAT Measurements Claim using a Measured Component</name>
        <sourcecode type="cbor-edn"><![CDATA[
{
  273: [
    [
      65000, / using a CoAP C-F from the experimental range /
      <<
        [
          / id / [
            / name / "boot loader X",
            / version / [
              "1.2.3rc2",
              16384 / semver /
            ]
          ],
          / measurement / [
            / alg / "sha-256",
            / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31db
                      e7af4b373431fc7d319da3'
          ],
          / signers / [
            h'492e9b676c21f6012b1ceeb9032feb4141a880797355f66750
              15ec59c51ca1ec',
            h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb
              814d6ff57a8a5e'
          ]
        ]
      >>
    ]
  ]
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="seccons">
      <name>Security and Privacy Considerations</name>
      <t>The Name and Version of a component could provide an attacker with detailed information about the running software and configuration settings of the device.
This information could also expose private details regarding the device.
The stability requirement for the component's Name could potentially enable tracking.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> replace "RFCthis" with the RFC number assigned to this document.</t>
      <section anchor="media-types-registrations">
        <name>Media Types Registrations</name>
        <t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="tab-mc-regs">
          <name>Measured Component Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>mc+cbor</tt></td>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>mc+json</tt></td>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <section anchor="applicationmeasured-componentcbor">
          <name><tt>application/measured-component+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>measured-component+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers and Relying Parties</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationmeasured-componentjson">
          <name><tt>application/measured-component+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>measured-component+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers and Relying Parties</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="measured-component-content-format-registrations">
        <name>Measured Component Content-Format Registrations</name>
        <t>IANA is requested to register two Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>, as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/measured-component+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/measured-component+json</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:,, and for the construction of constants; / for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-cddl-modules">
          <front>
            <title>CDDL Module Structure</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Brendan Moran" initials="B." surname="Moran">
              <organization>Arm Limited</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   At the time of writing, the Concise Data Definition Language (CDDL)
   is defined by RFC 8610 and RFC 9165.  The latter has used the
   extension point provided in RFC 8610, the _control operator_.

   As CDDL is being used in larger projects, the need for features has
   become known that cannot be easily mapped into this single extension
   point.

   The present document defines a backward- and forward-compatible way
   to add a module structure to CDDL.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-modules-02"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-cddl-more-control">
          <front>
            <title>More Control Operators for CDDL</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="28" month="March" year="2024"/>
            <abstract>
              <t>   The Concise Data Definition Language (CDDL), standardized in RFC
   8610, provides "control operators" as its main language extension
   point.  RFCs have added to this extension point both in an
   application-specific and a more general way.

   The present document defines a number of additional generally
   applicable control operators for text conversion (Bytes, Integers,
   JSON, Printf-style formatting) and for an operation on text.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-more-control-04"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="26" month="May" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-27"/>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>arm</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies the information elements for representing Endorsements and
   Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-types" target="http://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="http://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="February" year="2024"/>
            <abstract>
              <t>   The Arm Platform Security Architecture (PSA) is a family of hardware
   and firmware security specifications, as well as open-source
   reference implementations, to help device makers and chip
   manufacturers build best-practice security into products.  Devices
   that are PSA compliant can produce attestation tokens as described in
   this memo, which are the basis for many different protocols,
   including secure provisioning and network access control.  This
   document specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by PSA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with ARM's architecture.  It is not a
   standard nor a product of the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-22"/>
        </reference>
        <reference anchor="RFC9393">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="UEFI2" target="https://uefi.org/sites/default/files/resources/UEFI_Spec_2_10_Aug29.pdf">
          <front>
            <title>Unified Extensible Firmware Interface (UEFI) Specification</title>
            <author>
              <organization>UEFI Forum, Inc.</organization>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
        <reference anchor="TBBR-CLIENT" target="https://developer.arm.com/documentation/den0006">
          <front>
            <title>Trusted Board Boot Requirements Client (TBBR-CLIENT) Armv8-A</title>
            <author>
              <organization>Arm Ltd</organization>
            </author>
            <date year="2018" month="September"/>
          </front>
          <seriesInfo name="ARM" value="DEN0006D"/>
        </reference>
      </references>
    </references>
    <?line 422?>

<section anchor="open-issues">
      <name>Open Issues</name>
      <t>The list of currently open issues for this documents can be found at <eref target="https://github.com/thomas-fossati/draft-fft-rats-eat-measured-component/issues"/>.</t>
      <t><cref>Note to RFC Editor: please remove before publication.</cref></t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
Carl Wallace,
Carsten Bormann,
Giridhar Mandyam
and
Laurence Lundblade
for providing comments, reviews and suggestions that greatly improved this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
