<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cbor-file-magic-10" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="cbor-file-magic">On storing CBOR encoded items on stable storage</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-file-magic-10"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Postfach 330440</street>
          <city>D-28359 Bremen</city>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <area>Internet</area>
    <workgroup>CBOR Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines an on-disk format for CBOR objects that
is friendly to common on-disk recognition systems such as the Unix file(1) command.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cbor-file-magic/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        cbor Working Group mailing list (<eref target="mailto:cbor@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cbor/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cbor-wg/cbor-magic-number"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Since very early in computing, operating systems have sought ways to mark which files could be processed by which programs.
In Unix, everything is a stream of bytes (related to the TCP/IP
socket model, where all network connectivity also is a stream of
bytes); identifying the contents of a stream of bytes became a heuristic activity.</t>
      <t>For instance, the Unix file(1) command, which has existed since 1973 <xref target="file"/>, has for decades been able to identify many file formats based upon the contents of the file.</t>
      <t>Many systems (Linux, macOS, Windows) will select the correct application based upon the file contents, if the system can not determine it by other means.
For instance, in classical MacOS, a resource fork was maintained that includes media type ("MIME type") information and therefore ideally never needs to know anything about the file.</t>
      <t>But, many other systems do this by file extensions.
Many common web servers derive the MIME-type information from file extensions.</t>
      <t>Having a media type associated with the file is a better solution in
general.
When files become disconnected from their type information, such as when attempting to do forensics on a damaged system, then being able to identify a file type can become very important.</t>
      <t>It is noted that in the media type registration, that a magic number is asked for, if available, as is a file extension.</t>
      <t>A challenge for the file(1) program is often that it can be confused by the encoding vs the content.
For instance, an Android "apk" used to transfer and store an application may be identified as a ZIP file.
Additionally, both OpenOffice and MSOffice files are ZIP files of XML files, and may also be identified as a ZIP file.</t>
      <t>As CBOR becomes a more and more common encoding for a wide variety of artifacts, identifying them as just "CBOR" is probably not sufficient.
This document provides a way to encode a magic number into the beginning of a CBOR format file.
Two possible methods of enveloping data are presented: a CBOR Protocol author will specify one.
(A CBOR Protocol is a specification which uses CBOR as its encoding.)</t>
      <t>A third method is also proposed by which this CBOR format prepended tag is used to identify non-CBOR files.
This third method has been placed in an appendix because it is not
about identifying media types containing CBOR-encoded data items.</t>
      <t>This document also gives advice to designers of CBOR protocols on
choosing one of these mechanisms for identifying their contents.
This advice is informative.</t>
      <t>Examples of CBOR Protocols currently under development include CoSWID <xref target="I-D.ietf-sacm-coswid"/> and EAT <xref target="I-D.ietf-rats-eat"/>.
COSE itself <xref target="RFC8152"/> is considered infrastructure, however the encoding of public keys in CBOR as described in <xref target="I-D.ietf-cose-cbor-encoded-cert"/> would be an identified CBOR Protocol as well.</t>
      <t>A major inspiration for this document is observing the mess in certain
ASN.1 based systems where most files are PEM encoded; these are then all identified by the extension "pem", confusing public keys, private keys, certificate requests, and S/MIME content.</t>
      <t>While the envelopes defined in this specification add information to how data conforming to CBOR Protocols are stored in files, there is no requirement that either type of envelope be transferred on the wire.</t>
      <t>In addition to the on-disk identification aspects, there are some protocols which may benefit from having such a magic number on the wire if they are presently using a different (legacy) encoding scheme.
The presence of the identifiable magic sequence signals that CBOR is
being used as opposed to a legacy scheme.</t>
      <t>In addition, for convenience, <xref target="headers"/> defines a simple way to
retroactively add a magic number to content-formats as defined by
<xref target="RFC7252"/>, even if not in CBOR form.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Byte is a synonym for octet.
The term "byte string" refers to the data item defined in <xref target="STD94"/>.</t>
        <t>The term "diagnostic notation" refers to the human-readable notation
for CBOR data items defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>.</t>
        <t>The term CDDL (Concise Data Definition Language) refers to the
language defined in <xref target="RFC8610"/>.</t>
      </section>
      <section anchor="requirements-for-a-magic-number">
        <name>Requirements for a Magic Number</name>
        <t>A magic number is ideally a fingerprint that is unique to a CBOR protocol, present in the first few (small multiple of 4) bytes of the file,
which does not change when the contents change, and does not depend upon the length of the file.</t>
        <t>Less ideal solutions have a pattern that needs to be matched, but in which some bytes need to be ignored.
While the Unix file(1) command can be told to ignore certain bytes, this can lead to ambiguities.</t>
      </section>
    </section>
    <section anchor="protocol">
      <name>Protocol</name>
      <t>This Section presents two enveloping methods.  Which one is to be used is up to the CBOR Protocol author to determine.
Both use CBOR Tags in a way that results in a deterministic first 8 to 12 bytes.</t>
      <section anchor="the-cbor-protocol-specific-tag">
        <name>The CBOR Protocol Specific Tag</name>
        <t>In both enveloping methods,
CBOR Protocol designers need to obtain a CBOR tag for each kind of object that they might store on disk.
As there are more than 4 billion available 4-byte tags, there should be little issue in allocating a few to each available CBOR Protocol.</t>
        <t>The IANA policy for 4-byte CBOR Tags is First Come First Served, so all that is required is an email to IANA, having filled in the small template provided in <xref section="9.2" sectionFormat="of" target="RFC8949"/>.</t>
        <t>This tag needs to be allocated by the author of the CBOR Protocol.
In order to be in the four-byte range, and so that there are no
leading zeros, the value needs to be in the range 0x01000000 (decimal
16777216) to 0xFFFFFFFF (decimal 4294967295).
It is further suggested to avoid values that have an embedded zero byte in
the four bytes of their binary representation (such as 0x12003456).</t>
        <t>The use of a sequence of four US-ASCII codes which are mnemonic to the protocol is encouraged, but not required.</t>
        <t>For CBOR data items that form a representation that is
described by a CoAP Content-Format Number (<xref section="12.3" sectionFormat="of" target="RFC7252"/>,
Registry
<xref section="CoAP Content-Formats" relative="#content-formats" sectionFormat="bare" target="IANA.core-parameters"/>
of <xref target="IANA.core-parameters"/>),
a tag number has already been allocated in <xref target="iana-ct-tags"/> (see <xref target="ct-tags"/>
for details and examples).</t>
      </section>
      <section anchor="wrapped">
        <name>Enveloping Method: CBOR Tag Wrapped</name>
        <t>The CBOR Tag Wrapped method is appropriate for use with CBOR protocols that encode a single CBOR data item.
This data item is enveloped into two nested tags:</t>
        <t>The outer tag is a Self-described CBOR tag, 55799, as
described in <xref section="3.4.6" sectionFormat="of" target="RFC8949"/>.</t>
        <t>The tag content of that tag is a second CBOR Tag that has been allocated to describe the specific Protocol involved, as described above.</t>
        <t>This method wraps the CBOR value as tags usually do.
Applications that need to send the CBOR value across a constrained link may wish to remove the two tags if the use is implicitly understood.</t>
        <t>Whether these two tags should be removed for specific further processing is a decision made by the CBOR Protocol specification.</t>
        <section anchor="tag-wrap-example">
          <name>Example</name>
          <t>To construct an example without registering a new tag, we use the technique described in <xref target="ct-tags"/> to translate the Content-Format number registered for <tt>application/senml+cbor</tt>, the number 112, into the tag 1668546560+112 = 1668546672.</t>
          <t>With this tag, the SenML-CBOR pack <tt>[{0: "current", 6: 3, 2: 1.5}]</tt> would be enveloped as (in diagnostic notation):</t>
          <sourcecode type="cbor-diag">
55799(1668546672([{0: "current", 6: 3, 2: 1.5}]))
</sourcecode>
          <t>Or in hex:</t>
          <sourcecode type="cbor-pretty">
d9 d9f7                       # tag(55799)
   da 63740070                # tag(1668546672)
      81                      # array(1)
         a3                   # map(3)
            00                # unsigned(0)
            67                # text(7)
               63757272656e74 # "current"
            06                # unsigned(6)
            03                # unsigned(3)
            02                # unsigned(2)
            f9 3e00           # primitive(15872)
</sourcecode>
          <t>At the representation level, the unique fingerprint for <tt>application/senml+cbor</tt> is composed of the 8 bytes d9d9f7da63740070 hex, after which the unadorned CBOR data (81... for the SenML data) is appended.</t>
        </section>
      </section>
      <section anchor="sequences">
        <name>Enveloping Method: Labeled CBOR Sequence</name>
        <t>The Labeled CBOR Sequence method is appropriate for use with CBOR Sequences as described in <xref target="RFC8742"/>.</t>
        <t>This method prepends a newly constructed, separate data item to the
CBOR Sequence, the <em>label</em>.</t>
        <t>The label is a nesting of two tags, similar to but distinct from the
CBOR Tag Wrapped methods, with an inner tag content of a constant byte
string.
The total length of the label is 12 bytes.</t>
        <ol spacing="normal" type="1"><li>The outer tag is the self-described CBOR Sequence tag, 55800.</li>
          <li>The inner tag is a CBOR tag, from the First Come First Served space, that uniquely identifies the CBOR Protocol.
As with CBOR Tag Wrapped, the use of a four-byte tag is encouraged that encodes without zero bytes.</li>
          <li>The tag content is a three byte CBOR byte string containing
0x42_4F_52 ('BOR' in diagnostic notation).</li>
        </ol>
        <t>The outer tag in the label identifies the file as being a CBOR Sequence, and does so with all
the desirable properties explained in <xref section="3.4.6" sectionFormat="of" target="RFC8949"/>.
Specifically, it does not appear to conflict with any known file types, and it is not valid Unicode in any Unicode encoding.</t>
        <t>The inner tag in the label identifies which CBOR Protocol is used, as described above.</t>
        <t>The inner tag content is a constant byte string which is represented as
0x43_42_4f_52, the ASCII characters "CBOR",
which is the CBOR encoded data item for the three-byte string
0x42_4f_52 ('BOR' in diagnostic notation).</t>
        <t>The actual CBOR Protocol data then follow as the next data item(s) in the CBOR Sequence, without a need for any further specific tag.
The use of a CBOR Sequence allows the application to trivially remove the first item with the two tags.</t>
        <t>Should this file be reviewed by a human (directly in an
editor, or in a hexdump display), it will include the ASCII characters "CBOR" prominently.
This value is also included simply because the inner nested tag needs to tag something.</t>
      </section>
    </section>
    <section anchor="advice-to-protocol-developers">
      <name>Advice to Protocol Developers</name>
      <t>This document introduces a choice between wrapping a single CBOR data item into a (pair of) identifying CBOR tags, or prepending an identifying encoded CBOR data item (which in turn contains a pair of identifying CBOR tags) to a CBOR Sequence (which might be single data item).</t>
      <t>Which should a protocol designer use?</t>
      <t>In this discussion, one assumes that there is an object stored in a file, perhaps specified by a system operator in a configuration file.</t>
      <t>For example: a private key used in COSE operations, a public key/certificate in C509 or CBOR format, a recorded sensor reading stored for later transmission, or a COVID vaccination certificate that needs to be displayed in QR code form.</t>
      <t>Both the Labeled CBOR Sequence and the wrapped tag can be trivially removed by an application before sending the CBOR content out on the wire.</t>
      <t>The Labeled CBOR Sequence can be slightly easier to remove as in most cases, CBOR parsers will return it as a unit, and then return the actual CBOR item, which could be anything at all, and could include CBOR tags that <em>do</em> need to be sent on wire.</t>
      <t>On the other hand, having the Labeled CBOR Sequence in the file requires that all programs that expect to examine that file are able to skip what appears to be a CBOR item with two tags nested around a three-byte byte string.
Programs which might not expect the Labeled CBOR Sequence, but which would operate without a problem would include any program that expects to process CBOR Sequences from the file.</t>
      <t>As an example of where there was a problem with previous security systems, "PEM" format certificate files grew to be able to contain multiple certificates by simple concatenation.
The PKCS1 format could also contain a private key object followed by a one or more certificate objects: but only when in PEM format.
Annoyingly, when in binary DER format (which like CBOR is self-delimiting), concatenation of certificates was not compatible with most programs as they did not expect to read more than one item in the file.</t>
      <t>The use of CBOR Tag Wrapped format is easier to retrofit to an existing format with existing and unchangeable on-disk format for a single CBOR data item.
This new sequence of tags is expected to be trivially ignored by many
existing programs when reading CBOR from disk, even if the program only
supports decoding a single data item (and not a CBOR sequence).
But, a naive program might also then transmit the additional tags across the network.
Removing the CBOR Tag Wrapped format requires knowledge of the two tags involved.
Other tags present might be needed.</t>
      <t>For a representation matching a specific media-type that is carried in
a CBOR byte string, the byte string head will already have to be
removed for use as such a representation, so it should be easy to
remove the enclosing tag heads as well.
This is of particular interest with the pre-defined tags provided by
<xref target="ct-tags"/> for media-types with CoAP Content-Format numbers.</t>
      <t>Here are some considerations in the form of survey questions:</t>
      <section anchor="is-the-on-wire-format-new">
        <name>Is the on-wire format new?</name>
        <t>If the on-wire format is new, then it could be specified with the CBOR Tag Wrapped format if the extra eight bytes are not a problem.
The disk format is then identical to the on-wire format.</t>
        <t>If the eight bytes are a problem on the wire (and they often are if CBOR is being considered), then the Labeled CBOR Sequence format should be adopted for on-disk storage.</t>
      </section>
      <section anchor="can-many-items-be-trivially-concatenated">
        <name>Can many items be trivially concatenated?</name>
        <t>If the programs that read the contents of the file already expect to process all of the CBOR data items in the file (not just the first), then the Labeled CBOR Sequence format may be easily retrofitted.</t>
        <t>The program involved may throw errors or warnings on the Labeled CBOR Sequence if they have not yet been updated, but this may not be a problem.</t>
        <t>There are situations where multiple objects may be concatenated into a single file.
If each object is preceded by a  Labeled CBOR Sequence label then there may be
multiple such labels in the file.
<!-- ???If it is, then consideration should be given to CBOR Tag Wrapped instead.??? -->
        </t>
        <t>A protocol based on CBOR Sequences may specify that Labeled CBOR
Sequence labels can occur within a CBOR Sequence, possibly even to
switch to data items following in the sequence that are of a different type.</t>
        <t>If the CBOR Sequence based protocol does not define the semantics for
or at least tolerate embedded labels, care must be taken when
concatenating Labeled CBOR Sequences to remove the label from all but
the first part.</t>
        <aside>
          <t>As an example from legacy PEM encoded PKIX certificates, many programs accept a series of PKIX certificates in a single file in order to set up a certificate chain.
The file would contain not just the End-Entity (EE) certificate, but also any subordinate certification authorities (CA) needed to validate the EE.
This mechanism actually only works for PEM encoded certificates, and not DER encoded certificates.
One of the reasons for this specification is to make sure that CBOR encoded certificates do not suffer from this problem.</t>
          <t>As an example of mixing of types, some TLS server programs also can accept both their PEM encoded private key, and their PEM encoded certificate in the same file.</t>
        </aside>
        <t>If only one item is ever expected in the file, the use of Labeled CBOR Sequence may present an implementation hurdle to programs that previously just read a single data item and used it.</t>
      </section>
      <section anchor="are-there-tags-at-the-start">
        <name>Are there tags at the start?</name>
        <t>If the Protocol expects to use other tags values at the top-level, then it may be easier to explain if the Labeled CBOR Sequence format is used.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document provides a way to identify CBOR Protocol objects.
Clearly identifying CBOR contents on disk may have a variety of impacts.</t>
      <t>The most obvious is that it may allow malware to identify interesting objects on disk, and then exfiltrate or corrupt them.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><xref target="cbor-sequence-tag"/> documents the allocation that was done for a
CBOR tag to be used in a CBOR sequence to identify the sequence (an
example for using this tag is found in <xref target="openswan"/>).
<xref target="iana-ct-tags"/> allocates a CBOR tag for each actual or
potential CoAP Content-Format number (examples are in <xref target="ct-tags"/>).</t>
      <section anchor="cbor-sequence-tag">
        <name>Labeled CBOR Sequence Tag</name>
        <t>IANA has allocated tag 55800 as the tag for the Labeled CBOR Sequence
Enveloping Method.</t>
        <t>This tag is from the First Come/First Served area.</t>
        <t>The value has been picked to have properties similar to the 55799 tag (<xref section="3.4.6" sectionFormat="of" target="RFC8949"/>).</t>
        <t>The hexadecimal representation of the encoded tag head is: 0xd9_d9_f8.</t>
        <t>This is not valid UTF-8: the first 0xd9 introduces a three-byte sequence in UTF-8, but the 0xd9 as the second value is not a valid second byte for UTF-8.</t>
        <t>This is not valid UTF-16: the byte sequence 0xd9d9 (in either endian order) puts this value into the UTF-16 high-half zone, which would signal that this a 32-bit Unicode value.  However, the following 16-bit big-endian value 0xf8.. is not a valid second sequence according to <xref target="RFC2781"/>.
On a little-endian system, it would be necessary to examine the fourth byte to determine if it is valid.  That next byte is determined by the subsequent encoding, and <xref section="3.4.6" sectionFormat="of" target="RFC8949"/> has already determined that no valid CBOR encodings result in valid UTF-16.</t>
        <dl newline="true">
          <dt>Data Item:</dt>
          <dd>
            <t>tagged byte string
<!-- ouch: this needs to be updated in the registry -->
            </t>
          </dd>
          <dt>Semantics:</dt>
          <dd>
            <t>indicates that the file contains CBOR Sequences</t>
          </dd>
        </dl>
      </section>
      <section anchor="cbor-labeled-non-cbor-data-tag">
        <name>CBOR-Labeled Non-CBOR Data Tag</name>
        <t>IANA is requested to allocate tag 55801 as the tag for the CBOR-Labeled Non-CBOR Data
Enveloping Method (<xref target="headers"/>).</t>
        <t>This tag is from the First Come/First Served area.</t>
        <t>The value has been picked to have properties similar to the 55799 tag (<xref section="3.4.6" sectionFormat="of" target="RFC8949"/>).</t>
        <t>The hexadecimal representation of the encoded tag head is: 0xd9_d9_f9.</t>
        <t>This is not valid UTF-8: the first 0xd9 introduces a three-byte sequence in UTF-8, but the 0xd9 as the second value is not a valid second byte for UTF-8.</t>
        <t>This is not valid UTF-16: the byte sequence 0xd9d9 (in either endian order) puts this value into the UTF-16 high-half zone, which would signal that this a 32-bit Unicode value.  However, the following 16-bit big-endian value 0xf9.. is not a valid second sequence according to <xref target="RFC2781"/>.
On a little-endian system, it would be necessary to examine the fourth byte to determine if it is valid.  That next byte is determined by the subsequent encoding, and <xref section="3.4.6" sectionFormat="of" target="RFC8949"/> has already determined that no valid CBOR encodings result in valid UTF-16.</t>
        <dl newline="true">
          <dt>Data Item:</dt>
          <dd>
            <t>tagged byte string
<!-- ouch: this needs to be updated in the registry -->
            </t>
          </dd>
          <dt>Semantics:</dt>
          <dd>
            <t>indicates that the file starts with a CBOR-Labeled Non-CBOR Data label.</t>
          </dd>
        </dl>
      </section>
      <section anchor="iana-ct-tags">
        <name>CBOR Tags for CoAP Content-Format Numbers</name>
        <t>IANA is requested to allocate the
tag numbers 1668546560 (0x63740000) to
1668612095 (0x6374FFFF) as follows:</t>
        <dl newline="true">
          <dt>Data Item:</dt>
          <dd>
            <t>byte string
<!-- Er, hmm. -->
            </t>
          </dd>
          <dt>Semantics:</dt>
          <dd>
            <t>for each tag number NNNNNNNN, the representation of content-format (RFC7252) NNNNNNNN-1668546560</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
        </dl>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <referencegroup anchor="STD94" target="https://www.rfc-editor.org/info/std94">
          <!-- reference.RFC.8949.xml -->
<reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
            <front>
              <title>Concise Binary Object Representation (CBOR)</title>
              <author fullname="C. Bormann" initials="C." surname="Bormann">
                <organization/>
              </author>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman">
                <organization/>
              </author>
              <date month="December" year="2020"/>
              <abstract>
                <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
                <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="94"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq".  A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation.  This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="file" target="https://en.wikipedia.org/wiki/File_%28command%29">
          <front>
            <title>file (command)</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2021" month="January" day="20"/>
          </front>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-sacm-coswid" target="https://www.ietf.org/archive/id/draft-ietf-sacm-coswid-21.txt">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jessica Fitzgerald-McKay">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Charles Schmidt">
              <organization>The MITRE Corporation</organization>
            </author>
            <author fullname="David Waltermire">
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an
   extensible XML-based structure to identify and describe individual
   software components, patches, and installation bundles.  SWID tag
   representations can be too large for devices with network and storage
   constraints.  This document defines a concise representation of SWID
   tags: Concise SWID (CoSWID) tags.  CoSWID supports a similar set of
   semantics and features as SWID tags, as well as new semantics that
   allow CoSWIDs to describe additional types of information, all in a
   more memory efficient format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sacm-coswid-21"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat" target="https://www.ietf.org/archive/id/draft-ietf-rats-eat-12.txt">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <date day="24" month="February" year="2022"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a phone, IoT device, network equipment or such.  This claims set is
   used by a relying party, server or service to determine how much it
   wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.  To a large degree, all this document
   does is extend CWT and JWT.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-12"/>
        </reference>
        <reference anchor="RFC8152" target="https://www.rfc-editor.org/info/rfc8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert" target="https://www.ietf.org/archive/id/draft-ietf-cose-cbor-encoded-cert-03.txt">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="January" year="2022"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-03"/>
        </reference>
        <reference anchor="RFC2781" target="https://www.rfc-editor.org/info/rfc2781">
          <front>
            <title>UTF-16, an encoding of ISO 10646</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="F. Yergeau" initials="F." surname="Yergeau">
              <organization/>
            </author>
            <date month="February" year="2000"/>
            <abstract>
              <t>This document describes the UTF-16 encoding of Unicode/ISO-10646, addresses the issues of serializing UTF-16 as an octet stream for transmission over the Internet, discusses MIME charset naming as described in [CHARSET-REG], and contains the registration for three MIME charset parameter values: UTF-16BE (big-endian), UTF-16LE (little- endian), and UTF-16.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2781"/>
          <seriesInfo name="DOI" value="10.17487/RFC2781"/>
        </reference>
        <reference anchor="I-D.ietf-core-new-block" target="https://www.ietf.org/archive/id/draft-ietf-core-new-block-14.txt">
          <front>
            <title>Constrained Application Protocol (CoAP) Block-Wise Transfer Options Supporting Robust Transmission</title>
            <author fullname="Mohamed Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Jon Shallow">
	 </author>
            <date day="26" month="May" year="2021"/>
            <abstract>
              <t>   This document specifies alternative Constrained Application Protocol
   (CoAP) Block-Wise transfer options: Q-Block1 and Q-Block2 Options.

   These options are similar to, but distinct from, the CoAP Block1 and
   Block2 Options defined in RFC 7959.  Q-Block1 and Q-Block2 Options
   are not intended to replace Block1 and Block2 Options, but rather
   have the goal of supporting Non-confirmable messages for large
   amounts of data with fewer packet interchanges.  Also, the Q-Block1
   and Q-Block2 Options support faster recovery should any of the blocks
   get lost in transmission.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-new-block-14"/>
        </reference>
      </references>
    </references>
    <section anchor="ct-tags">
      <name>CBOR Tags for CoAP Content Formats</name>
      <t><xref section="5.10.3" sectionFormat="of" target="RFC7252"/> defines the concept of a Content-Format,
which is a short 16-bit unsigned integer that identifies a specific
content type (media type plus optionally parameters), optionally
together with a content encoding.</t>
      <t>Outside of a transfer protocol that indicates the Content-Format for a representation, it may be necessary to identify the Content-Format of the representation when it is on disk, in firmware, or when debugging.</t>
      <t>This specification allocates CBOR tag numbers 1668546560 (0x63740000) to
1668612095 (0x6374FFFF) for the tagging of representations of specific
content formats.
The tag content tagged with tag number NNNNNNNN (in above range) is a byte
string that is to be interpreted as a representation of the content
format NNNNNNNN-1668546560.</t>
      <t>Exceptionally, when used immediately as tag content of one of the tags
55799, 55800, or 55801, the tag content is as follows:</t>
      <dl>
        <dt>Tag 55799 (<xref target="wrapped"/>):</dt>
        <dd>
          <t>One of:
</t>
          <ol spacing="normal" type="1"><li>The CBOR data item within the representation (without byte string
wrapping).  This only works for Content Formats that are represented
by a single CBOR data item in identity content-coding.</li>
            <li>The data items in the CBOR sequence within the representation, without byte string
wrapping, but wrapped in a CBOR array.
This works for Content Formats that are represented
by a CBOR sequence in identity content-coding.</li>
          </ol>
        </dd>
        <dt>Tags 55800 (<xref target="sequences"/>) or 55801 (<xref target="headers"/>):</dt>
        <dd>
          <t>the byte string 'BOR', signifying that the representation of the
given content-format follows in the file, in the way defined for these tags.</t>
        </dd>
      </dl>
      <section anchor="ct-examples">
        <name>Content-Format Tag Examples</name>
        <t>Registry <xref section="Content-Formats" relative="#content-formats" sectionFormat="bare" target="IANA.core-parameters"/> of <xref target="IANA.core-parameters"/> defines content formats that can be used as examples:</t>
        <ul spacing="normal">
          <li>
            <t>As discussed in <xref target="tag-wrap-example"/>, Content-Format 112 stands for
media type application/senml+cbor (no parameters).
The corresponding tag number is 1668546672 (i.e., 1668546560+112).  </t>
            <t>
So the following CDDL snippet can be used to identify
application/senml+cbor representations:  </t>
            <sourcecode type="cddl">
senml-cbor = #6.1668546672(bstr)
</sourcecode>
            <t>
Note that a byte string is used as the type of the tag content, because a
media type representation in general can be any byte string.</t>
          </li>
          <li>
            <t>Content-Format 272 stands for media type
application/missing-blocks+cbor-seq, a CBOR sequence
<xref target="I-D.ietf-core-new-block"/>.  </t>
            <t>
The corresponding tag number is 1668546832 (i.e., 1668546560+272).  </t>
            <t>
So the following CDDL snippet can be used to identify
application/missing-blocks+cbor-seq representations as embedded in a
CBOR byte string:  </t>
            <sourcecode type="cddl">
missing-blocks = #6.1668546832(bstr)
</sourcecode>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="openswan">
      <name>Example from Openswan</name>
      <t>The Openswan IPsec project has a daemon ("pluto"), and two control programs ("addconn", and "whack").
They communicate via a Unix-domain socket, over which a C-structure containing pointers to strings is serialized using a bespoke mechanism.
This is normally not a problem as the structure is compiled by the same compiler; but when there are upgrades it is possible for the daemon and the control programs to get out of sync by the bespoke serialization.
As a result, there are extra compensations to deal with shutting the daemon down.
During testing it is sometimes the case that upgrades are backed out.</t>
      <t>In addition, when doing unit testing, the easiest way to load policy is to use the
normal policy reading process, but that is not normally loaded in the daemon.
Instead the IPC that is normally sent across the wire is compiled/serialized and placed in a file.
The above magic number is included in the file, and also on the IPC in order to distinguish the "shutdown" command CBOR operation.</t>
      <t>In order to reduce the problems due to serialization, the serialization is being changed to CBOR.
Additionally, this change allows the IPC to be described by CDDL, and for any language that encode to CBOR can be used.</t>
      <t>IANA has allocated the tag 1330664270, or 0x4f_50_53_4e for this purpose.
As a result, each file and each IPC is prefixed with a CBOR TAG Sequence.</t>
      <t>In diagnostic notation:</t>
      <sourcecode type="cbor-diag">
55800(1330664270(h'424F52'))
</sourcecode>
      <t>Or in hex:</t>
      <sourcecode type="cbor-pretty">
D9 D9F8         # tag(55800)
   DA 4F50534E  # tag(1330664270)
      43        # bytes(3)
         424F52 # "BOR"
</sourcecode>
    </section>
    <section anchor="headers">
      <name>Using CBOR Labels for non-CBOR data</name>
      <t>The CBOR-Labeled non-CBOR data method is appropriate for adding a magic number to a
non-CBOR data format, particularly one that can be described by a
Content-Format tag (<xref target="ct-tags"/>).</t>
      <t>This method prepends a CBOR data item to the non-CBOR data; this data
item is called the "header" and, similarly to the Labeled
CBOR-Sequence label, consists of two nested tags around a constant
byte string for a total of 12 bytes.</t>
      <ol spacing="normal" type="1"><li>The outer tag is the CBOR-Labeled Non-CBOR Data tag, 55801.</li>
        <li>The inner tag is a CBOR tag, from the First Come First Served space, that uniquely identifies the CBOR Protocol.
As with CBOR Tag Wrapped, the use of a four-byte tag is encouraged that encodes without zero bytes.</li>
        <li>The tag content is a three byte CBOR byte string containing
0x42_4F_52 ('BOR' in diagnostic notation).</li>
      </ol>
      <t>The outer tag in the label identifies the file as being file as being prefixed by a non-CBOR
data label, and does so with all
the desirable properties explained in <xref section="3.4.6" sectionFormat="of" target="RFC8949"/>.
Specifically, it does not appear to conflict with any known file types, and it is not valid Unicode in any Unicode encoding.</t>
      <t>The inner tag in the label identifies which non-CBOR Protocol is used.</t>
      <t>The inner tag content is a constant byte string which is represented as
0x43_42_4f_52, the ASCII characters "CBOR",
which is the CBOR encoded data item for the three-byte string
0x42_4f_52 ('BOR' in diagnostic notation).</t>
      <t>The actual non-CBOR Protocol data then follow directly appended to the
CBOR representation of the header.
This allows the application to trivially remove the header item with
the two nested tags and the byte string.</t>
      <t>Should this file be reviewed by a human (directly in an
editor, or in a hexdump display), it will include the ASCII characters
"CBOR" prominently to indicate the nature of the header.
This value is also included simply because the two tags need to tag something.</t>
      <section anchor="header-ct-examples">
        <name>Content-Format Tag Examples</name>
        <t>Registry <xref section="Content-Formats" relative="#content-formats" sectionFormat="bare" target="IANA.core-parameters"/> of <xref target="IANA.core-parameters"/> defines content formats that can be used as examples:</t>
        <ul spacing="normal">
          <li>
            <t>Content-Format 432 stands for media type application/td+json (no
parameters).
The corresponding tag number is 1668546992 (i.e., 1668546560+432).  </t>
            <t>
So the following CDDL snippet can be used to identify a CBOR-Labeled non-CBOR data  for application/td+json representations:  </t>
            <sourcecode type="cddl">
td-json-header = #6.55801(#6.1668546992('BOR'))
</sourcecode>
          </li>
          <li>
            <t>Content-Format 11050 stands for media type application/json in
deflate content-coding.  </t>
            <t>
The corresponding tag number is 1668557610 (i.e., 1668546560+11050).  </t>
            <t>
So the following CDDL snippet can be used to identify a CBOR-Labeled non-CBOR data  for application/json representations compressed in deflate content-coding:  </t>
            <sourcecode type="cddl">
json-deflate-header = #6.55801(#6.1668557610('BOR'))
</sourcecode>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The CBOR WG brainstormed this protocol on January 20, 2021 via a number of productive email exchanges on the mailing list.</t>
      <!--  LocalWords:  prepending COVID exfiltrate
 -->

</section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J. 'Jeff'" surname="Sipek" fullname="Josef 'Jeff' Sipek">
        <organization/>
        <address>
          <email>jeffpc@josefsipek.net</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
