<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ftbs-rats-msg-wrap-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="RATS CMW">RATS Conceptual Messages Wrapper</title>
    <seriesInfo name="Internet-Draft" value="draft-ftbs-rats-msg-wrap-01"/>
    <author initials="H." surname="Birkolz" fullname="Henk Birkolz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization>Intel</organization>
      <address>
        <email>ned.smith@intel.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>arm</organization>
      <address>
        <email>thomas.fossati@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>arm</organization>
      <address>
        <email>hannes.tschofenig@arm.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="20"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>evidence</keyword>
    <keyword>attestation result</keyword>
    <keyword>endorsement</keyword>
    <keyword>reference value</keyword>
    <abstract>
      <t>This document defines two encapsulation formats for RATS conceptual
messages (i.e., evidence, attestation results, endorsements and
reference values.)</t>
      <t>The first format uses a CBOR or JSON array with two members: one for the
type, another for the value.  The other format wraps the value in a CBOR
byte string and prepends a CBOR tag to convey the type information.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The RATS architecture defines a handful of conceptual messages
(see <xref section="8" sectionFormat="of" target="I-D.ietf-rats-architecture"/>), such as evidence and attestation results.
Each conceptual message can have multiple claims encoding and serialization
formats (<xref section="9" sectionFormat="of" target="I-D.ietf-rats-architecture"/>). Such serialized message may
have to be transported via different protocols - for example, evidence
using an EAT <xref target="I-D.ietf-rats-eat"/> encoding serialized as a CBOR payload in
a "background check" topological arrangement, or attestation results as
Attestation Results for Secure Interactions (AR4SI) <xref target="I-D.ietf-rats-ar4si"/> payloads
in "passport" mode.</t>
      <t>In order to minimize the cost associated with registration and maximize
interoperability, it is desirable to reuse their typing information
across such boundaries.</t>
      <t>This document defines two encapsulation formats for RATS conceptual
messages that aim to achieve the goals stated above.</t>
      <t>These encapsulation formats are designed to be:</t>
      <ul spacing="normal">
        <li>Self-describing - which removes the dependency on the framing provided
by the embedding protocol (or the storage system) to convey exact
typing information.</li>
        <li>Based on media types - which allows amortising their registration cost
across many different usage scenarios.</li>
      </ul>
      <t>A protocol designer could use these formats, for example, to convey
evidence, endorsements or reference values in certificates and CRLs
extensions (<xref target="DICE-arch"/>), to embed attestation results or evidence as
first class authentication credentials in TLS handshake messages
<xref target="I-D.fossati-tls-attestation"/>, to transport attestation-related payloads in RESTful APIs,
or for stable storage of attestation results in form of file system
objects.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> is used to describe the
data formats.</t>
      <t>The reader is assumed to be familiar with the vocabulary and concepts
defined in <xref target="I-D.ietf-rats-architecture"/>.</t>
    </section>
    <section anchor="conceptual-message-wrapper-encodings">
      <name>Conceptual Message Wrapper Encodings</name>
      <t>Two types of RATS Conceptual Message Wrapper (CMW) are specified in this
document:</t>
      <ol spacing="normal" type="1"><li>a CMW using a CBOR or a JSON array (<xref target="type-n-val"/>)</li>
        <li>a CMW based on CBOR tags (<xref target="cbor-tag"/>).</li>
      </ol>
      <section anchor="type-n-val">
        <name>CMW Array</name>
        <t>The CMW array illustrated in <xref target="fig-cddl"/> is composed of two members:</t>
        <ul spacing="normal">
          <li>type: either a text string representing a media-type (and optional
parameters) <xref target="RFC6838"/> or an unsigned integer corresponding to a
CoAP Content-Format <xref target="RFC7252"/></li>
          <li>value: the RATS conceptual message serialized according to the
value defined in the type member.</li>
        </ul>
        <t>A CMW array can be encoded as CBOR <xref target="STD94"/> or JSON <xref target="RFC8259"/>.</t>
        <t>When using JSON, the value field is encoded as Base64 using the URL and
filename safe alphabet (Section 5 of <xref target="RFC4648"/>) without padding.</t>
        <t>When using CBOR, the value field is encoded as a CBOR byte string.</t>
        <figure anchor="fig-cddl">
          <name>CDDL definition</name>
          <artwork type="cddl" align="left"><![CDATA[
cmw = [ type, value ]

type = coap-content-format / media-type

coap-content-format = uint .size 2
media-type = text .abnf ("media-type" .cat RFC6838)

value = cbor-bytes / base64-string

cbor-bytes = bytes
base64-string = text .regexp "[A-Za-z0-9_-]+"

RFC6838 = '
media-type = type-name "/" subtype-name *1("+" suffix) parameters

type-name = restricted-name
subtype-name = restricted-name

; see https://www.iana.org/assignments/media-type-structured-suffix/
suffix = "xml" / "json" / "ber" / "cbor" / "der" / "fastinfoset" /
         "wbxml" / "zip" / "tlv" / "json-seq" / "sqlite3" / "jwt" /
         "gzip" / "cbor-seq" / "zstd"

parameters = *(";" parameter-name "=" parameter-value)

parameter-name = restricted-name
parameter-value = *VCHAR

restricted-name = restricted-name-first *126restricted-name-chars
restricted-name-first  = ALPHA / DIGIT
restricted-name-chars  = ALPHA / DIGIT / "!" / "#" / "$" / "&" / "-" /
                         "^" / "_"
restricted-name-chars =/ "." ; Characters before first dot always
                             ; specify a facet name
restricted-name-chars =/ "+" ; Characters after last plus always
                             ; specify a structured syntax suffix

VCHAR = %x21-7E            ; Visible (printing) characters
ALPHA = %x41-5A / %x61-7A  ; A-Z / a-z
DIGIT = %x30-39            ; 0-9
'
]]></artwork>
        </figure>
      </section>
      <section anchor="cbor-tag">
        <name>CMW CBOR Tags</name>
        <t>CBOR Tags used as CMW are derived from CoAP Content Format values.
If a CoAP Content Format exists for a RATS conceptual message, the
TN() transform defined in <xref section="B" sectionFormat="of" target="RFC9277"/> can be used to
derive a corresponding CBOR tag in range [1668546817, 1668612095].</t>
        <t>The RATS conceptual message is first serialized according to the Content
Format associated with the tag and then encoded as a CBOR byte string,
to which the tag is prepended.</t>
        <section anchor="use-of-pre-existing-cbor-tags">
          <name>Use of Pre-existing CBOR Tags</name>
          <t>If a CBOR tag has been registered in association with a certain RATS
conceptual message independently of a CoAP Content Format (i.e., it is
not obtained by applying the TN() transform), it can be readily used as
an encapsulation without the extra processing described in <xref target="cbor-tag"/>.</t>
          <t>A consumer can always distinguish tags that have been derived via TN(),
which all fall in the [1668546817, 1668612095] range, from tags that
are not, and therefore apply the right decapsulation on receive.</t>
        </section>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The (equivalent) examples below assume the media-type
<tt>application/vnd.example.rats-conceptual-msg</tt> has been registered
alongside a corresponding CoAP content format <tt>30001</tt>.  The CBOR tag
<tt>1668576818</tt> is derived applying the TN transform as described in
<xref target="cbor-tag"/>.</t>
      <figure anchor="fig-example-cbor">
        <name>CBOR encoding</name>
        <artwork type="cbor-diag" align="left"><![CDATA[
[
  30001,
  h'abcdabcd'
]
]]></artwork>
      </figure>
      <figure anchor="fig-example-json">
        <name>JSON encoding</name>
        <artwork type="cbor-diag" align="left"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  "q82rzQ"
]
]]></artwork>
      </figure>
      <figure anchor="fig-example-cbor-tag">
        <name>CBOR tag</name>
        <artwork type="cbor-diag" align="left"><![CDATA[
1668576818(h'abcdabcd')
]]></artwork>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document defines two encapsulation formats for RATS
conceptual messages. The messages themselves and their
encoding ensure security protection. For this reason
there are no further security requirements raised by
the introduction of this encapsulation.</t>
      <t>Changing the encapsulation of a payload by an adversary
will result in incorrect processing of the encapsulated
messages and this will subsequently lead to a processing
error.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>When registering a new media type for evidence, in addition to its
syntactical description, the author <bcp14>SHOULD</bcp14> provide a public and stable
description of the signing and appraisal procedures associated with
the data format.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed: , , and  for the construction of constants; / for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-architecture">
          <front>
            <title>Remote Attestation Procedures Architecture</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="September" year="2022"/>
            <abstract>
              <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-22"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="9" month="October" year="2022"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine how much
   it wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-16"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="6" month="September" year="2022"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-03"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <date day="26" month="August" year="2022"/>
            <abstract>
              <t>   Various attestation technologies have been developed and formats have
   been standardized.  Examples include the Entity Attestation Token
   (EAT) and Trusted Platform Modules (TPMs).  Once attestation
   information has been produced on a device it needs to be communicated
   to a relying party.  This information exchange may happen at
   different layers in the protocol stack.

   This specification provides a generic way of passing attestation
   information in the TLS handshake.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-01"/>
        </reference>
        <reference anchor="DICE-arch" target="https://trustedcomputinggroup.org/wp-content/uploads/DICE-Attestation-Architecture-r23-final.pdf">
          <front>
            <title>DICE Attestation Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2021" month="March"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
