<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-epoch-markers-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-epoch-markers-04"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <postal>
          <country>Switzerland</country>
        </postal>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="I." surname="Mihalcea" fullname="Ionuț Mihalcea">
      <organization>Arm</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>ionut.mihalcea@arm.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="18"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 104?>

<t>This document defines Epoch Markers as a means to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system known as the Epoch Bell.
Systems receiving Epoch Markers do not need to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a specific Epoch Marker establishes a new epoch that is shared among all recipients.
This document defines Epoch Marker types, including CBOR time tags, RFC 3161 TimeStampToken, and nonce-like structures.
It also defines a CWT Claim to embed Epoch Markers in RFC 8392 CBOR Web Tokens, which serve as vehicles for signed protocol messages.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <?line 113?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="RFC9334"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in distributed systems.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Actors in a system that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock, with these ticks being conveyed over the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.
This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "Epoch ID" values are defined as Epoch Marker types in this document to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While most Epoch Markers types are encoded in CBOR <xref target="STD94"/>, and many of the Epoch ID types are themselves encoded in CBOR, a prominent format in this space is the TimeStampToken (TST) defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
TSTs are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an Epoch ID type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp or the start of a new freshness epoch, respectively, and therefore other Epoch Marker types.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The default top-level structure of Epoch Markers described in this document is CBOR Web Tokens (CWT) <xref target="RFC8392"/>.
The present document specifies an extensible set of Epoch Marker types, along with the <tt>em</tt> CWT claim to include them in CWTs.
CWTs are signed using COSE <xref target="STD96"/> and benefit from wide tool support.
However, CWTs are not the only containers in which Epoch Markers can be embedded.
Epoch Markers can be included in any type of message that allows for the embedding of opaque bytes or CBOR data items.
Examples include the Collection CMW in <xref target="I-D.ietf-lamps-csr-attestation"/>, Evidence formats such as <xref target="TCG-CoEvidence"/> or <xref target="I-D.ietf-rats-eat"/>, Attestation Results formats such as <xref target="I-D.ietf-rats-ar4si"/>, or the CWT Claims Header Parameter of <xref target="I-D.ietf-scitt-architecture"/>.</t>
      <t>Epoch markers can be used in the following ways:</t>
      <ul spacing="normal">
        <li>
          <t>as embeddings in other data formats</t>
        </li>
        <li>
          <t>as information elements in protocols</t>
        </li>
        <li>
          <t>in systems that integrate the aforementioned protocols or data formats</t>
        </li>
        <li>
          <t>in the deployment of such systems</t>
        </li>
      </ul>
      <t>All of these can be considered "users" of Epoch Markers and will be referred to as entities "using Epoch Markers” throughout the document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document makes use of the following terms from other documents:</t>
        <ul spacing="normal">
          <li>
            <t>"conceptual messages" as defined in <xref section="8" sectionFormat="of" target="RFC9334"/></t>
          </li>
          <li>
            <t>"freshness" and "epoch" as defined in <xref section="10" sectionFormat="of" target="RFC9334"/></t>
          </li>
          <li>
            <t>"handle" as defined in <xref section="6" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
          </li>
          <li>
            <t>"Time-Stamp Authority" as defined by <xref target="RFC3161"/></t>
          </li>
        </ul>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use the CBOR Extended Diagnostic Notation (EDN, <xref target="I-D.ietf-cbor-edn-literals"/>).</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in <xref section="10.3" sectionFormat="of" target="RFC9334"/> (the RATS architecture).</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models <xref target="I-D.ietf-rats-reference-interaction-models"/>.
In general, there are three major interaction models used in remote attestation:</t>
      <ul spacing="normal">
        <li>
          <t>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to <xref section="7.1" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
        <li>
          <t>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to <xref section="7.2" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
        <li>
          <t>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to <xref section="7.3" sectionFormat="of" target="I-D.ietf-rats-reference-interaction-models"/></t>
        </li>
      </ul>
      <t>In all three interaction models, Epoch Markers can be used as content for the generic information element <tt>handle</tt> as introduced by <xref target="I-D.ietf-rats-reference-interaction-models"/>.
Handles are used to establish freshness in ad-hoc, unsolicited, and solicited distribution mechanisms of an Epoch Bell.
For example, an Epoch Marker can be used as a nonce in challenge-response remote attestation (e.g., for limiting the number of ad-hoc requests by a Verifier).
If embedded in a CWT, an Epoch Marker can be used as a <tt>handle</tt> by extracting the value of the <tt>em</tt> Claim or by using the complete CWT including an <tt>em</tt> Claim (e.g., functioning as a signed time-stamp token).
Using an Epoch Marker requires the challenger to acquire an Epoch Marker beforehand, which may introduce a sensible overhead compared to using a simple nonce.</t>
      <t>When an Epoch Marker is used as the <tt>handle</tt> in the Passport or Background-Check challenge-response flows defined by <xref target="I-D.ietf-rats-reference-interaction-models"/>, the Verifier <bcp14>MUST</bcp14> follow the relevant Epoch Marker validation and acceptance policy.
That policy <bcp14>MUST</bcp14> fulfil the applicable requirements presented in this document, such as accepted epoch windows, replay or rollback detection state, and deployment-specific skew introduced by the Evidence path.</t>
      <t>For Background-Check, the policy <bcp14>MUST</bcp14> account for the additional path through the Relying Party before Evidence reaches the Verifier.
For Passport, any Attestation Result derived from such Evidence <bcp14>MUST</bcp14> remain bound to the Epoch Marker, or to the <tt>handle</tt> containing it, so that subsequent freshness decisions can be made according to Relying Party policy.</t>
    </section>
    <section anchor="sec-epoch-markers">
      <name>Epoch Marker Structure</name>
      <t>This section specifies the structure of Epoch Marker types using CDDL <xref target="RFC8610"/> and illustrates their usage and relationship with other IETF work (e.g, <xref target="RFC3161"/>) where applicable.
In general, Epoch Markers are intended to be conveyed securely, e.g., by being included in a signed data structure, such as a CBOR Web Token (CWT), or by being sent via a secure channel.
The specification of such "outer" structures and protocols and the means how to secure them is beyond the scope of this document.
This document defines the different types of Epoch Markers in <xref target="sec-iana-cbor-tags"/>.
When the media type <tt>application/epoch-marker+cbor</tt> is used to label content as an Epoch Marker, the <tt>em-type</tt> media type parameter can optionally specify the Epoch Marker type by referencing its CBOR tag number.
For example, an Epoch Marker can be used to construct a CBOR-based trusted time stamp token, similar in function to a <xref target="RFC3161"/> TimeStampToken, using CWT and the <tt>em</tt> Claim defined in this document (see <xref target="fig-ex-2"/> for an illustration).
The value(s) that an Epoch Marker represents are intended to demonstrate freshness of messages and protocols, but they can also serve other purposes in cases where trusted timestamps or time intervals are required.
Taken as an opaque value, it is possible to use Epoch Markers as values for a nonce field in existing data structures or protocols that already support extra data fields, such as <tt>extraData</tt> in TPMS_ATTEST <xref target="TCG-TPM2"/>.
Similarities in the usage of nonces and Epoch Markers can sometimes lead to applications where both are used in the same interaction, albeit in different places and for different purposes.
One example of such an application scenario is the "nested" use of classical nonces and Epoch Markers, whereby an Epoch Marker is requested to be used as a nonce value for a specific data structure, while a locally generated nonce is used to retrieve that Epoch Marker via an "outer" ad hoc interaction (e.g., nonce retrieval protocols that interact with an Epoch Bell to fetch an Epoch Marker to be used as a nonce).
As some Epoch Marker types represent certain timestamp variants, these Epoch Markers or the secure conveyance method they are used in do not necessarily have a hard-coded message imprint, as is always the case with <xref target="RFC3161"/> TimeStampTokens.
This means that not all Epoch Marker types support binding a message to an Epoch Marker (unlike the example in <xref target="fig-ex-2"/>.</t>
      <t>The following Epoch Marker types are defined in this document:</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker types (tag numbers 2698x are suggested, not yet allocated)</name>
        <sourcecode type="cddl"><![CDATA[
epoch-marker = $tagged-epoch-id

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-time
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(epoch-tick)
$tagged-epoch-id /= #6.26983(epoch-tick-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
$tagged-epoch-id /= #6.26985(epoclet)
]]></sourcecode>
      </figure>
      <figure anchor="fig-epoch-marker-cwt">
        <name>Epoch Marker as a CWT Claim (CWT claim number 2000 is suggested, not yet allocated)</name>
        <sourcecode type="cddl"><![CDATA[
$$Claims-Set-Claims //= (&(em: 2000) => epoch-marker)
]]></sourcecode>
      </figure>
      <section anchor="epoch-payloads">
        <name>Epoch Marker Types</name>
        <t>This section specifies the Epoch Marker types listed in <xref target="fig-epoch-marker-cddl"/>.</t>
        <section anchor="sec-cbor-time">
          <name>CBOR Time Tags</name>
          <t>CBOR Time Tags are CBOR time representations choosing from CBOR tag 0 (<tt>tdate</tt>, RFC3339 time as a string), tag 1 (<tt>time</tt>, POSIX time as int or float), or tag 1001 (extended time data item).</t>
          <sourcecode type="cddl"><![CDATA[
cbor-time = tdate / time / etime

;# import etime from rfc9581
]]></sourcecode>
          <t>The CBOR Time Tag represents a freshly sourced timestamp represented as either <tt>time</tt> or <tt>tdate</tt>
(Sections <xref target="RFC8949" section="3.4.2" sectionFormat="bare"/> and <xref target="RFC8949" section="3.4.1" sectionFormat="bare"/> of RFC 8949 <xref target="STD94"/>, <xref section="D" sectionFormat="of" target="RFC8610"/>), or <tt>etime</tt> (<xref section="3" sectionFormat="of" target="RFC9581"/>).
The <tt>etime</tt> rule shown in the CDDL above is imported from <xref section="6" sectionFormat="of" target="RFC9581"/>; RFC 9581 remains the authoritative specification of CBOR tag 1001, and this document neither updates nor redefines it.
This document merely profiles <tt>etime</tt> for use with Epoch Markers.</t>
          <section anchor="creation">
            <name>Creation</name>
            <t>To generate the cbor-time value, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-time-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="cddl"><![CDATA[
classical-rfc3161-TST-info = bytes
]]></sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl newline="true">
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The DER-encoded TSTInfo generated by a <xref target="RFC3161"/> Time Stamping Authority.</t>
            </dd>
          </dl>
          <section anchor="creation-1">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as MessageImprint in its request to the TSA:</t>
            <sourcecode type="asn.1"><![CDATA[
SEQUENCE {
  SEQUENCE {
    OBJECT      2.16.840.1.101.3.4.2.1 (sha256)
    NULL
  }
  OCTET STRING
    BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F
}
]]></sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
            <t>The TimeStampToken obtained from the TSA <bcp14>MUST</bcp14> be stripped of the TSA signature.
Only the TSTInfo is to be kept the rest <bcp14>MUST</bcp14> be discarded.
The Epoch Bell COSE signature will replace the TSA signature.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical <xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="cddl"><![CDATA[
TST-info-based-on-CBOR-time-tag = {
  &(version : 0) => v1
  &(policy : 1) => oid
  &(messageImprint : 2) => MessageImprint
  &(serialNumber : 3) => integer
  &(eTime : 4) => profiled-etime
  ? &(ordering : 5) => bool .default false
  ? &(nonce : 6) => integer
  ? &(tsa : 7) => GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 => ~time
  ? -8 => profiled-duration
  * int => any
}
profiled-duration = {* int => any}

GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]
; See Section 4.2.1.6 of RFC 5280 for type/value
]]></sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's policy under which the tst-info was produced.
Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.
Cf. messageImprint, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.
Cf. serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.
Cf. genTime, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="RFC9581"/>, indicated by CBOR tag 1001.
A separate tag is unnecessary because the profiled form remains an <tt>etime</tt> item carried with tag 1001.
RFC 9581 defines tag 1001 and its semantics; this document constrains one valid <tt>etime</tt> shape for Epoch Markers but does not introduce a new CBOR tag or alter the definition of <tt>etime</tt>.
The resulting <tt>profiled-etime</tt> remains a subset/profile of <tt>etime</tt> encoded with tag 1001 and is defined as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>
              <t>The "base time" is encoded using key 1, indicating POSIX time as int or float, to align the profile with the baseline representation defined in <xref target="RFC9581"/>.</t>
            </li>
            <li>
              <t>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time". The duration map
is profiled to disallow string keys. This is an optional field specialized to the needs of this profile.</t>
            </li>
            <li>
              <t>The map <bcp14>MUST</bcp14> include key 1 and <bcp14>MAY</bcp14> include additional negative integer keys, which can be used to encode supplementary information.
Unsigned integer keys, including 4, 5, and the keys in the $$ETIME-CRITICAL group choice, <bcp14>MUST NOT</bcp14> be used, unless the emitter wants to ensure that only implementations that understand the critical key interoperate.</t>
            </li>
          </ul>
          <t>Fixing key 1 for the base time and profiling key -8 provide a consistent shape for the profiled <tt>etime</tt> maps consumed by Epoch Markers without changing the meaning of the corresponding keys in <xref target="RFC9581"/>.
Key 1 is pinned so all profiled <tt>etime</tt> values share the same base-time representation, and key -8 is specialized to carry the accuracy bound expected by the TSA-style timestamps used here.
The permissive <tt>* int =&gt; any</tt> entry remains to allow other members defined by <xref target="RFC9581"/> and future extensions; implementations still rely on <xref target="RFC9581"/> for the full semantics and validation of <tt>etime</tt> beyond the constraints listed here.</t>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely based on the "base time".
This is an optional field, whose default value is "false".
Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.
Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint in identifying the name of the TSA.
Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data format.
Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.
Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
          <section anchor="creation-2">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as messageImprint in its request to the TSA:</t>
            <sourcecode type="cbor-diag"><![CDATA[
[
    / hashAlg   / -16, / sha-256 /
    / hashValue / h'BF4EE9143EF2329B1B778974AAD44506
                    4940B9CAE373C9E35A7B23361282698F'
]
]]></sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick">
          <name>Epoch Tick</name>
          <t>An Epoch Tick is a single opaque blob sent to multiple consumers.</t>
          <sourcecode type="cddl"><![CDATA[
; Epoch-Tick

epoch-tick = tstr / bstr / int
]]></sourcecode>
          <t>The following describes the epoch-tick type.</t>
          <dl newline="true">
            <dt>epoch-tick:</dt>
            <dd>
              <t>Either a string, a byte string, or an integer used by RATS roles within a trust domain as extra data (<tt>handle</tt>) included in conceptual messages <xref target="RFC9334"/>. Similarly to the use of nonces, this allows the conceptual messages to be associated with a certain epoch. However, unlike nonces (which require uniqueness), Epoch Markers can be used in multiple interactions by every consumer involved.</t>
            </dd>
          </dl>
          <section anchor="creation-3">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick-list">
          <name>Epoch Tick List</name>
          <t>A list of Epoch Ticks sent to multiple consumers.
The consumers use each Epoch Tick in the list sequentially.
Similarly to the use of nonces, this allows each interaction to be associated with a certain epoch. However, unlike nonces (which require uniqueness), Epoch Markers can be used in multiple interactions by every consumer involved.</t>
          <sourcecode type="cddl"><![CDATA[
; Epoch-Tick-List

epoch-tick-list = [ + epoch-tick ]
]]></sourcecode>
          <t>The following describes the Epoch Tick List type.</t>
          <dl newline="true">
            <dt>epoch-tick-list:</dt>
            <dd>
              <t>A sequence of byte strings used by RATS roles in trust domain as extra data (<tt>handle</tt>) in the generation of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch.
Each Epoch Tick in the list is used in a consecutive generation of a conceptual message.
Asserting freshness of a conceptual message including an Epoch Tick from the epoch-tick-list requires some state on the receiver side to assess if that Epoch Tick is the appropriate next unused Epoch Tick from the epoch-tick-list.</t>
            </dd>
          </dl>
          <section anchor="creation-4">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
          <section anchor="usage">
            <name>Usage</name>
            <t>Proving freshness requires receiver-side state to identify the “next unused” tick.
Systems using Epoch Tick lists <bcp14>SHOULD</bcp14> define how missing/out-of-order ticks are handled and how resynchronization occurs, as per <xref target="sec-state-seq-mgmt"/>.</t>
          </section>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch Bell.</t>
          <sourcecode type="cddl"><![CDATA[
strictly-monotonic-counter = uint
]]></sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl newline="true">
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
          <section anchor="usage-1">
            <name>Usage</name>
            <t>Systems that use Epoch Markers <bcp14>SHOULD</bcp14> follow the guidance in <xref target="sec-state-seq-mgmt"/> in establishing an Epoch Marker acceptance policy for receivers.
To prove freshness, receivers <bcp14>SHOULD</bcp14> track the highest accepted counter and ensure it fulfills the acceptance policy.</t>
          </section>
        </section>
        <section anchor="sec-epoclet">
          <name>Epoclet</name>
          <t>In a highly available service (e.g., a cloud attestation Verifier), maintaining per-session nonce state can cause scalability issues.
One alternative is to use time-synchronized servers that share a symmetric key and produce and consume nonces based on epoch ticks signed using the shared secret.
This means that a nonce minted by one server can be processed by any other server, avoiding the need for session "stickiness".</t>
          <t>An <tt>epoclet</tt> is an Epoch ID variant that supports the above use case by encoding a POSIX time (i.e., the epoch identifier) alongside a minimal set of metadata.
This is all authenticated with a symmetric key in a self-contained and compact token that fits within 64 bytes.
This makes it easy to use with common Evidence retrieval ABIs, which tend to limit the size of the challenge parameter to 64 bytes.</t>
          <sourcecode type="cddl"><![CDATA[
epoclet = [
  TimeToken
  AuthTag: bytes .size 32
]

TimeToken = [
  KeyID: bytes .size 1
  Timestamp: ~posix-time
  Pad: bytes .size (0..20)
]

posix-time = #6.1(int)
]]></sourcecode>
          <t>The following describes the <tt>epoclet</tt> type.</t>
          <dl newline="true">
            <dt>KeyID:</dt>
            <dd>
              <t>A one-byte opaque identifier that is shared across the server pool.
It is used to identify the key used to compute the AuthTag.
Its interpretation is deployment-specific.</t>
            </dd>
            <dt>Timestamp:</dt>
            <dd>
              <t>The time associated with the current epoch encoded as the CBOR tag for POSIX time.
It <bcp14>MUST</bcp14> use the int format.
The CBOR tag <bcp14>MUST</bcp14> be removed.
Note that this encoding restricts the granularity of this Epoch ID to one second.</t>
            </dd>
            <dt>Pad:</dt>
            <dd>
              <t>Zero or more (up to 20) bytes of padding.
This field is used to adjust the overall size of the <tt>epoclet</tt>, ranging from a minimum of 44 bytes (0 bytes of padding) to a maximum of 64 bytes (20 bytes of padding).
The padding bytes can assume any value.</t>
            </dd>
            <dt>AuthTag:</dt>
            <dd>
              <t>32 bytes string which is the result of applying HMAC <xref target="RFC2104"/> with SHA-256 over the CBOR serialization of the TimeToken array.
The serialization <bcp14>MUST</bcp14> use the CBOR deterministic encoding as specified in Section <xref target="RFC8949" section="4.2" sectionFormat="bare"/> of RFC 8949 <xref target="STD94"/>.</t>
            </dd>
          </dl>
          <section anchor="usage-2">
            <name>Usage</name>
            <t>The same size limit defined in <xref target="sec-nonce-reqs"/> applies: an encoded <tt>epoclet</tt> <bcp14>MUST</bcp14> be no more than 64 bytes in length.</t>
            <t>The requirements in <xref target="sec-time-reqs"/> apply.
Furthermore, when used in a server farm, the clocks of the servers that participate in the protocol <bcp14>MUST</bcp14> be synchronized.</t>
            <t>It is <bcp14>RECOMMENDED</bcp14> that the handling (i.e., storage, replication and rotation) of the symmetric key used to generate the authentication tag follows the recommendations and best practices described in <xref target="NIST-SP-800-pt2"/>.</t>
          </section>
        </section>
      </section>
      <section anchor="sec-time-reqs">
        <name>Time Requirements</name>
        <t>Time <bcp14>MUST</bcp14> be sourced from a trusted clock (see <xref section="10.1" sectionFormat="of" target="RFC9334"/>).</t>
      </section>
      <section anchor="sec-nonce-reqs">
        <name>Nonce Requirements</name>
        <t>A nonce value used in a protocol or message to retrieve an Epoch Marker <bcp14>MUST</bcp14> be freshly generated.
The generated value <bcp14>MUST</bcp14> have at least 64 bits of entropy (before encoding).
The generated value <bcp14>MUST</bcp14> be generated via a cryptographically secure random number generator.</t>
        <t>A maximum nonce size of 512 bits is set to limit the memory requirements.
All receivers <bcp14>MUST</bcp14> be able to accommodate the maximum size.</t>
      </section>
      <section anchor="sec-state-seq-mgmt">
        <name>State and Sequencing Management</name>
        <t>Data structures containing Epoch Markers could be reordered in-flight even without malicious intent, leading to perceived sequencing issues.
Some Epoch Marker types thus require receiver state to detect replay/rollback or establish sequencing.
Systems that use Epoch Markers <bcp14>SHOULD</bcp14> define an explicit acceptance policy (e.g., bounded acceptance window) that accounts for reordering of markers.</t>
        <t>There is a trade-off between keeping a single “global” epoch view versus per-Attester state at the Verifier: global-only policies can exacerbate latency-induced false replay rejections, while per-Attester tracking can be costly.
Systems that use Epoch Markers <bcp14>SHOULD</bcp14> document whether they use global epoch tracking or per-Attester state and, if necessary, the associated window.</t>
      </section>
    </section>
    <section anchor="sec-signature-reqs">
      <name>Signature Requirements</name>
      <t>The signature over an Epoch Marker <bcp14>MUST</bcp14> be generated by the Epoch Bell.
Conversely, applying the first signature to an Epoch Marker always makes the issuer of a signed message containing an Epoch Marker an Epoch Bell.</t>
    </section>
    <section anchor="sec-seccons">
      <name>Security Considerations</name>
      <t>In distributed systems that rely on Epoch Markers for conveyance of freshness, the Epoch Bell plays a significant role in the assumed trust model.
Freshness decisions derived from Epoch Markers depend on the Epoch Bell’s key(s) and correct behavior.
If the Epoch Bell key is compromised, or the Bell is malicious/misconfigured, an attacker can emit valid-looking “fresh” Epoch Markers.
System deployments using Epoch Markers generally need to protect Bell signing keys (secure storage, rotation, revocation) and scope acceptance to the intended trust domain (e.g., expected issuer/trust anchor).
Similarly, the Bell's clock needs to be securely sourced and managed, to prevent attacks that skew the Bell's perception of time.</t>
      <section anchor="epoch-signalling-issues">
        <name>Epoch Signalling Issues</name>
        <t><xref section="12.3" sectionFormat="of" target="RFC9334"/> provides a good introduction to attacks on conveyance of Epoch Markers.
A network adversary can replay validly signed Epoch Markers or delay distribution, and differential latency can lead to different parties having different views of the “current” epoch.</t>
        <t>The epoch (acceptable window) duration is an operational security parameter: if too long, an Attester can create “good” Evidence in a good state and release it later while the epoch is still acceptable (notably for epoch-tick, epoch-tick-list, and strictly-monotonic-counter); if too short, distant Attesters may be rejected as stale due to latency.
Epoch Markers are also designed to be reusable by multiple consumers, unlike nonces.
Where per-session uniqueness is required, protocols typically need to bind Epoch Markers to an explicit nonce (e.g., see <xref target="sec-epoch-markers"/>).
Finally, system deployments using Epoch Markers are normally required to pin which Epoch Marker types are acceptable for a given trust domain to avoid downgrade.</t>
      </section>
      <section anchor="operational-examples">
        <name>Operational Examples</name>
        <t>The following illustrative cases highlight “reasonable best practice” choices for balancing freshness, replay protection, and scalability.</t>
        <ul spacing="normal">
          <li>
            <t><em>Nonce-bound Bell interaction</em>: When a Verifier uses a nonce challenge to trigger Evidence creation, the Attester can forward that nonce to the Epoch Bell to request an Epoch Marker with the nonce echoed inside.
For reuse and caching, the typical pattern is to keep the marker generic and embed the Verifier nonce alongside the marker in the Evidence: if the Bell signs a nonce-echoed marker, that marker is not reusable across sessions.
The nonce and marker are thus either bound by the Bell's signature, or by the attester's signature on the Evidence.
The Verifier checks that (1) the nonce matches its challenge, (2) the Epoch Marker signature chains to the expected Bell key, and (3) the marker satisfies the acceptance policy (e.g., highest-seen counter or time window).
This pairing gives per-session uniqueness while still allowing Epoch Marker reuse by multiple consumers.</t>
          </li>
          <li>
            <t><em>Long-latency paths (e.g., LoRaWAN or DTN profiles)</em>: High propagation and queuing delays make tight epoch windows brittle.
In system deployments using Epoch Markers, epoch-tick-list can be pre-provisioned to Attesters so that each interaction consumes the next tick, with the Verifier keeping per-Attester sequencing state (<xref target="sec-state-seq-mgmt"/>).
Epoch duration should cover worst-case delivery plus clock skew of the Bell, and acceptance policies should allow an overlap (e.g., current and immediately previous epoch) to absorb in-flight drift while still rejecting replays beyond that window.</t>
          </li>
          <li>
            <t><em>Large fleets sharing a Bell</em>: When many Attesters reuse the same Epoch Marker, per-Attester state at the Verifier may be impractical.
One approach is to accept a global highest-seen epoch (with a bounded replay window) while requiring each Evidence record to bind the Epoch Marker to the Attester identity and, when feasible, a Verifier-provided nonce.
This limits cross-attester replay of a single Epoch Marker while keeping the Bell stateless, which allows Epoch Markers to be cached and enables their broadcast distribution at scale.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR representation of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-epoch-tick"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-epoch-tick-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26985</td>
              <td align="left">array</td>
              <td align="left">an "epoclet"</td>
              <td align="left">
                <xref target="sec-epoclet"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-iana-em-claim">
        <name> New EM CWT Claim</name>
        <t>This specification adds the following value to the "CBOR Web Token Claims" registry <xref target="IANA.cwt"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: em</t>
          </li>
          <li>
            <t>Claim Description: Epoch Marker</t>
          </li>
          <li>
            <t>Claim Key: 2000 (IANA: suggested assignment)</t>
          </li>
          <li>
            <t>Claim Value Type(s): CBOR array</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="sec-epoch-markers"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="new-media-type-applicationepoch-markercbor">
        <name>New Media Type <tt>application/epoch-marker+cbor</tt></name>
        <t>IANA is requested to add the <tt>application/epoch-marker+cbor</tt> media types to the "Media Types" registry <xref target="IANA.media-types"/>, using the following template:</t>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>epoch-marker+cbor</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>no</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t><tt>em-type</tt>: the CBOR tag number that identifies the specific Epoch Marker.
This value is encoded as an unsigned decimal integer, without leading zeroes, except for the actual number 0.
For example, <tt>em-type=26982</tt> identifies an Epoch Tick.</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="sec-seccons"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>RATS Attesters, Verifiers, Endorsers and Reference-Value providers, and Relying Parties that need to transfer Epoch Markers payloads over HTTP(S), CoAP(S), and other transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="new-coap-content-formats">
        <name>New CoAP Content-Formats</name>
        <t>IANA is requested to register the following Content-Format IDs in the "CoAP Content-Formats" registry, within the "Constrained RESTful Environments (CoRE) Parameters" registry group <xref target="IANA.core-parameters"/>:</t>
        <table align="left">
          <name>New CoAP Content Formats</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/epoch-marker+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/epoch-marker+cbor; em-type=0</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">
                <xref target="sec-cbor-time"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/epoch-marker+cbor; em-type=1</td>
              <td align="left">-</td>
              <td align="left">TBD3</td>
              <td align="left">
                <xref target="sec-cbor-time"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/epoch-marker+cbor; em-type=1001</td>
              <td align="left">-</td>
              <td align="left">TBD4</td>
              <td align="left">
                <xref target="sec-cbor-time"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/epoch-marker+cbor; em-type=26980</td>
              <td align="left">-</td>
              <td align="left">TBD5</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/epoch-marker+cbor; em-type=26981</td>
              <td align="left">-</td>
              <td align="left">TBD6</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/epoch-marker+cbor; em-type=26982</td>
              <td align="left">-</td>
              <td align="left">TBD7</td>
              <td align="left">
                <xref target="sec-epoch-tick"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/epoch-marker+cbor; em-type=26983</td>
              <td align="left">-</td>
              <td align="left">TBD8</td>
              <td align="left">
                <xref target="sec-epoch-tick-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/epoch-marker+cbor; em-type=26984</td>
              <td align="left">-</td>
              <td align="left">TBD9</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/epoch-marker+cbor; em-type=26985</td>
              <td align="left">-</td>
              <td align="left">TBD10</td>
              <td align="left">
                <xref target="sec-epoclet"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>If possible, TBD1..TBD10 should be assigned in the 256..9999 range.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3161"/>
          <seriesInfo name="DOI" value="10.17487/RFC3161"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9054"/>
          <seriesInfo name="DOI" value="10.17487/RFC9054"/>
        </reference>
        <referencegroup anchor="STD94" target="https://www.rfc-editor.org/info/std94">
          <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
            <front>
              <title>Concise Binary Object Representation (CBOR)</title>
              <author fullname="C. Bormann" initials="C." surname="Bormann"/>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="December" year="2020"/>
              <abstract>
                <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
                <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="94"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD96" target="https://www.rfc-editor.org/info/std96">
          <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="August" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
                <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
          </reference>
          <reference anchor="RFC9338" target="https://www.rfc-editor.org/info/rfc9338">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="December" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9338"/>
            <seriesInfo name="DOI" value="10.17487/RFC9338"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9581">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="B. Gamari" initials="B." surname="Gamari"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <date month="August" year="2024"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR, RFC 8949) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>In CBOR, one point of extensibility is the definition of CBOR tags. RFC 8949 defines two tags for time: CBOR tag 0 (RFC 3339 time as a string) and tag 1 (POSIX time as int or float). Since then, additional requirements have become known. The present document defines a CBOR tag for time that allows a more elaborate representation of time, as well as related CBOR tags for duration and time period. This document is intended as the reference document for the IANA registration of the CBOR tags defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9581"/>
          <seriesInfo name="DOI" value="10.17487/RFC9581"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <author fullname="Lijun Liao" initials="L." surname="Liao">
              <organization>NIO</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and common certificate
   profiles, and it is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER-encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is computed over the CBOR
   encoding instead of the DER encoding, thereby avoiding the use of
   ASN.1.  Both types of certificates have the same semantics as X.509
   while providing comparable size reduction.

   This document also specifies CBOR-encoded data structures for
   certification requests and certification request templates, new COSE
   headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698 by extending the TLSA selectors
   registry to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-19"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies registry-based extension points and uses them to
   support text representations such as of epoch-based dates/times and
   of IP addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present -23 is
   // intended as reference material during the 2026-04-29 CBOR interim,
   // a complete specification that reacts to discussion on previous
   // draft revisions and that can be used to confirm the results in a
   // WGLC.  Among other concerns, the discussion revealed that some
   // additional editorial content was required; the attempt was to
   // address this need without making technical changes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-24"/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T" value="Recommendation X.690"/>
        </reference>
        <reference anchor="NIST-SP-800-pt2">
          <front>
            <title>Recommendation for key management:: part 2 -- best practices for key management organizations</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="William C Barker" initials="W." surname="Barker">
              <organization/>
            </author>
            <date month="May" year="2019"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-57pt2r1"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2104">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="M. Bellare" initials="M." surname="Bellare"/>
            <author fullname="R. Canetti" initials="R." surname="Canetti"/>
            <date month="February" year="1997"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2104"/>
          <seriesInfo name="DOI" value="10.17487/RFC2104"/>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="2" month="April" year="2026"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS) [RFC9334].  Three conveying mechanisms --
   Challenge/Response, Uni-Directional, and Streaming Remote Attestation
   -- are illustrated and defined.  Analogously, a general overview
   about the information elements typically used by corresponding
   conveyance protocols are highlighted.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-17"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Cryptic Forest Software</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
         </author>
            <date day="5" month="May" year="2026"/>
            <abstract>
              <t>   Certification Authorities (CAs) issuing certificates to Public Key
   Infrastructure (PKI) end entities may require a certificate signing
   request (CSR) to include additional verifiable information to confirm
   policy compliance.  For example, a CA may require an end entity to
   demonstrate that the private key corresponding to a CSR's public key
   is secured by a hardware security module (HSM), is not exportable,
   etc.  The process of generating, transmitting, and verifying
   additional information required by the CA is called remote
   attestation.  While work is currently underway to standardize various
   aspects of remote attestation, a variety of proprietary mechanisms
   have been in use for years, particularly regarding protection of
   private keys.

   This specification defines ASN.1 structures which may carry
   attestation data for PKCS#10 and Certificate Request Message Format
   (CRMF) messages.  Both standardized and proprietary attestation
   formats are supported by this specification.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-25"/>
        </reference>
        <reference anchor="TCG-CoEvidence" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Concise-Evidence-Binding-for-SPDM-Version-1.0-Revision-53_1August2023.pdf">
          <front>
            <title>TCG DICE Concise Evidence Binding for SPDM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2023" month="June"/>
          </front>
          <refcontent>Version 1.00</refcontent>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="18" month="May" year="2026"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-10"/>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="TCG-TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/Trusted-Platform-Module-2.0-Library-Part-2-Version-184_pub.pdf">
          <front>
            <title>Trusted Platform Module 2.0 Library Part 2: Structures</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
          <refcontent>Version 184</refcontent>
        </reference>
      </references>
    </references>
    <?line 720?>

<section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an Epoch Marker with an <tt>etime</tt> as the Epoch Marker type.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR Epoch Marker based on `etime` (EDN)</name>
        <sourcecode type="cbor-diag"><![CDATA[
/ epoch-marker for
  1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
/ etime / 1001({
    1: 851042397,
  -10: "America/Los_Angeles",
  -11: { "u-ca": "hebrew" }
})
]]></sourcecode>
      </figure>
      <t>The encoded data item in CBOR pretty-printed form (hex with comments) is shown in <xref target="fig-ex-1-pretty"/>.</t>
      <figure anchor="fig-ex-1-pretty">
        <name>CBOR Epoch Marker based on `etime` (pretty hex)</name>
        <sourcecode type="cbor-pretty"><![CDATA[
d9 03e9                                 # tag(1001)
   a3                                   # map(3)
      01                                # unsigned(1)
      1a 32b9e05d                       # unsigned(851042397)
      29                                # negative(9)
      73                                # text(19)
         416d65726963612f4c6f735f416e67656c6573 # "America/Los_Angeles"
      2a                                # negative(10)
      a1                                # map(1)
         64                             # text(4)
            752d6361                    # "u-ca"
         66                             # text(6)
            686562726577                # "hebrew"
]]></sourcecode>
      </figure>
      <t>The example in <xref target="fig-ex-2"/> shows an Epoch Marker with an <tt>etime</tt> as the Epoch Marker type carried within a CWT.</t>
      <figure anchor="fig-ex-2">
        <name>CBOR Epoch Marker based on `etime` carried within a CWT (EDN)</name>
        <sourcecode type="cbor-diag"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

18([
  / protected / << {
    / alg / 1: -7 / ECDSA 256 /
  } >>,
  / unprotected / {},
  / payload / << {
    / epoch marker / 2000: / etime / 1001({
      1: 851042397,
      -10: "America/Los_Angeles",
      -11: { "u-ca": "hebrew" }
    }),
    / eat_nonce /  10: h'\
   c53a8c924f5a27877951ace250709aa64a45311840ca1c55da09af026a7a9c1c',
    / iss / 1 : "ACME epoch bell",
    / aud / 3 : "ACME protocol clients",
    / nbf / 5 : 1757929800,
    / exp / 4 : 1757929860
  } >>,
  / signature / h'737461747574617279'
])
]]></sourcecode>
      </figure>
      <t>The encoded data item in CBOR pretty-printed form (hex with comments) is shown in <xref target="fig-ex-2-pretty"/>.</t>
      <figure anchor="fig-ex-2-pretty">
        <name>CBOR Epoch Marker based on `etime` carried within a CWT (pretty hex)</name>
        <sourcecode type="cbor-pretty"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

d2                                      # tag(18)
   84                                   # array(4)
      43                                # bytes(3)
         a10126                         # "\xA1\u0001&"
      a0                                # map(0)
      58 88                             # bytes(136)
         \
a61907d0d903e9a3011a32b9e05d2973416d65726963612f4c6f735f416e67656c65\
732aa164752d6361666865627265770a5820c53a8c924f5a27877951ace250709aa6\
4a45311840ca1c55da09af026a7a9c1c016f41434d452065706f63682062656c6c03\
7541434d452070726f746f636f6c20636c69656e7473051a68c7e148041a68c7e18\
4 # "\xA6\u0019\a\xD0\xD9\u0003\xE9\xA3\u0001\u001A2\xB9\xE0])\
sAmerica/Los_Angeles*\xA1du-cafhebrew\nX \xC5:\x8C\x92OZ'\x87yQ\xAC\\
xE2Pp\x9A\xA6JE1\u0018@\xCA\u001CU\xDA\t\xAF\u0002jz\x9C\u001C\\
u0001oACME epoch bell\u0003uACME protocol clients\u0005\u001Ah\xC7\\
                                       xE1H\u0004\u001Ah\xC7\xE1\x84"
      49                                # bytes(9)
         737461747574617279             # "statutary"
]]></sourcecode>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depicts the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="asn.1"><![CDATA[
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
]]></sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank
Carl Wallace,
Jeremy O'Donoghue
and
Jun Zhang
for their reviews, suggestions and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
