<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.11 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4108 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
<!ENTITY RFC5280 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
<!ENTITY RFC8152 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8610 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
<!ENTITY RFC8742 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
<!ENTITY RFC8949 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
<!ENTITY I-D.ietf-cose-x509 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-x509.xml">
<!ENTITY I-D.ietf-cbor-tags-oid SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cbor-tags-oid.xml">
<!ENTITY RFC7228 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
<!ENTITY RFC7925 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
<!ENTITY RFC7932 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
<!ENTITY RFC8446 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY RFC8603 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
<!ENTITY RFC8879 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
<!ENTITY I-D.ietf-lake-edhoc SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
<!ENTITY I-D.ietf-tls-dtls13 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-dtls13.xml">
<!ENTITY I-D.ietf-uta-tls13-iot-profile SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
<!ENTITY I-D.ietf-tls-ctls SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
<!ENTITY I-D.ietf-emu-eap-tls13 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emu-eap-tls13.xml">
<!ENTITY I-D.ietf-emu-eaptlscert SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emu-eaptlscert.xml">
<!ENTITY I-D.ietf-quic-transport SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-quic-transport.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc tocdepth="2"?>

<rfc ipr="trust200902" docName="draft-mattsson-cose-cbor-cert-compress-08" category="std">

  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>

    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>

    <date year="2021" month="February" day="22"/>

    
    
    

    <abstract>


<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and significantly reduces the size of certificates compatible with e.g. RFC 7925, IEEE 802.1AR (DevID), CNSA, and CA/Browser Forum Baseline Requirements. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%.  The CBOR encoded structure can alternatively be signed directly (“natively signed”), which does not require re-encoding for the signature to be verified. The document also specifies COSE headers as well as a TLS certificate type for C509 certificates.</t>

<t>NOTE: “C509” is a placeholder, name to be decided by the COSE WG.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">

<t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="I-D.ietf-emu-eap-tls13"/> <xref target="I-D.ietf-emu-eaptlscert"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips and QUIC <xref target="I-D.ietf-quic-transport"/> where the latency increases significantly unless the server only send less than three times as many bytes as received prior to validating the client address. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc.</t>

<t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. <xref target="RFC8610"/> also extends the diagnostic notation.</t>

<t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>.</t>

<t>CAB Baseline Requirements <xref target="CAB-Baseline"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="I-D.ietf-quic-transport"/>, DTLS <xref target="I-D.ietf-tls-dtls13"/>, COSE <xref target="RFC8152"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of <xref target="RFC5280"/>. The encoding support all <xref target="RFC7925"/> and IEEE 802.1AR <xref target="IEEE-802.1AR"/> and CAB Baseline <xref target="CAB-Baseline"/> profiled X.509 certificates. The resulting certificates are called C509 Certificates. Two variants  are defined using the same CBOR encoding and differing only in what is being signed:</t>

<t><list style="numbers">
  <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
  <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
</list></t>

<t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>

<t>This document specifies COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>. The document also specifies a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>

</section>
<section anchor="notational-conventions" title="Notational Conventions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>This specification makes use of the terminology in <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>.</t>

</section>
<section anchor="encoding" title="CBOR Encoding">

<t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, and CAB Baseline <xref target="CAB-Baseline"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compressions algorithms, see <xref target="fig-table"/>.</t>

<t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>

<t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>

<section anchor="message-fields" title="Message Fields">

<t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>

<t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>

<t><list style="symbols">
  <t>version. The ‘version’ field is encoded in the ‘cborCertificateType’ CBOR int. The field ‘cborCertificateType’ also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (cborCertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (cborCertificateType = 1), see <xref target="type"/>.</t>
  <t>serialNumber. The ‘serialNumber’ INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) ‘certificateSerialNumber’. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
  <t>signature. The ‘signature’ field is always the same as the ‘signatureAlgorithm’ field and therefore omitted from the CBOR encoding.</t>
  <t>issuer. In the general case, the sequence of ‘RelativeDistinguishedName’ is encoded as a CBOR array of CBOR arrays of Attributes. Typically each RelativeDistinguishedName only contains a single attribute and the sequence is then ecoded as a CBOR array of Attributes. Each Attribute is encoded as a (CBOR int, CBOR text string) pair or as a (unwrapped CBOR OID, CBOR bytes) pair. The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributes SHALL have a positive sign. Text strings SHALL still adhere to any X.509 restrictions, i.e. serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded ‘common name’ it is encoded as a CBOR text string. If the text string contains an EUI-64 of the form “HH-HH-HH-HH-HH-HH-HH-HH” where ‘H’ is one of the symbol ‘0’–’9’ or ‘A’–’F’ it is encoded as a CBOR byte string of length 8 instead. EUI-64 mapped from a 48-bit MAC address (i.e. of the form “HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string of length 6.</t>
  <t>validity. The ‘notBefore’ and ‘notAfter’ fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value “99991231235959Z” (no expiration date) is encoded as CBOR null.</t>
  <t>subject. The ‘subject’ is encoded exactly like issuer.</t>
  <t>subjectPublicKeyInfo.  The ‘AlgorithmIdentifier’ field including parameters is encoded as the CBOR int ‘subjectPublicKeyAlgorithm’ (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the ‘subjectPublicKey’ BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
  <t>issuerUniqueID. Not supported.</t>
  <t>subjectUniqueID. Not supported.</t>
  <t>extensions. The ‘extensions’ field is encoded as a CBOR array where each extension is encoded as either a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type or an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/> followed by a CBOR bool encoding ‘critical’ and the DER encoded value of the ‘extnValue’ encoded as a CBOR byte string. If the array contains exactly two ints and the absolute value of the first int is 2, the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted ‘extensions’ field is encoded as an empty CBOR array.</t>
  <t>signatureAlgorithm. The ‘signatureAlgorithm’ field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="I-D.ietf-cbor-tags-oid"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
  <t>signatureValue. In general, the ‘signatureValue’ BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
</list></t>

<t>The following Concise Data Definition Language (CDDL) defines CBORCertificate and TBSCertificate, which are encoded as CBOR Sequences <xref target="RFC8742"/>. The member names therefore only have documentary value.</t>

<figure title="CDDL for CBORCertificate." anchor="fig-CBORCertCDDL"><artwork type="CDDL" align="center"><![CDATA[
; The elements of the following group are to be used in a CBOR Sequence:
CBORCertificate = (
   TBSCertificate,
   issuerSignatureValue : any,
)

TBSCertificate = (
   cborCertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / [ algorithm: ~oid, ? parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, critical: bool, extensionValue: bytes )

]]></artwork></figure>

</section>
<section anchor="alg-encoding" title="Encoding of subjectPublicKey and issuerSingatureValue">

<section anchor="encoding-of-subjectpublickey" title="Encoding of subjectPublicKey">

<t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>

<t>For elliptic curve public keys in Weirstraß form (id-ecPublicKey), uncompressed keys are point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. If a DER encoded certificate with a point compressed public key of type id-ecPublicKey is CBOR encoded, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>

</section>
<section anchor="encoding-of-issuersingaturevalue" title="Encoding of issuerSingatureValue">

<t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shortest INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>

</section>
</section>
<section anchor="ext-encoding" title="Encoding of Extensions">

<t>This section details the encoding of the ‘extensions’ field. The ‘extensions’ field is encoded as a CBOR array where each extensionID is encoded as either a CBOR int or a CBOR OID tag. If ‘extensionID’ is encoded an int (see <xref target="extype"/>),the sign is used to encode if the extension is critical and the ‘critical’ field is omitted. Critical extensions are encoded with a positive sign and non-critical extensions are encoded with a negative sign.</t>

<t>The ‘extnValue’ OCTET STREAM value field is encoded as the CBOR byte string ‘extensionValue’ except for the extensions specified below. The ‘extensionValue’ for the extensions mandated to be supported by <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, and <xref target="CAB-Baseline"/> are encoded as follows:</t>

<t><list style="symbols">
  <t>keyUsage. The ‘KeyUsage’ BIT STRING is interpreted as an unsigned integer n in network byte order and encoded as a CBOR int.</t>
  <t>subjectAltName. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When ‘otherName + hardwareModuleName’ is used, then [ oid, bytes ] is used to identify the pair ( hwType, hwSerialEntries ) directly as specified in <xref target="RFC4108"/>.</t>
</list></t>

<figure><artwork><![CDATA[
   GeneralNames = [ + GeneralName ] / text
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
]]></artwork></figure>

<t><list style="symbols">
  <t>basicConstraints. If ‘cA’ = false then extensionValue = -2, if ‘cA’ = true and ‘pathLenConstraint’ is not present then extensionValue = -1, and if ‘cA’ = true and ‘pathLenConstraint’ is present then extensionValue = pathLenConstraint.</t>
  <t>extKeyUsage. extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>) or unwrapped CBOR OID tags <xref target="I-D.ietf-cbor-tags-oid"/> where each int or OID tag encodes a key usage purpose. If the array contains a single int, the array is omitted.</t>
</list></t>

<figure><artwork><![CDATA[
   ExtValueEKU = [ + int / ~oid ] / int
]]></artwork></figure>

<t><list style="symbols">
  <t>subjectKeyIdentifier. extensionValue is the value of the ‘keyIdentifier’ field encoded as a CBOR byte string.</t>
  <t>authorityKeyIdentifier. extensionValue is encoded as an array where the value of the ‘keyIdentifier’ is encoded as a CBOR byte string, ‘GeneralNames’ is encoded like in subjectAltName, and ‘AuthorityCertSerialNumber’ is encoded as ~biguint exactly like certificateSerialNumber. Omitted values are encoded as CBOR null.</t>
</list></t>

<figure><artwork><![CDATA[
   ExtValueAKI = [ keyIdentifier: bytes / null,
                   certIssuer: GeneralNames / null,
                   certSerialNumber: CertificateSerialNumber / null ]
               / bytes
]]></artwork></figure>

<t><list style="symbols">
  <t>cRLDistributionPoints. If the cRLDistributionPoints is a sequence of DistributionPointName, it is encoded like subjectAltName, with the difference that if cRLDistributionPoints contains exactly one uniformResourceIdentifier, the array and the int are omitted and extensionValue is the uniformResourceIdentifier encoded as a CBOR text string.</t>
  <t>authorityInfoAccess. If authorityInfoAccess consist of only uniformResourceIdentifiers it is encoded as an array of uris.</t>
</list></t>

<figure><artwork><![CDATA[
   ExtValueAIA = [ + ( ocsp : 1 // caIssuers : 2 , uri : text ) ]
]]></artwork></figure>

<section anchor="example-encoding-of-extensions" title="Example Encoding of Extensions">

<t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>

<t><list style="symbols">
  <t>A critical basicConstraints (‘cA’ = true) without pathLenConstraint is encoded as the two CBOR ints -1, -1.</t>
  <t>A non-critical keyUsage with digitalSignature and keyAgreement asserted is encoded as the two CBOR ints 2, 17 (2^0 + 2^4 = 17).</t>
  <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 3 followed by the CBOR array [ 3, 6 ].</t>
  <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 4 followed by the CBOR text string “example.com”.</t>
</list></t>

<t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -1, -1, 2, 17, 3, [ 3, 6 ], 4, “example.com” ].</t>

</section>
</section>
</section>
<section anchor="compliance-requirements-for-constrained-iot" title="Compliance Requirements for Constrained IoT">

<t>For general purpose applications, the normative requirements of <xref target="RFC5280"/> applies. This section describes the mandatory to implement algorithms and OIDs for constrained IoT application; the values of the OIDs including certificate fields and extensions, time format, attributes in distinguished names, etc.</t>

<t>TODO: Write this section</t>

</section>
<section anchor="dep-set" title="Legacy Considerations">

<t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. In order to verify the signature, the C509 certificate is used to recreate the original X.509 data structure to be able to verify the signature.</t>

<t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>

<t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>

<t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>

</section>
<section anchor="expected-certificate-sizes" title="Expected Certificate Sizes">

<t>The CBOR encoding of the sample certificate given in <xref target="appA"/> results in the numbers shown in <xref target="fig-table"/>. After <xref target="RFC7925"/> profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms will be small, mainly corresponding to making the ASN.1 encoding more compact. For Brtoli <xref target="RFC7932"/>, the brotli command line tool 1.09 was used with the default best compression level.</t>

<figure title="Comparing Sizes of Certificates (bytes)" anchor="fig-table"><artwork align="center"><![CDATA[
+------------------+--------------+------------+--------------------+
|                  |   RFC 7925   |   Brotli   |  C509 Certificate  |
+------------------+---------------------------+--------------------+
| Certificate Size |     314      |     303    |         138        |
+------------------+--------------+------------+--------------------+
]]></artwork></figure>

</section>
<section anchor="sec-cons" title="Security Considerations">

<t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>

<t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>

<t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>

<t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>

</section>
<section anchor="iana" title="IANA Considerations">

<t>This document creates several new registries under the new heading “C509 Certificate”. For all items, the ‘Reference’ field points to this document.</t>

<t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaning values in the interval [-65536, 65535] have 3 byte encodings.</t>

<section anchor="type" title="C509 Certificate Types Registry">

<t>IANA has created a new registry titled “C509 Certificate Types” under the new heading “C509 Certificate”. The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”.  The initial contents of the registry are:</t>

<figure title="C509 Certificate Types" anchor="fig-types"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="atttype" title="C509 Certificate Attributes Registry">

<t>IANA has created a new registry titled “C509 Certificate Attributes” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. Only non-negative values can be registered. For values in the interval [0, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Attributes" anchor="fig-attrtype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     1 | Name:            Common Name                              |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Postal Code                              |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Given Name                               |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Generation Qualifier                     |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            DN Qualifier                             |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Organization Identifier                  |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="extype" title="C509 Certificate Extensions Registry">

<t>IANA has created a new registry titled “C509 Certificate Extensions” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, DER, Comments, extensionValue, and Reference, where Value is an integer, and the other columns are text strings. Only non-negative values can be registered. For values in the interval [0, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Extensions" anchor="fig-extype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     0 | Name:            Subject Key Identifier                   |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|     1 | Name:            Key Usage                                |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  int                                      |
+-------+-----------------------------------------------------------+
|     2 | Name:            Subject Alternative Name                 |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  [ + ( int, any ) ] / text                |
+-------+-----------------------------------------------------------+
|     3 | Name:            Basic Constraints                        |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  int                                      |
+-------+-----------------------------------------------------------+
|     4 | Name:            CRL Distribution Points                  |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  [ + ( int, any ) ] / text                |
+-------+-----------------------------------------------------------+
|     5 | Name:            Certificate Policies                     |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  [ + ( oid, ? text ) ]                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Authority Key Identifier                 |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|     7 | Name:            Extended Key Usage                       |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  int                                      |
+-------+-----------------------------------------------------------+
|     8 | Name:            Authority Information Access             |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:  [ + ( 1 / 2 , text ) ]                   |
+-------+-----------------------------------------------------------+
|     9 | Name:            Signed Certificate Timestamp List        |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  [ bytes, ~biguint,                       |
|       |                    AlgorithmIdentifier, bytes]            |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  bytes                                    |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="EKU" title="C509 Certificate Extended Key Usages Registry">

<t>IANA has created a new registry titled “C509 Certificate Extended Key Usages” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Extended Key Usages" anchor="fig-ekutype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extended Key Usage                                        |
+=======+===========================================================+
|     1 | Name:            TLS Server authentication                |
|       | OID:             1.3.6.1.5.5.7.3.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            TLS Client Authentication                |
|       | OID:             1.3.6.1.5.5.7.3.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Code Signing                             |
|       | OID:             1.3.6.1.5.5.7.3.3                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)                |
|       | OID:             1.3.6.1.5.5.7.3.4                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 04            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Time Stamping                            |
|       | OID:             1.3.6.1.5.5.7.3.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 08            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            OCSP Signing                             |
|       | OID:             1.3.6.1.5.5.7.3.9                        |
|       | DER:             06 08 2B 06 01 05 05 07 03 09            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="GN" title="C509 Certificate General Names Registry">

<t>IANA has created a new registry titled “C509 Certificate General Names” under the new heading “C509 Certificate”. The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate General Names" anchor="fig-gn"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="sigalg" title="C509 Certificate Signature Algorithms Registry">

<t>IANA has created a new registry titled “C509 Certificate Signature Algorithms” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Signature Algorithms" anchor="fig-sigalgs"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="pkalg" title="C509 Certificate Public Key Algorithms Registry">

<t>IANA has created a new registry titled “C509 Certificate Public Key Algorithms” under the new heading “C509 Certificate”. The columns of the registry are Value, Name, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. T The initial contents of the registry are:</t>

<figure title="C509 Certificate Public Key Algorithms" anchor="fig-pkalgs"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstrass) with secp256r1   |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstrass) with secp384r1   |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstrass) with secp521r1   |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="cose" title="COSE Header Parameters Registry">

<t>EDITORS NOTE: Should x5u refer to a bag or a chain? The text should be moved a section and not be in the IANA Section.</t>

<t>This document registers the following entries in the “COSE Header Parameters” registry under the “CBOR Object Signing and Encryption (COSE)” heading. The formatting and processing for c5b, c5c, and c5t, and c5u are similar to x5bag, x5chain, x5t, x5u defined in <xref target="I-D.ietf-cose-x509"/> except that the certificates are CBOR encoded instead of DER encoded, uses a COSE_C5 structure instead of COSE_X509, and that c5t MUST refer to an end-entity certificate. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C5 item served with the application/cbor content format. The COSE_C5 structure used in c5b, c5c, and c5u is defined as:</t>

<figure><artwork type="CDDL"><![CDATA[
COSE_C5 = [ + CBORCertificate ]
]]></artwork></figure>

<t>As the contents of c5bag, c5chain, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>

<t>Note that certificates can also be identified with a ‘kid’ header parameter by storing ‘kid’ and the associated bag or chain in a dictionary.</t>

<figure><artwork><![CDATA[
+-----------+-------+----------------+------------------------------+
| Name      | Label | Value Type     | Description                  |
+===========+=======+================+==============================+
| c5b       |  TBD1 | COSE_C5        | An unordered bag of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5c       |  TBD2 | COSE_C5        | An ordered chain of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5t       |  TBD3 | COSE_CertHash  | Hash of a C509 certificate   |
+-----------+-------+----------------+------------------------------+
| c5u       |  TBD4 | uri            | URI pointing to a COSE_C5    |
|           |       |                | containing a ordered chain   |
|           |       |                | of certificates              |
+-----------+-------+----------------+------------------------------+
]]></artwork></figure>

</section>
<section anchor="tls" title="TLS Certificate Types Registry">

<t>This document registers the following entry in the “TLS Certificate Types” registry under the “Transport Layer Security (TLS) Extensions” heading. The new certificate type can be used with addtional TLS certificate compression <xref target="RFC8879"/>.</t>

<t>EDITOR’S NOTE: The TLS registrations should be discussed and approved by the TLS WG at a later stage. When COSE WG has adopted work on C509 certificates, it could perhaps be presented in the TLS WG. The TLS WG might e.g. want a separate draft in the TLS WG.</t>

<figure><artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork></figure>

</section>
<section anchor="tags" title="CBOR Tags Registry">

<t>This document registers the following entries in the “CBOR Tags” registry under the “Concise Binary Object Representation (CBOR) Tags” heading.</t>

<figure><artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C5                                         |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC4108;
&RFC5280;
&RFC8152;
&RFC8174;
&RFC8610;
&RFC8742;
&RFC8949;
&I-D.ietf-cose-x509;
&I-D.ietf-cbor-tags-oid;
<reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
  <front>
    <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
    <author >
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>

&RFC7228;
&RFC7925;
&RFC7932;
&RFC8446;
&RFC8603;
&RFC8879;
&I-D.ietf-lake-edhoc;
&I-D.ietf-tls-dtls13;
&I-D.ietf-uta-tls13-iot-profile;
&I-D.ietf-tls-ctls;
&I-D.ietf-emu-eap-tls13;
&I-D.ietf-emu-eaptlscert;
&I-D.ietf-quic-transport;
<reference anchor="CAB-Baseline" target="https://cabforum.org/baseline-requirements-documents/">
  <front>
    <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.3</title>
    <author initials="." surname="CA/Browser Forum">
      <organization></organization>
    </author>
    <date year="2020" month="October"/>
  </front>
</reference>
<reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
    <author initials="." surname="Institute of Electrical and Electronics Engineers">
      <organization></organization>
    </author>
    <date year="2018" month="August"/>
  </front>
  <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
</reference>
<reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
  <front>
    <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
    <author initials="F." surname="Forsby">
      <organization></organization>
    </author>
    <author initials="M." surname="Furuhed">
      <organization></organization>
    </author>
    <author initials="P." surname="Papadimitratos">
      <organization></organization>
    </author>
    <author initials="S." surname="Raza">
      <organization></organization>
    </author>
    <date year="2018" month="July"/>
  </front>
  <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
</reference>


    </references>


<section anchor="appA" title="Example C509 Certificates">

<section anchor="example-rfc-7925-profiled-x509-certificate" title="Example RFC 7925 profiled X.509 Certificate">

<t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>

<figure><artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2020 GMT
            Not After : Feb  2 00:00:00 2021 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
         30:44:02:20:44:5d:79:8c:90:e7:f5:00:dc:74:7a:65:4c:ec:
         6c:fa:6f:03:72:76:e1:4e:52:ed:07:fc:16:29:4c:84:66:0d:
         02:20:5a:33:98:5d:fb:d4:bf:dd:6d:4a:cf:38:04:c3:d4:6e:
         bf:3b:7f:a6:26:40:67:4f:c0:35:4f:a0:56:db:ae:a6

]]></artwork></figure>

<t>The DER encoding of the above certificate is 314 bytes.</t>

<figure><artwork><![CDATA[
30 82 01 36 30 81 DE A0 03 02 01 02 02 03 01 F5 0D 30 0A 06 08 2A 86
48 CE 3D 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0C 0B 52 46 43 20
74 65 73 74 20 43 41 30 1E 17 0D 32 30 30 31 30 31 30 30 30 30 30 30
5A 17 0D 32 31 30 32 30 32 30 30 30 30 30 30 5A 30 22 31 20 30 1E 06
03 55 04 03 0C 17 30 31 2D 32 33 2D 34 35 2D 46 46 2D 46 45 2D 36 37
2D 38 39 2D 41 42 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86
48 CE 3D 03 01 07 03 42 00 04 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E
69 3F 16 21 3A 04 52 5E D4 44 50 B1 01 9C 2D FD 38 38 AB AC 4E 14 D8
6C 09 83 ED 5E 9E EF 24 48 C6 86 1C C4 06 54 71 77 E6 02 60 30 D0 51
F7 79 2A C2 06 A3 0F 30 0D 30 0B 06 03 55 1D 0F 04 04 03 02 07 80 30
0A 06 08 2A 86 48 CE 3D 04 03 02 03 47 00 30 44 02 20 44 5D 79 8C 90
E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1 4E 52 ED 07 FC 16 29
4C 84 66 0D 02 20 5A 33 98 5D FB D4 BF DD 6D 4A CF 38 04 C3 D4 6E BF
3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding" title="Example C509 Certificate Encoding">

<t>The CBOR encoding of the same X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'445D798C90E7F500DC747A654CEC6CFA6F037276E14E52ED07
    FC16294C84660D5A33985DFBD4BFDD6D4ACF3804C3D46EBF3B
    7FA62640674FC0354FA056DBAEA6

]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>

<figure><artwork><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 44 5D 79 8C 90 E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1
4E 52 ED 07 FC 16 29 4C 84 66 0D 5A 33 98 5D FB D4 BF DD 6D 4A CF 38
04 C3 D4 6E BF 3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork></figure>

</section>
<section anchor="example-natively-signed-c509-certificate" title="Example: Natively Signed C509 Certificate">

<t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for cborCertificateType and signatureValue.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  6,
  h'B27A0B781455F71B68290F6C2EC9A897F18FDE9B6C59575953
    BC67268AB0E4DDE99D273E04E4715383AB2257C6AAA35284E5
    ED18BDB91247E9F2C433136480B9'

]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>

<figure><artwork><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 B2 7A 0B 78 14 55 F7 1B 68 29 0F 6C 2E C9 A8 97 F1 8F DE 9B 6C
59 57 59 53 BC 67 26 8A B0 E4 DD E9 9D 27 3E 04 E4 71 53 83 AB 22 57
C6 AA A3 52 84 E5 ED 18 BD B9 12 47 E9 F2 C4 33 13 64 80 B9
]]></artwork></figure>

</section>
<section anchor="example-additonal-keys-for-the-example-certificates" title="Example: Additonal Keys for the Example Certificates">

<t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC8152"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>

<figure><artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork></figure>

<figure><artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork></figure>

</section>
</section>
<section anchor="example-ieee-8021ar-profiled-x509-certificate" title="Example IEEE 802.1AR profiled X.509 Certificate">

<t>EDITOR’S NOTE: To do</t>

</section>
<section anchor="example-cab-baseline-ecdsa-https-x509-certificate" title="Example CAB Baseline ECDSA HTTPS X.509 Certificate">

<t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>

<figure><artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding-1" title="Example C509 Certificate Encoding">

<t>The CBOR encoding of the first X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "IE",
 -8, "Baltimore",
 -9, "CyberTrust",
 -1, "Baltimore CyberTrust Root"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
  6, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
  0, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
  2, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
 -1, 1,
  7, [1, 2],
  4, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
      "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
  5, [h'6086480186FD6C0101', "https://www.digicert.com/CPS", 2],
  8, [1, "http://ocsp.digicert.com",
      2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
 -3, -2,
  9, ...
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork></figure>

</section>
</section>
<section anchor="example-cab-baseline-rsa-https-x509-certificate" title="Example CAB Baseline RSA HTTPS X.509 Certificate">

<t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>

<figure><artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding-2" title="Example C509 Certificate Encoding">

<t>The CBOR encoding of the first X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
 -3, -2,
  7, [ 1, 2 ],
 -1, 5,
  4, "http://crl.starfieldtech.com/sfig2s1-242.crl",
  5, [ h'6086480186fd6e01071701',
       "http://certificates.starfieldtech.com/repository/", 1 ],
  8, [1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt"],
  6, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
  2, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
  0, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
  9, [
       h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164
         E3',
       1715,
       1,
       h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE9
         0FBCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE645
         4995',
       h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70E
         CA',
       2012,
       1,
       h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B2872
         6DFC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F8
         6CE6'
     ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 1242 bytes.</t>

</section>
</section>
</section>
<section numbered="no" anchor="acknowledgments" title="Acknowledgments">

<t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

