<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-msg-wrap-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title abbrev="RATS CMW">RATS Conceptual Messages Wrapper (CMW)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-03"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization>Intel</organization>
      <address>
        <email>ned.smith@intel.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization/>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2024" month="January" day="30"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>evidence</keyword>
    <keyword>attestation result</keyword>
    <keyword>endorsement</keyword>
    <keyword>reference value</keyword>
    <abstract>
      <?line 75?>

<t>This document defines two encapsulation formats for RATS conceptual
messages (i.e., Evidence, Attestation Results, Endorsements and
Reference Values.)</t>
      <t>The first encapsulation format uses a CBOR or JSON array with two mandatory members,
one for the type, another for the value, and a third optional member
complementing the type field that says which kind of conceptual
message(s) are carried in the value.
The other format wraps the value in a CBOR byte string and prepends a
CBOR tag to convey the type information.</t>
      <t>This document also defines a corresponding CBOR tag, as well as JSON Web Tokens (JWT) and CBOR Web Tokens (CWT) claims.  These allow embedding the wrapped conceptual messages into CBOR-based protocols and web APIs, respectively.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap"/>.</t>
    </note>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The RATS architecture defines a handful of conceptual messages
(see <xref section="8" sectionFormat="of" target="RFC9334"/>), such as Evidence and Attestation Results.
Each conceptual message can have multiple claims encoding and serialization
formats (<xref section="9" sectionFormat="of" target="RFC9334"/>). Throughout their lifetime, RATS
conceptual messages are typically transported over different protocols.
For example,</t>
      <ul spacing="normal">
        <li>
          <t>EAT <xref target="I-D.ietf-rats-eat"/> Evidence in a "background check" topological
arrangement first flows from Attester to Relying Party, and then from Relying
Party to Verifier, over separate protocol legs.</t>
        </li>
        <li>
          <t>Attestation Results for Secure Interactions (AR4SI) <xref target="I-D.ietf-rats-ar4si"/> payloads in
"passport" mode would be sent by the Verifier to the Attester and then, at a later
point in time and over a different channel, from the Attester to the Relying Party.</t>
        </li>
      </ul>
      <t>It is desirable to reuse any typing information associated with the messages
across such protocol boundaries to minimize the cost associated with
type registrations and maximize interoperability. With the CMW format described
in this document, protocol designers do not need to update protocol specifications
to support different conceptual messages. This approach reduces the implementation
effort for developers to support different attestation technologies. For example,
an implementer of a Relying Party application does not need to parse
attestation-related conceptual messages, such as different Evidence formats,
but can instead utilize the CMW format to be agnostic to the attestation
technology.</t>
      <t>This document defines two encapsulation formats for RATS conceptual
messages that aim to achieve the goals stated above.</t>
      <t>These encapsulation formats have been specifically designed to possess the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>They are self-describing, which means that they can convey precise typing information without relying on the framing provided by the embedding protocol or the storage system.</t>
        </li>
        <li>
          <t>They are based on media types <xref target="RFC6838"/>, which allows the cost of their registration to be spread across numerous usage scenarios.</t>
        </li>
      </ul>
      <t>A protocol designer could use these formats, for example, to convey
Evidence, Endorsements and Reference Values in certificates and CRLs
extensions (<xref target="DICE-arch"/>), to embed Attestation Results or Evidence as
first-class authentication credentials in TLS handshake messages
<xref target="I-D.fossati-tls-attestation"/>, to transport attestation-related payloads in RESTful APIs,
or for stable storage of Attestation Results in the form of file system
objects.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> is used to describe the
data formats.</t>
      <t>The reader is assumed to be familiar with the vocabulary and concepts
defined in <xref target="RFC9334"/>.</t>
      <t>This document reuses the terms defined in <xref section="2" sectionFormat="of" target="RFC9193"/>
(e.g., "Content-Type").</t>
    </section>
    <section anchor="conceptual-message-wrapper-encodings">
      <name>Conceptual Message Wrapper Encodings</name>
      <t>Two types of RATS Conceptual Message Wrapper (CMW) are specified in this
document:</t>
      <ol spacing="normal" type="1"><li>
          <t>A CMW using a CBOR or JSON array (<xref target="type-n-val"/>);</t>
        </li>
        <li>
          <t>A CMW based on CBOR tags (<xref target="cbor-tag"/>).</t>
        </li>
      </ol>
      <t>A further CMW "collection" type that holds together multiple CMW items is defined in <xref target="cmw-coll"/>.</t>
      <t>The collected CDDL is in <xref target="collected-cddl"/>.</t>
      <section anchor="type-n-val">
        <name>CMW Array</name>
        <t>The CMW array format is defined in <xref target="fig-cddl-array"/>.</t>
        <t>The CDDL generic <tt>JC&lt;&gt;</tt> is used where there is a variance between CBOR
and JSON. The first argument is the CDDL for JSON and the second is the
CDDL for CBOR.</t>
        <figure anchor="fig-cddl-array">
          <name>CDDL definition of the Array format</name>
          <artwork type="cddl" align="left"><![CDATA[
cmw-array = [
  type: coap-content-format / media-type
  value: JC<base64-string, bytes>
  ? ind: uint .bits cm-type
]

coap-content-format = uint .size 2
media-type = text .abnf ("Content-Type" .cat Content-Type-ABNF)

base64-string = text .regexp "[A-Za-z0-9_-]+"

cm-type = &(
  reference-values: 0
  endorsements: 1
  evidence: 2
  attestation-results: 3
)
]]></artwork>
        </figure>
        <t>It is composed of three members:</t>
        <dl newline="true">
          <dt><tt>type</tt>:</dt>
          <dd>
            <t>Either a text string representing a Content-Type (e.g., an EAT media type
<xref target="I-D.ietf-rats-eat-media-type"/>) or an unsigned integer corresponding to a CoAP Content-Format
number (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).</t>
          </dd>
          <dt><tt>value</tt>:</dt>
          <dd>
            <t>The RATS conceptual message serialized according to the
value defined in the type member.</t>
          </dd>
          <dt><tt>ind</tt>:</dt>
          <dd>
            <t>An optional bitmap that indicates which conceptual message types are
carried in the <tt>value</tt> field.  Any combination (i.e., any value between
1 and 15, included) is allowed.  This is useful only if the <tt>type</tt> is
potentially ambiguous and there is no further context available to the
CMW consumer to decide.  For example, this might be the case if the base
media type is not profiled (e.g., <tt>application/eat+cwt</tt>), if the <tt>value</tt>
field contains multiple conceptual messages with different types (e.g.,
both Reference Values and Endorsements within the same <tt>application/signed-corim+cbor</tt>), or if the same profile identifier is
shared by different conceptual messages.
Future specifications may add new values to the <tt>ind</tt> field; see <xref target="iana-ind-ext"/>.</t>
          </dd>
        </dl>
        <t>A CMW array can be encoded as CBOR <xref target="STD94"/> or JSON <xref target="STD90"/>.</t>
        <t>When using JSON, the value field is encoded as Base64 using the URL and
filename safe alphabet (<xref section="5" sectionFormat="of" target="RFC4648"/>) without padding.</t>
        <t>When using CBOR, the value field is encoded as a CBOR byte string.</t>
      </section>
      <section anchor="cbor-tag">
        <name>CMW CBOR Tags</name>
        <t>CBOR Tags used as CMW may be derived from CoAP Content-Format numbers.
If a CoAP content format exists for a RATS conceptual message, the
<tt>TN()</tt> transform defined in <xref section="B" sectionFormat="of" target="RFC9277"/> can be used to
derive a corresponding CBOR tag in range [1668546817, 1668612095].</t>
        <t>The RATS conceptual message is first serialized according to the
Content-Format number associated with the CBOR tag and then encoded as a
CBOR byte string, to which the tag is prepended.</t>
        <t>The CMW CBOR Tag is defined in <xref target="fig-cddl-cbor-tag"/>.</t>
        <figure anchor="fig-cddl-cbor-tag">
          <name>CDDL definition of the CBOR Tag format</name>
          <artwork type="cddl" align="left"><![CDATA[
cmw-cbor-tag<bytes> = #6.<cbor-tag-numbers>(bytes)

cbor-tag-numbers = 0..18446744073709551615
]]></artwork>
        </figure>
        <section anchor="use-of-pre-existing-cbor-tags">
          <name>Use of Pre-existing CBOR Tags</name>
          <t>If a CBOR tag has been registered in association with a certain RATS
conceptual message independently of a CoAP content format (i.e., it is
not obtained by applying the <tt>TN()</tt> transform), it can be readily used
as an encapsulation without the extra processing described in
<xref target="cbor-tag"/>.</t>
          <t>A consumer can always distinguish tags that have been derived via
<tt>TN()</tt>, which all fall in the [1668546817, 1668612095] range, from
tags that are not, and therefore apply the right decapsulation on
receive.</t>
        </section>
      </section>
      <section anchor="decapsulation-algorithm">
        <name>Decapsulation Algorithm</name>
        <t>After removing any external framing (for example, the ASN.1 OCTET STRING
if the CMW is carried in a certificate extension <xref target="DICE-arch"/>), the CMW
decoder does a 1-byte lookahead, as illustrated in the following pseudo
code, to decide how to decode the remainder of the byte buffer:</t>
        <artwork><![CDATA[
func CMWTypeSniff(b []byte) (CMW, error) {
  if len(b) == 0 {
    return Unknown
  }

  if b[0] == 0x82 || b[0] == 0x83 {
    return CBORArray
  } else if b[0] >= 0xc0 && b[0] <= 0xdb {
    return CBORTag
  } else if b[0] == 0x5b {
    return JSONArray
  }

  return Unknown
}
]]></artwork>
      </section>
      <section anchor="cmw-coll">
        <name>CMW Collections</name>
        <t>Layered Attesters and composite devices (Sections <xref target="RFC9334" section="3.2" sectionFormat="bare"/> and <xref target="RFC9334" section="3.3" sectionFormat="bare"/> of <xref target="RFC9334"/>) generate Evidence that consists of multiple parts.</t>
        <t>For example, in data center servers, it is not uncommon for separate attesting environments (AE) to serve a subsection of the entire machine.
One AE might measure and attest to what was booted on the main CPU, while another AE might measure and attest to what was booted on a SmartNIC plugged into a PCIe slot, and a third AE might measure and attest to what was booted on the machine's GPU.</t>
        <t>To address the composite Attester use case, this document defines a CMW "collection" as a container that holds several CMW items, each with a label that is unique within the scope of the collection.</t>
        <t>The CMW collection (<xref target="fig-cddl-collection"/>) is defined as a CBOR map or JSON object with CMW values.
The position of a <tt>cmw</tt> entry in the <tt>cmw-collection</tt> is not significant.
Instead, the labels identify a conceptual message that, in the case of a composite Attester, should typically correspond to a component of a system.
Labels can be strings or integers that serve as a mnemonic for different conceptual messages in the collection.</t>
        <figure anchor="fig-cddl-collection">
          <name>CDDL definition of the CMW collection format</name>
          <artwork type="cddl" align="left"><![CDATA[
cmw-collection = {
  + cmw-collection-entry-label => cmw
}

cmw-collection-entry-label = text / int .feature "cbor"
]]></artwork>
        </figure>
        <t>Although initially designed for the composite Attester use case, the CMW collection can be repurposed for other use cases requiring CMW aggregation.</t>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The (equivalent) examples in <xref target="ex-ja"/>, <xref target="ex-ca"/>, and <xref target="ex-ct"/> assume that
the Media-Type-Name <tt>application/vnd.example.rats-conceptual-msg</tt> has been
registered alongside a corresponding CoAP Content-Format number <tt>30001</tt>.  The
CBOR tag <tt>1668576818</tt> is derived applying the <tt>TN()</tt> transform as described in
<xref target="cbor-tag"/>.</t>
      <t>The example in <xref target="ex-ca-ind"/> is a signed CoRIM payload with an explicit CM
indicator <tt>0b0000_0011</tt> (3), meaning that the wrapped message contains both
Reference Values and Endorsements.</t>
      <section anchor="ex-ja">
        <name>JSON Array</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  "q82rzQ"
]
]]></sourcecode>
        <t>Note that a CoAP Content-Format number can also be used with the JSON array
form.  That may be the case when it is known that the receiver can handle CoAP
Content-Formats and it is crucial to save bytes.</t>
      </section>
      <section anchor="ex-ca">
        <name>CBOR Array</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  30001,
  h'2347da55'
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
82             # array(2)
   19 7531     # unsigned(30001)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
        <t>Note that a Media-Type-Name can also be used with the CBOR array form,
for example if it is known that the receiver cannot handle CoAP
Content-Formats, or (unlike the case in point) if a CoAP Content-Format
number has not been registrered.</t>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  h'2347da55'
]
]]></sourcecode>
      </section>
      <section anchor="ex-ct">
        <name>CBOR Tag</name>
        <sourcecode type="cbor-diag"><![CDATA[
1668576818(h'2347da55')
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
da 63747632    # tag(1668576818)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
      </section>
      <section anchor="ex-ca-ind">
        <name>CBOR Array with explicit CM indicator</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/signed-corim+cbor",
  h'd28443a10126a1',
  3
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
83                                    # array(3)
   78 1d                              # text(29)
      6170706c69636174696f6e2f7369676e65642d636f72696d2b63626f72
                                      # "application/signed-corim+cbor"
   47                                 # bytes(7)
      d28443a10126a1                  # "҄C\xA1\u0001&\xA1"
   03                                 # unsigned(3)
]]></artwork>
      </section>
    </section>
    <section anchor="x509">
      <name>Transporting CMW and CMW Collections in X.509 Messages</name>
      <t>There are cases where CMW and CMW collection payloads need to be transported in PKIX messages, for example in Certificate Signing Requests (CSRs) <xref target="I-D.ietf-lamps-csr-attestation"/>, or in X.509 Certificates and Certificate Revocation Lists (CRLs) <xref target="DICE-arch"/>.</t>
      <t>For CMW, Section 6.1.8 of <xref target="DICE-arch"/> already defines the ConceptualMessageWrapper format and the associated object identifier.</t>
      <t>This section specifies the CMWCollection extension to carry CMW collection objects.</t>
      <t>The CMWCollection extension <bcp14>MAY</bcp14> be included in X.509 Certificates, CRLs <xref target="RFC5280"/>, and CSRs.</t>
      <t>The CMWCollection extension <bcp14>MUST</bcp14> be identified by the following object identifier:</t>
      <sourcecode type="asn.1"><![CDATA[
id-pe-cmw-collection  OBJECT IDENTIFIER ::=
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-pe(1) TBD }
]]></sourcecode>
      <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
      <t>The CMWCollection extension <bcp14>MUST</bcp14> have the following syntax:</t>
      <sourcecode type="asn.1"><![CDATA[
CMWCollection ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING,
}
]]></sourcecode>
      <t>The CMWCollection <bcp14>MUST</bcp14> contain the serialized CMW collection object in JSON or CBOR format, using the appropriate CHOICE entry.</t>
      <section anchor="asn1-x509">
        <name>ASN.1 Module</name>
        <t>This section provides an ASN.1 module <xref target="X.680"/> for the CMWCollection extension, following the conventions established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <sourcecode type="asn.1"><![CDATA[
CMWCollectionExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-cmw-collection-extn(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) } ;

-- CMWCollection Extension

ext-CMWCollection EXTENSION ::= {
  SYNTAX CMWCollection
  IDENTIFIED BY id-pe-cmw-collection }

-- CMWCollection Extension OID

id-pe-cmw-collection  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) TBD }

-- CMWCollection Extension Syntax

CMWCollection ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING,
}

END
]]></sourcecode>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>This section records the status of known implementations of the protocol
defined by this specification at the time of posting of this Internet-Draft,
and is based on a proposal described in <xref target="RFC7942"/>.
The description of implementations in this section is intended to assist the
IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not
imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here
that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of
available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups to
assign due consideration to documents that have the benefit of running code,
which may serve as evidence of valuable experimentation and feedback that have
made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see
fit".</t>
      <section anchor="project-veraison">
        <name>Project Veraison</name>
        <t>The organization responsible for this implementation is Project Veraison, a
Linux Foundation project hosted at the Confidential Computing Consortium.</t>
        <t>The software, hosted at <eref target="https://github.com/veraison/cmw"/>, provides a Golang
package that allows encoding and decoding of CMW payloads.
The implementation covers all the features presented in this draft.
The maturity level is alpha.
The license is Apache 2.0.
The developers can be contacted on the Zulip channel:
<eref target="https://veraison.zulipchat.com/#narrow/stream/383526-CMW/"/>.</t>
      </section>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>This document defines two encapsulation formats for RATS conceptual
messages. The messages themselves and their encoding ensure security
protection. For this reason there are no further security requirements
raised by the introduction of this encapsulation.</t>
      <t>Changing the encapsulation of a payload by an adversary will result in
incorrect processing of the encapsulated messages and this will
subsequently lead to a processing error.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> replace "RFCthis" with the RFC number assigned to this document.</t>
      <section anchor="cwt-cmw-claim-registration">
        <name>CWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>Claim Key: TBD</t>
          </li>
          <li>
            <t>Claim Value Type(s): CBOR Array, or CBOR Tag</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/> and <xref target="cbor-tag"/> of RFCthis</t>
          </li>
        </ul>
        <t>The suggested value for the Claim Key is 299.</t>
      </section>
      <section anchor="jwt-cmw-claim-registration">
        <name>JWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "JSON Web Token Claims" sub-registry of the "JSON Web Token (JWT)" registry <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>Claim Value Type(s): JSON Array</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="cbor-tag-registration">
        <name>CBOR Tag Registration</name>
        <t>IANA is requested to add the following tag to the "CBOR Tags" <xref target="IANA.cbor-tags"/> registry.</t>
        <table>
          <thead>
            <tr>
              <th align="left">CBOR Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">CBOR array, CBOR tag</td>
              <td align="left">RATS Conceptual Message Wrapper</td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cbor-tag"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="iana-ind-ext">
        <name>RATS Conceptual Message Wrapper (CMW) Indicators Registry</name>
        <t>This specification defines a new "RATS Conceptual Message Wrapper (CMW) Indicators" registry, with the policy "Expert Review" (<xref section="4.5" sectionFormat="of" target="BCP26"/>).</t>
        <t>The objective is to have Indicators values registered for all RATS Conceptual Messages (<xref section="8" sectionFormat="of" target="RFC9334"/>).</t>
        <section anchor="de-instructions">
          <name>Instructions for the Designated Expert</name>
          <t>The expert is instructed to add the values incrementally.</t>
          <t>Acceptable values are those corresponding to RATS Conceptual Messages defined by the RATS architecture <xref target="RFC9334"/> and any of its updates.</t>
        </section>
        <section anchor="structure-of-entries">
          <name>Structure of Entries</name>
          <t>Each entry in the registry must include:</t>
          <dl newline="true">
            <dt>Indicator value:</dt>
            <dd>
              <t>A number corresponding to the bit position in the <tt>cm-ind</tt> bitmap.</t>
            </dd>
            <dt>Conceptual Message name:</dt>
            <dd>
              <t>A text string describing the RATS conceptual message this indicator corresponds to.</t>
            </dd>
            <dt>Reference:</dt>
            <dd>
              <t>A reference to a document, if available, or the registrant.</t>
            </dd>
          </dl>
          <t>The initial registrations for the registry are detailed in <xref target="tab-ind-regs"/>.</t>
          <table anchor="tab-ind-regs">
            <name>CMW Indicators Registry Initial Contents</name>
            <thead>
              <tr>
                <th align="left">Indicator value</th>
                <th align="left">Conceptual Message name</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Reference Values</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Endorsements</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Evidence</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Attestation Results</td>
                <td align="left">RFCthis</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="media-types">
        <name>Media Types</name>
        <t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="tab-mt-regs">
          <name>CMW Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>cmw+cbor</tt></td>
              <td align="left">
                <tt>application/cmw+cbor</tt></td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cbor-tag"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+json</tt></td>
              <td align="left">
                <tt>application/cmw+json</tt></td>
              <td align="left">
                <xref target="type-n-val"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw-collection+cbor</tt></td>
              <td align="left">
                <tt>application/cmw-collection+cbor</tt></td>
              <td align="left">
                <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw-collection+json</tt></td>
              <td align="left">
                <tt>application/cmw-collection+json</tt></td>
              <td align="left">
                <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <section anchor="applicationcmwcbor">
          <name><tt>application/cmw+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwjson">
          <name><tt>application/cmw+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmw-collectioncbor">
          <name><tt>application/cmw-collection+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw-collection+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer collections of CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmw-collectionjson">
          <name><tt>application/cmw-collection+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw-collection+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer collections of CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="new-smi-numbers-registrations">
        <name>New SMI Numbers Registrations</name>
        <t>IANA is requested to assign an object identifier (OID) for the CMWCollection extension defined in <xref target="x509"/> in the "Certificate Extension" sub-registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry.</t>
        <t>IANA is requested to assign an object identifier (OID) for the ASN.1 Module defined in <xref target="asn1-x509"/> in the "Module Identifier" sub-registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="STD90">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:,, and for the construction of constants; / for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="IANA.cwt" target="http://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="http://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="BCP26">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1): Specification of Basic Notation</title>
            <author>
              <organization>International Telephone and Telegraph
Consultative Committee</organization>
            </author>
            <date month="July" year="1994"/>
          </front>
          <seriesInfo name="CCITT" value="Recommendation X.680"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.cbor-tags" target="http://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="http://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.smi-numbers" target="http://www.iana.org/assignments/smi-numbers">
          <front>
            <title>Structure of Management Information (SMI) Numbers (MIB Module Registrations)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC9193">
          <front>
            <title>Sensor Measurement Lists (SenML) Fields for Indicating Data Value Content-Format</title>
            <author fullname="A. Keränen" initials="A." surname="Keränen"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Sensor Measurement Lists (SenML) media types support multiple types of values, from numbers to text strings and arbitrary binary Data Values. In order to facilitate processing of binary Data Values, this document specifies a pair of new SenML fields for indicating the content format of those binary Data Values, i.e., their Internet media type, including parameters as well as any content codings applied.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9193"/>
          <seriesInfo name="DOI" value="10.17487/RFC9193"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
         </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="15" month="January" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-25"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat-media-type">
          <front>
            <title>EAT Media Types</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="7" month="November" year="2023"/>
            <abstract>
              <t>   Payloads used in Remote Attestation Procedures may require an
   associated media type for their conveyance, for example when used in
   RESTful APIs.

   This memo defines media types to be used for Entity Attestation
   Tokens (EAT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-media-type-05"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="30" month="August" year="2023"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-05"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Attestation is the process by which an entity produces evidence about
   itself that another party can use to evaluate the trustworthiness of
   that entity.

   In use cases that require the use of remote attestation, such as
   confidential computing or device onboarding, an attester has to
   convey evidence or attestation results to a relying party.  This
   information exchange may happen at different layers in the protocol
   stack.

   This specification provides a generic way of passing evidence and
   attestation results in the TLS handshake.  Functionality-wise this is
   accomplished with the help of key attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-04"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certificate Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="9" month="October" year="2023"/>
            <abstract>
              <t>   A client requesting a certificate from a Certification Authority (CA)
   may wish to offer believable claims about the protections afforded to
   the corresponding private key, such as whether the private key
   resides on a hardware security module or the protection capabilities
   provided by the hardware.

   This document describes how to encode Evidence produced by an
   Attester for inclusion in Certificate Signing Requests (CSRs), and
   any certificates necessary for validating it.

   Including Evidence along with a CSR can help to improve the
   assessment of the security posture for the private key, and the
   trustworthiness properties of the submitted key to the requested
   certificate profile.  These Evidence Claims can include information
   about the hardware component's manufacturer, the version of installed
   or running firmware, the version of software installed or running in
   layers above the firmware, or the presence of hardware components
   providing specific protection capabilities or shielded locations
   (e.g., to protect keys).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-02"/>
        </reference>
        <reference anchor="DICE-arch" target="https://trustedcomputinggroup.org/wp-content/uploads/DICE-Attestation-Architecture-Version-1.1-Revision-18_pub.pdf">
          <front>
            <title>DICE Attestation Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 818?>

<section anchor="collected-cddl">
      <name>Collected CDDL</name>
      <sourcecode type="cddl"><![CDATA[
cmw = cmw-array / cmw-cbor-tag<bytes> .feature "cbor"

cmw-array = [
  type: coap-content-format / media-type
  value: JC<base64-string, bytes>
  ? ind: uint .bits cm-type
]

coap-content-format = uint .size 2
media-type = text .abnf ("Content-Type" .cat Content-Type-ABNF)

base64-string = text .regexp "[A-Za-z0-9_-]+"

cm-type = &(
  reference-values: 0
  endorsements: 1
  evidence: 2
  attestation-results: 3
)

cmw-cbor-tag<bytes> = #6.<cbor-tag-numbers>(bytes)

cbor-tag-numbers = 0..18446744073709551615

cmw-collection = {
  + cmw-collection-entry-label => cmw
}

cmw-collection-entry-label = text / int .feature "cbor"

; from RFC9193
Content-Type-ABNF = '

Content-Type   = Media-Type-Name *( *SP ";" *SP parameter )
parameter      = token "=" ( token / quoted-string )

token          = 1*tchar
tchar          = "!" / "#" / "$" / "%" / "&" / "\'" / "*"
               / "+" / "-" / "." / "^" / "_" / "`" / "|" / "~"
               / DIGIT / ALPHA
quoted-string  = %x22 *( qdtext / quoted-pair ) %x22
qdtext         = SP / %x21 / %x23-5B / %x5D-7E
quoted-pair    = "\" ( SP / VCHAR )

Media-Type-Name = type-name "/" subtype-name

type-name = restricted-name
subtype-name = restricted-name

restricted-name = restricted-name-first *126restricted-name-chars
restricted-name-first  = ALPHA / DIGIT
restricted-name-chars  = ALPHA / DIGIT / "!" / "#" /
                         "$" / "&" / "-" / "^" / "_"
restricted-name-chars =/ "." ; Characters before first dot always
                             ; specify a facet name
restricted-name-chars =/ "+" ; Characters after last plus always
                             ; specify a structured syntax suffix

DIGIT     =  %x30-39           ; 0 - 9
POS-DIGIT =  %x31-39           ; 1 - 9
ALPHA     =  %x41-5A / %x61-7A ; A - Z / a - z
SP        =  %x20
VCHAR     =  %x21-7E           ; printable ASCII (no SP)
'

JSON-ONLY<J> = J .feature "json"
CBOR-ONLY<C> = C .feature "cbor"

JC<J,C> = JSON-ONLY<J> / CBOR-ONLY<C>

]]></sourcecode>
    </section>
    <section anchor="registering-and-using-cmws">
      <name>Registering and Using CMWs</name>
      <t><xref target="fig-howto-cmw"/> describes the registration preconditions for using
CMWs in either array or CBOR tag forms.</t>
      <figure anchor="fig-howto-cmw">
        <name>How To CMW</name>
        <artset>
          <artwork type="svg" align="left"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="496" width="400" viewBox="0 0 400 496" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 40,48 L 40,80" fill="none" stroke="black"/>
              <path d="M 56,176 L 56,424" fill="none" stroke="black"/>
              <path d="M 80,96 L 80,152" fill="none" stroke="black"/>
              <path d="M 80,168 L 80,424" fill="none" stroke="black"/>
              <path d="M 96,144 L 96,176" fill="none" stroke="black"/>
              <path d="M 104,256 L 104,288" fill="none" stroke="black"/>
              <path d="M 120,96 L 120,144" fill="none" stroke="black"/>
              <path d="M 168,192 L 168,232" fill="none" stroke="black"/>
              <path d="M 168,304 L 168,376" fill="none" stroke="black"/>
              <path d="M 184,48 L 184,80" fill="none" stroke="black"/>
              <path d="M 200,48 L 200,80" fill="none" stroke="black"/>
              <path d="M 224,96 L 224,144" fill="none" stroke="black"/>
              <path d="M 240,256 L 240,288" fill="none" stroke="black"/>
              <path d="M 248,144 L 248,176" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,152" fill="none" stroke="black"/>
              <path d="M 264,168 L 264,328" fill="none" stroke="black"/>
              <path d="M 264,344 L 264,424" fill="none" stroke="black"/>
              <path d="M 288,176 L 288,328" fill="none" stroke="black"/>
              <path d="M 288,344 L 288,424" fill="none" stroke="black"/>
              <path d="M 296,48 L 296,80" fill="none" stroke="black"/>
              <path d="M 304,256 L 304,288" fill="none" stroke="black"/>
              <path d="M 344,304 L 344,320" fill="none" stroke="black"/>
              <path d="M 392,256 L 392,288" fill="none" stroke="black"/>
              <path d="M 56,32 L 168,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 280,32" fill="none" stroke="black"/>
              <path d="M 56,96 L 168,96" fill="none" stroke="black"/>
              <path d="M 216,96 L 280,96" fill="none" stroke="black"/>
              <path d="M 112,128 L 232,128" fill="none" stroke="black"/>
              <path d="M 72,160 L 104,160" fill="none" stroke="black"/>
              <path d="M 240,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 112,192 L 232,192" fill="none" stroke="black"/>
              <path d="M 120,240 L 224,240" fill="none" stroke="black"/>
              <path d="M 320,240 L 376,240" fill="none" stroke="black"/>
              <path d="M 120,304 L 224,304" fill="none" stroke="black"/>
              <path d="M 320,304 L 376,304" fill="none" stroke="black"/>
              <path d="M 184,336 L 328,336" fill="none" stroke="black"/>
              <path d="M 112,384 L 248,384" fill="none" stroke="black"/>
              <path d="M 96,416 L 232,416" fill="none" stroke="black"/>
              <path d="M 24,432 L 336,432" fill="none" stroke="black"/>
              <path d="M 8,464 L 320,464" fill="none" stroke="black"/>
              <path d="M 8,464 L 24,432" fill="none" stroke="black"/>
              <path d="M 96,416 L 112,384" fill="none" stroke="black"/>
              <path d="M 232,416 L 248,384" fill="none" stroke="black"/>
              <path d="M 320,464 L 336,432" fill="none" stroke="black"/>
              <path d="M 56,32 C 47.16936,32 40,39.16936 40,48" fill="none" stroke="black"/>
              <path d="M 168,32 C 176.83064,32 184,39.16936 184,48" fill="none" stroke="black"/>
              <path d="M 216,32 C 207.16936,32 200,39.16936 200,48" fill="none" stroke="black"/>
              <path d="M 280,32 C 288.83064,32 296,39.16936 296,48" fill="none" stroke="black"/>
              <path d="M 56,96 C 47.16936,96 40,88.83064 40,80" fill="none" stroke="black"/>
              <path d="M 168,96 C 176.83064,96 184,88.83064 184,80" fill="none" stroke="black"/>
              <path d="M 216,96 C 207.16936,96 200,88.83064 200,80" fill="none" stroke="black"/>
              <path d="M 280,96 C 288.83064,96 296,88.83064 296,80" fill="none" stroke="black"/>
              <path d="M 112,128 C 103.16936,128 96,135.16936 96,144" fill="none" stroke="black"/>
              <path d="M 232,128 C 240.83064,128 248,135.16936 248,144" fill="none" stroke="black"/>
              <path d="M 72,160 C 63.16936,160 56,167.16936 56,176" fill="none" stroke="black"/>
              <path d="M 104,160 C 112.83064,160 120,152.83064 120,144" fill="none" stroke="black"/>
              <path d="M 240,160 C 231.16936,160 224,152.83064 224,144" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,167.16936 288,176" fill="none" stroke="black"/>
              <path d="M 112,192 C 103.16936,192 96,184.83064 96,176" fill="none" stroke="black"/>
              <path d="M 232,192 C 240.83064,192 248,184.83064 248,176" fill="none" stroke="black"/>
              <path d="M 120,240 C 111.16936,240 104,247.16936 104,256" fill="none" stroke="black"/>
              <path d="M 224,240 C 232.83064,240 240,247.16936 240,256" fill="none" stroke="black"/>
              <path d="M 320,240 C 311.16936,240 304,247.16936 304,256" fill="none" stroke="black"/>
              <path d="M 376,240 C 384.83064,240 392,247.16936 392,256" fill="none" stroke="black"/>
              <path d="M 120,304 C 111.16936,304 104,296.83064 104,288" fill="none" stroke="black"/>
              <path d="M 224,304 C 232.83064,304 240,296.83064 240,288" fill="none" stroke="black"/>
              <path d="M 320,304 C 311.16936,304 304,296.83064 304,288" fill="none" stroke="black"/>
              <path d="M 376,304 C 384.83064,304 392,296.83064 392,288" fill="none" stroke="black"/>
              <path d="M 184,336 C 175.16936,336 168,343.16936 168,352" fill="none" stroke="black"/>
              <path d="M 328,336 C 336.83064,336 344,328.83064 344,320" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="296,424 284,418.4 284,429.6" fill="black" transform="rotate(90,288,424)"/>
              <path class="jump" d="M 288,344 C 282,344 282,328 288,328" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="272,424 260,418.4 260,429.6" fill="black" transform="rotate(90,264,424)"/>
              <path class="jump" d="M 264,344 C 258,344 258,328 264,328" fill="none" stroke="black"/>
              <path class="jump" d="M 264,168 C 258,168 258,152 264,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="176,376 164,370.4 164,381.6" fill="black" transform="rotate(90,168,376)"/>
              <polygon class="arrowhead" points="176,232 164,226.4 164,237.6" fill="black" transform="rotate(90,168,232)"/>
              <polygon class="arrowhead" points="88,424 76,418.4 76,429.6" fill="black" transform="rotate(90,80,424)"/>
              <path class="jump" d="M 80,168 C 74,168 74,152 80,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="64,424 52,418.4 52,429.6" fill="black" transform="rotate(90,56,424)"/>
              <g class="text">
                <text x="72" y="52">Reuse</text>
                <text x="136" y="52">EAT/CoRIM</text>
                <text x="244" y="52">Register</text>
                <text x="72" y="68">media</text>
                <text x="128" y="68">type(s)</text>
                <text x="224" y="68">new</text>
                <text x="264" y="68">media</text>
                <text x="56" y="84">+</text>
                <text x="96" y="84">profile</text>
                <text x="228" y="84">type</text>
                <text x="172" y="148">Register</text>
                <text x="152" y="164">new</text>
                <text x="188" y="164">CoAP</text>
                <text x="172" y="180">Content-Format</text>
                <text x="168" y="260">Automatically</text>
                <text x="348" y="260">Existing</text>
                <text x="140" y="276">derive</text>
                <text x="188" y="276">CBOR</text>
                <text x="332" y="276">CBOR</text>
                <text x="128" y="292">tag</text>
                <text x="184" y="292">[RFC9277]</text>
                <text x="328" y="292">tag</text>
                <text x="140" y="404">CBOR</text>
                <text x="176" y="404">tag</text>
                <text x="208" y="404">CMW</text>
                <text x="144" y="452">Array</text>
                <text x="184" y="452">CMW</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="left"><![CDATA[
       .---------------.   .---------.
      | Reuse EAT/CoRIM | | Register  |
      | media type(s)   | | new media |
      | + profile       | | type      |
       `---+----+------'   `-+----+--'
           |    |            |    |
           |  .-+------------+-.  |
           | |  |  Register  |  | |
         .-(-+-'   new CoAP   `-+-(-.
        |  | |  Content-Format  | |  |
        |  |  `-------+--------'  |  |
        |  |          |           |  |
        |  |          v           |  |
        |  |   .--------------.   |  |  .--------.
        |  |  | Automatically  |  |  | | Existing |
        |  |  | derive CBOR    |  |  | | CBOR     |
        |  |  | tag [RFC9277]  |  |  | | tag      |
        |  |   `------+-------'   |  |  `---+----'
        |  |          |           |  |      |
        |  |          |.----------(--(-----'
        |  |          |           |  |
        |  |          v           |  |
        |  |   .----------------. |  |
        |  |  /  CBOR tag CMW  /  |  |
        v  v `----------------'   v  v
    .--------------------------------------.
   /             Array CMW                /
  `--------------------------------------'
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The list of currently open issues for this documents can be found at
<eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap/issues"/>.</t>
      <t><cref>Note to RFC Editor: please remove before publication.</cref></t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Carl Wallace and Carsten Bormann for their
reviews and suggestions.
The definition of a CMW collection has been modelled on a proposal originally made by Simon Frost for an EAT-based Evidence collection type.  The CMW collection intentionally attains binary compatibility with Simon's design and aims at superseding it by also generalizing on the allowed Evidence formats.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1963rbRpbg/3qKGmonJmOCEqk7Y6dDU5LDjCxpRLqdtOOJ
QLBIIQYBBgXqEkn9ax5knmUfYZ9oz6UKKJCU7STu6W93os8fTaDup879nCp6
nieu2nJTiCzMItWWlfPOoC+7SRyoWTb3I/lKae1PlJZvUn82U6msdl+9qVWE
Pxym6ipv8OpNRYySIPan0Mko9ceZF6ps7KV+pr2pnnjX0NyL/EzpTATw3yRJ
b9tSZyMRJLFWsZ7rtszSuRJ6PpyGWodJPLidQW+9w8GREOEspXKdtTY29jda
wk+VD8P3VTBPw+y2Iq6T9P0kTeYznJSaJpmSnQGO52fQlzxLk0CN5qnqV8R7
dQu1R235VqqrcKRgtXXpZ0XlVOl5lNWlikdJqtVUxfCQqrFKsa688qO5ku+E
gPrx6Cc/SmKY6K3SQk/9NPvplzmMDuuJEzELYZQsCepSJ2kGXWj4djvFL9De
n2eXSdoW0pMMum9V/F6+CNP3l0n0q5BSJunEj8NfaVpteZT68/gygXnIfm+A
5Wrqh1FbXkK7xtC0+0aHWWOcV22MVDHAiRrJ/jTMLpc778WZipw+YzVqaKz6
TYgljSCZFv0MLpOpr+VRAuiRhcudHYexnyZObxk1aIy5wTcRlTegkbN4P44B
0wY6wHnH4cRdIJU1srzsm8n0phGrTIg4SafQ5ZUCOMrzo+7WztZeWw59rXa2
+M12a2+jLWfvwxvzvN9smco7rZ09+3VvE9pN1Sj0vQxQT/Pr3dZ2qy2DxJ/B
c39wsL+B9aX02vJnncT0/Xkba+61tve5zd5OEwYMRqOIn/ebO9v8PIvmpt/9
1u5u23S5lXcZDJPU7XJ/C7vsdU46jeA6a9vvP/P3F92z1k7eNvRjH6nJbd9s
7cDj940dhEC32xsMGt/D90Zzf38LqCoeLwBvd38LVhtOZ5GHxJBPtrm/CeSq
4mnkBWPzbnNzqy2Jwv00QITqeQeNguyVn5li+Laq1CtgXVT0pst1/XRLh/lQ
8N3UMMjkZRG8L8gXkA1fuN1E/nSmvUCn5Xr0Auod9LqHtAiGZU6W9Ac4Cixl
gLwHiKebTGfzLIwn8iUymwpVstwT+5Edh5F0oM8wU0EGjMdU9dOJAsBcZtlM
t9fXM+43sN0SC0O6WL+eebCbGfCe9fksSvyRXqd5Ov17bv/eX1WKbNNrNpre
OTA2ftj7aTYfNmajMQ0/At7blt/58dxPb+uytdECNIAhgIUSMh4eHyH/POpm
l6GuCOF5nvSHOkv9AEhtAC8l8Pk5ckQ5UuMQCTa7ToBTBv4MmCYvm7FK4/+S
BESQSxQxtRKlGjZUoy4Pcw7sAu6cODAwy8OCBWsJ3Fac52z4r8iGdaOG81Jy
HKY6WzkPOdcwnC+7L07PYTfld/3TE+mnqX8rr4G90fyn0LWfgVACBjAdAiDr
Apg6LSCDzhFHQUTECTyk+VuSA/h6BL0DwNKRTGY4MAhO7kbgvkY0e0QZ2xVM
VkUjeITJaf9Wy+vLMLiU70PoKRmvgFZV12DGSgYw7RCwMIyLCTRo+fnMcMEo
bXVRA6ub5Q9vQS7CduJscN6zVM1AygF4BJVnPswywRlcqdtivjmjSOLGIhr4
kU5yXPChaQric5bEIxzDdgpQglWqKML/aQPeqKEcJO9B9Mvqd28GNZoOVXdL
ulgSRH441Q0JUkdpBQNGybVE+I5GFqrXpJ6MHNDJHNFAfCXUs4dCAdecgERO
IsInmNRQds56GgW8ngEpATOMbhuM+tMQeLYSYg2lY5qM5gGCgBGOENt3CNAB
Aoir0XgelTczn5GoaqXk3V1fUXdyD+t5OSd9eKiBkjAHhABYWfKgua6gkIY4
9KHm8iiAKzHM40rJKdQLAQsNHJFGkpFFAK3S0I+M3BaWcKvF5PaXJteAfQAu
NblM5hkCP0xlFI5VFk6BGBAqYtUuIPoCLoUBbB9gVurHgCQpstTkCjB3FI6J
rrNiexriCAhN3fhIQnXYEHnYGQDYcgHy8FCAh1C8MvQDUgJhYcGlCt5XAJln
SZRMcFiBNB9PiBoNuxgDJgGbSpOpgS3MBJDlHDAAAXQG2twtEzisM+aKplBQ
IdYGvhsCQad1XolWMx9mqPKFyEhNNCLUqv0jZkJarCINDBktFMMWdM63+r1a
vl4SfLDimX9LwgBWLCozXxMUK3KajIAKkjmwlaFCSZ0BrRNp2OnhVPE5X6hd
Fuq+ADzUzlMxS4BciL/AdlIVWpTvbFBAylhUZ3CUujRDlOAHK+9Bj8AxlA5T
fwiICNVSNUdSjm8JKaCuw2IA73UShD4iB3No6DMnHj9IQe4zgeQgHuKe+8Ab
NXY+DeNwGv6qqGGQwEYv9CiIq6VqEqJoY4DjWqf+DTdElTdNwODxh2EEwrEh
39iJgLFj+SysKEhD4EOCGLLDFevF1HDZkxhEChSCSZCBYg2zgFnOZ6MSmiD3
gZ0KeD4Cauj5DHfXhf0yZSE5wsjA/9IEWUEKZk6gmP2HVvoweavxGLtDlBsp
YHO4QALY8kCuOQT87TImKsLRSkQJPCYfA/YfWIVf3n2cV2TWBACAebkgAErR
SjhjeamKaJdWLLRgisU0c/o3nKsuhsCUkPWFMWCkP5KgVUUWFZytg8GBTvxJ
DNgRBhZxnZmIfNW3SyLvD2o+JPeBFeOosGMhbAWNPklAlkocHwDgD4HwaGSU
eatHIfY+VMCZctxB5mowjiEMtALjUv/jBCUnbg2QMDIa4Ay4et0W4ksUrrfE
pbWKxp5BbahcN9rJVAHL5rlnWBWBbPQE0CKCUKtVpIzUhnIiNUiRsOYC5ukU
HwFncQdHllkVUj0nC6NsadDOUKzpW9jXaaM0Y5br0DVZFKSyaGScjjH38GDX
QeqDLlgD4CwLMZcdGPzQsDLAIcNyYth9EC4aFEqaSaDAiA0T5O2dZXqH3pEb
I5vLaA8tihJyWAoqtC1RaMKLSq9cVHqRQQcqzZhdKK7UPT/WQt2AxaBZgtzd
5YYN6RQwFMF3pRyCORW6hhYkHz3QGGDdaA+hBmuoOAAOg4+IrDCPwXGf9B19
6b932DSAn8wwBDxSlxX4chW1O0JNnh/2B6g7kVImEla3oQEKDosEsGer1mDU
YgQ0VhmHkcUXkQx/BoUGt2oN/VtXuADL9Q+QnEPmuqTavQe8Qg+RlpVXr/uD
Sp3/lyen9P388N9f984PD/B7/9vO8XH+RZga/W9PXx8fFN+Klt3TV68OTw64
MbyVpVei8qrzQ4U1jsrp2aB3etI5rshF6cLKFGEoCSrAUmIZWuQSCdu86J79
7/9qbgEl/AtYdK1mcx/0B37Ya+5uwcM1i3+U8jEwDn5E6haoTvspqVWgtAPz
CTPYb1Lj9WVyDaolICRS4VuEzLu2fDYMZs2tr80LXHDppYVZ6SXBbPnNUmMG
4opXK4bJoVl6vwDp8nw7P5SeLdydl8/+EgHDl2BN/+VrAfrMkrTvHhwcI8dB
Hw8B2bPeHngKkWMwO7b7g0AWIP59yxWY00tkN8A6UJ5rDX2PzDaPgV1GIWxI
rg9dJYE/BIEAJivun5EziAEom2j/C9URGcCSFCMVjBkh4NBUy1JTq/+3SP+3
rp+HB1FVjQnY7ZUuOyc8dNNWapawFhzHud/40BgdSGEgNZlFQ8+POJzL/mYW
SyzirPUbamFXAuKr2ZAdEu9zTZbNKmMf+CEO68UeWMXAEL8qWuUCxNqrxD3R
GefBA9o8yOLH85SsbGxRAVYfMYgqbCOTZLxMohFqVBNFNXPTC5uAnQhADhfg
HEyvPezLbBAKJeoYfU2IVKE29exrg2MI8DXqt0Oru1tzFsc9YSEv3Sg9i2OP
wwn15lGtfAY07kSBDAPN6OK77rOvL3Icvka6R5yBT8RSeQUi0EehMVTZNaoi
CEKBKImgR+XU+mb8dMKIFzLS0TDjfI/YGgHtA1B5ZOqIvA72CtP7+9//zn5V
BBuv7bl8K6RkLyK6aa3XzDOLXnd8ulCRPCJtCatiF7HH3pA6uUb011DjLwCc
UVvO0RBqDEOQK8GUW78TYtUIz01djXpmSxTDQUkGAlk2/GE8ltUyycgGyFPp
vvI6L06OakKUJpb3AeqJupnJytuO9zff+3XD2//Je/e0AlOa2sG+qML08ziF
R0vVbbkBb51QBrxp4hsj7dswZbkglUmcYmCohhAXd225VsYV2MwMIy6eH4Gy
87wSqXFGDk5yhT6v0L6NcrlqlCyDqgy2yoM1DNFJlhABYq1UKeuEA8KGoa/0
zA+gzw1scYFLvWiLtjwMicR8Bo8BVqpAFmrjbvNL0JWGcYHain6EQlUUjkvB
m2ZA7cg4oNo8Nno0CtkJaXSubwu1dxihc5YPc0QLE6AnDpF1FUy02WpsEh9F
9GF2ckG7QyvJvUkrvDjWP4PiPYDx7chIHOzccyg699cx/HAUQGUaoxMXvknA
6ak/Y4YF5UaFZO14xRSYVwMLFgvuR7ME9mY2JIxxi3sJRgOrZcbDi0Y+T9Ww
CNEkam9u16GnIJqD/l8jZoKauRqRoy/UhuWQGw2Vk5BRiBEACsUsyVgNhUIf
Rp3MUTc3fITZU5zkTJtoFhDFv/LDyHohiMUAl8SwCSr3LKIDIAyYxFFJTccZ
TcPJZSaHxq8AVGonhRQrCoziocmVhTroyKLehWMMrwO2PQ2uswtQzO3SGJ6C
vcM4YR+sWMd/t8KtRvpAYQ/zXvFwYphA2ZLpgAAqGRjYhdlR7U9VeZZMAYC3
aTh9igIR5wuAMVOmBmaZMiSzgHxNsD1gD6Rs2H3YfSGO5uQ9Lbs/5BSZzGgk
Y3XN2KOtkU44zUj3lWRPKoa+PHjtwQ6TGOs4wg8N1aFitydpySzlUUeD9YB+
ZkUQvMGQHnXwBv19rExgWd3xpvP2hNrt8QWxbNMAq74+P6ZwBQIGw5sAqTG6
rmeXPlCByxu2iTEwz0feYy3mmU+GcHkuOPOPzWXZ1V/oClQyQP3mbi1Xb4Qo
XpOQRxBBZdyCITKYNLyCt+TuW8HvJPM72Mne2HJEIyGt4qFuwLJmr4j/GKuj
ZYmLwUm1dsHmItlxJYWlM8NoRXgjX5DuyFFU2EGzxUbLFjzjR4MR2Bd5guWP
b5s7O3vbWztgD9Ulft9ptjb2t39813Cc/Ct4IkCclZoP8eeVYFrp3Mxnlrua
3f0Ui/tJFjXza2L5uCRtYznAQAv1z27s46pfoeQuqle25BlrRqBfrO00ntm3
ntn1r6tUDGrLYgk02Gg0mntbWzu7W1sbu5u7ANnt5k5ze1mpsG1/p16RL7NQ
LdYA419rchWcpcojDMyRAFFdGHS1oL8EUJMvjf1AKmVQ2e2yzizEKpUiZ34s
1oEylXcizkA0JY8RhRGPIepAAsVFMsRumWciD761zGSRKGrUyiA9mowhjIPI
LxBd4gVvoWUo5F+7gU6QYQcwV+zedRgI1+QhJprLRRzLj64xVjliQM5DfcmW
Ehs+uSvSsour0DfU7HjewJCFDyNtHqc+Jk+OMIhiEDQDAVD1QsgDNBTDinpM
SUCDBHeWn8QiVYEKyZsKSHFQKu1EExBt2eUUljtGF3aqpskVR8duEVwqRZXJ
+iurZd8dqrT9k0ZTnnYHhwPZH5z3Tl4KIxvJ5tNuzNZ3nXYyd9XJJUcdtwY+
hkwgZb+5L5se8YAoSd77l7Dr5I0Jo2hOXstCLyv8vDOt5qNEYC/1QrcBK/Xa
PGHUiACHeTbxiF34pNHgSMM5Cu428QUxnscBzgp16X4MIr06lG/fYb0aWel1
qdI0SWvyDugVQAByrzqsyefABegVWiYg6GP5On4fJ9eYOQNkSlWHbzfeUcWb
vZa8v3efN8ttkVrJiMDWUkWsglH9r7F+sCG/+IKfn+HzaLjcHoh/uTWNtr1Q
GyV/PpoQSyt4IMDksjX3CJB0tXa9EMf+LXETGybTxmODVk+YoYC9CjFiUygF
Wm42WlRr0xgObgCWbXNEodxjS+SB1EpyFhrkSuMMOCp6l0raLCAKOZ8CDtuA
ELvCnAfmRaS6wmYn0ynHGoqQJluJiFkqvgrTJGYNsto5rFEYCfsBRNXzoTba
jUEnVAyBUqcY7oiBEE9joJxDo1BPla9RA6REChqB5RtmMiBTTpKMvTMUB0TO
2z17TUwlUnlSxm/vzZd9TNc76XXlLJpPJmzooVF31u2BqI0sp7HJHb93wrTm
J1q+PHuNojlBvTa1QZkCDfIoKoYM0LqoL3h9i/yCJQ+Uz6kXZDGgGVP4orSC
rQUOlnuggE4xTGhkGZhCKjKmIGh/cfgLaJWuRRAkM2V3sRjRUTGKl4jAhUTP
XyPGOupHoaGiEWp1b/bP86ywV1b5ObeF4GOQyZcXQFkXiFDpbW6IWmLjAS8s
EqPxQtw2zkA55YAgc1datrYWyy0Db8nwBajU7Rhk7tEElnesjj5xDPYUCQ6F
5sl+AmoU4y5SHzaKdczzMKKctTuKxRiXgxF8hrAQctMYBFQcBhzF/ZBllc/c
3bWyhlds3XPifE9l+bVHYPYYSZ5/jaXA9MSHKrE7Zl2SR2wMRi4SSgX1isoK
ta+YwO9U/MoIWKh/nQiVnsmlpAblsKjN3/oI6S31nitcs3nKDivsidmPbaih
+Jd5SM4oMkEnE9AnbebUmjxkFmwCTVWsC6gOEKxZ7mz8verG+5mCZ/Q1oK/I
b/gRc184QkAIInC2r8jvSI7EkyU7/ioeNcwADZIlBcJggvZFrv4KR/3FzOaJ
Ro1hyZR61AyUF5sbGxvNC07XKrLKLkjX2wVdb++C2QGriR9UdCnY/wENdUAq
La0qh1pAngAOu/jSbHk3Oe+9smFGw/tAT75BAIHQ674SxhEGG3qxMYQVbPwE
q2heyOomKGQY++Y5cvQ7zzfLk62sswZ9Lks5iks+F9ZEifFZ7z3vtyFQXCNs
5kSga7vyG/axUscGv+y10l//vSLesX5ygsnwrEB/aONYx9dJbknn5mkRRKEM
MdpaaGf8Azl3xPChUSFIPyrAZRTw1CSlxSMMicBMFkxkBhT3EKRzMLsiUivI
tkAr0zgyEKccuAWr4UZ4iPC4fNLa3Nod+dvbTyxI8qUVuvI1Kii5/5gzhFnz
BaXU/VtjUFRbNeRPzX25u73ZNCXWZVylwanC1pbblJZR3aqZ5GI7MSiprL38
8eag87qyvGmLlP34ThFoiphPXTj2Cuq6H90dFJsf2CDy/VXncRS+d72gsaS8
sRoO8UGfOHIZHMIxtFNkNY3PgvgrNtqiCzoHGFmyJWQpOFPV6aH2OzBl5Mud
zd2t3Z3NFm83MKpq0f0fwYcy3tOsHPYlC/ZlSIKY4EehuuTeNXActfa2tjb9
5kazteM3n+DLzd9HO5vyE/4sSW0SHHb3ZHP0sQaoZlRb+xZwO83djd2NnWBn
f2cTvm/B/+Md1RrvbsK33R21s72z1RpB2Xi3BW9GrSF8b+GT+JQJ4ogfARzt
7e4n9MNbvmtnXgb1yoH/z392f7zpNH+cI1P5Ar/SaBsfh63LkQxCr8mBzcXJ
lRTMHlqwYIGmv29sb+wXR8Du1m7gmWPLaPykVuPhmLDbkaM05ak9NucPJYaT
/QvjnP1b73sny6/EssDWc1wmfVToYdLnoDcptHSr3f65piRZOsuBShIpz2bu
3aUcKaezc4U5FDTJ45A7Oz+mzhxvjLGcyb9hPfY7jWaDcrZLNYEjoyvutsgO
RH6cMykDRpvXYHyANurtOIWNJVQEU2zihjWpbSKEtjpqsW2OTwnzyoCobhf3
o0iEGnyg9avOD5xdxOG51RCtU8oZAh/PVlkFFXfkY71jhtDQCRjl+X8FS1kC
AzMUX8eNpghHHsjCBRNGnr747rA7kL2Dw5NB76h3eC7b7ec5ed+B5EuqzZoz
quceWgMCAVN7VN2pcVJVrLJqs+ZwB23OGla3a4CtmAUd6qnGJ1w+ELSkaeEQ
gxcH0jiHaOsWlo7ZSEP0DKTvMdUVOkWr8VOARm7WMqD0LXDcGxc65R4ABrL7
7SkeTWLnFsa45OvB0V6fgwn0EllYyYtZF/kCFudEMzEar8nZyIMgK7EN0Yet
fE7kMNhfd+JllL48S5EE7GzJrGSNj52sr5LRHHjC3Ross+nlzMghDZNOSk5w
bjM1be7oDBxQqTX+HgFz3YEs24hFrqCiLMRQX9ogijlLiLRPlpk5UGhDKSt2
4/AmQ8fnH8DFT8JCWHV1g+vzk7dossM8qoClNfRrHhwe9U56mPTWl71XZ8e9
bm8gB52XfaKfF4cveydCQMHp+aAPfR5+Pzg86UNt+H50fvqK+LfXJXch6qja
wzO6UnoeRugkQkj8YQL8rcvOF47FPDdvo1XdhooP8is83bOAAYcWAwTm0HoL
hXbJRE1IRv0fTgad78t94IlDy3sO5Isf5Eo29fChweVp70B8Mnuz/O2PQPY3
c7UPzb5PvEh8Pg4kDk8OrNrSKx1mkH0+n1pmAGDKUN4uZ4xjBZTTbO+UD0No
60Kyidt55iSJIuzTTUiQxlaiYzHQcpawH5w6gco9A1fvAE+/1ykBDl7niYUU
dINGflRyaKDwdE7bIudAfstVZtbTtThzmw9sV005ghnFfsnbqDEMQCFoPD2P
1TGLDYM/2nBJDP+xpwkeJqkNBuLcKc8CCBeE+Fmk0LyLc1OUXKdhvnIMkaHh
ATwXHY/laVKGcH7kQ2DhrZuGZkU+ThGTQChNZ5qkqo5pO+aoSh6Uhc2Iyct+
hceZuKV7zsCYHgAAHFZk1hePJ1sio2AQMFBuAfTnYCqRe5kTjdAmzUHoa9Zk
pnOAIlurFFvB+wmMCltHj5if+VGCgBBFUtESkqXmdIFxhcKY55Tjyyfi/NFV
aFKDCyizR3GxJ/S2UBQbI7NuqsEiCtVlhbDjOsTjlnRYMlVXobq2kSf0s2Jb
OmuM2y0QYyaxHM15ocBGimMQNvzgBnopQqhiIBjyZ6fzmNRyijMKc1wEppu7
rW2uIVZGzz6BCsxX2MsCX3BqYzAS8BBfMZaY+iZGWRw0cs9wIsbAYAjbhskn
nM9sqpCDnEuLNicziHbco2d8ukUrJWB1FdY/ztKE9Ji/AlxCbU+AuixWsnNU
h7gy1jGw5zJFwJvFngCRxHEYz2/kER1hs2oMVbpM6My5ITywJcahOXnhnEOH
13i3RDifGgVSJ+Ps2kc6Ktq/fVe1J84nYL7Ph3idw/qVmcQ6iJpa3dGe5Msk
8uOJmMFW2EiIPThTOj5KIWTDDVD1s9Yes7GF5Qd4lJDS/FiFNRTh0G5+0AEZ
EfdBWwvySUZ4Yo3TBGeXPheCOQ6Sh9JxOjBXeNNqbFgWmh9wM3570lgDJzL3
t3kUzuxxxrZwYGQB0/gVq0CNjOC1FoNFlVyvo9PKn65v7m1ut3ZQVVjn/Hd7
GwntSU5EaDkDp0bCevi8J8k4u9o5V6amWkVXKs+CBL6TbxdeskKnu3iOAknI
hIUo1ZEAD+vSDB1j4TsZlLaliXCwJ1sgoAr7LXSOSeeysbQwAFQXID6xCnZ5
1RQcs256TIOJkUXCJuI5B2JonJyMsQAwTjEmEWRuPkseb7a9Fk56CxXDGgVF
qX+Zc5ZOhOe8KFLndEYJDbSzeOvGwq4K8fY/0nGgRu/Q8xX5wN0qd3df4BUK
Dw+VwiWLOnCR+pUfzCuFdo1f+83ARDe7eFJbnjsH0kABxymEHF9SRNcZRZJh
ypgjyQ3piLflfpXycXpzmp761hXrfb0F+WHvF6GgkjGA+FAgT+SE7mfB4J99
c1AoKG3Z+dgpjrzZv6nbNqqR+QuKj0i0Gqq61nY8nPXcVsR0Dah+SQl76FVO
UbNMzc1AX8p+SU07MBCl7soHPoyRVgSQ2IVjdszwTswDIOCa/EprLdrp4w60
9vdNAOdzb1j5ZoR8qwBTvXy7DIYv1qVLFJZ39ef/hl1d2MQirPWZ9q28Ta5H
/xMBXnaYmDsuCgrBbMAKHoxjOjD4gSe3LDRhu++LUe/lASbP9DI1he99NfXx
cKSG70Xg717ce/mf8/Xx7zACGlj0d+8EcupFiuL9R49L3f8mnIdZIjg/7QxW
z0YYtAU7ht9KmdfWGCvtbJG1glj/2A1jjw5WoHS94KmzBCT/rawcogqZoScX
1NuKm1W91eC8anspEh+6IK2NXFKYHxySGkgKrbM4k2zuhMEpbRlEz6OXo1U/
dJdHg3NRe2Q/GOe6ZSsHlJJAQsos5W5tpLzQqftgo9xUTNoqF5bR+8qeCw5Y
MGPGAxsKMFlSt00NOjoKiqFaPs3y6PpKlvGqm0/KJw05LyomVoWGJ190oA0g
+jR7bAXFh2iMYTYE3WJSSurJORmZYcYTTSeC+EDQg8g3zRzqwmMueTB7cXFk
soC5kicTFblDHh0o4FMxqJ4sIyddUEbdu4eNijPyBVhWphHRrtm5FjND9IPx
cqbBIxT3zJE6UpwxxdiqtTPr9li8PbROOgTp3JzvsnC5xbhcnY/Nj1Tm0/EU
8kMAlhAhQxXyQwA/WgAwsqXVsHmc9a3gdI+XIA/cKPVl8ifuSzzrXjbhTekM
y2KFFlawRudi4Sa8WXV8vFwPE5VcmOSZSGDmrOKFPQN4E/jWnITOsXsSjvqT
JZR7jYGVVE4/JSnPQqt00wHt3Qlvy0CBDYZO9c+3Q6i48FEg6LSUZOQW/EY5
ZLpFz+DKbm3BB1SDvBfHa/roPFfVcQ/jfrznx6a6qs6HerZ4Ns2W0Mzdc3Ok
YTW8kStiNpuP2Q102NFyLKe6EP35MHMLbXvkQWTS4U0MKRRmdPiyLeN1X4hT
e25wRZk91l12G1E5HgMEDK2i9lKDsa31uFzz7s6ax4u6Xm/hGp4VjWkaZ3Mb
lynpHtx53lungIVxZuUuoILiiAnbRO16fntScRVdunAlh8fqr3GeYEX3ApzQ
3vdiw9+c22ZOkefBcbpk6dvB4Kzar9UpgYa+0M0MZHznIXPK5U79CZ+kLk7c
LUOG7BlyyJubvqyeildjLPdgHJLaOWiPUqOU9UCJDg1ZPUmWezDqnhkRM7jm
acrGtdUfHukPsOMMxofGX/B9n0WCdGK9NtTWeiIchx0ulATvm5eYGh4h3NFD
LauokHyDtz/ibYo1xiVy79LtLdgOr4M4PUHkR4FuVLMkLirESawAbeg6yHVj
yQSFJSPs7bRnuPeaicSVu9zHI4RLvOEPEC7dPvqPJFyy42AfXw+OvD3PHkhD
BehPcv7/g5wRhT4nOXN//yPJeUmf+P2UvdjVn9L5n0DOxR7oxdjG/yvU/aew
/odQ9x+U24td/SnC/6T5PyX6P53m5Ym6lv1XPXliLi9wQwuPem44bcKPl7NV
ZfW0d1D7WLZh+U4Gymh8sI7JipurnKdYPRIMcmZeRDL0NLR3MZRjGX9wMaVs
zNIKisTMYhmmXi/v7bMswfM8iYkiHA8qX5l2t7ZwWVr52KN8Lovbw9blqqsu
Fg8u/nnd2H/XdWP/6JtH/innXsVX5upw/iUNsbQL0PyJKL2WEt4tnvv6siq/
7J/JylcV+j/XCWRNFN/pD6ZDUeHK84qsmu/rkn6YZmR3GgDHBfnfc9n8MsO7
gQV9ugWVf6lAB5U1+vxf9Pmv9PkFff74hP77srJ4mgZePqUijz4b9Pkf9PkT
fV7Q5z19/n1F84Pey94A/u8cn33bEeUVwLz+9abVQrj8MjLwNzVmfghgoWJh
yorFAOzWsajJ/2162y/o2/aBt3so3B547T8iEKnRX7vfds4Rcotb81yyXxq/
V9aJxeUvhCjKnmMCCwkzGIIK3ZorisXCi+UqHt9E9GWztbNYgruoF3sw9aEj
gqmF8VI1arxUDfepwIXHD08ZJPnC2Xy77Y+M9Jzx4yvMGeDbqTH3k2544RmP
ksxcQvPhM1tfGQ0Jj/WP/UBlpH9/YNSnC6P6dBNM5MOYeIXrbx5U2xDnyGpb
ej4ehzdCMAgZrQDhNje8zf1SJxvSk/vi7LTvcVWu1lys1qRqvDF5b1tNb7tD
iLzT9HY7UK0D1f4Gb3z4/1cBGJyTAOL9hmB0Lt5As8PSODOgMw4fd/rdXk9W
4wQIoSaAW6Ft4Z2eHP/w7Dvk0N85XI+0Rjr6zRW6WKG7zBZBKn5Xp8JSZ+vS
bSps/ve5icjb3MPX2pxfA/WML564TK6zBPPmQVewWda6FCa1ucJ4x2hYhEbp
HApmrVNKtDI3S5K8t2lImbldSpujqr6vryYWJRoLIbNG6V3DVMMQHNo3h53B
Oh9Iv6d3vCwoz+sVxg/+8oukepg9we+Lek/zu/fsm3u+gJCf7PQuYBJPPfvh
eU/onX3zxEXs+/yj/GahTsN2xX9PccULde6porM6elnUaXhVaIdTwZXRmWGe
VTUHmG0kF0+sm+7L1WiZzippnSuqlRbmlDxS7eoj1Rb2vpGX5AULy8Ho8zxL
0Dziu0Ly1/eg55vs+sVh7s2FCYyM0m1j36xog0j71lyT985tgwUr21ggPi1A
6ECX3j75RHg+MoB9cuBWpX+/oevPs1W4WSuqrcuC4tEHgC9K1a7w38ViX09M
CVVbGmn1H2HGunT/+Hw3jVv+Q1m7NOjqvyelm1ZyrvixO1a+Ta7lIKFfc8Ro
szydgXLY03puryshux1/0yh3HCRYJaQqRdZ7cWLAZF6P6Rd5/EysTkPn3wb0
zM+5rfPvR46zoS7/fuQ6j4MJVc8CMDu+5isS6LCKPAR2nqRtkNd0ZIVucVNW
fZihM4o9Go1n69QW19cJ8GBQpEYTTmW+a7P9oEbPK2M/0qpikq/4B+G0+X0d
vvsA0zL8+L3s+mkk3wAd++ZHmuAFMLxYvkBWFcfWag5Twacw2FllEk1RAtl8
dfduG3/xIGV+EAZ/6CeKlg4VJWk4CWNiJ3RgYngr+yHe33WU4o9cjPlGY5A8
5kew8uQYZwyUHHxty+LodDSGPZF42W5m7jphLyP5QbPQ+AMpR4+GfqLNlTuc
D4Y/PYVXGc0xJ1+R4zKkQ0B0kwVfaRaFvzo/EmLuA176kZcGpl7jcZl3bYk4
0IZHwg14Ps0Rsp3nZ7ddDBH/FzurA871dAAA

-->

</rfc>
