<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.11 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4108 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
<!ENTITY RFC5280 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
<!ENTITY RFC8152 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8610 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
<!ENTITY RFC8742 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
<!ENTITY RFC8949 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
<!ENTITY I-D.ietf-cose-x509 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-x509.xml">
<!ENTITY I-D.ietf-cbor-tags-oid SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cbor-tags-oid.xml">
<!ENTITY RFC7228 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
<!ENTITY RFC7925 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
<!ENTITY RFC7932 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
<!ENTITY RFC8446 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY RFC8603 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
<!ENTITY RFC8879 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
<!ENTITY I-D.ietf-lake-edhoc SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
<!ENTITY I-D.ietf-tls-dtls13 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-dtls13.xml">
<!ENTITY I-D.ietf-uta-tls13-iot-profile SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
<!ENTITY I-D.ietf-tls-ctls SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
<!ENTITY I-D.ietf-emu-eap-tls13 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emu-eap-tls13.xml">
<!ENTITY I-D.ietf-emu-eaptlscert SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emu-eaptlscert.xml">
<!ENTITY I-D.ietf-quic-transport SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-quic-transport.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc tocdepth="2"?>

<rfc ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-00" category="std">

  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>

    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>

    <date year="2021" month="April" day="28"/>

    
    
    

    <abstract>


<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and significantly reduces the size of certificates compatible with e.g. RFC 7925, IEEE 802.1AR (DevID), CNSA, and CA/Browser Forum Baseline Requirements. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%.  The CBOR encoded structure can alternatively be signed directly (“natively signed”), which does not require re-encoding for the signature to be verified. The document also specifies COSE headers as well as a TLS certificate type for C509 certificates.</t>

<t>NOTE: “C509” is a placeholder, name to be decided by the COSE WG.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">

<t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="I-D.ietf-emu-eap-tls13"/> <xref target="I-D.ietf-emu-eaptlscert"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips and QUIC <xref target="I-D.ietf-quic-transport"/> where the latency increases significantly unless the server only send less than three times as many bytes as received prior to validating the client address. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc.</t>

<t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. <xref target="RFC8610"/> also extends the diagnostic notation.</t>

<t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>.</t>

<t>CAB Baseline Requirements <xref target="CAB-Baseline"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="I-D.ietf-quic-transport"/>, DTLS <xref target="I-D.ietf-tls-dtls13"/>, COSE <xref target="RFC8152"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of <xref target="RFC5280"/>. The encoding support all <xref target="RFC7925"/> and IEEE 802.1AR <xref target="IEEE-802.1AR"/> and CAB Baseline <xref target="CAB-Baseline"/> profiled X.509 certificates. The resulting certificates are called C509 Certificates. Two variants  are defined using the same CBOR encoding and differing only in what is being signed:</t>

<t><list style="numbers">
  <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
  <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
</list></t>

<t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>

<t>This document specifies COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>. The document also specifies a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>

</section>
<section anchor="notational-conventions" title="Notational Conventions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>This specification makes use of the terminology in <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refer to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>

</section>
<section anchor="encoding" title="CBOR Encoding">

<t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, and CAB Baseline <xref target="CAB-Baseline"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-table"/>.</t>

<t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>

<t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>

<section anchor="message-fields" title="Message Fields">

<t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>

<t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>

<t><list style="symbols">
  <t>version. The ‘version’ field is encoded in the ‘cborCertificateType’ CBOR int. The field ‘cborCertificateType’ also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (cborCertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (cborCertificateType = 1), see <xref target="type"/>.</t>
  <t>serialNumber. The ‘serialNumber’ INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) ‘certificateSerialNumber’. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
  <t>signature. The ‘signature’ field is always the same as the ‘signatureAlgorithm’ field and therefore omitted from the CBOR encoding.</t>
  <t>issuer. In the general case, the sequence of ‘RelativeDistinguishedName’ is encoded as a CBOR array of CBOR arrays of Attributes. Typically each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as a (CBOR int, CBOR text string) pair or as a (unwrapped CBOR OID, CBOR bytes) pair. The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributes SHALL have a positive sign. Text strings SHALL still adhere to any X.509 restrictions, i.e. serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded ‘common name’ it is encoded as a CBOR text string. If the text string contains an EUI-64 of the form “HH-HH-HH-HH-HH-HH-HH-HH” where ‘H’ is one of the symbol ‘0’–’9’ or ‘A’–’F’ it is encoded as a CBOR byte string of length 8 instead. EUI-64 mapped from a 48-bit MAC address (i.e. of the form “HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string of length 6.</t>
  <t>validity. The ‘notBefore’ and ‘notAfter’ fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value “99991231235959Z” (no expiration date) is encoded as CBOR null.</t>
  <t>subject. The ‘subject’ is encoded exactly like issuer.</t>
  <t>subjectPublicKeyInfo.  The ‘AlgorithmIdentifier’ field including parameters is encoded as the CBOR int ‘subjectPublicKeyAlgorithm’ (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the ‘subjectPublicKey’ BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
  <t>issuerUniqueID. Not supported.</t>
  <t>subjectUniqueID. Not supported.</t>
  <t>extensions. The ‘extensions’ field is encoded as a CBOR array where each extension is encoded as either a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type or an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/> followed by a CBOR bool encoding ‘critical’ and the DER encoded value of the ‘extnValue’ encoded as a CBOR byte string. If the array contains exactly two ints and the absolute value of the first int is 2, the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted ‘extensions’ field is encoded as an empty CBOR array.</t>
  <t>signatureAlgorithm. The ‘signatureAlgorithm’ field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
  <t>signatureValue. In general, the ‘signatureValue’ BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
</list></t>

<t>The following Concise Data Definition Language (CDDL) defines CBORCertificate and TBSCertificate, which are encoded as CBOR Sequences <xref target="RFC8742"/>. The member names therefore only have documentary value.</t>

<figure title="CDDL for CBORCertificate." anchor="fig-CBORCertCDDL"><artwork type="CDDL" align="center"><![CDATA[
; The elements of the following group are to be used in a CBOR Sequence:
CBORCertificate = (
   TBSCertificate,
   issuerSignatureValue : any,
)

TBSCertificate = (
   cborCertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / [ algorithm: ~oid, ? parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, critical: bool, extensionValue: bytes )
)
]]></artwork></figure>

</section>
<section anchor="alg-encoding" title="Encoding of subjectPublicKey and issuerSingatureValue">

<section anchor="encoding-of-subjectpublickey" title="Encoding of subjectPublicKey">

<t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>

<t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), uncompressed keys are point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. If a DER encoded certificate with a point compressed public key of type id-ecPublicKey is CBOR encoded, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>

</section>
<section anchor="encoding-of-issuersingaturevalue" title="Encoding of issuerSingatureValue">

<t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shortest INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>

</section>
</section>
<section anchor="ext-encoding" title="Encoding of Extensions">

<t>This section details the encoding of the ‘extensions’ field. The ‘extensions’ field is encoded as a CBOR array where each extensionID is encoded as either a CBOR int or a CBOR OID tag. If ‘extensionID’ is encoded an int (see <xref target="extype"/>),the sign is used to encode if the extension is critical and the ‘critical’ field is omitted. Critical extensions are encoded with a positive sign and non-critical extensions are encoded with a negative sign.</t>

<t>The ‘extnValue’ OCTET STREAM value field is encoded as the CBOR byte string ‘extensionValue’ except for the extensions specified below. The ‘extensionValue’ for the extensions mandated to be supported by <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, and <xref target="CAB-Baseline"/> are encoded as follows:</t>

<t><list style="symbols">
  <t>keyUsage. The ‘KeyUsage’ BIT STRING is interpreted as an unsigned integer n in network byte order and encoded as a CBOR int.</t>
  <t>subjectAltName. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When ‘otherName + hardwareModuleName’ is used, then [ oid, bytes ] is used to identify the pair ( hwType, hwSerialEntries ) directly as specified in <xref target="RFC4108"/>.</t>
</list></t>

<figure><artwork><![CDATA[
   GeneralNames = [ + GeneralName ] / text
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
]]></artwork></figure>

<t><list style="symbols">
  <t>basicConstraints. If ‘cA’ = false then extensionValue = -2, if ‘cA’ = true and ‘pathLenConstraint’ is not present then extensionValue = -1, and if ‘cA’ = true and ‘pathLenConstraint’ is present then extensionValue = pathLenConstraint.</t>
  <t>extKeyUsage. extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>) or unwrapped CBOR OID tags <xref target="I-D.ietf-cbor-tags-oid"/> where each int or OID tag encodes a key usage purpose. If the array contains a single int, the array is omitted.</t>
</list></t>

<figure><artwork><![CDATA[
   ExtValueEKU = [ + int / ~oid ] / int
]]></artwork></figure>

<t><list style="symbols">
  <t>subjectKeyIdentifier. extensionValue is the value of the ‘keyIdentifier’ field encoded as a CBOR byte string.</t>
  <t>authorityKeyIdentifier. extensionValue is encoded as an array where the value of the ‘keyIdentifier’ is encoded as a CBOR byte string, ‘GeneralNames’ is encoded like in subjectAltName, and ‘AuthorityCertSerialNumber’ is encoded as ~biguint exactly like certificateSerialNumber. Omitted values are encoded as CBOR null.</t>
</list></t>

<figure><artwork><![CDATA[
   ExtValueAKI = [ keyIdentifier: bytes / null,
                   certIssuer: GeneralNames / null,
                   certSerialNumber: CertificateSerialNumber / null ]
               / bytes
]]></artwork></figure>

<t><list style="symbols">
  <t>cRLDistributionPoints. If the cRLDistributionPoints is a sequence of DistributionPointName, it is encoded like subjectAltName, with the difference that if cRLDistributionPoints contains exactly one uniformResourceIdentifier, the array and the int are omitted and extensionValue is the uniformResourceIdentifier encoded as a CBOR text string.</t>
  <t>authorityInfoAccess. If authorityInfoAccess consist of only uniformResourceIdentifiers it is encoded as an array of uris.</t>
</list></t>

<figure><artwork><![CDATA[
   ExtValueAIA = [ + ( ocsp : 1 // caIssuers : 2 , uri : text ) ]
]]></artwork></figure>

<section anchor="example-encoding-of-extensions" title="Example Encoding of Extensions">

<t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>

<t><list style="symbols">
  <t>A critical basicConstraints (‘cA’ = true) without pathLenConstraint is encoded as the two CBOR ints -1, -1.</t>
  <t>A non-critical keyUsage with digitalSignature and keyAgreement asserted is encoded as the two CBOR ints 2, 17 (2^0 + 2^4 = 17).</t>
  <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 3 followed by the CBOR array [ 3, 6 ].</t>
  <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 4 followed by the CBOR text string “example.com”.</t>
</list></t>

<t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -1, -1, 2, 17, 3, [ 3, 6 ], 4, “example.com” ].</t>

</section>
</section>
</section>
<section anchor="compliance-requirements-for-constrained-iot" title="Compliance Requirements for Constrained IoT">

<t>For general purpose applications, the normative requirements of <xref target="RFC5280"/> applies. This section describes the mandatory to implement algorithms and OIDs for constrained IoT application; the values of the OIDs including certificate fields and extensions, time format, attributes in distinguished names, etc.</t>

<t>TODO: Write this section</t>

</section>
<section anchor="dep-set" title="Legacy Considerations">

<t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. In order to verify the signature, the C509 certificate is used to recreate the original X.509 data structure to be able to verify the signature.</t>

<t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>

<t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>

<t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>

</section>
<section anchor="expected-certificate-sizes" title="Expected Certificate Sizes">

<t>The CBOR encoding of the sample certificate given in <xref target="appA"/> results in the numbers shown in <xref target="fig-table"/>. After <xref target="RFC7925"/> profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms will be small, mainly corresponding to making the ASN.1 encoding more compact. For Brtoli <xref target="RFC7932"/>, the brotli command line tool 1.09 was used with the default best compression level.</t>

<figure title="Comparing Sizes of Certificates (bytes)" anchor="fig-table"><artwork align="center"><![CDATA[
+------------------+--------------+------------+--------------------+
|                  |   RFC 7925   |   Brotli   |  C509 Certificate  |
+------------------+---------------------------+--------------------+
| Certificate Size |     314      |     303    |         138        |
+------------------+--------------+------------+--------------------+
]]></artwork></figure>

</section>
<section anchor="sec-cons" title="Security Considerations">

<t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>

<t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>

<t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>

<t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>

</section>
<section anchor="iana" title="IANA Considerations">

<t>This document creates several new registries under the new heading “C509 Certificate”. For all items, the ‘Reference’ field points to this document.</t>

<t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>

<section anchor="type" title="C509 Certificate Types Registry">

<t>IANA has created a new registry titled “C509 Certificate Types” under the new heading “C509 Certificate”. The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”.  The initial contents of the registry are:</t>

<figure title="C509 Certificate Types" anchor="fig-types"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="atttype" title="C509 Certificate Attributes Registry">

<t>IANA has created a new registry titled “C509 Certificate Attributes” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. Only non-negative values can be registered. For values in the interval [0, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Attributes" anchor="fig-attrtype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     1 | Name:            Common Name                              |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Postal Code                              |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Given Name                               |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Generation Qualifier                     |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            DN Qualifier                             |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Organization Identifier                  |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="extype" title="C509 Certificate Extensions Registry">

<t>IANA has created a new registry titled “C509 Certificate Extensions” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, DER, Comments, extensionValue, and Reference, where Value is an integer, and the other columns are text strings. Only non-negative values can be registered. For values in the interval [0, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Extensions" anchor="fig-extype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                |
+=======+===========================================================+
|     0 | Name:            Subject Key Identifier                   |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|     1 | Name:            Key Usage                                |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  int                                      |
+-------+-----------------------------------------------------------+
|     2 | Name:            Subject Alternative Name                 |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  [ + ( int, any ) ] / text                |
+-------+-----------------------------------------------------------+
|     3 | Name:            Basic Constraints                        |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  int                                      |
+-------+-----------------------------------------------------------+
|     4 | Name:            CRL Distribution Points                  |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  [ + ( int, any ) ] / text                |
+-------+-----------------------------------------------------------+
|     5 | Name:            Certificate Policies                     |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  [ + ( oid, ? text ) ]                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Authority Key Identifier                 |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|     7 | Name:            Extended Key Usage                       |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  int                                      |
+-------+-----------------------------------------------------------+
|     8 | Name:            Authority Information Access             |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:  [ + ( 1 / 2 , text ) ]                   |
+-------+-----------------------------------------------------------+
|     9 | Name:            Signed Certificate Timestamp List        |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  [ bytes, ~biguint,                       |
|       |                    AlgorithmIdentifier, bytes]            |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="EKU" title="C509 Certificate Extended Key Usages Registry">

<t>IANA has created a new registry titled “C509 Certificate Extended Key Usages” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Extended Key Usages" anchor="fig-ekutype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extended Key Usage                                        |
+=======+===========================================================+
|     1 | Name:            TLS Server authentication                |
|       | OID:             1.3.6.1.5.5.7.3.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            TLS Client Authentication                |
|       | OID:             1.3.6.1.5.5.7.3.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Code Signing                             |
|       | OID:             1.3.6.1.5.5.7.3.3                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)                |
|       | OID:             1.3.6.1.5.5.7.3.4                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 04            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Time Stamping                            |
|       | OID:             1.3.6.1.5.5.7.3.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 08            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            OCSP Signing                             |
|       | OID:             1.3.6.1.5.5.7.3.9                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 09            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="GN" title="C509 Certificate General Names Registry">

<t>IANA has created a new registry titled “C509 Certificate General Names” under the new heading “C509 Certificate”. The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate General Names" anchor="fig-gn"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="sigalg" title="C509 Certificate Signature Algorithms Registry">

<t>IANA has created a new registry titled “C509 Certificate Signature Algorithms” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Signature Algorithms" anchor="fig-sigalgs"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="pkalg" title="C509 Certificate Public Key Algorithms Registry">

<t>IANA has created a new registry titled “C509 Certificate Public Key Algorithms” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. T The initial contents of the registry are:</t>

<figure title="C509 Certificate Public Key Algorithms" anchor="fig-pkalgs"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="cose" title="COSE Header Parameters Registry">

<t>EDITORS NOTE: Should x5u refer to a bag or a chain? The text should be moved a section and not be in the IANA Section.</t>

<t>This document registers the following entries in the “COSE Header Parameters” registry under the “CBOR Object Signing and Encryption (COSE)” heading. The formatting and processing for c5b, c5c, and c5t, and c5u are similar to x5bag, x5chain, x5t, x5u defined in <xref target="I-D.ietf-cose-x509"/> except that the certificates are CBOR encoded instead of DER encoded, uses a COSE_C5 structure instead of COSE_X509, and that c5t MUST refer to an end-entity certificate. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C5 item served with the application/cbor content format. The COSE_C5 structure used in c5b, c5c, and c5u is defined as:</t>

<figure><artwork type="CDDL"><![CDATA[
COSE_C5 = [ + CBORCertificate ]
]]></artwork></figure>

<t>As the contents of c5bag, c5chain, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>

<t>Note that certificates can also be identified with a ‘kid’ header parameter by storing ‘kid’ and the associated bag or chain in a dictionary.</t>

<figure><artwork><![CDATA[
+-----------+-------+----------------+------------------------------+
| Name      | Label | Value Type     | Description                  |
+===========+=======+================+==============================+
| c5b       |  TBD1 | COSE_C5        | An unordered bag of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5c       |  TBD2 | COSE_C5        | An ordered chain of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5t       |  TBD3 | COSE_CertHash  | Hash of a C509 certificate   |
+-----------+-------+----------------+------------------------------+
| c5u       |  TBD4 | uri            | URI pointing to a COSE_C5    |
|           |       |                | containing a ordered chain   |
|           |       |                | of certificates              |
+-----------+-------+----------------+------------------------------+
]]></artwork></figure>

</section>
<section anchor="tls" title="TLS Certificate Types Registry">

<t>This document registers the following entry in the “TLS Certificate Types” registry under the “Transport Layer Security (TLS) Extensions” heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>.</t>

<t>EDITOR’S NOTE: The TLS registrations should be discussed and approved by the TLS WG at a later stage. When COSE WG has adopted work on C509 certificates, it could perhaps be presented in the TLS WG. The TLS WG might e.g. want a separate draft in the TLS WG.</t>

<figure><artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork></figure>

</section>
<section anchor="tags" title="CBOR Tags Registry">

<t>This document registers the following entries in the “CBOR Tags” registry under the “Concise Binary Object Representation (CBOR) Tags” heading.</t>

<figure><artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C5                                         |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC4108;
&RFC5280;
&RFC8152;
&RFC8174;
&RFC8610;
&RFC8742;
&RFC8949;
&I-D.ietf-cose-x509;
&I-D.ietf-cbor-tags-oid;
<reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
  <front>
    <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
    <author >
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>

&RFC7228;
&RFC7925;
&RFC7932;
&RFC8446;
&RFC8603;
&RFC8879;
&I-D.ietf-lake-edhoc;
&I-D.ietf-tls-dtls13;
&I-D.ietf-uta-tls13-iot-profile;
&I-D.ietf-tls-ctls;
&I-D.ietf-emu-eap-tls13;
&I-D.ietf-emu-eaptlscert;
&I-D.ietf-quic-transport;
<reference anchor="CAB-Baseline" target="https://cabforum.org/baseline-requirements-documents/">
  <front>
    <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.3</title>
    <author initials="." surname="CA/Browser Forum">
      <organization></organization>
    </author>
    <date year="2020" month="October"/>
  </front>
</reference>
<reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
    <author initials="." surname="Institute of Electrical and Electronics Engineers">
      <organization></organization>
    </author>
    <date year="2018" month="August"/>
  </front>
  <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
</reference>
<reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
  <front>
    <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
    <author initials="F." surname="Forsby">
      <organization></organization>
    </author>
    <author initials="M." surname="Furuhed">
      <organization></organization>
    </author>
    <author initials="P." surname="Papadimitratos">
      <organization></organization>
    </author>
    <author initials="S." surname="Raza">
      <organization></organization>
    </author>
    <date year="2018" month="July"/>
  </front>
  <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
</reference>


    </references>


<section anchor="appA" title="Example C509 Certificates">

<section anchor="example-rfc-7925-profiled-x509-certificate" title="Example RFC 7925 profiled X.509 Certificate">

<t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>

<figure><artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2020 GMT
            Not After : Feb  2 00:00:00 2021 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
         30:44:02:20:44:5d:79:8c:90:e7:f5:00:dc:74:7a:65:4c:ec:
         6c:fa:6f:03:72:76:e1:4e:52:ed:07:fc:16:29:4c:84:66:0d:
         02:20:5a:33:98:5d:fb:d4:bf:dd:6d:4a:cf:38:04:c3:d4:6e:
         bf:3b:7f:a6:26:40:67:4f:c0:35:4f:a0:56:db:ae:a6

]]></artwork></figure>

<t>The DER encoding of the above certificate is 314 bytes.</t>

<figure><artwork><![CDATA[
30 82 01 36 30 81 DE A0 03 02 01 02 02 03 01 F5 0D 30 0A 06 08 2A 86
48 CE 3D 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0C 0B 52 46 43 20
74 65 73 74 20 43 41 30 1E 17 0D 32 30 30 31 30 31 30 30 30 30 30 30
5A 17 0D 32 31 30 32 30 32 30 30 30 30 30 30 5A 30 22 31 20 30 1E 06
03 55 04 03 0C 17 30 31 2D 32 33 2D 34 35 2D 46 46 2D 46 45 2D 36 37
2D 38 39 2D 41 42 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86
48 CE 3D 03 01 07 03 42 00 04 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E
69 3F 16 21 3A 04 52 5E D4 44 50 B1 01 9C 2D FD 38 38 AB AC 4E 14 D8
6C 09 83 ED 5E 9E EF 24 48 C6 86 1C C4 06 54 71 77 E6 02 60 30 D0 51
F7 79 2A C2 06 A3 0F 30 0D 30 0B 06 03 55 1D 0F 04 04 03 02 07 80 30
0A 06 08 2A 86 48 CE 3D 04 03 02 03 47 00 30 44 02 20 44 5D 79 8C 90
E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1 4E 52 ED 07 FC 16 29
4C 84 66 0D 02 20 5A 33 98 5D FB D4 BF DD 6D 4A CF 38 04 C3 D4 6E BF
3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding" title="Example C509 Certificate Encoding">

<t>The CBOR encoding of the same X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'445D798C90E7F500DC747A654CEC6CFA6F037276E14E52ED07
    FC16294C84660D5A33985DFBD4BFDD6D4ACF3804C3D46EBF3B
    7FA62640674FC0354FA056DBAEA6

]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>

<figure><artwork><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 44 5D 79 8C 90 E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1
4E 52 ED 07 FC 16 29 4C 84 66 0D 5A 33 98 5D FB D4 BF DD 6D 4A CF 38
04 C3 D4 6E BF 3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork></figure>

</section>
<section anchor="example-natively-signed-c509-certificate" title="Example: Natively Signed C509 Certificate">

<t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for cborCertificateType and signatureValue.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  6,
  h'B27A0B781455F71B68290F6C2EC9A897F18FDE9B6C59575953
    BC67268AB0E4DDE99D273E04E4715383AB2257C6AAA35284E5
    ED18BDB91247E9F2C433136480B9'

]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>

<figure><artwork><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 B2 7A 0B 78 14 55 F7 1B 68 29 0F 6C 2E C9 A8 97 F1 8F DE 9B 6C
59 57 59 53 BC 67 26 8A B0 E4 DD E9 9D 27 3E 04 E4 71 53 83 AB 22 57
C6 AA A3 52 84 E5 ED 18 BD B9 12 47 E9 F2 C4 33 13 64 80 B9
]]></artwork></figure>

</section>
<section anchor="example-additonal-keys-for-the-example-certificates" title="Example: Additonal Keys for the Example Certificates">

<t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC8152"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>

<figure><artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork></figure>

<figure><artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork></figure>

</section>
</section>
<section anchor="example-ieee-8021ar-profiled-x509-certificate" title="Example IEEE 802.1AR profiled X.509 Certificate">

<t>EDITOR’S NOTE: To do</t>

</section>
<section anchor="example-cab-baseline-ecdsa-https-x509-certificate" title="Example CAB Baseline ECDSA HTTPS X.509 Certificate">

<t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>

<figure><artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding-1" title="Example C509 Certificate Encoding">

<t>The CBOR encoding of the first X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "IE",
 -8, "Baltimore",
 -9, "CyberTrust",
 -1, "Baltimore CyberTrust Root"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
  6, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
  0, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
  2, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
 -1, 1,
  7, [1, 2],
  4, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
      "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
  5, [h'6086480186FD6C0101', "https://www.digicert.com/CPS", 2],
  8, [1, "http://ocsp.digicert.com",
      2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
 -3, -2,
  9, ...
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork></figure>

</section>
</section>
<section anchor="example-cab-baseline-rsa-https-x509-certificate" title="Example CAB Baseline RSA HTTPS X.509 Certificate">

<t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>

<figure><artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding-2" title="Example C509 Certificate Encoding">

<t>The CBOR encoding of the first X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
 -3, -2,
  7, [ 1, 2 ],
 -1, 5,
  4, "http://crl.starfieldtech.com/sfig2s1-242.crl",
  5, [ h'6086480186fd6e01071701',
       "http://certificates.starfieldtech.com/repository/", 1 ],
  8, [ 1, "http://ocsp.starfieldtech.com/",
       2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
  6, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
  2, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
  0, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
  9, [
       h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
       1715,
       1,
       h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
         BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
       h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
       2012,
       1,
       h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
         FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
     ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 1242 bytes.</t>

</section>
</section>
</section>
<section numbered="no" anchor="acknowledgments" title="Acknowledgments">

<t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

