<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-epoch-markers-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-epoch-markers-03"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <postal>
          <country>Switzerland</country>
        </postal>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="I." surname="Mihalcea" fullname="Ionuț Mihalcea">
      <organization>Arm</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>ionut.mihalcea@arm.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 102?>

<t>This document defines Epoch Markers as a means to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system known as the Epoch Bell.
Systems receiving Epoch Markers do not need to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a specific Epoch Marker establishes a new epoch that is shared among all recipients.
This document defines Epoch Marker types, including CBOR time tags, RFC 3161 TimeStampToken, and nonce-like structures.
It also defines a CWT Claim to embed Epoch Markers in RFC 8392 CBOR Web Tokens, which serve as vehicles for signed protocol messages.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <?line 111?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="RFC9334"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in distributed systems.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Actors in a system that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock, with these ticks being conveyed over the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.
This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "Epoch ID" values are defined as Epoch Marker types in this document to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While most Epoch Markers types are encoded in CBOR <xref target="STD94"/>, and many of the Epoch ID types are themselves encoded in CBOR, a prominent format in this space is the TimeStampToken (TST) defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
TSTs are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an Epoch ID type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp or the start of a new freshness epoch, respectively, and therefore other Epoch Marker types.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The default top-level structure of Epoch Markers described in this document is CBOR Web Tokens (CWT) <xref target="RFC8392"/>.
The present document specifies an extensible set of Epoch Marker types, along with the <tt>em</tt> CWT claim to include them in CWTs.
CWTs are signed using COSE <xref target="STD96"/> and benefit from wide tool support.
However, CWTs are not the only containers in which Epoch Markers can be embedded.
Epoch Markers can be included in any type of message that allows for the embedding of opaque bytes or CBOR data items.
Examples include the Collection CMW in <xref target="I-D.ietf-lamps-csr-attestation"/>, Evidence formats such as <xref target="TCG-CoEvidence"/> or <xref target="I-D.ietf-rats-eat"/>, Attestation Results formats such as <xref target="I-D.ietf-rats-ar4si"/>, or the CWT Claims Header Parameter of <xref target="I-D.ietf-scitt-architecture"/>.</t>
      <t>Epoch markers can be used in the following ways:</t>
      <ul spacing="normal">
        <li>
          <t>as embeddings in other data formats</t>
        </li>
        <li>
          <t>as information elements in protocols</t>
        </li>
        <li>
          <t>in systems that integrate the aforementioned protocols or data formats</t>
        </li>
        <li>
          <t>in the deployment of such systems</t>
        </li>
      </ul>
      <t>All of these can be considered "users" of Epoch Markers and will be referred to as entities "using Epoch Markers” throughout the document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document makes use of the following terms from other documents:</t>
        <ul spacing="normal">
          <li>
            <t>"conceptual messages" as defined in <xref section="8" sectionFormat="of" target="RFC9334"/></t>
          </li>
          <li>
            <t>"freshness" and "epoch" as defined in <xref section="10" sectionFormat="of" target="RFC9334"/></t>
          </li>
          <li>
            <t>"handle" as defined in <xref section="6" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
          </li>
          <li>
            <t>"Time-Stamp Authority" as defined by <xref target="RFC3161"/></t>
          </li>
        </ul>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use the CBOR Extended Diagnostic Notation (EDN, <xref target="I-D.ietf-cbor-edn-literals"/>).</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in <xref section="10.3" sectionFormat="of" target="RFC9334"/> (the RATS architecture).</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models <xref target="I-D.ietf-rats-reference-interaction-models"/>.
In general, there are three major interaction models used in remote attestation:</t>
      <ul spacing="normal">
        <li>
          <t>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to <xref section="7.1" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
        <li>
          <t>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to <xref section="7.2" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
        <li>
          <t>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to <xref section="7.3" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
      </ul>
      <t>In all three interaction models, Epoch Markers can be used as content for the generic information element <tt>handle</tt> as introduced by <xref target="I-D.ietf-rats-reference-interaction-models"/>.
Handles are used to establish freshness in ad-hoc, unsolicited, and solicited distribution mechanisms of an Epoch Bell.
For example, an Epoch Marker can be used as a nonce in challenge-response remote attestation (e.g., for limiting the number of ad-hoc requests by a Verifier).
If embedded in a CWT, an Epoch Marker can be used as a <tt>handle</tt> by extracting the value of the <tt>em</tt> Claim or by using the complete CWT including an <tt>em</tt> Claim (e.g., functioning as a signed time-stamp token).
Using an Epoch Marker requires the challenger to acquire an Epoch Marker beforehand, which may introduce a sensible overhead compared to using a simple nonce.</t>
    </section>
    <section anchor="sec-epoch-markers">
      <name>Epoch Marker Structure</name>
      <t>This section specifies the structure of Epoch Marker types using CDDL <xref target="RFC8610"/> and illustrates their usage and relationship with other IETF work (e.g, <xref target="RFC3161"/>) where applicable.
In general, Epoch Markers are intended to be conveyed securely, e.g., by being included in a signed data structure, such as a CBOR Web Token (CWT), or by being sent via a secure channel.
The specification of such "outer" structures and protocols and the means how to secure them is beyond the scope of this document.
This document defines the different types of Epoch Markers in <xref target="sec-iana-cbor-tags"/>.
For example, an Epoch Marker can be used to construct a CBOR-based trusted time stamp token, similar in function to a <xref target="RFC3161"/> TimeStampToken, using CWT and the <tt>em</tt> Claim defined in this document (see <xref target="fig-ex-2"/> for an illustration).
The value(s) that an Epoch Marker represents are intended to demonstrate freshness of messages and protocols, but they can also serve other purposes in cases where trusted timestamps or time intervals are required.
Taken as an opaque value, it is possible to use Epoch Markers as values for a nonce field in existing data structures or protocols that already support extra data fields, such as <tt>extraData</tt> in TPMS_ATTEST <xref target="TCG-TPM2"/>.
Similarities in the usage of nonces and Epoch Markers can sometimes lead to applications where both are used in the same interaction, albeit in different places and for different purposes.
One example of such an application scenario is the "nested" use of classical nonces and Epoch Markers, whereby an Epoch Marker is requested to be used as a nonce value for a specific data structure, while a locally generated nonce is used to retrieve that Epoch Marker via an "outer" ad hoc interaction (e.g., nonce retrieval protocols that interact with an Epoch Bell to fetch an Epoch Marker to be used as a nonce).
As some Epoch Marker types represent certain timestamp variants, these Epoch Markers or the secure conveyance method they are used in do not necessarily have a hard-coded message imprint, as is always the case with <xref target="RFC3161"/> TimeStampTokens.
This means that not all Epoch Marker types support binding a message to an Epoch Marker (unlike the example in <xref target="fig-ex-2"/>.</t>
      <t>The following Epoch Marker types are defined in this document:</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker types (tag numbers 2698x are suggested, not yet allocated)</name>
        <artwork type="cddl" align="left"><![CDATA[
epoch-marker = $tagged-epoch-id

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-time
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(epoch-tick)
$tagged-epoch-id /= #6.26983(epoch-tick-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
]]></artwork>
      </figure>
      <figure anchor="fig-epoch-marker-cwt">
        <name>Epoch Marker as a CWT Claim (CWT claim number 2000 is suggested, not yet allocated)</name>
        <artwork type="cddl" align="left"><![CDATA[
$$Claims-Set-Claims //= (&(em: 2000) => epoch-marker)
]]></artwork>
      </figure>
      <section anchor="epoch-payloads">
        <name>Epoch Marker Types</name>
        <t>This section specifies the Epoch Marker types listed in <xref target="fig-epoch-marker-cddl"/>.</t>
        <section anchor="cbor-time-tags">
          <name>CBOR Time Tags</name>
          <t>CBOR Time Tags are CBOR time representations choosing from CBOR tag 0 (<tt>tdate</tt>, RFC3339 time as a string), tag 1 (<tt>time</tt>, Posix time as int or float), or tag 1001 (extended time data item).</t>
          <sourcecode type="cddl"><![CDATA[
cbor-time = tdate / time / etime

etime = #6.1001({* (int/tstr) => any})
]]></sourcecode>
          <t>The CBOR Time Tag represents a freshly sourced timestamp represented as either <tt>time</tt> or <tt>tdate</tt>
(Sections <xref target="RFC8949" section="3.4.2" sectionFormat="bare"/> and <xref target="RFC8949" section="3.4.1" sectionFormat="bare"/> of RFC 8949 <xref target="STD94"/>, <xref section="D" sectionFormat="of" target="RFC8610"/>), or <tt>etime</tt> (<xref section="3" sectionFormat="of" target="RFC9581"/>).</t>
          <section anchor="creation">
            <name>Creation</name>
            <t>To generate the cbor-time value, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-time-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="cddl"><![CDATA[
classical-rfc3161-TST-info = bytes
]]></sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl>
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The DER-encoded TSTInfo generated by a <xref target="RFC3161"/> Time Stamping Authority.</t>
            </dd>
          </dl>
          <section anchor="creation-1">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as MessageImprint in its request to the TSA:</t>
            <sourcecode type="asn.1"><![CDATA[
SEQUENCE {
  SEQUENCE {
    OBJECT      2.16.840.1.101.3.4.2.1 (sha256)
    NULL
  }
  OCTET STRING
    BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F
}
]]></sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
            <t>The TimeStampToken obtained from the TSA <bcp14>MUST</bcp14> be stripped of the TSA signature.
Only the TSTInfo is to be kept the rest <bcp14>MUST</bcp14> be discarded.
The Epoch Bell COSE signature will replace the TSA signature.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical <xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="cddl"><![CDATA[
TST-info-based-on-CBOR-time-tag = {
  &(version : 0) => v1
  &(policy : 1) => oid
  &(messageImprint : 2) => MessageImprint
  &(serialNumber : 3) => integer
  &(eTime : 4) => profiled-etime
  ? &(ordering : 5) => bool .default false
  ? &(nonce : 6) => integer
  ? &(tsa : 7) => GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 => ~time
  ? -8 => profiled-duration
  * int => any
}
profiled-duration = {* int => any}

GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]
; See Section 4.2.1.6 of RFC 5280 for type/value
]]></sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's policy under which the tst-info was produced.
Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.
Cf. messageImprint, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.
Cf. serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.
Cf. genTime, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="RFC9581"/>, indicated by CBOR tag 1001, profiled as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>
              <t>The "base time" is encoded using key 1, indicating Posix time as int or float.</t>
            </li>
            <li>
              <t>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time". The duration map
is profiled to disallow string keys. This is an optional field.</t>
            </li>
            <li>
              <t>The map <bcp14>MAY</bcp14> also contain one or more integer keys, which may encode
supplementary information <cref anchor="tf1">Allowing unsigned integer (i.e., critical) keys goes counter interoperability</cref>.</t>
            </li>
          </ul>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely based on the "base time".
This is an optional field, whose default value is "false".
Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.
Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint in identifying the name of the TSA.
Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data format.
Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.
Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
          <section anchor="creation-2">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as messageImprint in its request to the TSA:</t>
            <sourcecode type="cbor-diag"><![CDATA[
[
    / hashAlg   / -16, / sha-256 /
    / hashValue / h'BF4EE9143EF2329B1B778974AAD44506
                    4940B9CAE373C9E35A7B23361282698F'
]
]]></sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick">
          <name>Epoch Tick</name>
          <t>An Epoch Tick is a single opaque blob sent to multiple consumers.</t>
          <sourcecode type="cddl"><![CDATA[
; Epoch-Tick

epoch-tick = tstr / bstr / int
]]></sourcecode>
          <t>The following describes the epoch-tick type.</t>
          <dl>
            <dt>epoch-tick:</dt>
            <dd>
              <t>Either a string, a byte string, or an integer used by RATS roles within a trust domain as extra data (<tt>handle</tt>) included in conceptual messages <xref target="RFC9334"/>. Similarly to the use of nonces, this allows the conceptual messages to be associated with a certain epoch. However, unlike nonces (which require uniqueness), Epoch Markers can be used in multiple interactions by every consumer involved.</t>
            </dd>
          </dl>
          <section anchor="creation-3">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick-list">
          <name>Epoch Tick List</name>
          <t>A list of Epoch Ticks sent to multiple consumers.
The consumers use each Epoch Tick in the list sequentially.
Similarly to the use of nonces, this allows each interaction to be associated with a certain epoch. However, unlike nonces (which require uniqueness), Epoch Markers can be used in multiple interactions by every consumer involved.</t>
          <sourcecode type="cddl"><![CDATA[
; Epoch-Tick-List

epoch-tick-list = [ + epoch-tick ]
]]></sourcecode>
          <t>The following describes the Epoch Tick List type.</t>
          <dl>
            <dt>epoch-tick-list:</dt>
            <dd>
              <t>A sequence of byte strings used by RATS roles in trust domain as extra data (<tt>handle</tt>) in the generation of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch.
Each Epoch Tick in the list is used in a consecutive generation of a conceptual message.
Asserting freshness of a conceptual message including an Epoch Tick from the epoch-tick-list requires some state on the receiver side to assess if that Epoch Tick is the appropriate next unused Epoch Tick from the epoch-tick-list.</t>
            </dd>
          </dl>
          <section anchor="creation-4">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
          <section anchor="usage">
            <name>Usage</name>
            <t>Proving freshness requires receiver-side state to identify the “next unused” tick.
Systems using Epoch Tick lists <bcp14>SHOULD</bcp14> define how missing/out-of-order ticks are handled and how resynchronization occurs, as per <xref target="sec-state-seq-mgmt"/>.</t>
          </section>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch Bell.</t>
          <sourcecode type="cddl"><![CDATA[
strictly-monotonic-counter = uint
]]></sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl>
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
          <section anchor="usage-1">
            <name>Usage</name>
            <t>Systems that use Epoch Markers <bcp14>SHOULD</bcp14> follow the guidance in <xref target="sec-state-seq-mgmt"/> in establishing an Epoch Marker acceptance policy for receivers.
To prove freshness, receivers <bcp14>SHOULD</bcp14> track the highest accepted counter and ensure it fulfills the acceptance policy.</t>
          </section>
        </section>
      </section>
      <section anchor="sec-time-reqs">
        <name>Time Requirements</name>
        <t>Time <bcp14>MUST</bcp14> be sourced from a trusted clock (see <xref section="10.1" sectionFormat="of" target="RFC9334"/>).</t>
      </section>
      <section anchor="sec-nonce-reqs">
        <name>Nonce Requirements</name>
        <t>A nonce value used in a protocol or message to retrieve an Epoch Marker <bcp14>MUST</bcp14> be freshly generated.
The generated value <bcp14>MUST</bcp14> have at least 64 bits of entropy (before encoding).
The generated value <bcp14>MUST</bcp14> be generated via a cryptographically secure random number generator.</t>
        <t>A maximum nonce size of 512 bits is set to limit the memory requirements.
All receivers <bcp14>MUST</bcp14> be able to accommodate the maximum size.</t>
      </section>
      <section anchor="sec-state-seq-mgmt">
        <name>State and Sequencing Management</name>
        <t>Data structures containing Epoch Markers could be reordered in-flight even without malicious intent, leading to perceived sequencing issues.
Some Epoch Marker types thus require receiver state to detect replay/rollback or establish sequencing.
Systems that use Epoch Markers <bcp14>SHOULD</bcp14> define an explicit acceptance policy (e.g., bounded acceptance window) that accounts for reordering of markers.</t>
        <t>There is a trade-off between keeping a single “global” epoch view versus per-Attester state at the Verifier: global-only policies can exacerbate latency-induced false replay rejections, while per-Attester tracking can be costly.
Systems that use Epoch Markers <bcp14>SHOULD</bcp14> document whether they use global epoch tracking or per-Attester state and, if necessary, the associated window.</t>
      </section>
    </section>
    <section anchor="sec-signature-reqs">
      <name>Signature Requirements</name>
      <t>The signature over an Epoch Marker <bcp14>MUST</bcp14> be generated by the Epoch Bell.
Conversely, applying the first signature to an Epoch Marker always makes the issuer of a signed message containing an Epoch Marker an Epoch Bell.</t>
    </section>
    <section anchor="sec-seccons">
      <name>Security Considerations</name>
      <t>In distributed systems that rely on Epoch Markers for conveyance of freshness, the Epoch Bell plays a significant role in the assumed trust model.
Freshness decisions derived from Epoch Markers depend on the Epoch Bell’s key(s) and correct behavior.
If the Epoch Bell key is compromised, or the Bell is malicious/misconfigured, an attacker can emit valid-looking “fresh” Epoch Markers.
System deployments using Epoch Markers generally need to protect Bell signing keys (secure storage, rotation, revocation) and scope acceptance to the intended trust domain (e.g., expected issuer/trust anchor).
Similarly, the Bell's clock needs to be securely sourced and managed, to prevent attacks that skew the Bell's perception of time.</t>
      <section anchor="epoch-signalling-issues">
        <name>Epoch Signalling Issues</name>
        <t><xref section="12.3" sectionFormat="of" target="RFC9334"/> provides a good introduction to attacks on conveyance of Epoch Markers.
A network adversary can replay validly signed Epoch Markers or delay distribution, and differential latency can lead to different parties having different views of the “current” epoch.</t>
        <t>The epoch (acceptable window) duration is an operational security parameter: if too long, an Attester can create “good” Evidence in a good state and release it later while the epoch is still acceptable (notably for epoch-tick, epoch-tick-list, and strictly-monotonic-counter); if too short, distant Attesters may be rejected as stale due to latency.
Epoch Markers are also designed to be reusable by multiple consumers, unlike nonces.
Where per-session uniqueness is required, protocols typically need to bind Epoch Markers to an explicit nonce (e.g., see <xref target="sec-epoch-markers"/>).
Finally, system deployments using Epoch Markers are normally required to pin which Epoch Marker types are acceptable for a given trust domain to avoid downgrade.</t>
      </section>
      <section anchor="operational-examples">
        <name>Operational Examples</name>
        <t>The following illustrative cases highlight “reasonable best practice” choices for balancing freshness, replay protection, and scalability.</t>
        <ul spacing="normal">
          <li>
            <t><em>Nonce-bound Bell interaction</em>: When a Verifier uses a nonce challenge to trigger Evidence creation, the Attester can forward that nonce to the Epoch Bell to request an Epoch Marker with the nonce echoed inside.
For reuse and caching, the typical pattern is to keep the marker generic and embed the Verifier nonce alongside the marker in the Evidence: if the Bell signs a nonce-echoed marker, that marker is not reusable across sessions.
The nonce and marker are thus either bound by the Bell's signature, or by the attester's signature on the Evidence.
The Verifier checks that (1) the nonce matches its challenge, (2) the Epoch Marker signature chains to the expected Bell key, and (3) the marker satisfies the acceptance policy (e.g., highest-seen counter or time window).
This pairing gives per-session uniqueness while still allowing Epoch Marker reuse by multiple consumers.</t>
          </li>
          <li>
            <t><em>Long-latency paths (e.g., LoRaWAN or DTN profiles)</em>: High propagation and queuing delays make tight epoch windows brittle.
In system deployments using Epoch Markers, epoch-tick-list can be pre-provisioned to Attesters so that each interaction consumes the next tick, with the Verifier keeping per-Attester sequencing state (<xref target="sec-state-seq-mgmt"/>).
Epoch duration should cover worst-case delivery plus clock skew of the Bell, and acceptance policies should allow an overlap (e.g., current and immediately previous epoch) to absorb in-flight drift while still rejecting replays beyond that window.</t>
          </li>
          <li>
            <t><em>Large fleets sharing a Bell</em>: When many Attesters reuse the same Epoch Marker, per-Attester state at the Verifier may be impractical.
One approach is to accept a global highest-seen epoch (with a bounded replay window) while requiring each Evidence record to bind the Epoch Marker to the Attester identity and, when feasible, a Verifier-provided nonce.
This limits cross-attester replay of a single Epoch Marker while keeping the Bell stateless, which allows Epoch Markers to be cached and enables their broadcast distribution at scale.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR representation of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-epoch-tick"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-epoch-tick-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-iana-em-claim">
        <name> New EM CWT Claim</name>
        <t>This specification adds the following value to the "CBOR Web Token Claims" registry <xref target="IANA.cwt"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: em</t>
          </li>
          <li>
            <t>Claim Description: Epoch Marker</t>
          </li>
          <li>
            <t>Claim Key: 2000 (IANA: suggested assignment)</t>
          </li>
          <li>
            <t>Claim Value Type(s): CBOR array</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="sec-epoch-markers"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="new-media-type-applicationemcbor">
        <name>New Media Type <tt>application/em+cbor</tt></name>
        <t>IANA is requested to add the <tt>application/epoch-marker+cbor</tt> media types to the "Media Types" registry <xref target="IANA.media-types"/>, using the following template:</t>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>epoch-marker+cbor</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>no</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>no</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="sec-seccons"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>RATS Attesters, Verifiers, Endorsers and Reference-Value providers, and Relying Parties that need to transfer Epoch Markers payloads over HTTP(S), CoAP(S), and other transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="new-coap-content-format">
        <name>New CoAP Content-Format</name>
        <t>IANA is requested to register the following Content-Format ID in the "CoAP Content-Formats" registry, within the "Constrained RESTful Environments (CoRE) Parameters" registry group <xref target="IANA.core-parameters"/>:</t>
        <table align="left">
          <name>New CoAP Content Format</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/epoch-marker+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>If possible, TBD1 should be assigned in the 256..9999 range.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3161"/>
          <seriesInfo name="DOI" value="10.17487/RFC3161"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9054"/>
          <seriesInfo name="DOI" value="10.17487/RFC9054"/>
        </reference>
        <referencegroup anchor="STD94" target="https://www.rfc-editor.org/info/std94">
          <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
            <front>
              <title>Concise Binary Object Representation (CBOR)</title>
              <author fullname="C. Bormann" initials="C." surname="Bormann"/>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="December" year="2020"/>
              <abstract>
                <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
                <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="94"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD96" target="https://www.rfc-editor.org/info/std96">
          <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="August" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
                <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
          </reference>
          <reference anchor="RFC9338" target="https://www.rfc-editor.org/info/rfc9338">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="December" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9338"/>
            <seriesInfo name="DOI" value="10.17487/RFC9338"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9581">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="B. Gamari" initials="B." surname="Gamari"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <date month="August" year="2024"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR, RFC 8949) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>In CBOR, one point of extensibility is the definition of CBOR tags. RFC 8949 defines two tags for time: CBOR tag 0 (RFC 3339 time as a string) and tag 1 (POSIX time as int or float). Since then, additional requirements have become known. The present document defines a CBOR tag for time that allows a more elaborate representation of time, as well as related CBOR tags for duration and time period. This document is intended as the reference document for the IANA registration of the CBOR tags defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9581"/>
          <seriesInfo name="DOI" value="10.17487/RFC9581"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="25" month="January" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280, common certificate
   profiles and is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is over the CBOR encoding instead
   of the DER encoding, avoiding the use of ASN.1.  Both types of
   certificates have the same semantics as X.509 and the same reduced
   size compared to X.509.

   The document also specifies CBOR encoded data structures for
   certificate (signing) requests and certificate request templates, new
   COSE headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698; the TLSA selectors registry is
   extended to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-16"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="16" month="October" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present -19
   // includes the definition of the cri'' application- extension. cri''
   // was previously defined in draft-ietf-core-href; however the latter
   // document overtook the present document in the approval process.
   // As the definition of cri'' is dependent on the present document
   // (and conversely has essentially no dependency on the technical
   // content of draft-ietf-core-href beyond its mere existence), the
   // text (including IANA considerations) has been moved here. -19 is
   // intended for use at the CBOR WG meeting at IETF 124.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-19"/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T" value="Recommendation X.690"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="5" month="November" year="2025"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS) [RFC9334].  Three conveying mechanisms --
   Challenge/Response, Uni-Directional, and Streaming Remote Attestation
   -- are illustrated and defined.  Analogously, a general overview
   about the information elements typically used by corresponding
   conveyance protocols are highlighted.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-15"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Cryptic Forest Software</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
         </author>
            <date day="11" month="February" year="2026"/>
            <abstract>
              <t>   Certification Authorities (CAs) issuing certificates to Public Key
   Infrastructure (PKI) end entities may require a certificate signing
   request (CSR) to include additional verifiable information to confirm
   policy compliance.  For example, a CA may require an end entity to
   demonstrate that the private key corresponding to a CSR's public key
   is secured by a hardware security module (HSM), is not exportable,
   etc.  The process of generating, transmitting, and verifying
   additional information required by the CA is called remote
   attestation.  While work is currently underway to standardize various
   aspects of remote attestation, a variety of proprietary mechanisms
   have been in use for years, particularly regarding protection of
   private keys.

   This specification defines an ASN.1 structure for remote attestation
   that can accommodate proprietary and standardized attestation
   mechanisms, as well as an attribute and an extension to carry the
   structure in PKCS#10 and Certificate Request Message Format (CRMF)
   messages, respectively.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-22"/>
        </reference>
        <reference anchor="TCG-CoEvidence" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Concise-Evidence-Binding-for-SPDM-Version-1.0-Revision-53_1August2023.pdf">
          <front>
            <title>TCG DICE Concise Evidence Binding for SPDM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2023" month="June"/>
          </front>
          <refcontent>Version 1.00</refcontent>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="15" month="August" year="2025"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-09"/>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="TCG-TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/Trusted-Platform-Module-2.0-Library-Part-2-Version-184_pub.pdf">
          <front>
            <title>Trusted Platform Module 2.0 Library Part 2: Structures</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
          <refcontent>Version 184</refcontent>
        </reference>
      </references>
    </references>
    <?line 630?>

<section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an Epoch Marker with an <tt>etime</tt> as the Epoch Marker type.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR Epoch Marker based on `etime` (EDN)</name>
        <artwork type="cbor-diag" align="center"><![CDATA[
/ epoch-marker for
  1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
/ etime / 1001({
    1: 851042397,
  -10: "America/Los_Angeles",
  -11: { "u-ca": "hebrew" }
})
]]></artwork>
      </figure>
      <t>The encoded data item in CBOR pretty-printed form (hex with comments) is shown in <xref target="fig-ex-1-pretty"/>.</t>
      <figure anchor="fig-ex-1-pretty">
        <name>CBOR Epoch Marker based on `etime` (pretty hex)</name>
        <artwork type="cbor-pretty" align="center"><![CDATA[
d9 03e9                                 # tag(1001)
   a3                                   # map(3)
      01                                # unsigned(1)
      1a 32b9e05d                       # unsigned(851042397)
      29                                # negative(9)
      73                                # text(19)
         416d65726963612f4c6f735f416e67656c6573 # "America/Los_Angeles"
      2a                                # negative(10)
      a1                                # map(1)
         64                             # text(4)
            752d6361                    # "u-ca"
         66                             # text(6)
            686562726577                # "hebrew"
]]></artwork>
      </figure>
      <t>The example in <xref target="fig-ex-2"/> shows an Epoch Marker with an <tt>etime</tt> as the Epoch Marker type carried within a CWT.</t>
      <figure anchor="fig-ex-2">
        <name>CBOR Epoch Marker based on `etime` carried within a CWT (EDN)</name>
        <artwork type="cbor-diag" align="center"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

18([
  / protected / << {
    / alg / 1: -7 / ECDSA 256 /
  } >>,
  / unprotected / {},
  / payload / << {
    / epoch marker / 2000: / etime / 1001({
      1: 851042397,
      -10: "America/Los_Angeles",
      -11: { "u-ca": "hebrew" }
    }),
    / eat_nonce /  10: h'\
   c53a8c924f5a27877951ace250709aa64a45311840ca1c55da09af026a7a9c1c',
    / iss / 1 : "ACME epoch bell",
    / aud / 3 : "ACME protocol clients",
    / nbf / 5 : 1757929800,
    / exp / 4 : 1757929860
  } >>,
  / signature / h'737461747574617279'
])
]]></artwork>
      </figure>
      <t>The encoded data item in CBOR pretty-printed form (hex with comments) is shown in <xref target="fig-ex-2-pretty"/>.</t>
      <figure anchor="fig-ex-2-pretty">
        <name>CBOR Epoch Marker based on `etime` carried within a CWT (pretty hex)</name>
        <artwork type="cbor-pretty" align="center"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

d2                                      # tag(18)
   84                                   # array(4)
      43                                # bytes(3)
         a10126                         # "\xA1\u0001&"
      a0                                # map(0)
      58 88                             # bytes(136)
         \
a61907d0d903e9a3011a32b9e05d2973416d65726963612f4c6f735f416e67656c65\
732aa164752d6361666865627265770a5820c53a8c924f5a27877951ace250709aa6\
4a45311840ca1c55da09af026a7a9c1c016f41434d452065706f63682062656c6c03\
7541434d452070726f746f636f6c20636c69656e7473051a68c7e148041a68c7e18\
4 # "\xA6\u0019\a\xD0\xD9\u0003\xE9\xA3\u0001\u001A2\xB9\xE0])\
sAmerica/Los_Angeles*\xA1du-cafhebrew\nX \xC5:\x8C\x92OZ'\x87yQ\xAC\\
xE2Pp\x9A\xA6JE1\u0018@\xCA\u001CU\xDA\t\xAF\u0002jz\x9C\u001C\\
u0001oACME epoch bell\u0003uACME protocol clients\u0005\u001Ah\xC7\\
                                       xE1H\u0004\u001Ah\xC7\xE1\x84"
      49                                # bytes(9)
         737461747574617279             # "statutary"
]]></artwork>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depicts the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="asn.1"><![CDATA[
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
]]></sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank
Carl Wallace,
Jeremy O'Donoghue
and
Jun Zhang
for their reviews, suggestions and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
