<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.5) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY SELF "RFCthis">
]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-suit-report-19" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SUIT Reports">Secure Reporting of SUIT Update Status</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>

    <date year="2026" month="February" day="17"/>

    <area>Security</area>
    <workgroup>SUIT</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 62?>

<t>The Software Update for the Internet of Things (SUIT) manifest provides
a way for many different update and boot
workflows to be described by a common format.
This document specifies a lightweight feedback mechanism that
allows a developer in possession of a manifest to reconstruct the
decisions made and actions performed by a manifest processor.</t>



    </abstract>



  </front>

  <middle>


<?line 71?>

<section anchor="introduction"><name>Introduction</name>

<t>This document specifies a
logging container, specific to Software Update for the Internet of Things (SUIT) Manifests (<xref target="I-D.ietf-suit-manifest"/>)
that creates a lightweight feedback mechanism for
developers in the event that an update or boot fails in the manifest
processor. In this way, it provides the necessary link between the
Status Tracker Client and the Status Tracker Server as defined in
<xref section="2.3" sectionFormat="of" target="RFC9019"/>.</t>

<t>A SUIT Manifest Processor can fail to install or boot an update for many
reasons. Frequently, the error codes generated by such systems fail to
provide developers with enough information to find root causes and
produce corrective actions, resulting in extra effort to reproduce
failures. Logging the results of each SUIT command can simplify this
process.</t>

<t>While it is possible to report the results of SUIT commands through
existing logging or attestation mechanisms, this comes with several
drawbacks:</t>

<t><list style="symbols">
  <t>data inflation, particularly when designed for text-based logging</t>
  <t>missing information elements</t>
  <t>missing support for multiple components</t>
</list></t>

<t>The CBOR objects defined in this document allow devices to:</t>

<t><list style="symbols">
  <t>report a trace of how an update was performed</t>
  <t>report expected vs. actual values for critical checks</t>
  <t>describe the installation of complex multi-component architectures</t>
  <t>describe the measured properties of a system</t>
  <t>report the exact reason for a parsing failure</t>
</list></t>

</section>
<section anchor="terminology"><name>Conventions and Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>The terms "Author", "Recipient", and "Manifest" are defined in 
<xref section="2" sectionFormat="of" target="I-D.ietf-suit-manifest"/>.</t>

<t>Additionally, this document uses the term
Boot: initialization of an executable image. Although this
document refers to boot, any boot-specific operations described
are equally applicable to starting an executable in an OS context.</t>

</section>
<section anchor="suit-record"><name>The SUIT_Record</name>

<t>The SUIT_Record is a record of a decision taken by the Manifest Processor.
It contains the information that the Manifest Processor used to make the
decision. The decision can be inferred from this information, so it is not
included.
If the developer has a copy of the
manifest, then they need little information to reconstruct what the
manifest processor has done. They need any data that influences
the control flow of the manifest. The manifest only supports the
following control flow primitives:</t>

<t><list style="symbols">
  <t>Set Component</t>
  <t>Set/Override Parameters</t>
  <t>Try-Each</t>
  <t>Run Sequence</t>
  <t>Conditions</t>
</list></t>

<t>Of these, only conditions change the behavior of the processor from the
default, and then only when the condition fails.</t>

<t>To reconstruct the flow of a manifest, a developer needs
a list of metadata about failed conditions:</t>

<t><list style="symbols">
  <t>the current manifest</t>
  <t>the current Command Sequence (<xref section="5.3.3" sectionFormat="of" target="I-D.ietf-suit-manifest"/>)</t>
  <t>the offset into the current Command Sequence</t>
  <t>the current component index</t>
  <t>the "reason" for failure</t>
</list></t>

<t>Most conditions compare a parameter to an actual value, so the "reason"
is typically the actual value.</t>

<t>Since it is possible that a non-condition command (directive) may fail in an
exceptional circumstance,
a failure code for a non condition command must be communicated to the developer. However,
a failed directive will terminate processing of the manifest. To accommodate
for a failed command and for explicit "completion," an additional "result"
element is included as well; however, this is included in the SUIT_Report (<xref target="suit-report"/>).
In the case of a command failure,
the failure reason is typically a numeric error code. However, these error
codes need to be standardised in order to be useful.</t>

<t>This approach effectively compacts the log of operations taken using the SUIT Manifest
as a dictionary. This enables a full reconstruction of the log using a matching
decompaction tool. The following CDDL (<xref target="RFC8610"/>) shows the structure of a SUIT_Record.</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Record = [
    suit-record-manifest-id        : [* uint ],
    suit-record-manifest-section   : int,
    suit-record-section-offset     : uint,
    suit-record-component-index    : uint,
    suit-record-properties         : SUIT_Parameters,
    $$SUIT_Record_Extensions
]
]]></sourcecode></figure>

<t>suit-record-manifest-id is used to identify which manifest contains the
command that caused the record to be generated. The manifest id is a
list of integers that form a walk of the manifest tree, starting at the
root. An empty list indicates that the command was contained in the
root manifest. If the list is not empty, the command was contained in
one of the root manifest's dependencies, or nested even further below
that.</t>

<t>For example, suppose that the root manifest has 3 dependencies
and each of those dependencies has 2 dependencies of its own:</t>

<t><list style="symbols">
  <t>Root  <list style="symbols">
      <t>Dependency A (index 0)      <list style="symbols">
          <t>Dependency AA (index 0,0)</t>
          <t>Dependency AB (index 0,1)</t>
        </list></t>
      <t>Dependency B (index 1)      <list style="symbols">
          <t>Dependency BA (index 1,0)</t>
          <t>Dependency BB (index 1,1)</t>
        </list></t>
      <t>Dependency C (index 2)      <list style="symbols">
          <t>Dependency CA (index 2,0)</t>
          <t>Dependency CB (index 2,1)</t>
        </list></t>
    </list></t>
</list></t>

<t>A suit-record-manifest-id of [1,0] would indicate that the current command was
contained within Dependency BA. Similarly, a suit-record-manifest-id of [2,1]
would indicate Dependency CB</t>

<t>suit-record-manifest-section indicates which Command Sequence of the manifest was
active. Only the "top level" Command Sequences, with entries in the Manifest are
identified by this element. These are:</t>

<t><list style="symbols">
  <t>suit-validate = 7</t>
  <t>suit-load = 8</t>
  <t>suit-invoke = 9</t>
  <t>suit-dependency-resolution  = 15</t>
  <t>suit-payload-fetch = 16</t>
  <t>suit-candidate-verification = 18</t>
  <t>suit-install = 20</t>
</list></t>

<t>This list may be extended through extensions to the SUIT_Manifest.</t>

<t>suit-record-manifest-section is used in addition to an offset so that the developer can
index into severable Command Sequences in a predictable way. The value of this
element is the value of the key that identified the Command Sequence in the
manifest.</t>

<t>suit-record-section-offset is the number of bytes into the current
Command Sequence at which the current command is located.</t>

<t>suit-record-component-index is the index of the component that was
specified at the time that the report was generated. This field is
necessary due to the availability of set-current-component values of
True and a list of components. Both of these values cause the manifest
processor to loop over commands using a series of component-ids, so the
developer needs to know which was selected when the command executed.</t>

<t>suit-record-properties contains any measured properties that led to the
command failure.
For example, this could be the actual value of a SUIT_Digest or
class identifier. This is encoded in a SUIT_Parameters block as defined
in <xref section="8.4.8" sectionFormat="of" target="I-D.ietf-suit-manifest"/>.</t>

</section>
<section anchor="suit-report"><name>The SUIT_Report</name>

<t>The SUIT_Report is a SUIT-specific logging container. It contains
the SUIT_Records needed to reconstruct the decisions made by a
Manifest Processor as well as references to the Manifest being 
processed, the result of processing, and an optional capability
report.</t>

<t>Some metadata is common to all records, such as the root manifest:
the manifest that is the entry-point for the manifest processor. This
metadata is aggregated with a list of SUIT_Records as defined in 
<xref target="suit-record"/>. The SUIT_Report
may also contain a list of any System Properties that were measured
and reported, and a reason for a failure if one occurred.
The following CDDL describes the structure of a SUIT_Report and
a SUIT_Reference:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Report = {
  suit-reference              => SUIT_Reference,
  ? suit-report-nonce         => bstr,
  suit-report-records         => \
        \[ * SUIT_Record / system-property-claims \],
  suit-report-result          => true / {
    suit-report-result-code   => int,
    suit-report-result-record => SUIT_Record,
    suit-report-result-reason => SUIT_Report_Reasons,
  },
  ? suit-report-capability-report => SUIT_Capability_Report,
  $$SUIT_Report_Extensions
}

system-property-claims = {
  system-component-id => SUIT_Component_Identifier,
  + SUIT_Parameters,
}

SUIT_Reference = [
    suit-report-manifest-uri  : tstr,
    suit-report-manifest-digest : SUIT_Digest,
]
]]></sourcecode></figure>

<t>Further details for each element appear in subsequent sections: the
encoding of <spanx style="verb">suit-report-records</spanx> is defined in <xref target="suit-report-records"/>,
the result semantics in <xref target="suit-report-result"/>, and the optional
capability report in <xref target="capabilities"/>.</t>

<t>The suit-reference provides a reference URI and digest for a suit
manifest. The URI <bcp14>MUST</bcp14> exactly match the suit-reference-uri
(<xref section="8.4.3" sectionFormat="of" target="I-D.ietf-suit-manifest"/>) that is provided in the
manifest. The digest is the digest of the manifest, exactly as reported in
SUIT_Authentication, element 0 (<xref section="8.3" sectionFormat="of" target="I-D.ietf-suit-manifest"/>).</t>

<t>NOTE: The digest is used
in preference to other identifiers in the manifest because it allows
a manifest to be uniquely identified (collision resistance) whereas
other identifiers, such as the sequence number, can collide,
particularly in scenarios with multiple trusted signers.</t>

<t>suit-report-nonce provides a container for freshness or replay
protection information. This field <bcp14>MAY</bcp14> be omitted where the suit-report
is authenticated within a container that provides freshness already.
For example, attestation evidence typically contains a proof of
freshness.</t>

<t>suit-report-manifest-digest provides a SUIT_Digest (as defined in
<xref section="10" sectionFormat="of" target="I-D.ietf-suit-manifest"/>) that is the characteristic digest of the
Root manifest. This digest <bcp14>MUST</bcp14> be the same digest as is held in
the first element of SUIT_Authentication in the referenced
Manifest_Envelope.</t>

<t>suit-report-manifest-uri provides the reference URI that was provided in
the root manifest.</t>

<section anchor="suit-report-records"><name>suit-report-records</name>

<t>suit-report-records is a list of 0 or more SUIT_Records or
system-property-claims. Because SUIT_Records are only generated on failure,
in simple cases this can be an empty list. SUIT_Records and
suit-system-property-claims are merged into a single list because this
reduces the overhead for a constrained node that generates this report.
The use of a single log allows report generators to use simple
memory management. Because the system-property-claims
are encoded as maps and SUIT_Records are encoded as lists, a recipient need
only filter the CBOR Type-5 entries from suit-report-records to obtain all 
system-property-claims.</t>

<t>System Properties can be extracted from suit-report-records by filtering
suit-report-records for maps. System Properties are a list of measured
or asserted properties
of the system that creates the SUIT_Report. These properties are scoped by
component identifier. Because this list is expected to be constructed on
the fly by a constrained node, component identifiers may appear more than
once. A recipient may convert the result to a more conventional structure:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Record_System_Properties = {
  * component-id => {
    + SUIT_Parameters,
  }
}
]]></sourcecode></figure>

</section>
<section anchor="suit-report-result"><name>suit-report-result</name>

<t>suit-report-result provides a mechanism to show that the SUIT procedure
completed successfully (value is true) or why it failed (value is a map
of an error code and a SUIT_Record).</t>

<t>suit-report-result-reason gives a high-level explanation of the failure.
These reasons are intended for interoperable implementations. The reasons
are divided into a small number of groups:</t>

<t><list style="symbols">
  <t>suit-report-reason-cbor-parse: a parsing error was encountered by the
CBOR parser.</t>
  <t>suit-report-reason-cose-unsupported: an unsupported COSE (<xref target="RFC9052"/>) structure or
header was encountered.</t>
  <t>suit-report-reason-alg-unsupported: an unsupported COSE algorithm was
encountered.</t>
  <t>suit-report-reason-unauthorised: Signature/MAC verification failed.</t>
  <t>suit-report-reason-command-unsupported: an unsupported command was
encountered.</t>
  <t>suit-report-reason-component-unsupported: The manifest declared a
component/prefix that does not exist.</t>
  <t>suit-report-reason-component-unauthorised: The manifest declared a
component that is not accessible by the signer.</t>
  <t>suit-report-reason-parameter-unsupported: The manifest used a
parameter that does not exist.</t>
  <t>suit-report-reason-severing-unsupported: The manifest used severable fields
but the Manifest Processor does not support them.</t>
  <t>suit-report-reason-condition-failed: A condition failed with soft-
failure off.</t>
  <t>suit-report-reason-operation-failed: A command failed (e.g.,
download/copy/swap/write)</t>
  <t>suit-report-reason-invoke-pending: Invocation is about to be attempted
and the final outcome is not yet known.</t>
</list></t>

<t>The suit-report-result-code reports an internal error code that is
provided for debugging reasons. This code is not intended for
interoperability.</t>

<t>The suit-report-result-record indicates the exact point in the manifest
or manifest dependency tree where the error occurred.</t>

<t>NOTE: Some deployments use <spanx style="verb">SUIT_Command_Invoke</spanx>, which can transfer
control to invoked code that never returns to the Manifest Processor.
When a SUIT_Report is produced for remote attestation, implementations
often need to sign the report before attempting the invoke. Signing with
an unconditional "success" result would be misleading if the invocation
ultimately fails. Implementers can leave the invoke outcome
implicit—allowing a verifier to infer that execution was handed off—or,
when the result must be reported before invocation, use
<spanx style="verb">suit-report-reason-invoke-pending</spanx> to signal that invocation is about to
occur without asserting a final outcome.</t>

<t>suit-report-capability-report provides a mechanism to report the capabilities of the Manifest Processor. The SUIT_Capability_Report is described in <xref target="capabilities"/>. The capability report is optional to include in the SUIT_Report, according to an application-specific policy. While the SUIT_Capability_Report is not expected to be very large, applications should ensure that they only report capabilities when necessary in order to conserve bandwidth. A capability report is not necessary except when:</t>

<t><list style="numbers" type="1">
  <t>A client explicitly requests the capability report, or</t>
  <t>A manifest attempts to use a capability that the Manifest Processor does not implement.</t>
</list></t>

</section>
</section>
<section anchor="attestation"><name>Attestation</name>

<t>Where Remote Attestation (see <xref target="RFC9334"/>, the RATS Architecture) is in use, the RATS Verifier (Verifier hereafter) requires a set of
Attestation Evidence. Attestation Evidence contains Evidence Claims about the Attester. These Evidence Claims
contain measurements about the Attester. Many of these measurements are the same measurements that are generated in SUIT,
which means that a SUIT_Report contains most of the Claims and some of the Endorsements that a Verifier requires.</t>

<t>Using a SUIT_Manifest and a SUIT_Report improves a Verifier's ability to 
appraise the trustworthiness of a remote device.
Remote attestation is done by using the SUIT_Envelope
along with the SUIT_Report in Evidence to reconstruct the state of the device at boot time.
Additionally, by including SUIT_Report data as telemetry (i.e., debug/failure information) next to measurements in Evidence, both types of Evidence data can be notarized via verifiable data structure, such as an append-only log (<xref section="3" sectionFormat="of" target="I-D.ietf-scitt-architecture"/>) using the same conceptual message.</t>

<t>For the SUIT_Report to be usable as Attestation Evidence, the environment that
generated the SUIT_Report also needs to be measured. Typically, this means that
the software that executes the commands in the Manifest (the Manifest
Processor) must be measured; similarly, the piece of software that assembles
the measurements, taken by the Manifest Processor, into the SUIT_Report (the
Report Generator) must also be measured. Any bootloaders or operating systems
that facilitate the running of the Manifest Processor or Report Generator also need
to be measured in order to demonstrate the integrity of the measuring environment.</t>

<t>Therefore, if a Remote Attestation format that conveys Attestation Evidence, such as an Entity Attestation Token (EAT, see <xref target="RFC9711"/>), contains a SUIT_Report, then it <bcp14>MUST</bcp14> also include an integrity measurement of the Manifest Processor, the Report Generator and any bootloader or OS environment that ran before or during the 
execution of both.</t>

<t>If Reference Values (<xref section="8.3" sectionFormat="of" target="RFC9334"/>) required by the Verifier are delivered in a SUIT_Envelope, this codifies the delivery of appraisal information to the Verifier:</t>

<t><list style="symbols">
  <t>The Firmware Distributor:
  <list style="symbols">
      <t>sends the SUIT_Envelope to the Verifier without payload or text, but with Reference Values</t>
      <t>sends the SUIT_Envelope to the Recipient without Reference Values, or text, but with payload</t>
    </list></t>
  <t>The Recipient:
  <list style="symbols">
      <t>Installs the firmware as described in the SUIT_Manifest and generates a SUIT_Report, which is encapsulated in an EAT by the installer and sent to the Firmware Distributor.</t>
      <t>Boots the firmware as described in the SUIT_Manifest and creates a SUIT_Report, which is encapsulated in an EAT by the installer and sent to the Firmware Distributor.</t>
    </list></t>
  <t>The Firmware Distributor sends both reports to the Verifier (separately or together)</t>
  <t>The Verifier:
  <list style="symbols">
      <t>Reconstructs the state of the device using the manifest</t>
      <t>Compares this state to the Reference Values</t>
      <t>Returns an Attestation Report to the Firmware Distributor</t>
    </list></t>
</list></t>

<t>This approach simplifies the design of the bootloader since it is able to use an append-only log. It allows a Verifier to validate this report against signed Reference Values that is provided by the firmware author, which simplifies the delivery chain of verification information to the Verifier.</t>

<t>For a Verifier to consume the SUIT_Report, it requires a copy of the
SUIT_Manifest. The Verifier then replays the SUIT_Manifest, using the
SUIT_Report to resolve whether each condition is met. It identifies each
measurement that is required by attestation policy and records this
measurement as a Claim (<xref section="4" sectionFormat="of" target="RFC9711"/>). It evaluates whether the SUIT_Report
correctly matches the SUIT_Manifest as an element of evaluating
trustworthiness. For example there are several indicators that would show
that a SUIT_Report does not match a SUIT_Manifest. If any of the following
(not an exhaustive list) occur, then the Manifest Processor that created the
report is not trustworthy:</t>

<t><list style="symbols">
  <t>Hash of SUIT_Manifest at suit-report-manifest-uri does not match suit-report-manifest-digest</t>
  <t>A SUIT_Record is issued for a SUIT_Command_Sequence that does not exist 
in the SUIT_Manifest at suit-report-manifest-uri.</t>
  <t>A SUIT_Record is identified at an offset that is not a condition and does
not have a reporting policy that would indicate a SUIT_Record is needed.</t>
</list></t>

<t>Many architectures require multiple Verifiers, for example where one Verifier
handles hardware trust, and another handles software trust, especially the
evaluation of software authenticity and freshness. Some Verifiers may not
be capable of processing a SUIT_Report and, for separation of roles, it
may be preferable to divide that responsibility. In this case, the Verifier
of the SUIT_Report should perform an Evidence Transformation
<xref target="I-D.ietf-rats-evidence-trans"/> and
produce general purpose Measurement Results Claims that can be consumed by a
downstream Verifier, for example a Verifying Relying Party, that does not
understand SUIT_Reports.</t>

</section>
<section anchor="capabilities"><name>Capability Reporting</name>

<t>Because SUIT is extensible, a manifest author must know what capabilities a device has available. To enable this, a capability report is a set of lists that define which commands, parameters, algorithms, and component IDs are supported by a manifest processor.</t>

<t>The CDDL for a SUIT_Capability_Report follows:</t>

<figure><sourcecode type="~CDDL"><![CDATA[
SUIT_Capability_Report = {
  suit-component-capabilities  => [+ SUIT_Component_Capability ]
  suit-command-capabilities          => [+ int],
  suit-parameters-capabilities       => [+ int],
  suit-crypt-algo-capabilities       => [+ int],
  ? suit-envelope-capabilities       => [+ int],
  ? suit-manifest-capabilities       => [+ int],
  ? suit-common-capabilities         => [+ int],
  ? suit-text-capabilities           => [+ int],
  ? suit-text-component-capabilities => [+ int],
  ? suit-dependency-capabilities     => [+ int],
  * [+int]                           => [+ int],
  $$SUIT_Capability_Report_Extensions
}

SUIT_Component_Capability = [*bstr,?true]
]]></sourcecode></figure>

<t>A SUIT_Component_Capability is similar to a SUIT_Component_ID, with one difference: it may optionally be terminated by a CBOR 'true' which acts as a wild-card match for any component with a prefix matching the SUIT_Component_Capability leading up to the 'true.' This feature is for use with filesystem storage, key value stores, or any other arbitrary-component-id storage systems.</t>

<t>When reporting capabilities, it is <bcp14>OPTIONAL</bcp14> to report capabilities that are declared mandatory by the SUIT Manifest <xref target="I-D.ietf-suit-manifest"/>. Capabilities defined by extensions <bcp14>MUST</bcp14> be reported.</t>

<t>Additional capability reporting can be added as follows: if a manifest element does not exist in this map, it can be added by specifying the CBOR path to the manifest element in an array and using this as the key. For example SUIT_Dependencies, as described in <xref section="5.2.2" sectionFormat="of" target="I-D.ietf-suit-trust-domains"/>,  could have an extension added, which was key 3 in the SUIT_Dependencies map. This capability would be reported as: [3, 3, 1] =&gt; [3], where the key consists of the key for SUIT_Manifest (3), the key for SUIT_Common (3), and the key for SUIT_Dependencies (1). Then the value indicates that this manifest processor supports the extension (3).</t>

</section>
<section anchor="eat"><name>EAT Claim</name>

<t>The Entity Attestation Token (EAT, see <xref target="RFC9711"/>) is a secure container for conveying
Attestation Evidence, such as measurements, and Attestation Results.
The SUIT_Report is a form of measurement done by the SUIT Manifest Processor as it attempts to invoke a manifest or install a manifest. As a result, the SUIT_Report can be captured in an EAT measurements type.</t>

<t>The log-based structure of the SUIT_Report is not conducive to processing by a
typical Relying Party: it contains only a list of waypoints through the SUIT
Manifest--unless system parameter records are included--and requires additional 
information (the SUIT_Manifest) to reconstruct the values that must have been
present at each test. A Verifier in posession of the SUIT_Manifest can reconstruct 
the measurements that would produce the waypoints in the SUIT_Report. The Verifier 
<bcp14>SHOULD</bcp14> convert a SUIT_Report into a more consumable version of the EAT claim by, for 
example, constructing a measurement results claim that contains the digest of a 
component, the Vendor ID and Class ID of a component, etc.</t>

</section>
<section anchor="container"><name>SUIT_Report Container</name>

<t>Transmission of the SUIT_Report <bcp14>MUST</bcp14> satisfy the requirements of <xref section="4.3.16" sectionFormat="of" target="RFC9124"/>: REQ.SEC.REPORTING.</t>

<t>Status reports from the device to any remote system <bcp14>MUST</bcp14> be performed over an authenticated, confidential channel in order to prevent modification or spoofing of the reports.</t>

<t>As a result, the SUIT_Report <bcp14>MUST</bcp14> be transported using one of the following methods:</t>

<t><list style="symbols">
  <t>As part of a larger document that provides authenticity guarantees, such as within a <spanx style="verb">measurements</spanx> claim in an Entity Attestation Token (EAT, <xref section="4.2.16" sectionFormat="of" target="RFC9711"/>).</t>
  <t>As the payload of a message transmitted over a communication security protocol, such as DTLS <xref target="RFC9147"/>.</t>
  <t>Encapsulated within a secure container, such as a COSE structure. In the case of COSE, the container <bcp14>MUST</bcp14> be either a <spanx style="verb">COSE_Encrypt0</spanx> or <spanx style="verb">COSE_Sign1</spanx> structure. The SUIT_Report <bcp14>MUST</bcp14> be the sole payload, as illustrated by the CDDL fragment below.</t>
</list></t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Report_Protected /= SUIT_Report_COSE_Sign1 \
                         .and SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_Sign1_Tagged \
                         .and SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0 \
                         .and SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0_Tagged \
                         .and SUIT_COSE_Profiles

SUIT_Report_COSE_Sign1_Tagged = #6.18(SUIT_Report_COSE_Sign1)
SUIT_Report_COSE_Sign1 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    signature : bstr
]
SUIT_Report_COSE_MAC0_Tagged = #6.17(SUIT_Report_COSE_MAC0)
SUIT_Report_COSE_MAC0 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    tag : bstr
]
SUIT_Report_Unprotected = SUIT_Report / SUIT_Report_COSE_Encrypt0
SUIT_Report_COSE_Encrypt0 = COSE_Encrypt0
]]></sourcecode></figure>

<t>Note that SUIT_Report_COSE_Sign1 and SUIT_Report_COSE_MAC0 <bcp14>MUST</bcp14> be combined with a SUIT_COSE_Profiles from <xref target="I-D.ietf-suit-mti"/> using the CDDL .and directive. The SUIT_Report_COSE_Encrypt0 carries a ciphertext payload that <bcp14>MUST</bcp14> contain just the ciphertext obtained by encrypting the following CDDL:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Report_plaintext = bstr .cbor SUIT_Report
]]></sourcecode></figure>

<t>SUIT_COSE_Profiles, which use AES-CTR encryption, are not integrity protected and authenticated. For this purpose, SUIT_Report_Protected defines authenticated containers with an encrypted payload.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<t>IANA is requested to rename the overall SUIT registry group (https://www.iana.org/assignments/suit/suit.xhtml) "Software Update for the Internet of Things (SUIT)".</t>

<t>IANA is requested to allocate a CBOR tag for each of the following items. Please see <xref target="cbor-tag"/> for further details.</t>

<t><list style="symbols">
  <t>SUIT_Report_Protected</t>
  <t>SUIT_Reference</t>
  <t>SUIT_Capability_Report</t>
</list></t>

<t>IANA is requested to allocate a CoAP content-format <xref target="RFC7252"/> and a media-type for SUIT_Report <xref target="media-type"/>. Please see <xref target="media-type"/> and <xref target="coap-cf"/> for further details.</t>

<t>IANA is also requested to add the following registries to the SUIT registry group (https://www.iana.org/assignments/suit/suit.xhtml).</t>

<t><list style="symbols">
  <t>SUIT_Report Elements <xref target="iana-suit-report-elements"/></t>
  <t>SUIT_Record Elements <xref target="iana-suit-record-elements"/></t>
  <t>SUIT_Report Reasons <xref target="iana-suit-report-reasons"/></t>
  <t>SUIT_Capability_Report Elements <xref target="iana-suit-capability-report"/></t>
</list></t>

<t>For each of these registries, registration policy is:</t>

<t><list style="symbols">
  <t>-256 to 255: Standards Action With Expert Review</t>
  <t>-65536 to -257, 256 to 65535: Specification Required</t>
  <t>-4294967296 to -65537, 65536 to 4294967295: First Come First Served</t>
</list></t>

<t>Requests in the Standards Action and Specification Required ranges <bcp14>MUST</bcp14>
undergo designated expert review as described below; this guidance supplements
the normal IANA processing for those policies.</t>

<section anchor="expert-review-instructions"><name>Expert Review Instructions</name>

<t>The IANA registries established in this document allow values to be added based on expert review. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason, so they should be given substantial latitude.</t>

<t>Expert reviewers should take into consideration the following points:</t>

<t><list style="symbols">
  <t>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments. The zones tagged as private use are intended for testing purposes and closed environments; code points in other ranges should not be assigned for testing.</t>
  <t>Specifications are required for the standards track range of point assignment. Specifications should exist for all other ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</t>
  <t>Experts should take into account the expected usage of fields when approving point assignment. The fact that there is a range for standards track documents does not mean that a standards track document cannot have points assigned outside of that range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
</list></t>

</section>
<section anchor="media-type"><name>Media Type Registration</name>

<section anchor="applicationsuit-reportcose"><name>application/suit-report+cose</name>

<t>IANA is requested to register application/suit-report+cose as a media type for the SUIT_Report.</t>

<dl spacing="compact">
  <dt>Type name:</dt>
  <dd>
    <t>application</t>
  </dd>
  <dt>Subtype name:</dt>
  <dd>
    <t>suit-report+cose</t>
  </dd>
  <dt>Required parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Optional parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Encoding considerations:</dt>
  <dd>
    <t>binary (CBOR)</t>
  </dd>
  <dt>Security considerations:</dt>
  <dd>
    <t><xref target="seccons"/> of &SELF;</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>SUIT Reports are encoded as CBOR and optionally wrapped in any COSE structure (e.g., COSE_Sign1, COSE_Mac0, COSE_Encrypt0). Receivers must be able to identify and process the COSE envelope used and support compatible COSE algorithms for validation or decryption. All versioning and structure are self-describing within the CBOR SUIT_Report format, and no media-type parameters are used for negotiation. Interoperability therefore depends on shared deployment profiles that specify the expected COSE protections and algorithms. Comprehension of a SUIT Report is dependent on obtaining a matching SUIT Manifest. The structure is effectively opaque if the matching SUIT Manifest cannot be sourced.</t>
  </dd>
  <dt>Published specification:</dt>
  <dd>
    <t>&SELF;</t>
  </dd>
  <dt>Applications that use this media type:</dt>
  <dd>
    <t>SUIT Manifest Processor, SUIT Manifest Distributor, SUIT Manifest Author, RATS Attesters, RATS Verifiers</t>
  </dd>
  <dt>Fragment identifier considerations:</dt>
  <dd>
    <t>The syntax and semantics of fragment identifiers are as specified for "application/cose".</t>
  </dd>
  <dt>Person &amp; email address to contact for further information:</dt>
  <dd>
    <t>SUIT WG mailing list (suit@ietf.org)</t>
  </dd>
  <dt>Intended usage:</dt>
  <dd>
    <t>COMMON</t>
  </dd>
  <dt>Restrictions on usage:</dt>
  <dd>
    <t>none</t>
  </dd>
  <dt>Author/Change controller:</dt>
  <dd>
    <t>IETF</t>
  </dd>
  <dt>Provisional registration:</dt>
  <dd>
    <t>no</t>
  </dd>
</dl>

</section>
</section>
<section anchor="coap-cf"><name>CoAP Content-Format Registration</name>

<t>IANA is requested to assign a CoAP Content-Format ID for the SUIT_Report media type in the "CoAP Content-Formats" registry, from the "IETF Review with Expert Review or IESG Approval with Expert Review" space (256..9999), within the "CoRE Parameters" registry group <xref target="RFC7252"/> <xref target="IANA.core-parameters"/>:</t>

<texttable>
      <ttcol align='left'>Content Type</ttcol>
      <ttcol align='left'>Content Coding</ttcol>
      <ttcol align='left'>ID</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>application/suit-report+cose</c>
      <c>&#160;</c>
      <c>TBA</c>
      <c>&SELF;</c>
</texttable>

</section>
<section anchor="cbor-tag"><name>CBOR Tag Registration</name>

<t>IANA is requested to allocate a tag in the "CBOR Tags" registry <xref target="IANA.cbor-tags"/>, preferably in the Specification Required range:</t>

<texttable>
      <ttcol align='left'>Tag</ttcol>
      <ttcol align='left'>Data Item</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c>TBA</c>
      <c>array</c>
      <c>SUIT_Report_Protected</c>
      <c>TBA</c>
      <c>array</c>
      <c>SUIT_Reference</c>
      <c>TBA</c>
      <c>map</c>
      <c>SUIT_Capability_Report</c>
</texttable>

</section>
<section anchor="iana-suit-report-elements"><name>SUIT_Report Elements</name>

<t>IANA is requested to create a new registry for SUIT_Report Elements.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>2</c>
      <c>Nonce</c>
      <c>suit-report-nonce</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>3</c>
      <c>Records</c>
      <c>suit-report-records</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>4</c>
      <c>Result</c>
      <c>suit-report-result</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>5</c>
      <c>Result Code</c>
      <c>suit-report-result-code</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>6</c>
      <c>Result Record</c>
      <c>suit-report-result-record</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>7</c>
      <c>Result Reason</c>
      <c>suit-report-result-reason</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>8</c>
      <c>Capability Report</c>
      <c>suit-report-capability-report</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>99</c>
      <c>Reference</c>
      <c>suit-reference</c>
      <c><xref target="suit-report"/> of &SELF;</c>
</texttable>

</section>
<section anchor="iana-suit-record-elements"><name>SUIT_Record Elements</name>

<t>IANA is requested to create a new registry for SUIT_Record Elements.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>Manifest ID</c>
      <c>suit-record-manifest-id</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>1</c>
      <c>Manifest Section</c>
      <c>suit-record-manifest-section</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>2</c>
      <c>Section Offset</c>
      <c>suit-record-section-offset</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>3</c>
      <c>Component Index</c>
      <c>suit-record-component-index</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>4</c>
      <c>Record Properties</c>
      <c>suit-record-properties</c>
      <c><xref target="suit-record"/> of &SELF;</c>
</texttable>

</section>
<section anchor="iana-suit-report-reasons"><name>SUIT_Report Reasons</name>

<t>IANA is requested to create a new registry for SUIT_Report Reasons.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>Result OK</c>
      <c>suit-report-reason-ok</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>1</c>
      <c>CBOR Parse Failure</c>
      <c>suit-report-reason-cbor-parse</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>2</c>
      <c>Unsupported COSE Structure or Header</c>
      <c>suit-report-reason-cose-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>3</c>
      <c>Unsupported COSE Algorithm</c>
      <c>suit-report-reason-alg-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>4</c>
      <c>Signature / MAC verification failed</c>
      <c>suit-report-reason-unauthorised</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>5</c>
      <c>Unsupported SUIT Command</c>
      <c>suit-report-reason-command-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>6</c>
      <c>Unsupported SUIT Component</c>
      <c>suit-report-reason-component-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>7</c>
      <c>Unauthorized SUIT Component</c>
      <c>suit-report-reason-component-unauthorised</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>8</c>
      <c>Unsupported SUIT Parameter</c>
      <c>suit-report-reason-parameter-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>9</c>
      <c>Severing Unsupported</c>
      <c>suit-report-reason-severing-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>10</c>
      <c>Condition Failed</c>
      <c>suit-report-reason-condition-failed</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>11</c>
      <c>Operation Failed</c>
      <c>suit-report-reason-operation-failed</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>12</c>
      <c>Invocation Pending</c>
      <c>suit-report-reason-invoke-pending</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
</texttable>

</section>
<section anchor="iana-suit-capability-report"><name> SUIT Capability Report Elements</name>

<t>IANA is requested to create a new registry for SUIT Capability Report Elements.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>1</c>
      <c>Components</c>
      <c>suit-component-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>2</c>
      <c>Commands</c>
      <c>suit-command-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>3</c>
      <c>Parameters</c>
      <c>suit-parameters-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>4</c>
      <c>Cryptographic Algorithms</c>
      <c>suit-crypt-algo-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>5</c>
      <c>Envelope Elements</c>
      <c>suit-envelope-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>6</c>
      <c>Manifest Elements</c>
      <c>suit-manifest-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>7</c>
      <c>Common Elements</c>
      <c>suit-common-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>8</c>
      <c>Text Elements</c>
      <c>suit-text-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>9</c>
      <c>Component Text Elements</c>
      <c>suit-text-component-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>10</c>
      <c>Dependency Capabilities</c>
      <c>suit-dependency-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
</texttable>

</section>
</section>
<section anchor="seccons"><name>Security Considerations</name>

<t>The SUIT_Report serves four primary security objectives:</t>

<t><list style="symbols">
  <t>Validated Identity</t>
  <t>Integrity</t>
  <t>Replay protection</t>
  <t>Confidentiality</t>
</list></t>

<t>The mechanisms for achieving these protections are outlined in <xref target="container"/>.</t>

<t>Ideally, a SUIT_Report <bcp14>SHOULD</bcp14> be conveyed as part of a remote attestation procedure,
such as embeding it in EAT tokens that represent RATS conceptual messages. This approach ensures that the SUIT_Report
is cryptographically bound to the environment (hardware, software, or both) in
which it was generated, thereby strengthening its authenticity.</t>

<t>A SUIT_Report may disclose sensitive information about the device on which it
were produced. In such cases, the SUIT_Report <bcp14>MUST</bcp14> be encrypted, as specified in
<xref target="container"/>.</t>

<t>Furthermore, failure reports, particularly those involving cryptographic operations,
can unintentionally reveal insights into system weaknesses or vulnerabilities. As such,
SUIT_Reports <bcp14>SHOULD</bcp14> be encrypted whenever possible, to minimize the risk of information
leakage.</t>

<t>In addition to these core security requirements, operational considerations must be taken
into account. When a SUIT_Report is included within another protocol message (e.g., inside
an encrypted EAT), care must be taken to avoid inadvertently leaking information and
to uphold the principle of least privilege. For example, in many EAT-based remote attestation flows,
the Verifier may not require the full SUIT_Report. Similarly, the Relying Party might not
need access to it either.</t>

<t>To support least-privilege access, the SUIT_Report should be independently encrypted, even
when the transport or enclosing token is also encrypted. This layered encryption ensures that
only authorized entities can access the contents of the SUIT_Report.</t>

<t>In other scenarios, the EAT Verifier might require full access to a SUIT_Report.
For example, the SUIT_Report must be accessible in its entirety for the EAT Verifier
to extract or convert the SUIT_Report content into specific EAT claims, such as <spanx style="verb">measres</spanx>
(Measurement Results). A typical case
involves translating a successful <spanx style="verb">suit-condition-image</spanx> check into a digest-based claim within
the EAT.</t>

<t>When applying cryptographic protection to the SUIT_Report, the same algorithm profile used for
the corresponding SUIT manifest <bcp14>SHOULD</bcp14> be reused. The available algorithm profiles are detailed
in <xref target="I-D.ietf-suit-mti"/>. If using the same profile is not feasible (e.g., due to constraints
imposed by <spanx style="verb">suit-sha256-hsslms-a256kw-a256ctr</spanx>), then a profile offering comparable security
strength <bcp14>SHOULD</bcp14> be selected—for instance, <spanx style="verb">suit-sha256-esp256-ecdh-a128ctr</spanx>.</t>

<t>In exceptional cases, if no suitable profile can be applied, the necessity of disabling a SUIT_Report functionality altogether might arise.</t>

<t>SUIT_Reports may expose information about the user to the Verifier, Firmware Distributor, or Manifest Author. Implementors <bcp14>MUST</bcp14> carefully consider user consent in the reporting system.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank Dave Thaler for his feedback.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="I-D.ietf-suit-manifest">
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname="Brendan Moran" initials="B." surname="Moran">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
      </author>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Koen Zandberg" initials="K." surname="Zandberg">
         <organization>Inria</organization>
      </author>
      <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day="28" month="May" year="2025"/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an Internet of Things (IoT) device), where to find
   the code/data, the devices to which it applies, and cryptographic
   information protecting the manifest.  Software updates and Trusted
   Invocation both tend to use sequences of common operations, so the
   manifest encodes those sequences of operations, rather than declaring
   the metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-manifest-34"/>
   
</reference>
<reference anchor="RFC9019">
  <front>
    <title>A Firmware Update Architecture for Internet of Things</title>
    <author fullname="B. Moran" initials="B." surname="Moran"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="D. Brown" initials="D." surname="Brown"/>
    <author fullname="M. Meriac" initials="M." surname="Meriac"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
      <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9019"/>
  <seriesInfo name="DOI" value="10.17487/RFC9019"/>
</reference>
<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>
<reference anchor="RFC9711">
  <front>
    <title>The Entity Attestation Token (EAT)</title>
    <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
    <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
    <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
    <author fullname="C. Wallace" initials="C." surname="Wallace"/>
    <date month="April" year="2025"/>
    <abstract>
      <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
      <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9711"/>
  <seriesInfo name="DOI" value="10.17487/RFC9711"/>
</reference>
<reference anchor="RFC8610">
  <front>
    <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="C. Vigano" initials="C." surname="Vigano"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2019"/>
    <abstract>
      <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8610"/>
  <seriesInfo name="DOI" value="10.17487/RFC8610"/>
</reference>
<reference anchor="RFC8792">
  <front>
    <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <author fullname="Q. Wu" initials="Q." surname="Wu"/>
    <date month="June" year="2020"/>
    <abstract>
      <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8792"/>
  <seriesInfo name="DOI" value="10.17487/RFC8792"/>
</reference>
<reference anchor="RFC9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>

<reference anchor="I-D.ietf-suit-mti">
   <front>
      <title>Cryptographic Algorithms for Internet of Things (IoT) Devices</title>
      <author fullname="Brendan Moran" initials="B." surname="Moran">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
         <organization>Nordic Semiconductor</organization>
      </author>
      <author fullname="Akira Tsukamoto" initials="A." surname="Tsukamoto">
         <organization>Openchip &amp; Software Technologies, S.L.</organization>
      </author>
      <date day="22" month="July" year="2025"/>
      <abstract>
	 <t>   The SUIT manifest, as defined in &quot;A Manifest Information Model for
   Firmware Updates in Internet of Things (IoT) Devices&quot; (RFC 9124),
   provides a flexible and extensible format for describing how firmware
   and software updates are to be fetched, verified, decrypted, and
   installed on resource-constrained devices.  To ensure the security of
   these update processes, the manifest relies on cryptographic
   algorithms for functions such as digital signature verification,
   integrity checking, and confidentiality.

   This document defines cryptographic algorithm profiles for use with
   the Software Updates for Internet of Things (SUIT) manifest.  These
   profiles specify sets of algorithms to promote interoperability
   across implementations.

   Given the diversity of IoT deployments and the evolving cryptographic
   landscape, algorithm agility is essential.  This document groups
   algorithms into named profiles to accommodate varying levels of
   device capabilities and security requirements.  These profiles
   support the use cases laid out in the SUIT architecture, published in
   &quot;A Firmware Update Architecture for Internet of Things&quot; (RFC 9019).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-mti-23"/>
   
</reference>
<reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
  <front>
    <title>Concise Binary Object Representation (CBOR) Tags</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
<reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
  <front>
    <title>Constrained RESTful Environments (CoRE) Parameters</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.ietf-suit-trust-domains">
   <front>
      <title>Software Update for the Internet of Things (SUIT) Manifest Extensions for Multiple Trust Domain</title>
      <author fullname="Brendan Moran" initials="B." surname="Moran">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Ken Takayama" initials="K." surname="Takayama">
         <organization>SECOM CO., LTD.</organization>
      </author>
      <date day="22" month="July" year="2025"/>
      <abstract>
	 <t>   A device has more than one trust domain when it enables delegation of
   different rights to mutually distrusting entities for use for
   different purposes or Components in the context of firmware or
   software update.  This specification describes extensions to the
   Software Update for the Internet of Things (SUIT) Manifest format for
   use in deployments with multiple trust domains.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-trust-domains-12"/>
   
</reference>

<reference anchor="I-D.ietf-scitt-architecture">
   <front>
      <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
         <organization>Microsoft Research</organization>
      </author>
      <author fullname="Cedric Fournet" initials="C." surname="Fournet">
         <organization>Microsoft Research</organization>
      </author>
      <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
         <organization>ARM</organization>
      </author>
      <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
      <date day="10" month="October" year="2025"/>
      <abstract>
	 <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
   
</reference>

<reference anchor="I-D.ietf-rats-evidence-trans">
   <front>
      <title>Evidence Transformations</title>
      <author fullname="Fabrizio Damato" initials="F." surname="Damato">
         <organization>AMD</organization>
      </author>
      <author fullname="Andrew Draper" initials="A." surname="Draper">
         <organization>Independent</organization>
      </author>
      <author fullname="Ned Smith" initials="N." surname="Smith">
         <organization>Independent</organization>
      </author>
      <date day="17" month="October" year="2025"/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester to decide if continued
   interaction is warrented.  Evidence structures can vary making
   appraisals challenging for Verifiers.  Verifiers need to understand
   Evidence encoding formats and some of the Evidence semantics to
   appraise it.  Consequently, Evidence may require format
   transformation to an internal representation that preserves original
   semantics.  This document specifies Evidence transformation methods
   for DiceTcbInfo, concise evidence, and SPDM measurements block
   structures.  These Evidence structures are converted to the CoRIM
   internal representation and follow CoRIM defined appraisal
   procedures.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-evidence-trans-02"/>
   
</reference>
<reference anchor="RFC9124">
  <front>
    <title>A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices</title>
    <author fullname="B. Moran" initials="B." surname="Moran"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <date month="January" year="2022"/>
    <abstract>
      <t>Vulnerabilities with Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism that is also suitable for constrained devices. Ensuring that devices function and remain secure over their service lifetime requires such an update mechanism to fix vulnerabilities, update configuration settings, and add new functionality.</t>
      <t>One component of such a firmware update is a concise and machine-processable metadata document, or manifest, that describes the firmware image(s) and offers appropriate protection. This document describes the information that must be present in the manifest.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9124"/>
  <seriesInfo name="DOI" value="10.17487/RFC9124"/>
</reference>
<reference anchor="RFC9147">
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9147"/>
  <seriesInfo name="DOI" value="10.17487/RFC9147"/>
</reference>
<reference anchor="RFC7252">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>



    </references>

</references>


<?line 818?>

<section anchor="full-cddl"><name>Full CDDL</name>
<t>In order to create a valid SUIT_Report document the structure of the corresponding CBOR message <bcp14>MUST</bcp14> adhere to the following CDDL (<xref target="RFC8610"/>) data definition.</t>

<t>To be valid, the following CDDL <bcp14>MUST</bcp14> have the COSE CDDL appended to it. The COSE CDDL can be obtained by following the directions in <xref section="1.4" sectionFormat="of" target="RFC9052"/>. It must also have the CDDL from <xref target="I-D.ietf-suit-mti"/> appended to it. This CDDL is line-wrapped per <xref target="RFC8792"/>.</t>

<figure><sourcecode type="CDDL"><![CDATA[
; NOTE: '\' line wrapping per RFC 8792
=============== NOTE: '\' line wrapping per RFC 8792 ================

SUIT_Report_Tool_Tweak /= SUIT_start
SUIT_Report_Tool_Tweak /= SUIT_Report_Protected
SUIT_Report_Protected /= SUIT_COSE_tool_tweak

SUIT_Report_Protected /= SUIT_Report_COSE_Sign1 .and \
                                                   SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_Sign1_Tagged .and \
                                                   SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0 .and \
                                                   SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0_Tagged .and \
                                                   SUIT_COSE_Profiles

SUIT_Report_COSE_Sign1_Tagged = #6.18(SUIT_Report_COSE_Sign1)
SUIT_Report_COSE_Sign1 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    signature : bstr
]
SUIT_Report_COSE_MAC0_Tagged = #6.17(SUIT_Report_COSE_MAC0)
SUIT_Report_COSE_MAC0 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    tag : bstr
]
SUIT_Report_Unprotected = SUIT_Report / SUIT_Report_COSE_Encrypt0
SUIT_Report_COSE_Encrypt0 = COSE_Encrypt0

SUIT_Report = {
  suit-reference              => SUIT_Reference,
  ? suit-report-nonce         => bstr,
  suit-report-records         => [
    * SUIT_Record / system-property-claims ],
  suit-report-result          => true / {
    suit-report-result-code   => int,
    suit-report-result-record => SUIT_Record,
    suit-report-result-reason => SUIT_Report_Reasons,
  },
  ? suit-report-capability-report => SUIT_Capability_Report,
  $$SUIT_Report_Extensions
}

SUIT_Reference = [
    suit-report-manifest-uri : tstr,
    suit-report-manifest-digest : SUIT_Digest
]

SUIT_Record = [
    suit-record-manifest-id        : [* uint ],
    suit-record-manifest-section   : int,
    suit-record-section-offset     : uint,
    suit-record-component-index    : uint,
    suit-record-properties         : {*$$SUIT_Parameters},
    $$SUIT_Record_Extensions
]

system-property-claims = {
  system-component-id => SUIT_Component_Identifier,
  + $$SUIT_Parameters,
}

SUIT_Capability_Report = {
  suit-component-capabilities  => [+ SUIT_Component_Capability]
  suit-command-capabilities          => [+ int],
  suit-parameters-capabilities       => [+ int],
  suit-crypt-algo-capabilities       => [+ int],
  ? suit-envelope-capabilities       => [+ int],
  ? suit-manifest-capabilities       => [+ int],
  ? suit-common-capabilities         => [+ int],
  ? suit-text-capabilities           => [+ int],
  ? suit-text-component-capabilities => [+ int],
  ? suit-dependency-capabilities     => [+ int],
  * [+int]                           => [+ int],
  $$SUIT_Capability_Report_Extensions
}

SUIT_Component_Capability = [*bstr,?true]

suit-report-nonce = 2
suit-report-records = 3
suit-report-result = 4
suit-report-result-code = 5
suit-report-result-record = 6
suit-report-result-reason = 7
suit-report-capability-report = 8
suit-reference = 99

system-component-id = 0

suit-record-manifest-id = 0
suit-record-manifest-section = 1
suit-record-section-offset = 2
suit-record-component-index = 3
suit-record-properties = 4

SUIT_Report_Reasons /= suit-report-reason-ok
SUIT_Report_Reasons /= suit-report-reason-cbor-parse
SUIT_Report_Reasons /= suit-report-reason-cose-unsupported
SUIT_Report_Reasons /= suit-report-reason-alg-unsupported
SUIT_Report_Reasons /= suit-report-reason-unauthorised
SUIT_Report_Reasons /= suit-report-reason-command-unsupported
SUIT_Report_Reasons /= suit-report-reason-component-unsupported
SUIT_Report_Reasons /= suit-report-reason-component-unauthorised
SUIT_Report_Reasons /= suit-report-reason-parameter-unsupported
SUIT_Report_Reasons /= suit-report-reason-severing-unsupported
SUIT_Report_Reasons /= suit-report-reason-condition-failed
SUIT_Report_Reasons /= suit-report-reason-operation-failed
SUIT_Report_Reasons /= suit-report-reason-invoke-pending

suit-report-reason-ok = 0
suit-report-reason-cbor-parse = 1
suit-report-reason-cose-unsupported = 2
suit-report-reason-alg-unsupported = 3
suit-report-reason-unauthorised = 4
suit-report-reason-command-unsupported = 5
suit-report-reason-component-unsupported = 6
suit-report-reason-component-unauthorised = 7
suit-report-reason-parameter-unsupported = 8
suit-report-reason-severing-unsupported = 9
suit-report-reason-condition-failed = 10
suit-report-reason-operation-failed = 11
suit-report-reason-invoke-pending = 12

suit-component-capabilities        = 1
suit-command-capabilities          = 2
suit-parameters-capabilities       = 3
suit-crypt-algo-capabilities       = 4
suit-envelope-capabilities         = 5
suit-manifest-capabilities         = 6
suit-common-capabilities           = 7
suit-text-capabilities             = 8
suit-text-component-capabilities   = 9
suit-dependency-capabilities       = 10
  
]]></sourcecode></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

