<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2986 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
<!ENTITY RFC4108 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
<!ENTITY RFC5280 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
<!ENTITY RFC8152 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8610 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
<!ENTITY RFC8742 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
<!ENTITY RFC8949 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
<!ENTITY I-D.ietf-cose-x509 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-x509.xml">
<!ENTITY I-D.ietf-cbor-tags-oid SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cbor-tags-oid.xml">
<!ENTITY RFC6487 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
<!ENTITY RFC7228 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
<!ENTITY RFC7925 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
<!ENTITY RFC7932 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
<!ENTITY RFC8446 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY RFC8603 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
<!ENTITY RFC8879 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
<!ENTITY RFC9000 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
<!ENTITY I-D.ietf-lake-edhoc SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
<!ENTITY I-D.ietf-tls-dtls13 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-dtls13.xml">
<!ENTITY I-D.ietf-uta-tls13-iot-profile SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
<!ENTITY I-D.ietf-tls-ctls SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
<!ENTITY I-D.ietf-emu-eap-tls13 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emu-eap-tls13.xml">
<!ENTITY I-D.ietf-emu-eaptlscert SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emu-eaptlscert.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc tocdepth="2"?>

<rfc ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-02" category="std">

  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>

    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>

    <date year="2021" month="July" day="12"/>

    
    
    

    <abstract>


<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%.  The CBOR encoded structure can alternatively be signed directly (“natively signed”), which does not require re-encoding for the signature to be verified. The document also specifies C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">

<t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="I-D.ietf-emu-eap-tls13"/> <xref target="I-D.ietf-emu-eaptlscert"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc.</t>

<t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>

<t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>

<t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="I-D.ietf-tls-dtls13"/>, COSE <xref target="RFC8152"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of RFC 5280. The encoding supports all RFC 7925, IEEE 802.1AR, CAB Baseline <xref target="CAB-TLS"/>, <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates. The resulting certificates are called C509 Certificates. This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>

<t><list style="numbers">
  <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
  <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
</list></t>

<t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>

<t>This document specifies COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>. The document also specifies a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>

</section>
<section anchor="notational-conventions" title="Notational Conventions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>This specification makes use of the terminology in <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>

</section>
<section anchor="certificate" title="C509 Certificate">

<t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>

<t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>

<t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>

<section anchor="message-fields" title="Message Fields">

<t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>

<t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>

<t><list style="symbols">
  <t>version. The ‘version’ field is encoded in the ‘c509CertificateType’ CBOR int. The field ‘c509CertificateType’ also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (c509CertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 1), see <xref target="type"/>.</t>
  <t>serialNumber. The ‘serialNumber’ INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) ‘certificateSerialNumber’. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
  <t>signature. The ‘signature’ field is always the same as the ‘signatureAlgorithm’ field and therefore omitted from the CBOR encoding.</t>
  <t>issuer. In the general case, the sequence of ‘RelativeDistinguishedName’ is encoded as a CBOR array of CBOR arrays of Attributes. Typically, each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as a (CBOR int, CBOR text string) pair or as a (unwrapped CBOR OID, CBOR bytes) pair. The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. The Attribute Email Address is always an IA5String. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributeType SHALL have be non-negative. Text strings SHALL still adhere to any X.509 restrictions, i.e., serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded ‘common name’ it is encoded as a CBOR text string. If the text string contains an EUI-64 of the form “HH-HH-HH-HH-HH-HH-HH-HH” where ‘H’ is one of the symbols ‘0’–’9’ or ‘A’–’F’ it is encoded as a CBOR byte string of length 8 instead. EUI-64 mapped from a 48-bit MAC address (i.e., of the form “HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string of length 6.</t>
  <t>validity. The ‘notBefore’ and ‘notAfter’ fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value “99991231235959Z” (no expiration date) is encoded as CBOR null.</t>
  <t>subject. The ‘subject’ is encoded exactly like issuer.</t>
  <t>subjectPublicKeyInfo.  The ‘AlgorithmIdentifier’ field including parameters is encoded as the CBOR int ‘subjectPublicKeyAlgorithm’ (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the ‘subjectPublicKey’ BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
  <t>issuerUniqueID. Not supported.</t>
  <t>subjectUniqueID. Not supported.</t>
  <t>extensions. The ‘extensions’ field is encoded as a CBOR array where each extension is encoded as either a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type or an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/> followed by a CBOR bool encoding ‘critical’ and the DER encoded value of the ‘extnValue’ encoded as a CBOR byte string. If the array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage), the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted ‘extensions’ field is encoded as an empty CBOR array.</t>
  <t>signatureAlgorithm. The ‘signatureAlgorithm’ field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
  <t>signatureValue. In general, the ‘signatureValue’ BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
</list></t>

<t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item MAY represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate).</t>

<figure title="CDDL for C509Certificate." anchor="fig-CBORCertCDDL"><artwork type="CDDL" align="center"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / ~oid / 
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, ? critical: true, 
              extensionValue: bytes )
]]></artwork></figure>

</section>
<section anchor="alg-encoding" title="Encoding of subjectPublicKey and issuerSignatureValue">

<section anchor="encoding-of-subjectpublickey" title="Encoding of subjectPublicKey">

<t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>

<t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), uncompressed keys are point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. If a DER encoded certificate with a point compressed public key of type id-ecPublicKey is CBOR encoded, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>

</section>
<section anchor="encoding-of-issuersignaturevalue" title="Encoding of issuerSignatureValue">

<t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shortest INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>

</section>
</section>
<section anchor="ext-encoding" title="Encoding of Extensions">

<t>This section details the encoding of the ‘extensions’ field. The ‘extensions’ field is encoded as a CBOR array where each extensionID is encoded as either a CBOR int or an unwrapped CBOR OID tag. If ‘extensionID’ is encoded an int (see <xref target="extype"/>), the sign is used to encode if the extension is critical and the ‘critical’ field is omitted. Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign.</t>

<t>The ‘extnValue’ OCTET STRING value field is encoded as the CBOR byte string ‘extensionValue’ except for the extensions specified below. For some extensions, only commonly used parts are supported by the CBOR encoding. If unsupported parts are used, the CBOR encoding cannot be used.</t>

<t>CBOR encoding of the following extension values are fully supported:</t>

<t><list style="symbols">
  <t>Subject Key Identifier (subjectKeyIdentifier). The extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></artwork></figure>

<t><list style="symbols">
  <t>Key Usage (keyUsage). The ‘KeyUsage’ BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="message-fields"/> for special encoding in case keyUsage is the only extension present.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   KeyUsage = int
]]></artwork></figure>

<t><list style="symbols">
  <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Basic Constraints (basicConstraints). If ‘cA’ = false then extensionValue = -2, if ‘cA’ = true and ‘pathLenConstraint’ is not present then extensionValue = -1, and if ‘cA’ = true and ‘pathLenConstraint’ is present then extensionValue = pathLenConstraint.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   BasicConstraints = int
]]></artwork></figure>

<t><list style="symbols">
  <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   PolicyConstraints = [ 
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]   
]]></artwork></figure>

<t><list style="symbols">
  <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/> or unwrapped CBOR OID tags <xref target="I-D.ietf-cbor-tags-oid"/> where each int or OID tag encodes a key usage purpose.  If the array contains a single KeyPurposeId, the array is omitted.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></artwork></figure>

<t><list style="symbols">
  <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   InhibitAnyPolicy = uint
]]></artwork></figure>

<t>CBOR encoding of the following extension values are partly supported:</t>

<t><list style="symbols">
  <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When ‘otherName + hardwareModuleName’ is used, then [ oid, bytes ] is used to identify the pair ( hwType, hwSerialEntries ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></artwork></figure>

<t><list style="symbols">
  <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></artwork></figure>

<t><list style="symbols">
  <t>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></artwork></figure>

<t><list style="symbols">
  <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as an CBOR ints (see <xref target="IA"/>) or unwrapped CBOR OID tags <xref target="I-D.ietf-cbor-tags-oid"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></artwork></figure>

<t><list style="symbols">
  <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumberm or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></artwork></figure>

<t><list style="symbols">
  <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/>.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid, 
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Name Constraints (nameConstraints). If the name constraints only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   GeneralSubtree = [ GeneralName, minimum: uint, ? maximum: uint ]
   NameConstraints = [ 
     permittedSubtrees: GeneralSubtree,
     excludedSubtrees: GeneralSubtree,
   ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   Attributes = ( attributeType: int, attributeValue: [+text] ) //
                ( attributeType: ~oid, attributeValue: [+bytes] )
   SubjectDirectoryAttributes = Attributes
]]></artwork></figure>

<t><list style="symbols">
  <t>AS Resources (autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   AsIdsOrRanges = uint / [uint, uint]
   ASIdentifiers = [ + AsIdsOrRanges ] / null
]]></artwork></figure>

<t><list style="symbols">
  <t>AS Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like autonomousSysIds.</t>
  <t>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI is not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress is set to ones. With the exception of the first  Address, if the byte string has the same length as the previous ASid, the Addess is encoded as an uint with the the difference to the previous Addess.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   Address = bytes / uint, 
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange =  [Address, Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddrBlocks = [ AFI: uint, IPAddressChoice ]
]]></artwork></figure>

<t><list style="symbols">
  <t>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</t>
  <t>Signed Certificate Timestamp. If all the SCTs are version 1, and there are no SCT extensions, the extension value can be CBOR encoded. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as and CBOR int (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   SignedCerticateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCerticateTimestamp ]
]]></artwork></figure>

<section anchor="example-encoding-of-extensions" title="Example Encoding of Extensions">

<t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>

<t><list style="symbols">
  <t>A critical basicConstraints (‘cA’ = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
  <t>A non-critical keyUsage with digitalSignature and keyAgreement asserted is encoded as the two CBOR ints 2, 17 (2^0 + 2^4 = 17).</t>
  <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 6 ].</t>
  <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string “example.com”.</t>
</list></t>

<t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 17, 8, [ 3, 6 ], 3, “example.com” ].</t>

</section>
</section>
</section>
<section anchor="CSR" title="C509 Certificate Signing Request">

<t>The section defines the C509 Certificate Signing Request (CSR) format based on and compatible with RFC 2986 <xref target="RFC2986"/> reusing the formatting for C509 certificates defined in <xref target="certificate"/>. There are currently two c509CertificateSigningRequestType values defined, c509CertificateSigningRequestType = 0 requests a c509CertificateType = 0 and c509CertificateSigningRequestType = 1 requests a c509CertificateType = 1 . subjectProofOfPossessionAlgorithm can be a C509 signature algorithm or a non-signature Proof-of-Possession Algorithm as defined in e.g. RFC 6955. CSR attributes other than extensionRequest are not supported.</t>

<figure title="CDDL for C509CertificateSigningRequest." anchor="fig-C509CSRCDDL"><artwork type="CDDL" align="center"><![CDATA[
C509CertificateSigningRequest = [
   TBSCertificateSigningRequest,
   subjectProofOfPossessionValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateSigningRequest = (
   c509CertificateSigningRequestType: int,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensionsRequest : Extensions,
   subjectProofOfPossessionAlgorithm: AlgorithmIdentifier,
)
]]></artwork></figure>

<t>After verifying the subjectProofOfPossessionValue, the CA MAY transform the C509CertificateSigningRequest into a RFC 2985 CertificationRequestInfo for compatibility with existing procedures and code.</t>

</section>
<section anchor="CRL" title="C509 Certificate Revocation List">

<t>The section defines the C509 Certificate Revocation List (CRL) format based on and compatible with <xref target="RFC5280"/> reusing the formatting for C509 certificates defined in <xref target="certificate"/>.</t>

<figure title="CDDL for C509CertificateRevocationList." anchor="fig-C509CRLCDDL"><artwork type="CDDL" align="center"><![CDATA[
C509CertificateRevocationList = [
   TBSCertificateRevocationList,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateSigningRequest = (
   C509CertificateRevocationListType: int,
   issuer: Name,
   thisUpdate: Time,
   nextUpdate: Time,
   revokedCertificates: RevokedCertificates,
   crlExtensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

RevokedCertificates = [
    userCertificate: CertificateSerialNumber,
    revocationDate: Time,
    crlEntryExtensions: Extensions,
]
]]></artwork></figure>

</section>
<section anchor="OCSP" title="C509 Online Certificate Status Protocol">

<t>TODO</t>

</section>
<section anchor="c509-processing-and-certificate-issuance" title="C509 Processing and Certificate Issuance">

<t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>

<t>The CSR format defined in Section 4 follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>.</t>

<t>When a certificate request is received the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof of possession of the public key, before normal certificate generation can take place.</t>

<t>In the reverse direction, in case c509CertificateType = 1 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 0 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with CA may be needed.</t>

</section>
<section anchor="dep-set" title="Legacy Considerations">

<t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. In order to verify the signature, the C509 certificate is used to recreate the original X.509 data structure to be able to verify the signature.</t>

<t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>

<t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>

<t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>

</section>
<section anchor="expected-certificate-sizes" title="Expected Certificate Sizes">

<t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in <xref target="fig-size-COSE"/> and <xref target="fig-size-TLS"/>. COSE_X509 is defined in <xref target="I-D.ietf-cose-x509"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. For the example HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 use dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 0 and 1 have the same size. For Brotli <xref target="RFC7932"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>

<figure title="Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain)." anchor="fig-size-COSE"><artwork align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       139 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1394 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3934 |
+---------------------------------------+-----------+-----------+
]]></artwork></figure>

<figure title="Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X509 and C509 are Certificate messages. X509 + Brotli and C509 + Brotli are CompressedCertificate messages." anchor="fig-size-TLS"><artwork align="center"><![CDATA[
+-------------------+-------+---------------+------+---------------+
|                   |  X509 | X509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+---------------+------+---------------+
| RFC 7925 Cert (1) |   327 |           324 |  151 |           167 |
+-------------------+-------+---------------+------+---------------+
| RPKI Cert (1)     | 20991 |          9134 | 8660 |          5668 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (2)   |  2204 |          1455 | 1414 |          1063 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (4)   |  5190 |          3244 | 3958 |          2845 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Bag (8)     | 11578 |          3979 | 8882 |          3519 |
+-------------------+-------+---------------+------+---------------+
]]></artwork></figure>

</section>
<section anchor="sec-cons" title="Security Considerations">

<t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>

<t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>

<t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>

<t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>

</section>
<section anchor="iana" title="IANA Considerations">

<t>This document creates several new registries under the new heading “C509 Certificate”. For all items, the ‘Reference’ field points to this document.</t>

<t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>

<section anchor="type" title="C509 Certificate Types Registry">

<t>IANA has created a new registry titled “C509 Certificate Types” under the new heading “C509 Certificate”. The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”.  The initial contents of the registry are:</t>

<figure title="C509 Certificate Types" anchor="fig-types"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="atttype" title="C509 Attributes Registry">

<t>IANA has created a new registry titled “C509 Attributes” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an non-negative integer, and the other columns are text strings. For values in the interval [0, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Attributes" anchor="fig-attrtype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="extype" title="C509 Extensions Registry">

<t>IANA has created a new registry titled “C509 Extensions Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is an positive integer, and the other columns are text strings. For values in the interval [1, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Extensions" anchor="fig-extype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:   AuthorityInfoAccessSyntax               |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestamps              |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:   SubjectDirectoryAttributes              |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     ipAddrBlocks                             |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     autonomousSysIds                         |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     ipAddrBlocks-v2                          |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     autonomousSysIds-v2                      |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="CP" title="C509 Certificate Policies Registry">

<t>IANA has created a new registry titled “C509 Certificate Policies Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Policies" anchor="fig-cp"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="PQ" title="C509 Policies Qualifiers Registry">

<t>IANA has created a new registry titled “C509 Policies Qualifiers Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Policies Qualifiers" anchor="fig-pq"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="IA" title="C509 Information Access Registry">

<t>IANA has created a new registry titled “C509 Information Access Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Information Accesses" anchor="fig-ia"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="EKU" title="C509 Extended Key Usages Registry">

<t>IANA has created a new registry titled “C509 Extended Key Usages Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Extended Key Usages" anchor="fig-eku"><artwork align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="GN" title="C509 General Names Registry">
<t>IANA has created a new registry titled “C509 General Names Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 General Names" anchor="fig-gn"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleNamee                |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="sigalg" title="C509 Signature Algorithms Registry">

<t>IANA has created a new registry titled “C509 Signature Algorithms” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Signature Algorithms" anchor="fig-sigalgs"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="pkalg" title="C509 Public Key Algorithms Registry">

<t>IANA has created a new registry titled “C509 Public Key Algorithms” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. T The initial contents of the registry are:</t>

<figure title="C509 Public Key Algorithms" anchor="fig-pkalgs"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="cose" title="COSE Header Parameters Registry">

<t>EDITORS NOTE: The text should be moved a section and not be in the IANA Section.</t>

<t>This document registers the following entries in the “COSE Header Parameters” registry under the “CBOR Object Signing and Encryption (COSE)” heading. The formatting and processing for c5b, c5c, and c5t, and c5u are similar to x5bag, x5chain, x5t, x5u defined in <xref target="I-D.ietf-cose-x509"/> except that the certificates are C509 instead of DER encoded X.509 and uses a COSE_C509 structure instead of COSE_X509. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C509 item served with the application/cbor content format. The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>

<figure><artwork type="CDDL"><![CDATA[
COSE_C509 = C509Certificate / [ 2* C509Certificate ]
]]></artwork></figure>

<t>As the contents of c5bag, c5chain, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>

<t>Note that certificates can also be identified with a ‘kid’ header parameter by storing ‘kid’ and the associated bag or chain in a dictionary.</t>

<figure><artwork><![CDATA[
+-----------+-------+----------------+------------------------------+
| Name      | Label | Value Type     | Description                  |
+===========+=======+================+==============================+
| c5b       |  TBD1 | COSE_C509      | An unordered bag of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5c       |  TBD2 | COSE_C509      | An ordered chain of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5t       |  TBD3 | COSE_CertHash  | Hash of a C509Certificate    |
+-----------+-------+----------------+------------------------------+
| c5u       |  TBD4 | uri            | URI pointing to a COSE_C509  |
|           |       |                | containing a ordered chain   |
|           |       |                | of certificates              |
+-----------+-------+----------------+------------------------------+
]]></artwork></figure>

</section>
<section anchor="tls" title="TLS Certificate Types Registry">

<t>This document registers the following entry in the “TLS Certificate Types” registry under the “Transport Layer Security (TLS) Extensions” heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as as X509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).</t>

<t>EDITOR’S NOTE: The TLS registrations should be discussed and approved by the TLS WG at a later stage. When COSE WG has adopted work on C509 certificates, it could perhaps be presented in the TLS WG. The TLS WG might e.g. want a separate draft in the TLS WG.</t>

<figure><artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork></figure>

</section>
<section anchor="tags" title="CBOR Tags Registry">

<t>This document registers the following entries in the “CBOR Tags” registry under the “Concise Binary Object Representation (CBOR) Tags” heading.</t>

<figure><artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C509                                       |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC2986;
&RFC4108;
&RFC5280;
&RFC8152;
&RFC8174;
&RFC8610;
&RFC8742;
&RFC8949;
&I-D.ietf-cose-x509;
&I-D.ietf-cbor-tags-oid;
<reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
  <front>
    <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
    <author >
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>

&RFC6487;
&RFC7228;
&RFC7925;
&RFC7932;
&RFC8446;
&RFC8603;
&RFC8879;
&RFC9000;
&I-D.ietf-lake-edhoc;
&I-D.ietf-tls-dtls13;
&I-D.ietf-uta-tls13-iot-profile;
&I-D.ietf-tls-ctls;
&I-D.ietf-emu-eap-tls13;
&I-D.ietf-emu-eaptlscert;
<reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
  <front>
    <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.6"</title>
    <author initials="." surname="CA/Browser Forum">
      <organization></organization>
    </author>
    <date year="2021" month="June"/>
  </front>
</reference>
<reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
  <front>
    <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 2.3"</title>
    <author initials="." surname="CA/Browser Forum">
      <organization></organization>
    </author>
    <date year="2021" month="May"/>
  </front>
</reference>
<reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
    <author initials="." surname="Institute of Electrical and Electronics Engineers">
      <organization></organization>
    </author>
    <date year="2018" month="August"/>
  </front>
  <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
</reference>
<reference anchor="GSMA-eUICC" target="https://www.gsma.com/esim/wp-content/uploads/2021/02/SGP.14-v2.1.pdf">
  <front>
    <title>GSMA eUICC PKI Certificate Policy Version 2.1</title>
    <author initials="." surname="GSMA">
      <organization></organization>
    </author>
    <date year="2021" month="February"/>
  </front>
</reference>
<reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
  <front>
    <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
    <author initials="F." surname="Forsby">
      <organization></organization>
    </author>
    <author initials="M." surname="Furuhed">
      <organization></organization>
    </author>
    <author initials="P." surname="Papadimitratos">
      <organization></organization>
    </author>
    <author initials="S." surname="Raza">
      <organization></organization>
    </author>
    <date year="2018" month="July"/>
  </front>
  <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
</reference>
<reference anchor="CborMe" target="http://cbor.me/">
  <front>
    <title>CBOR Playground</title>
    <author initials="C." surname="Bormann">
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>


    </references>


<section anchor="appA" title="Example C509 Certificates">

<section anchor="example-rfc-7925-profiled-x509-certificate" title="Example RFC 7925 profiled X.509 Certificate">

<t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>

<figure><artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2020 GMT
            Not After : Feb  2 00:00:00 2021 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
         30:44:02:20:44:5d:79:8c:90:e7:f5:00:dc:74:7a:65:4c:ec:
         6c:fa:6f:03:72:76:e1:4e:52:ed:07:fc:16:29:4c:84:66:0d:
         02:20:5a:33:98:5d:fb:d4:bf:dd:6d:4a:cf:38:04:c3:d4:6e:
         bf:3b:7f:a6:26:40:67:4f:c0:35:4f:a0:56:db:ae:a6

]]></artwork></figure>

<t>The DER encoding of the above certificate is 314 bytes.</t>

<figure><artwork><![CDATA[
30 82 01 36 30 81 DE A0 03 02 01 02 02 03 01 F5 0D 30 0A 06 08 2A 86
48 CE 3D 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0C 0B 52 46 43 20
74 65 73 74 20 43 41 30 1E 17 0D 32 30 30 31 30 31 30 30 30 30 30 30
5A 17 0D 32 31 30 32 30 32 30 30 30 30 30 30 5A 30 22 31 20 30 1E 06
03 55 04 03 0C 17 30 31 2D 32 33 2D 34 35 2D 46 46 2D 46 45 2D 36 37
2D 38 39 2D 41 42 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86
48 CE 3D 03 01 07 03 42 00 04 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E
69 3F 16 21 3A 04 52 5E D4 44 50 B1 01 9C 2D FD 38 38 AB AC 4E 14 D8
6C 09 83 ED 5E 9E EF 24 48 C6 86 1C C4 06 54 71 77 E6 02 60 30 D0 51
F7 79 2A C2 06 A3 0F 30 0D 30 0B 06 03 55 1D 0F 04 04 03 02 07 80 30
0A 06 08 2A 86 48 CE 3D 04 03 02 03 47 00 30 44 02 20 44 5D 79 8C 90
E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1 4E 52 ED 07 FC 16 29
4C 84 66 0D 02 20 5A 33 98 5D FB D4 BF DD 6D 4A CF 38 04 C3 D4 6E BF
3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding" title="Example C509 Certificate Encoding">

<t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'445D798C90E7F500DC747A654CEC6CFA6F037276E14E52ED07
    FC16294C84660D5A33985DFBD4BFDD6D4ACF3804C3D46EBF3B
    7FA62640674FC0354FA056DBAEA6'

]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>

<figure><artwork><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 44 5D 79 8C 90 E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1
4E 52 ED 07 FC 16 29 4C 84 66 0D 5A 33 98 5D FB D4 BF DD 6D 4A CF 38
04 C3 D4 6E BF 3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork></figure>

</section>
<section anchor="example-natively-signed-c509-certificate" title="Example: Natively Signed C509 Certificate">

<t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for c509CertificateType and signatureValue.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'B27A0B781455F71B68290F6C2EC9A897F18FDE9B6C59575953
    BC67268AB0E4DDE99D273E04E4715383AB2257C6AAA35284E5
    ED18BDB91247E9F2C433136480B9'

]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>

<figure><artwork><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 B2 7A 0B 78 14 55 F7 1B 68 29 0F 6C 2E C9 A8 97 F1 8F DE 9B 6C
59 57 59 53 BC 67 26 8A B0 E4 DD E9 9D 27 3E 04 E4 71 53 83 AB 22 57
C6 AA A3 52 84 E5 ED 18 BD B9 12 47 E9 F2 C4 33 13 64 80 B9
]]></artwork></figure>

</section>
<section anchor="example-additonal-keys-for-the-example-certificates" title="Example: Additonal Keys for the Example Certificates">

<t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC8152"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>

<figure><artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork></figure>

<figure><artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork></figure>

</section>
</section>
<section anchor="example-ieee-8021ar-profiled-x509-certificate" title="Example IEEE 802.1AR profiled X.509 Certificate">

<t>EDITOR’S NOTE: To do</t>

</section>
<section anchor="example-cab-baseline-ecdsa-https-x509-certificate" title="Example CAB Baseline ECDSA HTTPS X.509 Certificate">

<t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>

<figure><artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding-1" title="Example C509 Certificate Encoding">

<t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>

</section>
</section>
<section anchor="example-cab-baseline-rsa-https-x509-certificate" title="Example CAB Baseline RSA HTTPS X.509 Certificate">

<t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>

<figure><artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding-2" title="Example C509 Certificate Encoding">

<t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>

</section>
</section>
</section>
<section numbered="no" anchor="acknowledgments" title="Acknowledgments">

<t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombinini, Thomas Peterson, Michael Richardson, Maik Reichert, Stefan Santesson, Jim Schaad, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and helping with GitHub.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

