<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lake-app-profiles-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EDHOC Application Profiles">Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lake-app-profiles-04"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 74?>

<t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) requires certain parameters to be agreed out-of-band, in order to ensure its successful completion. To this end, application profiles specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. In order to ensure the applicability of such parameters and information beyond transport- or setup-specific scenarios, this document defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles. Furthermore, in order to facilitate interoperability between EDHOC implementations and support EDHOC extensibility for additional integrations, this document defines a number of means to coordinate the use of EDHOC application profiles. Finally, this document defines a set of well-known EDHOC application profiles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/lake-wg/app-profiles"/>.</t>
    </note>
  </front>
  <middle>
    <?line 78?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol, especially intended for use in constrained scenarios. A main use case for EDHOC is the establishment of a Security Context for Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>.</t>
      <t>In order to successfully run EDHOC, the two peers acting as Initiator and Responder have to agree on certain parameters. Some of those are in-band and communicated through the protocol execution, during which a few of them may even be negotiated. However, other parameters have to be known out-of-band, before running the EDHOC protocol.</t>
      <t>As discussed in <xref section="3.9" sectionFormat="of" target="RFC9528"/>, applications can use EDHOC application profiles, which specify the intended usage of EDHOC to allow for the relevant processing and verifications to be made. In particular, an EDHOC application profile may include both in-band and out-of-band parameters.</t>
      <t>In order to ensure the applicability of such parameters and information beyond transport- or setup-specific scenarios, this document also defines the EDHOC_Application_Profile object, i.e., a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles as CBOR data items (see <xref target="sec-app-profile-cbor"/>). The defined representation is transport- and setup-independent, and it avoids the need to reinvent an encoding for the available options to run the EDHOC protocol or the selection logic to apply on those.</t>
      <t>The CBOR-based representation of an EDHOC application profile can be, for example: retrieved as a result of a discovery process; or retrieved/provided during the retrieval/provisioning of an EDHOC peer's public authentication credential; or obtained during the execution of a device on-boarding/registration workflow.</t>
      <t>Furthermore, in order to facilitate interoperability between EDHOC implementations and to support EDHOC extensibility for additional integrations (e.g., external security applications, or handling of authentication credentials), this document defines a number of means to coordinate the use of EDHOC application profiles, that is:</t>
      <ul spacing="normal">
        <li>
          <t>The new IANA registry "EDHOC Application Profiles" defined in <xref target="iana-edhoc-application-profiles"/>, where to register integer identifiers of EDHOC application profiles to use as corresponding Profile IDs.</t>
        </li>
        <li>
          <t>The new parameter "ed-prof" defined in <xref target="web-linking"/>. This parameter is employed to specify an EDHOC application profile identified by its Profile ID and can be used as target attribute in a web link <xref target="RFC8288"/> to an EDHOC resource, or as filter criterion in a discovery request to discover EDHOC resources.  </t>
          <t>
For instance, the target attribute can be used in a CoRE link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over the Constrained Application Protocol (CoAP) <xref target="RFC7252"/> (see <xref section="A.2" sectionFormat="of" target="RFC9528"/> as well as <xref target="RFC9668"/>).</t>
        </li>
        <li>
          <t>The new parameter "app_prof" defined in <xref target="sec-edhoc-information-object"/> for the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. This parameter is employed to specify a set of EDHOC application profiles, each identified by its Profile ID.  </t>
          <t>
For instance, the parameter can be used in the EDHOC and OSCORE profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>, in order to indicate the EDHOC application profiles supported by an ACE resource server.  </t>
          <t>
This parameter is also used in the EDHOC_Application_Profile object defined in this document, in order to encode the Profile ID of the EDHOC application profile described by an instance of that object.</t>
        </li>
        <li>
          <t>Additional parameters that provide information about an EDHOC application profile. These parameters correspond to elements of the EDHOC_Information object and are to be used as target attributes in a web link to an EDHOC resource, or as filter criteria in a discovery request to discover EDHOC resources (see <xref target="sec-parameters-web-linking"/>).</t>
        </li>
        <li>
          <t>A new EDHOC External Authorization Data (EAD) item (see <xref target="sec-app-profile-edhoc-message_1_2"/>) and a new error code for the EDHOC error message (see <xref target="sec-app-profile-edhoc-error-message"/>). When running EDHOC, a peer can use those in order to advertise the EDHOC application profiles that it supports to the other peer.</t>
        </li>
        <li>
          <t>The use of SVCB Resource Records (RR) <xref target="RFC9460"/><xref target="RFC9461"/> to advertise the support for EDHOC and for EDHOC application profiles of a given server (see <xref target="sec-svcb"/>).</t>
        </li>
      </ul>
      <t>Finally, this document defines a set of well-known EDHOC application profiles (see <xref target="sec-well-known-app-profiles"/>). These application profiles are meant to reflect what is most common and expected to be supported by EDHOC peers, while they are not intended as "default" application profiles or as a deviation from what is mandatory to support for EDHOC peers (see <xref section="8" sectionFormat="of" target="RFC9528"/>). On the other hand, they provide implementers and users with a quick overview of the several available options to run the EDHOC protocol and of their most expected combinations.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>The reader is expected to be familiar with terms and concepts defined in EDHOC <xref target="RFC9528"/> and with the use of EDHOC with CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> defined in <xref target="RFC9668"/>.</t>
        <t>Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and Concise Data Definition Language (CDDL) <xref target="RFC8610"/> are used in this document. CDDL predefined type names, especially bstr for CBOR byte strings and tstr for CBOR text strings, are used extensively in this document.</t>
        <t>CBOR data items are represented using the CBOR extended diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/> ("diagnostic notation"). Diagnostic notation comments are used to provide a textual representation of the parameters' keys and values.</t>
        <t>In the CBOR diagnostic notation used in this document, constructs of the form e'SOME_NAME' are replaced by the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. For example, {e'methods' : [0, 1, 2, 3], e'cipher_suites': 3} stands for {1 : [0, 1, 2, 3], 2 : 3}.</t>
        <t>Note to RFC Editor: Please delete the paragraph immediately preceding this note. Also, in the CBOR diagnostic notation used in this document, please replace the constructs of the form e'SOME_NAME' with the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. Finally, please delete this note.</t>
      </section>
    </section>
    <section anchor="sec-app-profile-cbor">
      <name>EDHOC_Application_Profile</name>
      <t>This section defines the EDHOC_Application_Profile object, which can be used as a canonical representation of EDHOC application profiles for their description, distribution, and storage.</t>
      <t>An EDHOC_Application_Profile object is encoded as a CBOR map <xref target="RFC8949"/>. All elements that can be included in the EDHOC_Application_Profile object are elements that can be included in the CBOR-encoded EDHOC_Information object specified in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>. In particular, they use the same CBOR abbreviations from the 'CBOR label' column of the IANA registry "EDHOC Information" defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The CBOR map encoding an EDHOC_Application_Profile object <bcp14>MUST</bcp14> include the element "app_prof" defined in <xref target="sec-edhoc-information-object"/> of this document, as well as the elements "methods" and "cred_types" defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The value of the element "app_prof" is the unique identifier of the EDHOC application profile described by the instance of the EDHOC_Application_Profile object in question. The identifier is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in this document and encoded as a CBOR integer.</t>
      <t>The CBOR map <bcp14>MUST NOT</bcp14> include the following elements: "session_id", "uri_path", "initiator", "responder", and "trust_anchors". Also, the CBOR map <bcp14>MUST NOT</bcp14> include the element "exporter_out_len" defined in <xref target="exporter-out-length"/> of this document. A consumer <bcp14>MUST</bcp14> ignore those elements if they are included in the EDHOC_Application_Profile object.</t>
      <t>The CBOR map <bcp14>MAY</bcp14> include other elements.</t>
      <t>Furthermore, consistent with Sections <xref target="RFC9528" section="8" sectionFormat="bare"/> and <xref target="RFC9528" section="A.1" sectionFormat="bare"/> of <xref target="RFC9528"/> and with <xref section="5.4" sectionFormat="of" target="RFC8613"/>, the following applies:</t>
      <ul spacing="normal">
        <li>
          <t>If the element "cipher_suites" is not present in the CBOR map, this indicates that the EDHOC application profile uses the EDHOC cipher suites 2 and 3, and possibly other cipher suites.</t>
        </li>
        <li>
          <t>If the element "id_cred_types" is not present in the CBOR map, this indicates that the EDHOC application profile uses "kid" as type of authentication credential identifiers for EDHOC, and possibly other types of authentication credential identifiers.</t>
        </li>
        <li>
          <t>The absence of any other elements in the CBOR map <bcp14>MUST NOT</bcp14> result in assuming any value.</t>
        </li>
      </ul>
      <t>If an element is present in the CBOR map and the corresponding entry in the IANA registry "EDHOC Information" specifies "NP" (non-prescriptive) in the 'Type' column and "True or False" in the 'CBOR type' column, then the following applies. An EDHOC peer that adheres to the EDHOC application profile in question is either required to support or not required to support the property or feature of EDHOC associated with the element in the CBOR map, if that element encodes the CBOR simple value <tt>true</tt> (0xf5) or <tt>false</tt> (0xf4), respectively. For example, the presence of the parameter "comb_req" denotes whether EDHOC peers adhering to the EDHOC application profile have to support the EDHOC + OSCORE combined request defined in <xref target="RFC9668"/>, or instead do not have to but might if they are willing to.</t>
      <t>If an element present in the CBOR map specifies an information that is intrinsically a set of one or more co-existing alternatives, then all the specified alternatives apply for the EDHOC application profile in question. For example, the element "cipher_suites" with value the CBOR array [0, 2] means that, in order to adhere to the EDHOC application profile in question, an EDHOC peer has to implement both the EDHOC cipher suites 0 and 2, because either of them can be used by another EDHOC peer also adhering to the same EDHOC application profile.</t>
      <t>The CDDL grammar describing the EDHOC_Application_Profile object is:</t>
      <figure anchor="fig-cddl-edhoc_application-profile-object">
        <name>CDDL Definition of the EDHOC_Application_Profile object</name>
        <sourcecode type="cddl"><![CDATA[
EDHOC_Application_Profile = {
      1 => int / array,    ; methods
      6 => int / array,    ; cred_types
     23 => int,            ; app_prof
   * int / tstr => any
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="identifying-edhoc-application-profiles-by-profile-id">
      <name>Identifying EDHOC Application Profiles by Profile ID</name>
      <t>This document introduces the concept of Profile IDs, i.e., integer values that uniquely identify EDHOC application profiles, for which an IANA registry is defined in <xref target="iana-edhoc-application-profiles"/>.</t>
      <t>This section defines two parameters to convey such Profile IDs, i.e.:</t>
      <ul spacing="normal">
        <li>
          <t>The parameter "ed-prof" for web linking <xref target="RFC8288"/> (see <xref target="web-linking"/> of this document).</t>
        </li>
        <li>
          <t>The parameter "app_prof" of the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> (see <xref target="sec-edhoc-information-object"/> of this document).  </t>
          <t>
As defined in <xref target="sec-app-profile-cbor"/>, Profile IDs are also conveyed by the parameter "app_prof" in the EDHOC_Application_Profile object, in order to identify the EDHOC application profile described by a given instance of that object.</t>
        </li>
      </ul>
      <t>As defined later in this document, Profile IDs can be used to identify EDHOC application profiles also:</t>
      <ul spacing="normal">
        <li>
          <t>Within certain EDHOC messages sent during an EDHOC session by a peer that supports such EDHOC application profiles (see <xref target="sec-app-profile-edhoc-messages"/>).</t>
        </li>
        <li>
          <t>When using SVCB Resource Records (RR) <xref target="RFC9460"/><xref target="RFC9461"/> to advertise the support for EDHOC and for EDHOC application profiles of a given server (see <xref target="sec-svcb"/>).</t>
        </li>
      </ul>
      <section anchor="web-linking">
        <name>In Web Linking</name>
        <t><xref section="6" sectionFormat="of" target="RFC9668"/> defines a number of target attributes that can be used in a web link <xref target="RFC8288"/> with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>). This is the case, e.g., when using a CoRE link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> as defined in <xref section="A.2" sectionFormat="of" target="RFC9528"/>. This allows a client to obtain relevant information about the EDHOC application profile(s) to be used with a certain EDHOC resource.</t>
        <t>In the same spirit, this section defines the following additional parameter, which can be optionally specified as a target attribute with the same name in the link to the respective EDHOC resource, or among the filter criteria in a discovery request from a client.</t>
        <ul spacing="normal">
          <li>
            <t>'ed-prof', specifying an EDHOC application profile supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying an EDHOC application profile.</t>
          </li>
        </ul>
        <t>When specifying the parameter 'ed-prof' in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
        <t>If a link to an EDHOC resource includes occurrences of the target attribute 'ed-prof', then the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The link <bcp14>MUST NOT</bcp14> include other target attributes that provide information about an EDHOC application profile (see, e.g., <xref section="6" sectionFormat="of" target="RFC9668"/> and <xref target="sec-parameters-web-linking"/> of this document), with the exception of the target attribute 'ed-ead' that <bcp14>MAY</bcp14> be included.  </t>
            <t>
The recipient <bcp14>MUST</bcp14> ignore other target attributes that provide information about an EDHOC application profile, with the exception of the target attribute 'ed-ead'.</t>
          </li>
          <li>
            <t>If the link includes occurrences of the target attribute 'ed-ead', the link provides the following information: when using the target EDHOC resource as per the EDHOC application profile indicated by any occurrence of the target attribute 'ed-prof', the server supports the External Authorization Data (EAD) items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the occurrences of the target attribute 'ed-ead'.</t>
          </li>
        </ul>
        <t>The example in <xref target="fig-web-link-example"/> shows how a CoAP client discovers two EDHOC resources at a CoAP server and obtains information about the application profile corresponding to each of those resources. The CoRE Link Format notation from <xref section="5" sectionFormat="of" target="RFC6690"/> is used.</t>
        <t>The example assumes the existence of an EDHOC application profile identified by the integer Profile ID 500, which is supported by the EDHOC resource at /edhoc-alt and whose definition includes the support for the EAD items with EAD label 111 and 222.</t>
        <t>Therefore, the link to the EDHOC resource at /edhoc-alt indicates that, when using that EDHOC resource as per the EDHOC application profile with Profile ID 500, the server supports the EAD items with EAD label 111, 222, and 333.</t>
        <figure anchor="fig-web-link-example">
          <name>The Web Link.</name>
          <artwork align="center"><![CDATA[
REQ: GET /.well-known/core

RES: 2.05 Content
    </sensors/temp>;osc,
    </sensors/light>;if=sensor,
    </.well-known/edhoc>;rt=core.edhoc;ed-csuite=0;ed-csuite=2;
        ed-method=0;ed-cred-t=0;ed-cred-t=1;ed-idcred-t=4;
        ed-i;ed-r;ed-comb-req,
    </edhoc-alt>;rt=core.edhoc;ed-prof=500;ed-ead=333
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-edhoc-information-object">
        <name>In the EDHOC_Information Object</name>
        <t><xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines the EDHOC_Information object and an initial set of its parameters. The object can be used to convey information that guides two peers about executing the EDHOC protocol.</t>
        <t>This document defines the new parameter "app_prof" of the EDHOC_Information object. The parameter is of type non-prescriptive (NP) and is summarized in <xref target="_table-cbor-key-edhoc-params"/>. The parameter is specified further below.</t>
        <table align="center" anchor="_table-cbor-key-edhoc-params">
          <name>EDHOC_Information Parameter "app_prof"</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">CBOR label</th>
              <th align="left">CBOR type</th>
              <th align="left">Registry</th>
              <th align="left">Description</th>
              <th align="left">Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">app_prof</td>
              <td align="left">23</td>
              <td align="left">int or array</td>
              <td align="left">EDHOC Application Profiles registry</td>
              <td align="left">Set of supported EDHOC application profiles</td>
              <td align="left">NP</td>
            </tr>
          </tbody>
        </table>
        <ul spacing="normal">
          <li>
            <t>app_prof: This parameter specifies a set of supported EDHOC application profiles, identified by their Profile ID. If the set is composed of a single EDHOC application profile, its Profile ID is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one Profile ID. In JSON, the "app_prof" value is an integer or an array of integers. In CBOR, "app_prof" is an integer or an array of integers, and it has label 23. The integer values are taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
          </li>
        </ul>
        <t>The CDDL grammar describing the parameter "app_prof" when included in the CBOR-encoded EDHOC_Information object is:</t>
        <figure anchor="fig-cddl-app_prof">
          <name>CDDL Definition of the Parameter "app_prof" when Included in the CBOR-encoded EDHOC_Information Object.</name>
          <sourcecode type="cddl"><![CDATA[
app_prof_parameter = (
  ? 23 => int / [2* int]                      ; app_prof
)
]]></sourcecode>
        </figure>
        <section anchor="use-in-the-edhoc-and-oscore-profile-of-the-ace-framework">
          <name>Use in the EDHOC and OSCORE Profile of the ACE Framework</name>
          <t><xref section="3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines how the EDHOC_Information object can be used within the workflow of the EDHOC and OSCORE transport profile of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>.</t>
          <t>In particular, the AS-to-C Access Token Response includes the parameter "edhoc_info", with value an EDHOC_Information object. This allows the ACE authorization server (AS) to provide the ACE client (C) with information about how to run the EDHOC protocol with the ACE resource server (RS) for which the access token is issued.</t>
          <t>Similarly, the access token includes the corresponding claim "edhoc_info", with value an EDHOC_Information object. This allows the AS to provide the ACE RS with information about how to run the EDHOC protocol with the ACE client, according to the issued access token.</t>
          <t>In turn, the EDHOC_Information object can include the parameter "app_prof" defined in this document. This parameter indicates a set of EDHOC application profiles associated with the EDHOC resource to use at the RS, which is either implied or specified by the parameter "uri_path" within the same EDHOC_Information object.</t>
          <t>If the EDHOC_Information object specified as the value of the parameter/claim "edhoc_info" includes the parameter "app_prof", then the following applies.</t>
          <ul spacing="normal">
            <li>
              <t>In addition to the parameter "app_prof", the object <bcp14>MUST NOT</bcp14> include other parameters, with the exception of the following parameters that <bcp14>MAY</bcp14> be included:  </t>
              <ul spacing="normal">
                <li>
                  <t>The parameter "eads".</t>
                </li>
                <li>
                  <t>Any parameter that is not allowed in the EDHOC_Application_Profile object defined in <xref target="sec-app-profile-cbor"/>, unless its inclusion in the EDHOC_Information object is explicitly forbidden by the parameter's definition.      </t>
                  <t>
For example, the parameter "session_id" is not allowed in the EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) and thus can be included in the EDHOC_Information object, where in fact it has to be present (see Sections <xref target="I-D.ietf-ace-edhoc-oscore-profile" section="3.3" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-edhoc-oscore-profile" section="3.3.1" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
                </li>
              </ul>
              <t>
C and RS <bcp14>MUST</bcp14> ignore other parameters that are not admitted if they are present in the EDHOC_Information object.</t>
            </li>
            <li>
              <t>The object might provide an information that corresponds to an EDHOC_Information prescriptive parameter (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>), e.g., "message_4". The type of a parameter is indicated in the 'Type' column of the corresponding entry in the IANA registry "EDHOC Information" (see <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).  </t>
              <t>
If the object specifies such an information multiple times, then each occurrence of that information <bcp14>MUST</bcp14> convey exactly the same content. This <bcp14>MUST</bcp14> take into account prescriptive parameters that are included: i) as elements of the EDHOC_Information object; or ii) as elements of an EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) encoding an EDHOC application profile, which is identified by its Profile ID specified in the parameter "app_prof" of the EDHOC_Information object.  </t>
              <t>
A consumer <bcp14>MUST</bcp14> treat as malformed an EDHOC_Information object that does not comply with the restriction above.</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the parameter "edhoc_info" of the AS-to-C Access Token Response includes the parameter "eads", then the following applies.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE RS for which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the claim "edhoc_info" of the access token includes the parameter "eads", then the following applies.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE client to which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-parameters-web-linking">
      <name>Additional Parameters for Web Linking</name>
      <t>Building on what is defined and prescribed in <xref section="6" sectionFormat="of" target="RFC9668"/>, this section defines additional parameters for web linking <xref target="RFC8288"/>, which can be used to obtain relevant pieces of information from the EDHOC application profile associated with an EDHOC resource.</t>
      <t>These parameters can be optionally specified as target attributes with the same name in a link with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>) targeting an EDHOC resource, or as filter criteria in a discovery request from a client.</t>
      <t>When specifying any of the parameters defined below in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
      <ul spacing="normal">
        <li>
          <t>'ed-ta-edcred-uuid', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a UUID <xref target="RFC9562"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the UUID in its string format (see Section 4 of <xref target="RFC9562"/>). This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-kid', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a binary key identifier. This parameter <bcp14>MUST</bcp14> specify a single value, which is the base64url-encoded text string of the binary representation of the key identifier. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-c5t', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a hash of a C509 certificate <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the base64url-encoded text string of the binary representation of the certificate hash encoded as a COSE_CertHash <xref target="RFC9360"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-c5u', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a URI <xref target="RFC3986"/> pointing to a C509 certificate <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the URI pointing to the certificate. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-x5t', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a hash of an X.509 certificate <xref target="RFC5280"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the base64url-encoded text string of the binary representation of the certificate hash encoded as a COSE_CertHash <xref target="RFC9360"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-x5u', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a URI <xref target="RFC3986"/> pointing to an X.509 certificate <xref target="RFC5280"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the URI pointing to the certificate. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
      </ul>
      <t>The example in <xref target="fig-web-link-example-2"/> extends the earlier example in <xref target="fig-web-link-example"/>, by additionally showing the use of the target attributes 'ed-ta-edcred-kid' and 'ed-ta-edcred-x5t'. Compared to the example in <xref target="fig-web-link-example"/>, the following also applies.</t>
      <ul spacing="normal">
        <li>
          <t>The link to the EDHOC resource at /.well-known/edhoc includes the target attribute 'ed-ta-edcred-kid'. The target attribute has value "AKw", i.e., the base64url-encoded text string of 0x00ac. The latter is the binary key identifier of a trust anchor supported by the server when running EDHOC through that resource.</t>
        </li>
        <li>
          <t>The link to the EDHOC resource at /edhoc-alt includes the target attribute 'ed-ta-edcred-kid'. The target attribute has value "_wH_", i.e., the base64url-encoded text string of 0xff01ff. The latter is the binary key identifier of a trust anchor supported by the server when running EDHOC through that resource.</t>
        </li>
        <li>
          <t>The link to the EDHOC resource at /edhoc-alt includes the target attribute 'ed-ta-edcred-x5t'. The target attribute has value "gi5IefKkG1EMH5s", i.e., the base64url-encoded text string of 0x822e4879f2a41b510c1f9b. The latter is the binary representation of the COSE_CertHash <xref target="RFC9360"/> corresponding to an X.509 certificate <xref target="RFC5280"/> that the server supports as a trust anchor when running EDHOC through that resource. In CBOR diagnostic notation, the considered COSE_CertHash is as follows: [-15, h'79f2a41b510c1f9b'].</t>
        </li>
      </ul>
      <figure anchor="fig-web-link-example-2">
        <name>The Web Link.</name>
        <artwork align="center"><![CDATA[
REQ: GET /.well-known/core

RES: 2.05 Content
    </sensors/temp>;osc,
    </sensors/light>;if=sensor,
    </.well-known/edhoc>;rt=core.edhoc;ed-csuite=0;ed-csuite=2;
        ed-method=0;ed-cred-t=0;ed-cred-t=1;ed-idcred-t=4;
        ed-i;ed-r;ed-comb-req;ed-ta-edcred-kid="AKw",
    </edhoc-alt>;rt=core.edhoc;ed-prof=500;ed-ead=333;
        ed-ta-edcred-kid="_wH_";ed-ta-edcred-x5t="gi5IefKkG1EMH5s"
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-app-profile-edhoc-messages">
      <name>Advertising Supported EDHOC Application Profiles during an EDHOC Session</name>
      <t>The rest of this section defines means that an EDHOC peer can use in order to advertise the EDHOC application profiles that it supports to another EDHOC peer, when running EDHOC with that other peer.</t>
      <t>Such means are an EDHOC EAD item (see <xref target="sec-app-profile-edhoc-message_1_2"/>) and an error code for the EDHOC error message (see <xref target="sec-app-profile-edhoc-error-message"/>).</t>
      <section anchor="sec-app-profile-edhoc-message_1_2">
        <name>In EDHOC Message 1 and Message 2</name>
        <t>This section defines the EDHOC EAD item "Supported EDHOC application profiles", which is registered in <xref target="iana-edhoc-ead-registry"/> of this document.</t>
        <t>The EAD item <bcp14>MAY</bcp14> be included:</t>
        <ul spacing="normal">
          <li>
            <t>In the EAD_1 field of EDHOC message_1, in order to specify EDHOC application profiles supported by the Initiator.</t>
          </li>
          <li>
            <t>In the EAD_2 field of EDHOC message_2, in order to specify EDHOC application profiles supported by the Responder.</t>
          </li>
        </ul>
        <t>When the EAD item is present, its ead_label TBD_EAD_LABEL <bcp14>MUST</bcp14> be used only with negative sign, i.e., the use of the EAD item is always critical (see <xref section="3.8" sectionFormat="of" target="RFC9528"/>).</t>
        <t>The EAD item <bcp14>MUST NOT</bcp14> occur more than once in the EAD fields of EDHOC message_1 or message_2. The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if the EAD item occurs multiple times in the EAD fields of EDHOC message_1 or message_2.</t>
        <t>The EAD item <bcp14>MUST NOT</bcp14> be included in the EAD fields of EDHOC message_3 or message_4. In case the recipient peer supports the EAD item, the recipient peer <bcp14>MUST</bcp14> silently ignore the EAD item if this is included in the EAD fields of EDHOC message_3 or message_4.</t>
        <t>The EAD item <bcp14>MUST</bcp14> specify an ead_value, as a CBOR byte string with value the binary representation of a CBOR sequence <xref target="RFC8742"/>. In particular:</t>
        <ul spacing="normal">
          <li>
            <t>When the EAD item is included in the EAD_1 field, the value of the CBOR byte string is the binary representation of the CBOR sequence OUTER_SEQ. In turn, OUTER_SEQ is composed of the following elements:  </t>
            <ul spacing="normal">
              <li>
                <t>The CBOR data item advertise_flag, which <bcp14>MAY</bcp14> be present. If present, it <bcp14>MUST</bcp14> encode the CBOR simple value <tt>true</tt> (0xf5) or <tt>false</tt> (0xf4). The semantics of this element is as follows.      </t>
                <ul spacing="normal">
                  <li>
                    <t>If advertise_flag is present and encodes the CBOR simple value <tt>true</tt> (0xf5), the Initiator is asking the Responder to advertise the EDHOC application profiles that it supports, within the EDHOC message sent in reply to EDHOC message_1.          </t>
                    <t>
If such a message is EDHOC message_2, the Responder relies on the EAD item "Supported EDHOC application profiles" included in the EAD_2 field. If such a message is an EDHOC error message with error code TBD_ERROR_CODE (see <xref target="sec-app-profile-edhoc-error-message"/>), the Responder relies on ERR_INFO.          </t>
                    <t>
If the Responder sends either of those messages in reply to such an EDHOC message_1, the Responder <bcp14>MUST</bcp14> honor the wish of the Initiator and accordingly advertise the EDHOC application profiles that it supports.</t>
                  </li>
                  <li>
                    <t>If advertise_flag is present and encodes the CBOR simple value <tt>false</tt> (0xf4), the Initiator is suggesting the Responder to not advertise the EDHOC application profiles that it supports, within the EDHOC message sent in reply to EDHOC message_1. This is relevant when the Initiator already knows what EDHOC application profiles are supported by the Responder, e.g., based on previous interactions with that Responder or on the outcome of a discovery process.          </t>
                    <t>
In spite of the suggestion from the Initiator, the Responder <bcp14>MAY</bcp14> still advertise the EDHOC application profiles that it supports, when replying to EDHOC message_1 with EDHOC message_2 or with an EDHOC error message with error code TBD_ERROR_CODE (see <xref target="sec-app-profile-edhoc-error-message"/>). For example, when sending EDHOC message_2, the Responder might wish to steer the rest of the EDHOC session in a specific way, by including the EAD item "Supported EDHOC application profiles" that specifies information corresponding to EDHOC_Information prescriptive parameters (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>The CBOR sequence APP_PROF_SEQ, which <bcp14>MUST</bcp14> be present and is specified further below.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>When the EAD item is included in the EAD_2 field, the value of the CBOR byte string is the binary representation of the CBOR sequence APP_PROF_SEQ.</t>
          </li>
        </ul>
        <t>The CBOR sequence APP_PROF_SEQ is composed of one or more elements, whose order has no meaning. Each element of the CBOR sequence <bcp14>MUST</bcp14> be either of the following:</t>
        <ul spacing="normal">
          <li>
            <t>A CBOR integer, specifying the Profile ID of an EDHOC application profile. The integer value is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.  </t>
            <t>
This element of the CBOR sequence indicates that the message sender supports the EDHOC application profile identified by the Profile ID.</t>
          </li>
          <li>
            <t>A CBOR array including at least two elements. In particular:  </t>
            <ul spacing="normal">
              <li>
                <t>The first element <bcp14>MUST</bcp14> be a CBOR integer, specifying the Profile ID of an EDHOC application profile. The integer value is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry.</t>
              </li>
              <li>
                <t>Each of the elements following the first one <bcp14>MUST</bcp14> be a CBOR unsigned integer, specifying the ead_label of an EAD item.</t>
              </li>
            </ul>
            <t>
This element of the CBOR sequence indicates that the message sender supports:  </t>
            <ul spacing="normal">
              <li>
                <t>The EDHOC application profile PROFILE identified by the Profile ID in the first element of the array; and</t>
              </li>
              <li>
                <t>The EAD items identified by the ead_label in the elements following the first one, in addition to the EAD items that are specified in the definition of the EDHOC application profile PROFILE.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>An EDHOC_Information object encoded in CBOR, i.e., as a CBOR map (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>).  </t>
            <t>
The EDHOC_Information object <bcp14>MUST NOT</bcp14> include the element "app_prof". Also, it <bcp14>MUST NOT</bcp14> include elements that are not allowed within the EDHOC_Application_Profile object defined in <xref target="sec-app-profile-cbor"/>, with the exception of the following elements that <bcp14>MAY</bcp14> be included:  </t>
            <ul spacing="normal">
              <li>
                <t>"trust_anchors".</t>
              </li>
              <li>
                <t>"exporter_out_len" (see <xref target="exporter-out-length"/>).</t>
              </li>
            </ul>
            <t>
This element of the CBOR sequence indicates that the message sender supports an EDHOC application profile consistent with the pieces of information specified by the EDHOC_Information object.</t>
          </li>
        </ul>
        <t>When sending EDHOC message_1, the Initiator might want to include the EAD item "Supported EDHOC application profiles" and not advertise the EDHOC application profiles that it supports, but instead just take advantage of advertise_flag and ask the Responder to advertise what is supported on its side. In order to do that, the Initiator can compose ead_value such that, following advertise_flag, the CBOR sequence APP_PROF_SEQ only consists of a single EDHOC_Information object as an empty CBOR map.</t>
        <t>The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if ead_value is malformed or does not conform with the format defined above.</t>
        <t>It is possible that ead_value provides information corresponding to EDHOC_Information prescriptive parameters (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>), e.g., "message_4". The type of such parameters is indicated in the 'Type' column of the corresponding entry in the IANA registry "EDHOC Information" (see <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
        <t>If the EAD item "Supported EDHOC application profiles" is included in EDHOC message_1 and/or message_2 during an EDHOC session, the peers participating in that session <bcp14>MUST NOT</bcp14> act in violation of what is indicated by prescriptive parameters that are specified in those EAD items. Upon receiving an EDHOC message and throughout the session, a peer <bcp14>MUST</bcp14> check whether the other peer has violated such indications. If any violation is found, the peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1.</t>
        <t>When composing ead_value, the sender peer <bcp14>MUST</bcp14> comply with the content restrictions specified in <xref target="sec-app-profile-edhoc-message_1_2-restrictions"/>.</t>
        <t>The CDDL grammar describing ead_value for the EAD item "Supported EDHOC application profiles" is shown in <xref target="fig-cddl-ead-value"/>.</t>
        <figure anchor="fig-cddl-ead-value">
          <name>CDDL Definition of ead_value for the EAD Item "Supported EDHOC application profiles"</name>
          <sourcecode type="cddl"><![CDATA[
ead_value = ead_1_value / ead_2_value

ead_1_value = bytes .cborseq OUTER_SEQ

ead_2_value = bytes .cborseq APP_PROF_SEQ

; This defines an array, the elements of which
; are to be used in the CBOR Sequence OUTER_SEQ:
OUTER_SEQ = [?advertise_flag, APP_PROF_SEQ]

advertise_flag = bool

; This defines an array, the elements of which
; are to be used in the CBOR Sequence APP_PROF_SEQ:
APP_PROF_SEQ = [1* element]

element = profile_id / profile_id_with_eads / EDHOC_Information

profile_id = int

profile_id_with_eads = [profile_id, 1* uint]

; The full definition is provided in
; draft-ietf-ace-edhoc-oscore-profile
EDHOC_Information = map
]]></sourcecode>
        </figure>
        <t>Examples of ead_value are shown in <xref target="sec-examples-ead-value"/>.</t>
        <section anchor="sec-app-profile-edhoc-message_1_2-restrictions">
          <name>Content Restrictions</name>
          <t>When the sender peer composes ead_value of the EDHOC EAD item "Supported EDHOC application profiles", the following applies.</t>
          <t>It is possible that ead_value provides an information corresponding to an EDHOC_Information prescriptive parameter (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
          <t>If ead_value specifies such an information multiple times, then each occurrence of that information <bcp14>MUST</bcp14> convey exactly the same content. With reference to the CBOR sequence APP_PROF_SEQ defined in <xref target="sec-app-profile-edhoc-message_1_2"/>, the enforcement of these content restrictions <bcp14>MUST</bcp14> take into account prescriptive parameters that are included:</t>
          <ul spacing="normal">
            <li>
              <t>As elements of an EDHOC_Information object specified within APP_PROF_SEQ; or</t>
            </li>
            <li>
              <t>As elements of an EDHOC_Application_Profile object encoding an EDHOC application profile, which is identified by its Profile ID specified within APP_PROF_SEQ.</t>
            </li>
          </ul>
          <t>If the Responder has received the EAD item in the EAD_1 field of EDHOC message_1 and intends to include the EAD item in the EAD_2 field of EDHOC message_2, then the Responder <bcp14>MUST</bcp14> further take into account the presence of such information in the received EAD item when composing ead_value.</t>
          <t>A consumer <bcp14>MUST</bcp14> treat as malformed an EDHOC_Information object that does not comply with the restrictions above.</t>
        </section>
        <section anchor="exporter-out-length">
          <name>Agreeing on EDHOC_Exporter Output Lengths</name>
          <t>The main output of a successfully completed EDHOC session is the shared secret session key PRK_out (see <xref section="4.1.3" sectionFormat="of" target="RFC9528"/>).</t>
          <t>After having established PRK_out, the two peers can use the EDHOC_Exporter interface defined in <xref section="4.2.1" sectionFormat="of" target="RFC9528"/>, e.g., to derive keying material for an application protocol. Among its inputs, the EDHOC_Exporter interface includes "exporter_label" as a registered numeric identifier of the intended output and "length" as the length in bytes of the intended output.</t>
          <t>When using the EDHOC_Exporter interface, it is crucial that the two peers agree about the length in bytes of each intended output, in order to ensure the correctness of their operations. To this end, the two peers can rely on pre-defined default lengths, or agree out-of-band on alternative lengths.</t>
          <t>However, the two peers might need or prefer to explicitly agree about specific output lengths to use on a per-session basis. As described below, this can be achieved in-band, by using the EDHOC EAD item "Supported EDHOC application profiles" defined in <xref target="sec-app-profile-edhoc-message_1_2"/>.</t>
          <t>This document defines the new parameter "exporter_out_len" of the EDHOC_Information object (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>). The parameter is of type prescriptive (P) and is summarized in <xref target="_table-cbor-key-edhoc-params-2"/>. The parameter is specified further below.</t>
          <table align="center" anchor="_table-cbor-key-edhoc-params-2">
            <name>EDHOC_Information Parameter "exporter_out_len"</name>
            <thead>
              <tr>
                <th align="left">Name</th>
                <th align="left">CBOR label</th>
                <th align="left">CBOR type</th>
                <th align="left">Registry</th>
                <th align="left">Description</th>
                <th align="left">Type</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">exporter_out_len</td>
                <td align="left">22</td>
                <td align="left">array</td>
                <td align="left">EDHOC Exporter Labels</td>
                <td align="left">Set of output lengths to use with the EDHOC_Exporter interface</td>
                <td align="left">P</td>
              </tr>
            </tbody>
          </table>
          <ul spacing="normal">
            <li>
              <t>exporter_out_len: This parameter specifies a set of one or more pairs (X, Y), where:  </t>
              <ul spacing="normal">
                <li>
                  <t>The first element X specifies a value to use as first argument "exporter_label" when invoking the EDHOC_Exporter interface (see <xref section="4.2.1" sectionFormat="of" target="RFC9528"/>).      </t>
                  <t>
The value of X is taken from the 'Label' column of the "EDHOC Exporter Labels" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group <xref target="EDHOC.Exporter.Labels"/>.</t>
                </li>
                <li>
                  <t>The second element Y specifies the value to use as third argument "length" when invoking the EDHOC_Exporter interface using the value specified by X as first argument "exporter_label" (see <xref section="4.2.1" sectionFormat="of" target="RFC9528"/>).      </t>
                  <t>
The value specified by Y <bcp14>MUST</bcp14> be a valid value to use as "length" when using the value specified by X as "exporter_label". For example, when X specifies 0 as the "exporter_label" to derive an OSCORE Master Secret <xref target="RFC8613"/>, Y is required to be not less than the "length" default value defined in <xref section="A.1" sectionFormat="of" target="RFC9528"/>, i.e., the key length (in bytes) of the application AEAD Algorithm of the selected cipher suite for the EDHOC session.</t>
                </li>
              </ul>
              <t>
The set is encoded as a non-empty array, each element of which <bcp14>MUST</bcp14> be an array of exactly two elements, hence encoding one pair (X, Y). That is, each inner array includes X encoded as an unsigned integer and Y encoded as an unsigned integer, in this order.  </t>
              <t>
Within the set of pairs (X, Y), the order of the inner arrays encoding the pairs is not relevant. The set <bcp14>MUST NOT</bcp14> specify multiple pairs that have the same unsigned integer value as their first element X.  </t>
              <t>
In JSON, the "exporter_out_len" value is a non-empty array, each element of which is an array including two unsigned integers. In CBOR, "exporter_out_len" is a non-empty array that has label 22, each element of which is an array including two unsigned integers.</t>
            </li>
          </ul>
          <t>The CDDL grammar describing the parameter "exporter_out_len" when included in the CBOR-encoded EDHOC_Information object is:</t>
          <figure anchor="fig-cddl-exporter_out_len">
            <name>CDDL Definition of the Parameter "exporter_out_len" when Included in the CBOR-encoded EDHOC_Information Object.</name>
            <sourcecode type="cddl"><![CDATA[
exporter_out_len = (
  ? 22 => [1* [uint, uint]]                   ; app_prof
)
]]></sourcecode>
          </figure>
          <t>Within ead_value of the EAD item "Supported EDHOC application profiles", the parameter "exporter_out_len" can be included within instances of the EDHOC_Information object that are specified within the CBOR sequence APP_PROF_SEQ (see <xref target="sec-app-profile-edhoc-message_1_2"/>).</t>
          <t>The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if any of the following occurs:</t>
          <ul spacing="normal">
            <li>
              <t>The recipient peer does not recognize the value encoded by the first element X of a pair (X, Y) as a valid "exporter_label" to be used when invoking the EDHOC_Exporter interface.</t>
            </li>
            <li>
              <t>In a pair (X, Y), the value encoded by the second element Y is not valid to be used as "length" when invoking the EDHOC_Exporter interface using the value encoded by the first element X as "exporter_label".</t>
            </li>
            <li>
              <t>For a pair (X, Y), the recipient peer is not going to be able to invoke the EDHOC_Exporter interface using the values encoded by X and Y as the first argument "exporter_label" and the third argument "length", respectively.</t>
            </li>
          </ul>
          <t>If the Responder has received an EDHOC message_1 including the EAD item "Supported EDHOC application profiles" and specifying the parameter "exporter_out_len", then the following applies if the Responder includes the EAD item "Supported EDHOC application profiles" in EDHOC message_2, with ead_value specifying the parameter "exporter_out_len". Within ead_value of the EAD item included in EDHOC message_2, the Responder <bcp14>MUST NOT</bcp14> specify any pair (X, Y) such that the unsigned integer value encoded by X was encoded by the first element of a pair within the EAD item included in the received EDHOC message_1.</t>
          <t>If the Initiator receives an EDHOC message_2 including the EAD item "Supported EDHOC application profiles" and specifying the parameter "exporter_out_len", then the following applies if the Initiator included the EAD item "Supported EDHOC application profiles" in EDHOC message_1, with ead_value specifying the parameter "exporter_out_len". The Initiator <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if ead_value of the EAD item included in EDHOC message_2 specifies any pair (X, Y) such that the unsigned integer value encoded by X was encoded by the first element of a pair of the EAD item included in the sent EDHOC message_1.</t>
          <t>Since the parameter "exporter_out_len" is of type prescriptive, the restrictions compiled in <xref target="sec-app-profile-edhoc-message_1_2-restrictions"/> apply. In particular, the "information" corresponding to the prescriptive parameter "exporter_out_len" is the "length" Y to use when invoking the EDHOC_Exporter interface using the paired "exporter_label" X.</t>
          <t>That is, if ead_value provides the length of the EDHOC_Exporter output for a given "exporter_label" multiple times, then each of such occurrences <bcp14>MUST</bcp14> specify the same "length" value. Within this constraint, it remains possible for ead_value to specify multiple instances of the EDHOC_Information object within APP_PROF_SEQ and for each of such instances to include the parameter "exporter_out_len", which can overall encode a value different from that of the same parameter in another instance of the EDHOC_Information object.</t>
          <t>The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if the parameter "exporter_out_len" is malformed or does not conform with the format and constraints defined above.</t>
          <t>In an EDHOC session during which the EAD item "Supported EDHOC application profiles" has been included in EDHOC message_1 and/or message_2 as specifying the parameter "exporter_out_len", the following applies.</t>
          <ul spacing="normal">
            <li>
              <t>The Initiator (Responder) considers the successful verification of EDHOC message_2 (message_3) as a confirmed agreement with the other peer about how to invoke the EDHOC_Exporter interface, once the session key PRK_out for the present EDHOC session is available.  </t>
              <t>
That is, for each pair (X, Y) specified by the exchanged EAD items, the two peers <bcp14>MUST</bcp14> use the unsigned integer values encoded by X and Y as the first argument "exporter_label" and the third argument "length", respectively.</t>
            </li>
            <li>
              <t>If a particular "exporter_label" value is not specified by the exchanged EAD items, then a possible invocation of the EDHOC_Exporter interface using that value as its first argument takes as value for its third argument "length" a pre-defined default value, or an alternative value agreed out-of-band.</t>
            </li>
          </ul>
          <t>When using the EDHOC and OSCORE transport profile of the ACE framework <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>, the parameter "exporter_out_len" <bcp14>MUST NOT</bcp14> be included within the EDHOC_Information object specified as the value of the parameter/claim "edhoc_info".</t>
        </section>
        <section anchor="sec-examples-ead-value">
          <name>Examples of ead_value</name>
          <t><xref target="fig-example-ead-value-1"/> shows an example in CBOR diagnostic notation of ead_value for the EDHOC EAD item "Supported EDHOC application profiles", when used in EDHOC message_1. With reference to the CDDL grammar in <xref target="fig-cddl-ead-value"/>, the following applies.</t>
          <t>The CBOR data item advertise_flag is present and encodes the CBOR simple value <tt>true</tt> (0xf5), hence asking the Responder to advertise the EDHOC application profiles that it supports, when replying to the present EDHOC message_1.</t>
          <t>The CBOR sequence APP_PROF_SEQ includes the following three elements:</t>
          <ul spacing="normal">
            <li>
              <t>An element profile_id, specifying the Profile ID of an EDHOC application profile supported by the Initiator. Specifically, that EDHOC application profile is the well-known application profile MINIMAL-CS-2 defined in <xref target="sec-well-known-app-prof-id-0"/>.</t>
            </li>
            <li>
              <t>An element profile_id, specifying the Profile ID of an EDHOC application profile supported by the Initiator. Specifically, that EDHOC application profile is the well-known application profile MINIMAL-CS-0 defined in <xref target="sec-well-known-app-prof-id-1"/>.</t>
            </li>
            <li>
              <t>An element EDHOC_Information, which in turn includes the following parameters:  </t>
              <ul spacing="normal">
                <li>
                  <t>"message_4", encoded as the CBOR simple value <tt>true</tt> (0xf5), hence indicating that EDHOC meessage_4 is expected in the current EDHOC session.</t>
                </li>
                <li>
                  <t>"eads", encoded as a CBOR array. The array includes two elements encoded as unsigned integers, i.e., the EAD labels 500 and 333 of the corresponding EAD items supported by the Initiator.</t>
                </li>
                <li>
                  <t>"trust_anchors", encoded as a CBOR map. The map includes a single element with value a CBOR array, which pertains to trust anchors whose purpose is the verification of authentication credentials of other EDHOC peers in an EDHOC session.      </t>
                  <t>
In turn, the array includes two CBOR maps. Within the first CBOR map, its entry's value is a CBOR byte string that encodes 0x00ac. Within the second CBOR map, its entry's value is a CBOR byte string that encodes 0xff01ff. Both 0x00ac and 0xff01ff are binary key identifiers of trust anchors supported by the Initiator in the current EDHOC session.</t>
                </li>
              </ul>
            </li>
          </ul>
          <figure anchor="fig-example-ead-value-1">
            <name>Example of ead_value for the EAD Item "Supported EDHOC application profiles" in EDHOC message_1</name>
            <sourcecode type="cbor-diag"><![CDATA[
<<
   true,                      / advertise_flag /
   e'APP-PROF-MINIMAL-CS-2',  / profile_id /
   e'APP-PROF-MINIMAL-CS-0',  / profile_id /
   {                          / EDHOC_Information /
      e'message_4' : true,
      e'eads' : [500, 333],
      e'trust_anchors' : {
         e'edhoc_cred' : [
           { e'kid_ta_type' : h'00ac' },
           { e'kid_ta_type' : h'ff01ff' }
         ]
      }
   }
>>
]]></sourcecode>
          </figure>
          <t><xref target="fig-example-ead-value-2"/> shows an example in CBOR diagnostic notation of ead_value for the EDHOC EAD item "Supported EDHOC application profiles", when used in EDHOC message_2. With reference to the CDDL grammar in <xref target="fig-cddl-ead-value"/>, the following applies.</t>
          <t>The CBOR sequence APP_PROF_SEQ includes the following two elements:</t>
          <ul spacing="normal">
            <li>
              <t>An element profile_id, specifying the Profile ID of an EDHOC application profile supported by the Responder. Specifically, that EDHOC application profile is the well-known application profile MINIMAL-CS-2 defined in <xref target="sec-well-known-app-prof-id-0"/>.</t>
            </li>
            <li>
              <t>An element EDHOC_Information, which in turn includes the following parameters:  </t>
              <ul spacing="normal">
                <li>
                  <t>"comb_req", encoded as the CBOR simple value <tt>true</tt> (0xf5), hence indicating that the Responder supports the EDHOC + OSCORE combined request defined in <xref target="RFC9668"/>.</t>
                </li>
                <li>
                  <t>"eads", encoded as a CBOR array. The array includes two elements encoded as unsigned integers, i.e., the EAD labels 500 and 999 of the corresponding EAD items supported by the Responder.</t>
                </li>
                <li>
                  <t>"trust_anchors", encoded as a CBOR map. The map includes a single element with value an inner CBOR map, which pertains to trust anchors whose purpose is the verification of authentication credentials of other EDHOC peers in an EDHOC session.      </t>
                  <t>
Within the inner map, its entry's value is a CBOR byte string that encodes 0x91ab, i.e., the binary key identifier of a trust anchor supported by the Responder in the current EDHOC session.</t>
                </li>
              </ul>
            </li>
          </ul>
          <figure anchor="fig-example-ead-value-2">
            <name>Example of ead_value for the EAD Item "Supported EDHOC application profiles" in EDHOC message_2</name>
            <sourcecode type="cbor-diag"><![CDATA[
<<
   e'APP-PROF-MINIMAL-CS-2',  / profile_id /
   {                          / EDHOC_Information /
      e'comb_req' : true,
      e'eads' : [500, 999],
      e'trust_anchors' : {
         e'edhoc_cred' : { e'kid_ta_type' : h'91ab' }
      }
   }
>>
]]></sourcecode>
          </figure>
        </section>
      </section>
      <section anchor="sec-app-profile-edhoc-error-message">
        <name>In the EDHOC Error Message</name>
        <t>This section defines the error code TBD_ERROR_CODE, which is registered in <xref target="iana-edhoc-error-codes-registry"/> of this document.</t>
        <t>Error code TBD_ERROR_CODE <bcp14>MUST</bcp14> only be used when replying to EDHOC message_1. If an EDHOC error message with error code TBD_ERROR_CODE is received as reply to an EDHOC message different from EDHOC message_1, then the recipient of the error message <bcp14>MUST</bcp14> ignore what is specified in ERR_INFO.</t>
        <t>The Responder <bcp14>MUST NOT</bcp14> abort an EDHOC session exclusively due to the wish of sending an error message with error code TBD_ERROR_CODE. Instead, the Responder can advertise the EDHOC application profiles that it supports to the Initiator by means of the EAD item "Supported EDHOC application profiles" defined in <xref target="sec-app-profile-edhoc-message_1_2"/>, specifying it in the EAD_2 field of the EDHOC message_2 to send in the EDHOC session.</t>
        <t>When replying to an EDHOC message_1 with an error message, the Responder has to consider the reason for which it is aborting the EDHOC session and <bcp14>MUST NOT</bcp14> specify error code TBD_ERROR_CODE if a different, more appropriate error code can be specified instead. For example, if the negotiation of the selected cipher suite fails (see <xref section="6.3" sectionFormat="of" target="RFC9528"/>), the error message <bcp14>MUST NOT</bcp14> specify error code TBD_ERROR_CODE, since the error message intended to be used in that case specifies error code 2 (Wrong selected cipher suite) and conveys SUITES_R as ERR_INFO.</t>
        <t>When using error code TBD_ERROR_CODE, the error information specified in ERR_INFO <bcp14>MUST</bcp14> be a CBOR byte string with value the binary representation of the CBOR sequence APP_PROF_SEQ.</t>
        <t>In particular, APP_PROF_SEQ has the same format and semantics specified in <xref target="sec-app-profile-edhoc-message_1_2"/>, except for the following difference: for each element of the CBOR sequence that is an EDHOC_Information object, such an object <bcp14>MUST NOT</bcp14> include the element "exporter_out_len" defined in <xref target="exporter-out-length"/>.</t>
        <t>The recipient peer <bcp14>MUST</bcp14> silently ignore elements of the CBOR sequence APP_PROF_SEQ that are malformed or do not conform with the intended format of APP_PROF_SEQ.</t>
        <section anchor="example-of-errinfo">
          <name>Example of ERR_INFO</name>
          <t><xref target="fig-example-err-info"/> shows an example in CBOR diagnostic notation of ERR_INFO for the EDHOC error message with Error Code TBD_ERROR_CODE. With reference to the CDDL grammar in <xref target="fig-cddl-ead-value"/>, the following applies.</t>
          <t>The CBOR sequence APP_PROF_SEQ includes the following two elements:</t>
          <ul spacing="normal">
            <li>
              <t>An element profile_id, specifying the Profile ID of an EDHOC application profile supported by the Responder. Specifically, that EDHOC application profile is the well-known application profile MINIMAL-CS-0 defined in <xref target="sec-well-known-app-prof-id-1"/>.</t>
            </li>
            <li>
              <t>An element EDHOC_Information, which in turn includes the following parameters:  </t>
              <ul spacing="normal">
                <li>
                  <t>"comb_req", encoded as the CBOR simple value <tt>true</tt> (0xf5), hence indicating that the Responder supports the EDHOC + OSCORE combined request defined in <xref target="RFC9668"/>.</t>
                </li>
                <li>
                  <t>"eads", encoded as a CBOR array. The array includes two elements encoded as unsigned integers, i.e., the EAD labels 500 and 777 of the corresponding EAD items supported by the Responder.</t>
                </li>
                <li>
                  <t>"trust_anchors", encoded as a CBOR map. The map includes a single element with value an inner CBOR map, which pertains to trust anchors whose purpose is the verification of authentication credentials of other EDHOC peers in an EDHOC session.      </t>
                  <t>
Within the inner map, its entry's value is a COSE_CertHash <xref target="RFC9360"/> corresponding to an X.509 certificate <xref target="RFC5280"/> that the Responder supports as a trust anchor when running EDHOC.</t>
                </li>
              </ul>
            </li>
          </ul>
          <figure anchor="fig-example-err-info">
            <name>Example of ERR_INFO for the EDHOC Error Message with Error Code TBD_ERROR_CODE</name>
            <sourcecode type="cbor-diag"><![CDATA[
<<
   e'APP-PROF-MINIMAL-CS-0',  / profile_id /
   {                          / EDHOC_Information /
      e'comb_req' : true,
      e'eads' : [500, 777],
      e'trust_anchors' : {
         e'edhoc_cred' : {
           e'x5t_ta_type' : [-15, h'79f2a41b510c1f9b']
         }
      }
   }
>>
]]></sourcecode>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="sec-svcb">
      <name>Advertising Supported EDHOC Application Profiles using DNS SVCB Resource Records</name>
      <t>Given a server, its support for EDHOC and for EDHOC application profiles can be advertised using DNS SVCB Resource Records (RR) <xref target="RFC9460"/><xref target="RFC9461"/>.</t>
      <t>To this end, this document specifies the SvcParamKeys "edhocpath" and "edhoc-app-prof", which are defined below and are registered in <xref target="iana-svcb"/>.</t>
      <ul spacing="normal">
        <li>
          <t>"edhocpath" - The SvcParamKey "edhocpath" is single-valued and specifies a list of one or more absolute paths to EDHOC resources at the server.  </t>
          <ul spacing="normal">
            <li>
              <t>The wire-format value of "edhocpath" is the binary representation of the CBOR data item edhocpath-value, which <bcp14>MUST</bcp14> exactly fill the SvcParamValue.      </t>
              <t>
In particular, edhocpath-value <bcp14>MUST</bcp14> be a CBOR byte string PATH_BSTR or a CBOR array. In the latter case, the array <bcp14>MUST</bcp14> include at least two elements, each of which <bcp14>MUST</bcp14> be a CBOR byte string PATH_BSTR. The SVCB RR <bcp14>MUST</bcp14> be considered malformed if the SvcParamValue ends within edhocpath-value or if edhocpath-value is malformed.      </t>
              <t>
The value of each CBOR byte string PATH_BSTR is the binary representation of a CBOR sequence PATH_SEQ composed of zero or more CBOR text strings. In particular, each PATH_SEQ specifies the URI path of an EDHOC resource at the server, with each CBOR text string within that PATH_SEQ specifying a URI path segment.      </t>
              <t>
If edhocpath-value is a CBOR array, it <bcp14>MUST NOT</bcp14> include any two elements that specify the same URI path.      </t>
              <t>
The CDDL grammar describing the CBOR data item edhocpath-value is shown in <xref target="fig-cddl-edhocpath-value"/>.</t>
            </li>
            <li>
              <t>The presentation format value of "edhocpath" <bcp14>SHALL</bcp14> be a comma-separated list (see <xref section="A.1" sectionFormat="of" target="RFC9460"/>) of one or more absolute paths to EDHOC resources at the server. The same considerations for the "," and "\" characters in paths for zone-file implementations as for the alpn-ids in an "alpn" SvcParam apply (see <xref section="7.1.1" sectionFormat="of" target="RFC9460"/>).      </t>
              <t>
The i-th path in the presentation format value is the textual representation of the path specified by the i-th CBOR sequence PATH_SEQ in the wire-format value (see above).      </t>
              <t>
The textual representation of each path follows the semantics of path-absolute shown in the ABNF definition in <xref target="fig-edhocpath-value-path-abnf"/>, which is provided by the ABNF for path-absolute in <xref section="3.3" sectionFormat="of" target="RFC3986"/>. In particular, given the path specified by a CBOR sequence PATH_SEQ, segment-nz is the value of the first CBOR text string in PATH_SEQ (if any), while each segment is the value of a CBOR text string following the first one in PATH_SEQ (if any).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>"edhoc-app-prof" - The SvcParamKey "edhoc-app-prof" is single-valued and specifies a set of EDHOC application profiles that the server supports.  </t>
          <ul spacing="normal">
            <li>
              <t>The wire-format value of "edhoc-app-prof" is the binary representation of the CBOR data item edhoc-app-prof-value, which <bcp14>MUST</bcp14> exactly fill the SvcParamValue.      </t>
              <t>
In particular, edhoc-app-prof-value <bcp14>MUST</bcp14> be a CBOR byte string. The value of the CBOR byte string is the binary representation of the CBOR sequence SVCB_EDHOC_APP_PROF, which is composed of one or two elements as specified below. The SVCB RR <bcp14>MUST</bcp14> be considered malformed if the SvcParamValue ends within edhoc-app-prof-value or if edhoc-app-prof-value is malformed.      </t>
              <ul spacing="normal">
                <li>
                  <t>The first element advertise_flag is <bcp14>OPTIONAL</bcp14>. If present, it <bcp14>MUST</bcp14> encode the CBOR simple value <tt>true</tt> (0xf5). If advertise_flag is present, a peer that runs EDHOC with the server is encouraged to advertise the EDHOC application profiles that it supports, when sending to the server its first EDHOC message in an EDHOC session.          </t>
                  <t>
In order to do that, the peer can rely as appropriate on the EDHOC EAD item "Supported EDHOC application profiles" (see <xref target="sec-app-profile-edhoc-message_1_2"/>) when sending an EDHOC message_1 or message_2, or on an EDHOC error message with error code TBD_ERROR_CODE (see <xref target="sec-app-profile-edhoc-error-message"/>).          </t>
                  <t>
If the peer supports the EDHOC EAD item "Supported EDHOC application profiles" or the error code TBD_ERROR_CODE, the peer <bcp14>MUST</bcp14> use those as appropriate to honor the wish of the server and accordingly advertise the EDHOC application profiles that it supports.</t>
                </li>
                <li>
                  <t>The second element server_info is <bcp14>REQUIRED</bcp14>, and it <bcp14>MUST</bcp14> be a CBOR byte string APP_BSTR or a CBOR array. In the latter case, the array <bcp14>MUST</bcp14> include at least two elements, each of which <bcp14>MUST</bcp14> be a CBOR byte string APP_BSTR.          </t>
                  <t>
The value of each CBOR byte string APP_BSTR is the binary representation of the CBOR sequence APP_PROF_SEQ. In particular, APP_PROF_SEQ has the same format and semantics specified in <xref target="sec-app-profile-edhoc-message_1_2"/>, except for the following difference: for each element of the CBOR sequence that is an EDHOC_Information object, such an object <bcp14>MUST NOT</bcp14> include the element "exporter_out_len" defined in <xref target="exporter-out-length"/>.          </t>
                  <t>
The SVCB RR <bcp14>MUST</bcp14> be considered malformed if APP_PROF_SEQ is malformed or does not conform with the intended format.</t>
                </li>
              </ul>
              <t>
An SVCB RR might not be intended to advertise what EDHOC application profiles a server supports for a given EDHOC resource that it hosts. In such a case, server_info can be composed such that the CBOR sequence APP_PROF_SEQ pertaining to that resource only consists of a single EDHOC_Information object as an empty CBOR map.      </t>
              <t>
The CDDL grammar describing the CBOR data item edhoc-app-prof-value is shown in <xref target="fig-cddl-edhoc-app-prof-value"/>.</t>
            </li>
            <li>
              <t>The presentation format value of "edhoc-app-prof" <bcp14>SHALL</bcp14> be the CBOR extended diagnostic notation (see <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>) of edhoc-app-prof-value in the wire-format value (see above). When producing the presentation format value, care ought to be taken in representing Unicode with the limited ASCII character subset (e.g., by means of Punycode <xref target="RFC3492"/>) and in removing unnecessary common blank spaces within the CBOR extended diagnostic notation.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>If the SvcParamKey "edhoc-app-prof" is not present in the SVCB RR, then the SvcParamKey "edhocpath", if present, still specifies the URI paths of EDHOC resources at the server. However, no information is provided about what EDHOC application profiles the server supports.</t>
      <t>If the SvcParamKey "edhoc-app-prof" is present in the SVCB RR, then the following applies to server_info therein.</t>
      <ul spacing="normal">
        <li>
          <t>If the SvcParamKey "edhocpath" is not present in the SVCB RR, then server_info <bcp14>MUST</bcp14> be a CBOR byte string.  </t>
          <t>
The information specified by the SvcParamKey "edhoc-app-prof" pertains to the EDHOC resource at the server with URI path "/.well-known/edhoc".</t>
        </li>
        <li>
          <t>If the SvcParamKey "edhocpath" is present in the SVCB RR, then the following applies.  </t>
          <ul spacing="normal">
            <li>
              <t>If the value of the SvcParamKey "edhocpath" is a CBOR byte string, then server_info <bcp14>MUST</bcp14> be a CBOR byte string.      </t>
              <t>
The information specified by the SvcParamKey "edhoc-app-prof" pertains to the EDHOC resource at the server with URI path specified by the SvcParamKey "edhocpath".</t>
            </li>
            <li>
              <t>If the value of the SvcParamKey "edhocpath" is a CBOR array including N elements, then server_info <bcp14>MUST</bcp14> be a CBOR array including N elements.      </t>
              <t>
The information specified by the i-th element of server_info pertains to the EDHOC resource at the server with URI path specified by the i-th element of the CBOR array within the SvcParamKey "edhocpath".</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>A consumer <bcp14>MUST</bcp14> treat as malformed an SVCB RR, in case the SvcParamKeys "edhocpath" and "edhoc-app-prof", if present, do not comply with the format and restrictions defined above.</t>
      <figure anchor="fig-cddl-edhocpath-value">
        <name>CDDL Definition of the Value of the SvcParamKey "edhocpath"</name>
        <sourcecode type="cddl"><![CDATA[
edhocpath-value = PATH_BSTR / [2* PATH_BSTR]

PATH_BSTR = bytes .cborseq PATH_SEQ

; This defines an array, the elements of which
; are to be used in the CBOR Sequence PATH_SEQ:
PATH_SEQ = [* path_segment]

path_segment = tstr
]]></sourcecode>
      </figure>
      <figure anchor="fig-edhocpath-value-path-abnf">
        <name>ABNF Definition of path-absolute</name>
        <sourcecode type="abnf"><![CDATA[
path-absolute = "/" [ segment-nz *( "/" segment ) ]

segment       = *pchar
segment-nz    = 1*pchar

pchar = unreserved / pct-encoded / sub-delims / ":" / "@"

unreserved    = ALPHA / DIGIT / "-" / "." / "_" / "~"
pct-encoded   = "%" HEXDIG HEXDIG
sub-delims    = "!" / "$" / "&" / "'" / "(" / ")"
              / "*" / "+" / "," / ";" / "="
]]></sourcecode>
      </figure>
      <figure anchor="fig-cddl-edhoc-app-prof-value">
        <name>CDDL Definition of the Value of the SvcParamKey "edhoc-app-prof"</name>
        <sourcecode type="cddl"><![CDATA[
edhoc-app-prof-value = bytes .cborseq SVCB_EDHOC_APP_PROF

; This defines an array, the elements of which
; are to be used in the CBOR Sequence SVCB_EDHOC_APP_PROF:
SVCB_EDHOC_APP_PROF = [?advertise_flag, server_info]

advertise_flag = bool

server_info = APP_BSTR / [2* APP_BSTR]

; The full definition of APP_PROF_SEQ
; is provided in Section 5.1
APP_BSTR = bytes .cborseq APP_PROF_SEQ
]]></sourcecode>
      </figure>
      <section anchor="examples-of-wire-format-values-of-the-svcparamkeys">
        <name>Examples of Wire-Format Values of the SvcParamKeys</name>
        <t>Using CBOR diagnostic notation, this section provides examples of wire-format values of the SvcParamKeys "edhocpath" and "edhoc-app-prof", within an SVCB RR corresponding to a given server.</t>
        <t><xref target="fig-example-svcb-edhocpath"/> shows an example of the SvcParamKey "edhocpath", with reference to the CDDL grammar in <xref target="fig-cddl-edhocpath-value"/>.</t>
        <t>In the example, two URI paths are specified, i.e., one for the EDHOC resource at "/.well-known/edhoc" and one for the EDHOC resource at "/edhoc-alt".</t>
        <figure anchor="fig-example-svcb-edhocpath">
          <name>Example of Wire-Format Value of the SvcParamKey "edhocpath" within an SVCB RR</name>
          <sourcecode type="cbor-diag"><![CDATA[
[                   / edhocpath-value /
  <<                / PATH_BSTR /
    ".well-known",  / path_segment /
    "edhoc"         / path_segment /
  >>,
  <<                / PATH_BSTR /
    "edhoc-alt"     / path_segment /
  >>
]
]]></sourcecode>
        </figure>
        <t><xref target="fig-example-svcb-edhoc-app-prof"/> shows an example of the SvcParamKey "edhoc-app-prof", with reference to the CDDL grammar in <xref target="fig-cddl-edhoc-app-prof-value"/>. In particular, the following applies.</t>
        <t>The CBOR data item advertise_flag is present and encodes the CBOR simple value <tt>true</tt> (0xf5), hence indicating that a peer that runs EDHOC with the server is encouraged to advertise the EDHOC application profiles that it supports, when sending to the server its first EDHOC message in an EDHOC session.</t>
        <t>The CBOR data item server_info is a CBOR array, which includes two CBOR byte strings APP_BSTR. In particular:</t>
        <ul spacing="normal">
          <li>
            <t>The value of the first CBOR byte string is the binary representation of a CBOR sequence APP_PROF_SEQ, which advertises the EDHOC application profiles that the server supports when running EDHOC through the resource with URI path "/.well-known/edhoc".</t>
          </li>
          <li>
            <t>The value of the second CBOR byte string is the binary representation of a CBOR sequence APP_PROF_SEQ, which advertises the EDHOC application profiles that the server supports when running EDHOC through the resource with URI path "/edhoc-alt".</t>
          </li>
        </ul>
        <figure anchor="fig-example-svcb-edhoc-app-prof">
          <name>Example of Wire-Format Value of the SvcParamKey "edhoc-app-prof" within an SVCB RR</name>
          <sourcecode type="cbor-diag"><![CDATA[
<<                                / edhoc-app-prof-value /
   true,                          / advertise_flag /
   [                              / server_info /
     <<                           / APP_BSTR /
       e'APP-PROF-MINIMAL-CS-2',  / profile_id /
       e'APP-PROF-MINIMAL-CS-0',  / profile_id /
       {                          / EDHOC_Information /
         e'message_4' : true,
         e'eads' : [500, 333],
         e'trust_anchors' : {
           e'edhoc_cred' : [
             { e'kid_ta_type' : h'00ac' },
             { e'kid_ta_type' : h'ff01ff' }
           ]
         }
       }
     >>,
     <<                           / APP_BSTR /
       e'APP-PROF-MINIMAL-CS-2',  / profile_id /
       {                          / EDHOC_Information /
         e'comb_req' : true,
         e'eads' : [500, 999],
         e'trust_anchors' : {
           e'edhoc_cred' : { e'kid_ta_type' : h'91ab' }
         }
       }
     >>
   ]
>>
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="sec-well-known-app-profiles">
      <name>Well-known EDHOC Application Profiles</name>
      <t>This section defines a set of well-known EDHOC application profiles that are meant to reflect what is most common and expected to be supported by EDHOC peers.</t>
      <t>The well-known application profiles are <em>not</em> to be intended as "default" profiles to use, in case no other indication is provided to EDHOC peers.</t>
      <t>In particular, an EDHOC peer <bcp14>MUST NOT</bcp14> assume that, unless otherwise indicated, any of such profiles is used when running EDHOC through a well-known EDHOC resource, such as the resource at /.well-known/edhoc when EDHOC messages are transported as payload of CoAP messages (see <xref section="A.2" sectionFormat="of" target="RFC9528"/>).</t>
      <t>Building on the above, the well-known application profiles are <em>not</em> intended to deviate from what is mandatory to support for EDHOC peers, which is defined by the compliance requirements in <xref section="8" sectionFormat="of" target="RFC9528"/>.</t>
      <t>The rest of this section defines the well-known application profiles, each of which is represented by means of an EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) using the CBOR extended diagnostic notation.</t>
      <t>An entry for each well-known application profile is also registered at the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
      <section anchor="sec-well-known-app-prof-id-0">
        <name>Well-Known Application Profile MINIMAL-CS-2</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-MINIMAL-CS-2'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="sec-well-known-app-prof-id-1">
        <name>Well-Known Application Profile MINIMAL-CS-0</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-MINIMAL-CS-0'
}
]]></sourcecode>
      </section>
      <section anchor="sec-well-known-app-prof-id-2">
        <name>Well-Known Application Profile BASIC-CS-2-X509</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                             and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-2-X509'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="sec-well-known-app-prof-id-3">
        <name>Well-Known Application Profile BASIC-CS-0-X509</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                             and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-0-X509'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="sec-well-known-app-prof-id-4">
        <name>Well-Known Application Profile BASIC-CS-2-C509</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                        and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-2-C509'
}
]]></sourcecode>
      </section>
      <section anchor="sec-well-known-app-prof-id-5">
        <name>Well-Known Application Profile BASIC-CS-0-C509</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                        and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-0-C509'
}
]]></sourcecode>
      </section>
      <section anchor="sec-well-known-app-prof-id-6">
        <name>Well-Known Application Profile INTERMEDIATE-CS-2</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                           X.509 certificate,
                                           and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                      x5t, x5chain,
                                                      c5t, and c5c /
       e'app_prof' : e'APP-PROF-INTERMEDIATE-CS-2'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="sec-well-known-app-prof-id-7">
        <name>Well-Known Application Profile INTERMEDIATE-CS-0</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                             X.509 certificate,
                                             and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                      x5t, x5chain,
                                                      c5t, and c5c /
       e'app_prof' : e'APP-PROF-INTERMEDIATE-CS-0'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="sec-well-known-app-prof-id-8">
        <name>Well-Known Application Profile EXTENSIVE</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
        e'methods' : [0, 1, 2, 3], / EDHOC Method Types
                                     0, 1, 2, and 3 /
  e'cipher_suites' : [0, 1, 2, 3], / EDHOC Cipher Suites
                                     0, 1, 2, and 3 /
     e'cred_types' : [1, 0, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                              CWT, X.509 certificate,
                                              and C509 certificate /
  e'id_cred_types' : [4, 14, 13, 34, 33, e'c5t', e'c5c'], / kid,
                                                          kccs, kcwt,
                                                          x5t,
                                                          x5chain,
                                                          c5t, and
                                                          c5c /
       e'app_prof' : e'APP-PROF-EXTENSIVE'
}
]]></sourcecode>
        <t>This application profile is aligned with the example traces of EDHOC compiled in Sections <xref target="RFC9529" section="2" sectionFormat="bare"/> and <xref target="RFC9529" section="3" sectionFormat="bare"/> of <xref target="RFC9529"/>.</t>
      </section>
    </section>
    <section anchor="sec-edhoc-well-known-app-profiles">
      <name>Identifiers of Well-known EDHOC Application Profiles</name>
      <t>This document defines the following identifiers of well-known EDHOC application profiles.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <table align="center" anchor="_table-edhoc-well-known-app-profiles">
        <name>EDHOC Well-known Application Profiles</name>
        <thead>
          <tr>
            <th align="left">Profile ID</th>
            <th align="left">Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">MINIMAL-CS-2</td>
            <td align="left">Method 3; Cipher Suite 2; CCS; kid</td>
            <td align="left">[RFC-XXXX, <xref target="sec-well-known-app-prof-id-0"/>]</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">MINIMAL-CS-0</td>
            <td align="left">Method 3; Cipher Suite 0; CCS; kid</td>
            <td align="left">[RFC-XXXX, <xref target="sec-well-known-app-prof-id-1"/>]</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">BASIC-CS-2-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX, <xref target="sec-well-known-app-prof-id-2"/>]</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">BASIC-CS-0-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX, <xref target="sec-well-known-app-prof-id-3"/>]</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">BASIC-CS-2-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX, <xref target="sec-well-known-app-prof-id-4"/>]</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">BASIC-CS-0-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX, <xref target="sec-well-known-app-prof-id-5"/>]</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">INTERMEDIATE-CS-2</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX, <xref target="sec-well-known-app-prof-id-6"/>]</td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">INTERMEDIATE-CS-0</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX, <xref target="sec-well-known-app-prof-id-7"/>]</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">EXTENSIVE</td>
            <td align="left">Methods (0, 1, 2, 3); Cipher Suites (0, 1, 2, 3); (CCS, CWT, X.509/C509 certificates); (kid, kccs, kcwt, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX, <xref target="sec-well-known-app-prof-id-8"/>]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This section compiles the operational considerations that hold for this document.</t>
      <section anchor="relation-with-network-operations">
        <name>Relation with Network Operations</name>
        <t>The means defined in this document are largely about aiding peers in running the EDHOC protocol by achieving a common understanding of what they support, thereby facilitating interoperability between EDHOC implementations. Such coordination is expected to keep authenticate key exchange through EDHOC a smooth process in itself and with respect to network operation and management.</t>
        <t>The use of these coordinating means in itself is not expected to have a notable impact on performance and network operations, and it is embedded within other relevant network protocols and components such as: the discovery of resources through web-linking <xref target="RFC8288"/> and CoRE Link Format <xref target="RFC6690"/> (see <xref target="web-linking"/> and <xref target="sec-parameters-web-linking"/>); the execution of the EDHOC protocol itself (see <xref target="sec-app-profile-edhoc-messages"/>); and the discovery of server-related information via DNS SVCB RR <xref target="RFC9460"/><xref target="RFC9461"/> (see <xref target="sec-svcb"/>).</t>
      </section>
      <section anchor="source-of-data-for-network-operators">
        <name>Source of Data for Network Operators</name>
        <t>As further discussed in <xref target="sec-security-considerations"/>, information about what EDHOC application profiles a peer supports could be advertised in plain, depending on the approach specifically used. In such a case, a network operator can passively observe the plain exchange of such information, thereby gaining (a partial) knowledge of EDHOC application profiles that are supported and used in the network.</t>
        <t>From the perspective of an individual network operator, this knowledge can be useful for (fine-)tuning the allocation of network resources.</t>
        <t>Multiple, cooperating network operators could build an aggregated knowledge that indicates broad "trends" about EDHOC application profiles and their use. This raises awareness of what appears to be most supported and preferred by EDHOC peers, which can influence priority decisions about the development and use of EDHOC implementations, as well as the operations of infrastructures for provisioning and validating public authentication credentials.</t>
        <t>As noted in <xref target="sec-well-known-app-profiles"/>, well-known EDHOC application profiles are not meant to be default profiles to use, and they are not meant to deviate from the EDHOC compliance requirements compiled in <xref section="8" sectionFormat="of" target="RFC9528"/>. Instead, they are meant to reflect what is most common and expected to be supported by EDHOC peers. Hence, developing aggregated knowledge on typical uses of EDHOC can help identifying EDHOC application profiles that have become de facto well-known, thereby further accelerating their adoption.</t>
      </section>
      <section anchor="logging-and-reporting">
        <name>Logging and Reporting</name>
        <t>When using the means defined in this document, EDHOC peers are not expected to keep any particular log of such use, or to go beyond expectations already in place as to the logging of EDHOC sessions. However, when gaining knowledge about what EDHOC application profiles are supported by a given EDHOC peer, it is encouraged to locally preserve that knowledge for a non-negligible amount of time determined by the application. Especially under the assumption that what EDHOC peers support does not (often) change, this avoids the need to repeatedly re-gain the same knowledge at least in the short term.</t>
        <t>If an EDHOC session fails due to an apparent mismatch with gained knowledge about commonly supported EDHOC application profiles, a peer can report such a failure to a network manager or infrastructure operator. This can help identify peers whose behavior deviates from what is advertised in terms of EDHOC application profiles that they allegedly support. In turn, this can be used to detect misbehaving peers, outdated information about what peers support, or ongoing tampering of such information if that is advertised in plain (see <xref target="sec-security-considerations"/>).</t>
        <t>It is out of the scope of this document what specific semantics and data model are used for producing and processing such reports. Specific semantics and data models can be defined by applications and future specifications.</t>
      </section>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations compiled in <xref section="9" sectionFormat="of" target="RFC9528"/> hold for this document. The security considerations compiled in <xref section="7" sectionFormat="of" target="RFC9668"/> also apply, when EDHOC is transported over CoAP <xref target="RFC7252"/> and specifically when using the EDHOC + OSCORE request defined in <xref section="3" sectionFormat="of" target="RFC9668"/>.</t>
      <t>Instances of the EDHOC_Application_Profile objects (see <xref target="sec-app-profile-cbor"/>) ought to be accepted only if provided by an identifiable, trusted party by using secure communication. When this is not the case, an EDHOC peer can be induced to: erroneously identify a given EDHOC application profile with a wrong Profile ID; erroneously believe a given EDHOC application profile to exist in the first place; develop a wrong understanding of what a given EDHOC application profile consists of.</t>
      <t>Different security guarantees can be achieved about the acquired information on the EDHOC application profiles supported by a given peer, depending on the specific approach used. The potential consequences of acquiring such information in a non secured way are discussed later in this section.</t>
      <ul spacing="normal">
        <li>
          <t>With respect to using web linking (see <xref target="web-linking"/> and <xref target="sec-parameters-web-linking"/>), the security considerations in <xref section="5" sectionFormat="of" target="RFC8288"/> apply. When specifically relying on CoRE Link Format <xref target="RFC6690"/>, the security considerations in <xref section="6" sectionFormat="of" target="RFC6690"/> also apply.  </t>
          <t>
Clearly, the discovery of EDHOC resources at a server is intended to happen before running EDHOC with the server. At that point in time, the peer attempting to discover EDHOC resources at the server is unlikely to already have a secure communication association with the server. Therefore, the discovery process is likely to use unsecured communication.  </t>
          <t>
Alternatively, EDHOC resources at a server can be discovered by securely interacting with separate discovery services, e.g., by using the CoRE Resource Directory <xref target="RFC9176"/>.</t>
        </li>
        <li>
          <t>With respect to using the EDHOC EAD item "Supported EDHOC application profiles" (see <xref target="sec-app-profile-edhoc-message_1_2"/>), the following applies.  </t>
          <ul spacing="normal">
            <li>
              <t>When the EAD item is included in EDHOC message_1, the information conveyed therein is not protected. However, changing EDHOC message_1 in transit (e.g., by adding, removing, or modifying the EAD item) would result in the Initiator aborting the EDHOC session, after receiving and failing to verify EDHOC message_2.</t>
            </li>
            <li>
              <t>When the EAD item is included in EDHOC message_2, the information conveyed therein is protected by EDHOC.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>With respect to using an EDHOC error message with error code TBD_ERROR_CODE, the information conveyed in ERR_INFO is not protected, just like when any other error code is used.</t>
        </li>
        <li>
          <t>With respect to using the SvcParamKeys "edhocpath" and "edhoc-app-prof" within an SVCB RR (see <xref target="sec-svcb"/>), the security considerations from <xref section="12" sectionFormat="of" target="RFC9460"/> and <xref section="8" sectionFormat="of" target="RFC9461"/> apply.  </t>
          <t>
It is encouraged that DNS is used with secure communication. Known threats for unprotected DNS are described in <xref target="RFC3833"/> and <xref target="RFC9076"/>.</t>
        </li>
      </ul>
      <t>In case information about EDHOC application profiles supported by a peer is distributed in an unprotected way (e.g., through unsecured communication), a consumer should treat such information as a hint.</t>
      <t>If the acquired information has been tampered with and does not reflect what a given peer supports and intends to advertise, this can set wrong expectations about what is effectively possible to do when running EDHOC with that peer. Although this can still result in successfully running EDHOC with a configuration that is commonly supported, such configuration would probably not have been selected, had reliable information been acquired. In the worst case, there might be the erroneous belief that there is not sufficient shared support with that peer.</t>
      <t>What is discussed above does not have an impact on the security of the EDHOC protocol in itself. That is, even when the available information about supported EDHOC application profiles is not guaranteed to be reliable, the successful completion of an EDHOC session still provides the security guarantees that are expected as per the way the session was run (e.g., based on the selected cipher suite and EDHOC method used).</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-media-type">
        <name>Media Type Registrations</name>
        <t>IANA is asked to register the media type "application/edhoc-app-profile+cbor-seq". This registration follows the procedures specified in <xref target="RFC6838"/>.</t>
        <t>Type name: application</t>
        <t>Subtype name: edhoc-app-profile+cbor-seq</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: Must be encoded as a CBOR sequence <xref target="RFC8742"/> of CBOR maps <xref target="RFC8949"/>. Each element of each CBOR map is also defined as an element of the CBOR-encoded EDHOC_Information object from <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>Security considerations: See <xref target="sec-security-considerations"/> of [RFC-XXXX].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [RFC-XXXX]</t>
        <t>Applications that use this media type: Applications that need to describe, distribute, and store a representation of an EDHOC application profile (see [RFC-XXXX] and <xref section="3.9" sectionFormat="of" target="RFC9528"/>).</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information: N/A</t>
        <t>Person &amp; email address to contact for further information: LAKE WG mailing list (lake@ietf.org) or IETF Applications and Real-Time Area (art@ietf.org)</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: None</t>
        <t>Author/Change controller: IETF</t>
        <t>Provisional registration: No</t>
      </section>
      <section anchor="iana-content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is asked to add the following entry to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <t>Content Type: application/edhoc-app-profile+cbor-seq</t>
        <t>Content Coding: -</t>
        <t>ID: TBD (range 0-255)</t>
        <t>Reference: [RFC-XXXX]</t>
      </section>
      <section anchor="iana-target-attributes">
        <name>Target Attributes Registry</name>
        <t>IANA is asked to register the following entries in the "Target Attributes" registry within the "Constrained RESTful Environments (CoRE) Parameters", as per <xref target="RFC9423"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-prof</t>
          </li>
          <li>
            <t>Brief Description: A supported EDHOC application profile</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="web-linking"/>]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-uuid</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a UUID</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-parameters-web-linking"/>]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-kid</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a binary key identifier</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-parameters-web-linking"/>]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-c5t</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a hash of a C509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-parameters-web-linking"/>]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-c5u</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a URI pointing to a C509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-parameters-web-linking"/>]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-x5t</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a hash of an X.509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-parameters-web-linking"/>]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-x5u</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a URI pointing to an X.509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-parameters-web-linking"/>]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-information-registry">
        <name>EDHOC Information Registry</name>
        <t>IANA is asked to register the following entries in the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: exporter_out_len</t>
          </li>
          <li>
            <t>CBOR label: 22 (suggested)</t>
          </li>
          <li>
            <t>CBOR type: array</t>
          </li>
          <li>
            <t>Registry: EDHOC Exporter Labels</t>
          </li>
          <li>
            <t>Description: Set of output lengths to use with the EDHOC_Exporter interface</t>
          </li>
          <li>
            <t>Type: P</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: app_prof</t>
          </li>
          <li>
            <t>CBOR label: 23 (suggested)</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Application Profiles registry</t>
          </li>
          <li>
            <t>Description: Set of supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Type: NP</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-ead-registry">
        <name>EDHOC External Authorization Data Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC External Authorization Data" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: Supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Label: TBD_EAD_LABEL (range 0-23)</t>
          </li>
          <li>
            <t>Description: Set of supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-app-profile-edhoc-message_1_2"/>]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-error-codes-registry">
        <name>EDHOC Error Codes Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC Error Codes" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <ul spacing="normal">
          <li>
            <t>ERR_CODE: TBD_ERROR_CODE (range -24 to 23)</t>
          </li>
          <li>
            <t>ERR_INFO Type: app_profiles</t>
          </li>
          <li>
            <t>Description: Supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-app-profile-edhoc-error-message"/>]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-svcb">
        <name>DNS SVCB Service Parameter Keys (SvcParamKeys)</name>
        <t>IANA is asked to add the following entries to the "DNS SVCB Service Parameter Keys (SvcParamKeys)" registry within the "DNS Service Bindings (SVCB)" registry group. The definition of these parameters can be found in <xref target="sec-svcb"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Number: 11 (suggested)</t>
          </li>
          <li>
            <t>Name: edhocpath</t>
          </li>
          <li>
            <t>Meaning: EDHOC resource path</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-svcb"/>]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Number: 12 (suggested)</t>
          </li>
          <li>
            <t>Name: edhoc-app-prof</t>
          </li>
          <li>
            <t>Meaning: Supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX, <xref target="sec-svcb"/>]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-application-profiles">
        <name>EDHOC Application Profiles Registry</name>
        <t>IANA is requested to create a new "EDHOC Application Profiles" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>The registration policy is either "Private Use", "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. "Expert Review" guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, WG chairs are encouraged to consult the expert(s) early during the process outlined in <xref section="3.1" sectionFormat="of" target="RFC7120"/>.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Profile ID: This field contains the value used to identify the EDHOC application profile. These values <bcp14>MUST</bcp14> be unique. The value can be a positive integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>. Integer values from -24 to 23 are designated as "Standards Action With Expert Review". Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required". Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
          </li>
          <li>
            <t>Name: This field contains the name of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the EDHOC application profile.</t>
          </li>
        </ul>
        <t>This registry has been initially populated with the values in <xref target="_table-edhoc-well-known-app-profiles"/>.</t>
      </section>
      <section anchor="iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>"Standards Action with Expert Review" and "Specification Required" are two of the registration policies defined for the IANA registry established in this document. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts need to make sure that the object of registration is clearly defined in the corresponding specification. Entries that do not meet these objectives of clarity and completeness must not be registered.</t>
          </li>
          <li>
            <t>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. The zones tagged as "Private Use" are intended for testing purposes and closed environments. Code points in other ranges should not be assigned for testing.</t>
          </li>
          <li>
            <t>Specifications are required for the "Standards Action With Expert Review" range of point assignment. Specifications should exist for "Specification Required" ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</t>
          </li>
          <li>
            <t>Experts should take into account the expected usage of fields when approving point assignment. Documents published via Standards Action can also register points outside the Standards Action range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC9562">
          <front>
            <title>Universally Unique IDentifiers (UUIDs)</title>
            <author fullname="K. Davis" initials="K." surname="Davis"/>
            <author fullname="B. Peabody" initials="B." surname="Peabody"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This specification defines UUIDs (Universally Unique IDentifiers) --
also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform
Resource Name namespace for UUIDs. A UUID is 128 bits long and is
intended to guarantee uniqueness across space and time. UUIDs were
originally used in the Apollo Network Computing System (NCS), later
in the Open Software Foundation's (OSF's) Distributed Computing
Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the OSF DCE specification with the
kind permission of the OSF (now known as "The Open Group"). Information from earlier versions of the OSF DCE specification have
been incorporated into this document. This document obsoletes RFC
4122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9562"/>
          <seriesInfo name="DOI" value="10.17487/RFC9562"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="1" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth client and resource
   server, and it binds an authentication credential of the client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications between the client and resource
   server when accessing protected resources according to the
   authorization information indicated in the access token.  This
   profile can be used to delegate management of authorization
   information from a resource-constrained server to a trusted host with
   less severe limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-10"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="25" month="January" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280, common certificate
   profiles and is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is over the CBOR encoding instead
   of the DER encoding, avoiding the use of ASN.1.  Both types of
   certificates have the same semantics as X.509 and the same reduced
   size compared to X.509.

   The document also specifies CBOR encoded data structures for
   certificate (signing) requests and certificate request templates, new
   COSE headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698; the TLSA selectors registry is
   extended to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-16"/>
        </reference>
        <reference anchor="EDHOC.Exporter.Labels" target="https://www.iana.org/assignments/edhoc/edhoc.xhtml#edhoc-exporter-labels">
          <front>
            <title>EDHOC Exporter Labels</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3492">
          <front>
            <title>Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA)</title>
            <author fullname="A. Costello" initials="A." surname="Costello"/>
            <date month="March" year="2003"/>
            <abstract>
              <t>Punycode is a simple and efficient transfer encoding syntax designed for use with Internationalized Domain Names in Applications (IDNA). It uniquely and reversibly transforms a Unicode string into an ASCII string. ASCII characters in the Unicode string are represented literally, and non-ASCII characters are represented by ASCII characters that are allowed in host name labels (letters, digits, and hyphens). This document defines a general algorithm called Bootstring that allows a string of basic code points to uniquely represent any string of code points drawn from a larger set. Punycode is an instance of Bootstring that uses particular parameter values specified by this document, appropriate for IDNA. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3492"/>
          <seriesInfo name="DOI" value="10.17487/RFC3492"/>
        </reference>
        <reference anchor="RFC3833">
          <front>
            <title>Threat Analysis of the Domain Name System (DNS)</title>
            <author fullname="D. Atkins" initials="D." surname="Atkins"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="August" year="2004"/>
            <abstract>
              <t>Although the DNS Security Extensions (DNSSEC) have been under development for most of the last decade, the IETF has never written down the specific set of threats against which DNSSEC is designed to protect. Among other drawbacks, this cart-before-the-horse situation has made it difficult to determine whether DNSSEC meets its design goals, since its design goals are not well specified. This note attempts to document some of the known threats to the DNS, and, in doing so, attempts to measure to what extent (if any) DNSSEC is a useful tool in defending against these threats. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3833"/>
          <seriesInfo name="DOI" value="10.17487/RFC3833"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="RFC9423">
          <front>
            <title>Constrained RESTful Environments (CoRE) Target Attributes Registry</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>The Constrained RESTful Environments (CoRE) specifications apply web technologies to constrained environments. One such important technology is Web Linking (RFC 8288), which CoRE specifications use as the basis for a number of discovery protocols, such as the Link Format (RFC 6690) in the Constrained Application Protocol's (CoAP's) resource discovery process (Section 7.2 of RFC 7252) and the Resource Directory (RD) (RFC 9176).</t>
              <t>Web Links can have target attributes, the names of which are not generally coordinated by the Web Linking specification (Section 2.2 of RFC 8288). This document introduces an IANA registry for coordinating names of target attributes when used in CoRE. It updates the "RD Parameters" IANA registry created by RFC 9176 to coordinate with this registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9423"/>
          <seriesInfo name="DOI" value="10.17487/RFC9423"/>
        </reference>
        <reference anchor="RFC9529">
          <front>
            <title>Traces of Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Serafin" initials="M." surname="Serafin"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="M. Vučinić" initials="M." surname="Vučinić"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document contains example traces of Ephemeral Diffie-Hellman Over COSE (EDHOC).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9529"/>
          <seriesInfo name="DOI" value="10.17487/RFC9529"/>
        </reference>
        <reference anchor="I-D.serafin-lake-ta-hint">
          <front>
            <title>Trust Anchor Hints in Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Marek Serafin" initials="M." surname="Serafin">
              <organization>ASSA ABLOY</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a format for transport of hints about Trust
   Anchors of trusted third parties when using the lightweight
   authenticated key exchange protocol Ephemeral Diffie-Hellman Over
   COSE (EDHOC).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-serafin-lake-ta-hint-00"/>
        </reference>
      </references>
    </references>
    <?line 1267?>

<section anchor="sec-cddl-model" removeInRFC="true">
      <name>CDDL Model</name>
      <figure anchor="fig-cddl-model">
        <name>CDDL model</name>
        <artwork type="cddl" align="left"><![CDATA[
; EDHOC Information
methods = 1
cipher_suites = 2
message_4 = 3
comb_req = 4
cred_types = 6
id_cred_types = 7
eads = 8
trust_anchors = 11
app_prof = 23

; EDHOC Application Profiles
APP-PROF-MINIMAL-CS-2 = 0
APP-PROF-MINIMAL-CS-0 = 1
APP-PROF-BASIC-CS-2-X509 = 2
APP-PROF-BASIC-CS-0-X509 = 3
APP-PROF-BASIC-CS-2-C509 = 4
APP-PROF-BASIC-CS-0-C509 = 5
APP-PROF-INTERMEDIATE-CS-2 = 6
APP-PROF-INTERMEDIATE-CS-0 = 7
APP-PROF-EXTENSIVE = 8

; COSE Header Parameters
c5t = 22
c5c = 25

; EDHOC Trust Anchor Purposes
edhoc_cred = 0

; EDHOC Trust Anchor Types
kid_ta_type = 4
x5t_ta_type = 34

; EDHOC Authentication Credential Types
c509_cert = 3
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-03-04">
        <name>Version -03 to -04</name>
        <ul spacing="normal">
          <li>
            <t>Removed parameters that were removed from draft-ietf-ace-edhoc-oscore-profile.</t>
          </li>
          <li>
            <t>Renamed "reply_flag" to "advertise_flag".</t>
          </li>
          <li>
            <t>Defined use of "advertise_flag" also in SVCB Resource Records.</t>
          </li>
          <li>
            <t>Added guidelines on using the EAD item "Supported EDHOC application profiles" only to take advantage of advertise_flag.</t>
          </li>
          <li>
            <t>Added guidelines on having per-resource empty advertisements in an SVCB RR.</t>
          </li>
          <li>
            <t>Clarifications:  </t>
            <ul spacing="normal">
              <li>
                <t>Deviations from prescriptive parameters are assessed throughout the whole EDHOC session.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>CDDL definitions:  </t>
            <ul spacing="normal">
              <li>
                <t>Added CDDL definitions of the parameters "app_prof" and "exporter_out_len" for the CBOR-encoded EDHOC_Information object.</t>
              </li>
              <li>
                <t>Fixed CDDL definition of ead_value of the EAD item "Supported EDHOC application profiles".</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Added new examples:  </t>
            <ul spacing="normal">
              <li>
                <t>Response in CoRE link-format using the target attributes 'ed-ta-edcred-*'.</t>
              </li>
              <li>
                <t>ead_value for the EDHOC EAD item "Supported EDHOC application profiles".</t>
              </li>
              <li>
                <t>Added examples of wire-format values of the SvcParamKeys "edhocpath" and "edhoc-app-prof".</t>
              </li>
              <li>
                <t>ERR_INFO for the EDHOC error message with Error Code TBD_ERROR_CODE.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Added "Operational Considerations" section.</t>
          </li>
          <li>
            <t>Added security considerations.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>
            <t>Removed restrictions on the scope of the EDHOC_Application_Profile object.</t>
          </li>
          <li>
            <t>Forbidden violations of prescriptive indications in the EAD item. The EDHOC session fails if such a violation is detected.</t>
          </li>
          <li>
            <t>Extended semantics of ead_value: optional boolean flag when the EAD item is used in EDHOC message_1.</t>
          </li>
          <li>
            <t>Defined parameter "exporter_out_len", for in-band negotiation of EDHOC_Exporter output lengths through the EAD item "Supported EDHOC application profiles".</t>
          </li>
          <li>
            <t>Specified wire-format and presentation format for the SvcParamKeys.</t>
          </li>
          <li>
            <t>Fixed errors in CDDL notations.</t>
          </li>
          <li>
            <t>Specified type of "app_prof" in the IANA registration request.</t>
          </li>
          <li>
            <t>Clarifications and editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>Revised order of sections.</t>
          </li>
          <li>
            <t>Use of parameters aligned with corresponding updates in draft-ietf-ace-edhoc-oscore-profile.</t>
          </li>
          <li>
            <t>EAD item "Supported EDHOC application profiles":  </t>
            <ul spacing="normal">
              <li>
                <t>It can be used only in a critical way.</t>
              </li>
              <li>
                <t>Improved semantics of ead_value.</t>
              </li>
              <li>
                <t>Content restrictions to avoid inconsistent information.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Use of the parameter "app_prof" in draft-ietf-ace-edhoc-oscore-profile:  </t>
            <ul spacing="normal">
              <li>
                <t>Improved co-existence with other parameters.</t>
              </li>
              <li>
                <t>Content restrictions to avoid inconsistent information.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Error handling:  </t>
            <ul spacing="normal">
              <li>
                <t>EAD item "Supported EDHOC application profiles" occurring multiple times in EDHOC message_1 or message_2.</t>
              </li>
              <li>
                <t>EAD item "Supported EDHOC application profiles" in EDHOC message_3 or message_4.</t>
              </li>
              <li>
                <t>Invalid ead_value in EAD item "Supported EDHOC application profiles".</t>
              </li>
              <li>
                <t>Invalid information in EDHOC error message with new error code.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Fixed encoding of ERR_INFO for the EDHOC error message with the new error code.</t>
          </li>
          <li>
            <t>EDHOC_Application_Profile object  </t>
            <ul spacing="normal">
              <li>
                <t>Clarified scope.</t>
              </li>
              <li>
                <t>Clarified meaning of boolean parameters that are non-prescriptive.</t>
              </li>
              <li>
                <t>Forbid the presence of the element "trust_anchors".</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Advertisement of Supported EDHOC Application Profiles using SVCB Resource Records.</t>
          </li>
          <li>
            <t>Updated integer abbreviations for the EDHOC_Information parameters.</t>
          </li>
          <li>
            <t>Editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Clarified motivation in the abstract and introduction.</t>
          </li>
          <li>
            <t>Moved definition of EDHOC_Information parameters to draft-ietf-ace-edhoc-oscore-profile.</t>
          </li>
          <li>
            <t>Renamed ed-idep-t x as ed-epid-t.</t>
          </li>
          <li>
            <t>Content-Format abbreviated as "ct" (not "cf").</t>
          </li>
          <li>
            <t>CBOR abbreviation of "app_prof" changed to 23.</t>
          </li>
          <li>
            <t>Added preamble on identifying application profiles by Profile ID.</t>
          </li>
          <li>
            <t>Defined target attributes "ed-ta-*" for specifying supported trust anchors.</t>
          </li>
          <li>
            <t>Defined new EAD item and error code to advertise supported EDHOC application profiles.</t>
          </li>
          <li>
            <t>Defined how to handle non admitted parameters.</t>
          </li>
          <li>
            <t>Renamed well-known EDHOC application profiles.</t>
          </li>
          <li>
            <t>Updated IANA considerations:  </t>
            <ul spacing="normal">
              <li>
                <t>Suggested range 0-255 for CoAP Content-Format ID.</t>
              </li>
              <li>
                <t>Requested registration for target attributes "ed-ta-*".</t>
              </li>
              <li>
                <t>Removed requests for registration of removed parameters.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Updated references.</t>
          </li>
          <li>
            <t>Editorial improvements.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Carsten Bormann"/>, <contact fullname="Geovane Fedrecheski"/>, <contact fullname="Martine Lenders"/>, <contact fullname="Elsa Lopez-Perez"/>, <contact fullname="Michael Richardson"/>, <contact fullname="Göran Selander"/>, <contact fullname="Brian Sipos"/>, and <contact fullname="Mališa Vučinić"/> for their feedback and comments.</t>
      <t>The target attributes "ed-ta-*" for specifying supported trust anchors build on a proposal originally described in <xref target="I-D.serafin-lake-ta-hint"/>.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
