<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.6 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc tocdepth="2"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-03" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" tocDepth="2" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.0 -->
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-03"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>
    <date year="2022" month="January" day="10"/>
    <abstract>
      <t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%.  The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re-encoding for the signature to be verified. The document also specifies C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro" numbered="true" toc="default">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280" format="default"/>, since those are not optimized for constrained environments <xref target="RFC7228" format="default"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="I-D.ietf-emu-eap-tls13" format="default"/> <xref target="I-D.ietf-emu-eaptlscert" format="default"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips, QUIC <xref target="RFC9000" format="default"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487" format="default"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949" format="default"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc.</t>
      <t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>
      <t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949" format="default"/>, <xref target="RFC8610" format="default"/>, and <xref target="RFC8742" format="default"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe" format="default"/>.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS" format="default"/>, RFC 7925 <xref target="RFC7925" format="default"/>, IEEE 802.1AR <xref target="IEEE-802.1AR" format="default"/>, and CNSA <xref target="RFC8603" format="default"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446" format="default"/>, QUIC <xref target="RFC9000" format="default"/>, DTLS <xref target="I-D.ietf-tls-dtls13" format="default"/>, COSE <xref target="RFC8152" format="default"/>, EDHOC <xref target="I-D.ietf-lake-edhoc" format="default"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls" format="default"/>. RFC 7925 <xref target="RFC7925" format="default"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile" format="default"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR" format="default"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT" format="default"/>, which can support large parts of RFC 5280. The encoding supports all RFC 7925, IEEE 802.1AR, CAB Baseline <xref target="CAB-TLS" format="default"/>, <xref target="CAB-Code" format="default"/>, RPKI <xref target="RFC6487" format="default"/>, eUICC <xref target="GSMA-eUICC" format="default"/> profiled X.509 certificates. The resulting certificates are called C509 Certificates. This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280" format="default"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</li>
        <li>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document specifies COSE headers for use of the C509 certificates with COSE, see <xref target="cose" format="default"/>. The document also specifies a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls" format="default"/>.</t>
    </section>
    <section anchor="notational-conventions" numbered="true" toc="default">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This specification makes use of the terminology in <xref target="RFC5280" format="default"/>, <xref target="RFC7228" format="default"/>, <xref target="RFC8610" format="default"/>, and <xref target="RFC8949" format="default"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949" format="default"/>.</t>
    </section>
    <section anchor="certificate" numbered="true" toc="default">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280" format="default"/>, and everything in <xref target="RFC7925" format="default"/>, <xref target="IEEE-802.1AR" format="default"/>, RPKI <xref target="RFC6487" format="default"/>, GSMA eUICC <xref target="GSMA-eUICC" format="default"/>, and CAB Baseline <xref target="CAB-TLS" format="default"/> <xref target="CAB-Code" format="default"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS" format="default"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280" format="default"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields" numbered="true" toc="default">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL" format="default"/>.</t>
        <t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280" format="default"/> X.509 certificates:</t>
        <ul spacing="normal">
          <li>version. The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (c509CertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 1), see <xref target="type" format="default"/>.</li>
          <li>serialNumber. The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</li>
          <li>signature. The 'signature' field is always the same as the 'signatureAlgorithm' field and therefore omitted from the CBOR encoding.</li>
          <li>issuer. In the general case, the sequence of 'RelativeDistinguishedName' is encoded as a CBOR array of CBOR arrays of Attributes. Typically, each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as a (CBOR int, CBOR text string) pair or as a (unwrapped CBOR OID, CBOR bytes) pair. The absolute value of the CBOR int (see <xref target="fig-attrtype" format="default"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. The Attribute Email Address is always an IA5String. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributeType SHALL have be non-negative. Text strings SHALL still adhere to any X.509 restrictions, i.e., serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded 'common name' it is encoded as a CBOR text string. If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where 'H' is one of the symbols '0'-'9' or 'A'-'F' it is encoded as a CBOR byte string of length 8 instead. EUI-64 mapped from a 48-bit MAC address (i.e., of the form "HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string of length 6.</li>
          <li>validity. The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as CBOR null.</li>
          <li>subject. The 'subject' is encoded exactly like issuer.</li>
          <li>subjectPublicKeyInfo.  The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg" format="default"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090" format="default"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding" format="default"/>.</li>
          <li>issuerUniqueID. Not supported.</li>
          <li>subjectUniqueID. Not supported.</li>
          <li>extensions. The 'extensions' field is encoded as a CBOR array where each extension is encoded as either a CBOR int (see <xref target="extype" format="default"/>) followed by an optional CBOR item of any type or an unwrapped CBOR OID tag <xref target="RFC9090" format="default"/> followed by a CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string. If the array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage), the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding" format="default"/>. The extensions mandated to be supported by <xref target="RFC7925" format="default"/> and <xref target="IEEE-802.1AR" format="default"/> are given special treatment. An omitted 'extensions' field is encoded as an empty CBOR array.</li>
          <li>signatureAlgorithm. The 'signatureAlgorithm' field including parameters is encoded as a CBOR int (see <xref target="sigalg" format="default"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090" format="default"/> optionally followed by the parameters encoded as a CBOR byte string.</li>
          <li>signatureValue. In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding" format="default"/></li>
        </ul>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742" format="default"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item MAY represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate).</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <artwork type="CDDL" align="center" name="" alt=""><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / ~oid / 
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, ? critical: true, 
              extensionValue: bytes )
]]></artwork>
        </figure>
      </section>
      <section anchor="alg-encoding" numbered="true" toc="default">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="encoding-of-subjectpublickey" numbered="true" toc="default">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstrass form (id-ecPublicKey), uncompressed keys are point compressed as defined in Section 2.3.3 of <xref target="SECG" format="default"/>. If a DER encoded certificate with a point compressed public key of type id-ecPublicKey is CBOR encoded, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue" numbered="true" toc="default">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shortest INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding" numbered="true" toc="default">
        <name>Encoding of Extensions</name>
        <t>This section details the encoding of the 'extensions' field. The 'extensions' field is encoded as a CBOR array where each extensionID is encoded as either a CBOR int or an unwrapped CBOR OID tag. If 'extensionID' is encoded an int (see <xref target="extype" format="default"/>), the sign is used to encode if the extension is critical and the 'critical' field is omitted. Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign.</t>
        <t>The 'extnValue' OCTET STRING value field is encoded as the CBOR byte string 'extensionValue' except for the extensions specified below. For some extensions, only commonly used parts are supported by the CBOR encoding. If unsupported parts are used, the CBOR encoding cannot be used.</t>
        <t>CBOR encoding of the following extension values are fully supported:</t>
        <ul spacing="normal">
          <li>Subject Key Identifier (subjectKeyIdentifier). The extensionValue is encoded as follows:</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></artwork>
        <ul spacing="normal">
          <li>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="message-fields" format="default"/> for special encoding in case keyUsage is the only extension present.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   KeyUsage = int
]]></artwork>
        <ul spacing="normal">
          <li>Policy Mappings (policyMappings). extensionValue is encoded as follows:</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></artwork>
        <ul spacing="normal">
          <li>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   BasicConstraints = int
]]></artwork>
        <ul spacing="normal">
          <li>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   PolicyConstraints = [ 
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]   
]]></artwork>
        <ul spacing="normal">
          <li>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU" format="default"/> or unwrapped CBOR OID tags <xref target="RFC9090" format="default"/> where each int or OID tag encodes a key usage purpose.  If the array contains a single KeyPurposeId, the array is omitted.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></artwork>
        <ul spacing="normal">
          <li>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   InhibitAnyPolicy = uint
]]></artwork>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN" format="default"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN" format="default"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280" format="default"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When 'otherName + hardwareModuleName' is used, then [ oid, bytes ] is used to identify the pair ( hwType, hwSerialEntries ) directly as specified in <xref target="RFC4108" format="default"/>. Only the general names in <xref target="GN" format="default"/> are supported.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></artwork>
        <ul spacing="normal">
          <li>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></artwork>
        <ul spacing="normal">
          <li>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></artwork>
        <ul spacing="normal">
          <li>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></artwork>
        <ul spacing="normal">
          <li>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as an CBOR ints (see <xref target="IA" format="default"/>) or unwrapped CBOR OID tags <xref target="RFC9090" format="default"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></artwork>
        <ul spacing="normal">
          <li>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></artwork>
        <ul spacing="normal">
          <li>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumberm or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></artwork>
        <ul spacing="normal">
          <li>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP" format="default"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ" format="default"/>) or an unwrapped CBOR OID tag <xref target="RFC9090" format="default"/>.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid, 
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></artwork>
        <ul spacing="normal">
          <li>Name Constraints (nameConstraints). If the name constraints only contains general names registered in <xref target="GN" format="default"/> the extension value can be CBOR encoded.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   GeneralSubtree = [ GeneralName, minimum: uint, ? maximum: uint ]
   NameConstraints = [ 
     permittedSubtrees: GeneralSubtree,
     excludedSubtrees: GeneralSubtree,
   ]
]]></artwork>
        <ul spacing="normal">
          <li>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   Attributes = ( attributeType: int, attributeValue: [+text] ) //
                ( attributeType: ~oid, attributeValue: [+bytes] )
   SubjectDirectoryAttributes = Attributes
]]></artwork>
        <ul spacing="normal">
          <li>AS Resources (autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   AsIdsOrRanges = uint / [uint, uint]
   ASIdentifiers = [ + AsIdsOrRanges ] / null
]]></artwork>
        <ul spacing="normal">
          <li>AS Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like autonomousSysIds.</li>
          <li>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI is not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress is set to ones. With the exception of the first  Address, if the byte string has the same length as the previous ASid, the Addess is encoded as an uint with the the difference to the previous Addess.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   Address = bytes / uint, 
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange =  [Address, Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddrBlocks = [ AFI: uint, IPAddressChoice ]
]]></artwork>
        <ul spacing="normal">
          <li>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</li>
          <li>Signed Certificate Timestamp. If all the SCTs are version 1, and there are no SCT extensions, the extension value can be CBOR encoded. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as and CBOR int (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</li>
        </ul>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
   SignedCerticateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCerticateTimestamp ]
]]></artwork>
        <section anchor="example-encoding-of-extensions" numbered="true" toc="default">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype" format="default"/>, <xref target="EKU" format="default"/>, and <xref target="GN" format="default"/>:</t>
          <ul spacing="normal">
            <li>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</li>
            <li>A non-critical keyUsage with digitalSignature and keyAgreement asserted is encoded as the two CBOR ints 2, 17 (2^0 + 2^4 = 17).</li>
            <li>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 6 ].</li>
            <li>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 17, 8, [ 3, 6 ], 3, "example.com" ].</t>
        </section>
      </section>
    </section>
    <section anchor="CSR" numbered="true" toc="default">
      <name>C509 Certificate Signing Request</name>
      <t>The section defines the C509 Certificate Signing Request (CSR) format based on and compatible with RFC 2986 <xref target="RFC2986" format="default"/> reusing the formatting for C509 certificates defined in <xref target="certificate" format="default"/>. There are currently two c509CertificateSigningRequestType values defined, c509CertificateSigningRequestType = 0 requests a c509CertificateType = 0 and c509CertificateSigningRequestType = 1 requests a c509CertificateType = 1 . subjectProofOfPossessionAlgorithm can be a C509 signature algorithm or a non-signature Proof-of-Possession Algorithm as defined in e.g. RFC 6955. CSR attributes other than extensionRequest are not supported.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateSigningRequest.</name>
        <artwork type="CDDL" align="center" name="" alt=""><![CDATA[
C509CertificateSigningRequest = [
   TBSCertificateSigningRequest,
   subjectProofOfPossessionValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateSigningRequest = (
   c509CertificateSigningRequestType: int,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensionsRequest : Extensions,
   subjectProofOfPossessionAlgorithm: AlgorithmIdentifier,
)
]]></artwork>
      </figure>
      <t>After verifying the subjectProofOfPossessionValue, the CA MAY transform the C509CertificateSigningRequest into a RFC 2985 CertificationRequestInfo for compatibility with existing procedures and code.</t>
    </section>
    <section anchor="CRL" numbered="true" toc="default">
      <name>C509 Certificate Revocation List</name>
      <t>The section defines the C509 Certificate Revocation List (CRL) format based on and compatible with <xref target="RFC5280" format="default"/> reusing the formatting for C509 certificates defined in <xref target="certificate" format="default"/>.</t>
      <figure anchor="fig-C509CRLCDDL">
        <name>CDDL for C509CertificateRevocationList.</name>
        <artwork type="CDDL" align="center" name="" alt=""><![CDATA[
C509CertificateRevocationList = [
   TBSCertificateRevocationList,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateSigningRequest = (
   C509CertificateRevocationListType: int,
   issuer: Name,
   thisUpdate: Time,
   nextUpdate: Time,
   revokedCertificates: RevokedCertificates,
   crlExtensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

RevokedCertificates = [
    userCertificate: CertificateSerialNumber,
    revocationDate: Time,
    crlEntryExtensions: Extensions,
]
]]></artwork>
      </figure>
    </section>
    <section anchor="OCSP" numbered="true" toc="default">
      <name>C509 Online Certificate Status Protocol</name>
      <t>TODO</t>
    </section>
    <section anchor="c509-processing-and-certificate-issuance" numbered="true" toc="default">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The CSR format defined in Section 4 follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986" format="default"/>.</t>
      <t>When a certificate request is received the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof of possession of the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 1 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 0 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with CA may be needed.</t>
    </section>
    <section anchor="dep-set" numbered="true" toc="default">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. In order to verify the signature, the C509 certificate is used to recreate the original X.509 data structure to be able to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes" numbered="true" toc="default">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA" format="default"/> results in the numbers shown in <xref target="fig-size-COSE" format="default"/> and <xref target="fig-size-TLS" format="default"/>. COSE_X509 is defined in <xref target="I-D.ietf-cose-x509" format="default"/> and COSE_C509 is defined in <xref target="cose" format="default"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. For the example HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 use dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 0 and 1 have the same size. For Brotli <xref target="RFC7932" format="default"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       139 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1394 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3934 |
+---------------------------------------+-----------+-----------+
]]></artwork>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X509 and C509 are Certificate messages. X509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+-------------------+-------+---------------+------+---------------+
|                   |  X509 | X509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+---------------+------+---------------+
| RFC 7925 Cert (1) |   327 |           324 |  151 |           167 |
+-------------------+-------+---------------+------+---------------+
| RPKI Cert (1)     | 20991 |          9134 | 8660 |          5668 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (2)   |  2204 |          1455 | 1414 |          1063 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (4)   |  5190 |          3244 | 3958 |          2845 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Bag (8)     | 11578 |          3979 | 8882 |          3519 |
+-------------------+-------+---------------+------+---------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-cons" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set" format="default"/> requires unencrypted certificates and is not recommended.</t>
    </section>
    <section anchor="iana" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document creates several new registries under the new heading "C509 Certificate". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>
      <section anchor="type" numbered="true" toc="default">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the new heading "C509 Certificate". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="atttype" numbered="true" toc="default">
        <name>C509 Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 Attributes" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an non-negative integer, and the other columns are text strings. For values in the interval [0, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 Attributes</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="extype" numbered="true" toc="default">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is an positive integer, and the other columns are text strings. For values in the interval [1, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:   AuthorityInfoAccessSyntax               |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestamps              |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:   SubjectDirectoryAttributes              |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     ipAddrBlocks                             |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     autonomousSysIds                         |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     ipAddrBlocks-v2                          |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     autonomousSysIds-v2                      |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="CP" numbered="true" toc="default">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="PQ" numbered="true" toc="default">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="IA" numbered="true" toc="default">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="EKU" numbered="true" toc="default">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="GN" numbered="true" toc="default">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleNamee                |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sigalg" numbered="true" toc="default">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="pkalg" numbered="true" toc="default">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". T The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="cose" numbered="true" toc="default">
        <name>COSE Header Parameters Registry</name>
        <t>EDITORS NOTE: The text should be moved a section and not be in the IANA Section.</t>
        <t>This document registers the following entries in the "COSE Header Parameters" registry under the "CBOR Object Signing and Encryption (COSE)" heading. The formatting and processing for c5b, c5c, and c5t, and c5u are similar to x5bag, x5chain, x5t, x5u defined in <xref target="I-D.ietf-cose-x509" format="default"/> except that the certificates are C509 instead of DER encoded X.509 and uses a COSE_C509 structure instead of COSE_X509. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C509 item served with the application/cbor content format. The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <artwork type="CDDL" name="" align="left" alt=""><![CDATA[
COSE_C509 = C509Certificate / [ 2* C509Certificate ]
]]></artwork>
        <t>As the contents of c5bag, c5chain, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+-----------+-------+----------------+------------------------------+
| Name      | Label | Value Type     | Description                  |
+===========+=======+================+==============================+
| c5b       |  TBD1 | COSE_C509      | An unordered bag of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5c       |  TBD2 | COSE_C509      | An ordered chain of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5t       |  TBD3 | COSE_CertHash  | Hash of a C509Certificate    |
+-----------+-------+----------------+------------------------------+
| c5u       |  TBD4 | uri            | URI pointing to a COSE_C509  |
|           |       |                | containing a ordered chain   |
|           |       |                | of certificates              |
+-----------+-------+----------------+------------------------------+
]]></artwork>
      </section>
      <section anchor="tls" numbered="true" toc="default">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879" format="default"/>. C509 is defined in the same way as as X509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).</t>
        <t>EDITOR'S NOTE: The TLS registrations should be discussed and approved by the TLS WG at a later stage. When COSE WG has adopted work on C509 certificates, it could perhaps be presented in the TLS WG. The TLS WG might e.g. want a separate draft in the TLS WG.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
      </section>
      <section anchor="tags" numbered="true" toc="default">
        <name>CBOR Tags Registry</name>
        <t>This document registers the following entries in the "CBOR Tags" registry under the "Concise Binary Object Representation (CBOR) Tags" heading.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C509                                       |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2986" target="https://www.rfc-editor.org/info/rfc2986" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author initials="M." surname="Nystrom" fullname="M. Nystrom">
              <organization/>
            </author>
            <author initials="B." surname="Kaliski" fullname="B. Kaliski">
              <organization/>
            </author>
            <date year="2000" month="November"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4108" target="https://www.rfc-editor.org/info/rfc4108" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization/>
            </author>
            <date year="2005" month="August"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components.  CMS is specified in RFC 3852.  A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package.  A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package.  Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author initials="D." surname="Cooper" fullname="D. Cooper">
              <organization/>
            </author>
            <author initials="S." surname="Santesson" fullname="S. Santesson">
              <organization/>
            </author>
            <author initials="S." surname="Farrell" fullname="S. Farrell">
              <organization/>
            </author>
            <author initials="S." surname="Boeyen" fullname="S. Boeyen">
              <organization/>
            </author>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization/>
            </author>
            <author initials="W." surname="Polk" fullname="W. Polk">
              <organization/>
            </author>
            <date year="2008" month="May"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8152" target="https://www.rfc-editor.org/info/rfc8152" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization/>
            </author>
            <date year="2017" month="July"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author initials="H." surname="Birkholz" fullname="H. Birkholz">
              <organization/>
            </author>
            <author initials="C." surname="Vigano" fullname="C. Vigano">
              <organization/>
            </author>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2019" month="June"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2020" month="February"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq".  A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation.  This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization/>
            </author>
            <date year="2020" month="December"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9090" target="https://www.rfc-editor.org/info/rfc9090" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9090.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2021" month="July"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="I-D.ietf-cose-x509" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-x509.xml" target="https://www.ietf.org/internet-drafts/draft-ietf-cose-x509-08.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header parameters for carrying and referencing X.509 certificates</title>
            <author initials="J" surname="Schaad" fullname="Jim Schaad">
              <organization/>
            </author>
            <date year="2020" month="December" day="14"/>
            <abstract>
              <t>The CBOR Signing And Encrypted Message (COSE) structure uses references to keys in general.  For some algorithms, additional properties are defined which carry parameters relating to keys as needed.  The COSE Key structure is used for transporting keys outside of COSE messages.  This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-x509-08"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6487" target="https://www.rfc-editor.org/info/rfc6487" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author initials="G." surname="Huston" fullname="G. Huston">
              <organization/>
            </author>
            <author initials="G." surname="Michaelson" fullname="G. Michaelson">
              <organization/>
            </author>
            <author initials="R." surname="Loomans" fullname="R. Loomans">
              <organization/>
            </author>
            <date year="2012" month="February"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs).  The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate.  This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI).  This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <author initials="M." surname="Ersue" fullname="M. Ersue">
              <organization/>
            </author>
            <author initials="A." surname="Keranen" fullname="A. Keranen">
              <organization/>
            </author>
            <date year="2014" month="May"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig" role="editor">
              <organization/>
            </author>
            <author initials="T." surname="Fossati" fullname="T. Fossati">
              <organization/>
            </author>
            <date year="2016" month="July"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery.  The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932" target="https://www.rfc-editor.org/info/rfc7932" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author initials="J." surname="Alakuijala" fullname="J. Alakuijala">
              <organization/>
            </author>
            <author initials="Z." surname="Szabadka" fullname="Z. Szabadka">
              <organization/>
            </author>
            <date year="2016" month="July"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603" target="https://www.rfc-editor.org/info/rfc8603" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author initials="M." surname="Jenkins" fullname="M. Jenkins">
              <organization/>
            </author>
            <author initials="L." surname="Zieglar" fullname="L. Zieglar">
              <organization/>
            </author>
            <date year="2019" month="May"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite.  The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates.  US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information.  It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879" target="https://www.rfc-editor.org/info/rfc8879" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
          <front>
            <title>TLS Certificate Compression</title>
            <author initials="A." surname="Ghedini" fullname="A. Ghedini">
              <organization/>
            </author>
            <author initials="V." surname="Vasiliev" fullname="V. Vasiliev">
              <organization/>
            </author>
            <date year="2020" month="December"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author initials="J." surname="Iyengar" fullname="J. Iyengar" role="editor">
              <organization/>
            </author>
            <author initials="M." surname="Thomson" fullname="M. Thomson" role="editor">
              <organization/>
            </author>
            <date year="2021" month="May"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml" target="https://www.ietf.org/archive/id/draft-ietf-lake-edhoc-12.txt">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date month="October" day="20" year="2021"/>
            <abstract>
              <t>   This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a
   very compact and lightweight authenticated Diffie-Hellman key
   exchange with ephemeral keys.  EDHOC provides mutual authentication,
   forward secrecy, and identity protection.  EDHOC is intended for
   usage in constrained scenarios and a main use case is to establish an
   OSCORE security context.  By reusing COSE for cryptography, CBOR for
   encoding, and CoAP for transport, the additional code size can be
   kept very low.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-12"/>
        </reference>
        <reference anchor="I-D.ietf-tls-dtls13" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-dtls13.xml" target="https://www.ietf.org/internet-drafts/draft-ietf-tls-dtls13-43.txt">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author initials="E" surname="Rescorla" fullname="Eric Rescorla">
              <organization/>
            </author>
            <author initials="H" surname="Tschofenig" fullname="Hannes Tschofenig">
              <organization/>
            </author>
            <author initials="N" surname="Modadugu" fullname="Nagendra Modadugu">
              <organization/>
            </author>
            <date year="2021" month="April" day="30"/>
            <abstract>
              <t>This document specifies Version 1.3 of the Datagram Transport Layer Security (DTLS) protocol.  DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t> The DTLS 1.3 protocol is intentionally based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection/non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t> This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls13-43"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml" target="https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-03.txt">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati">
              <organization>Arm Limited</organization>
            </author>
            <date month="October" day="25" year="2021"/>
            <abstract>
              <t>   This document is a companion to RFC 7925 and defines TLS/DTLS 1.3
   profiles for Internet of Things devices.  It also updates RFC 7925
   with regards to the X.509 certificate profile.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/thomas-fossati/draft-tls13-iot.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-03"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml" target="https://www.ietf.org/archive/id/draft-ietf-tls-ctls-04.txt">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Richard Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <date month="October" day="25" year="2021"/>
            <abstract>
              <t>   This document specifies a "compact" version of TLS 1.3.  It is
   isomorphic to TLS 1.3 but saves space by trimming obsolete material,
   tighter encoding, a template-based specialization technique, and
   alternative cryptographic techniques. cTLS is not directly
   interoperable with TLS 1.3, but it should eventually be possible for
   a cTLS/TLS 1.3 server to exist and successfully interoperate.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-04"/>
        </reference>
        <reference anchor="I-D.ietf-emu-eap-tls13" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emu-eap-tls13.xml" target="https://www.ietf.org/internet-drafts/draft-ietf-emu-eap-tls13-21.txt">
          <front>
            <title>Using EAP-TLS with TLS 1.3 (EAP-TLS 1.3)</title>
            <author initials="J" surname="Mattsson" fullname="John Mattsson">
              <organization/>
            </author>
            <author initials="M" surname="Sethi" fullname="Mohit Sethi">
              <organization/>
            </author>
            <date year="2021" month="October" day="20"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods.  This document specifies the use of EAP-Transport Layer Security (EAP-TLS) with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS.  TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS.  EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking, when compared to EAP-TLS with earlier versions of TLS.  This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used).  This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eap-tls13-21"/>
        </reference>
        <reference anchor="I-D.ietf-emu-eaptlscert" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emu-eaptlscert.xml" target="https://www.ietf.org/archive/id/draft-ietf-emu-eaptlscert-08.txt">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-based EAP Methods</title>
            <author fullname="Mohit Sethi">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Sean Turner">
              <organization>sn3rd</organization>
            </author>
            <date month="November" day="20" year="2020"/>
            <abstract>
              <t>   The Extensible Authentication Protocol (EAP), defined in RFC3748,
   provides a standard mechanism for support of multiple authentication
   methods.  EAP-Transport Layer Security (EAP-TLS) and other TLS-based
   EAP methods are widely deployed and used for network access
   authentication.  Large certificates and long certificate chains
   combined with authenticators that drop an EAP session after only 40 -
   50 round-trips is a major deployment problem.  This document looks at
   this problem in detail and describes the potential solutions
   available.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eaptlscert-08"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.6"</title>
            <author initials="." surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="June"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 2.3"</title>
            <author initials="." surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="." surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/esim/wp-content/uploads/2021/02/SGP.14-v2.1.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.1</title>
            <author initials="." surname="GSMA">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="http://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="appA" numbered="true" toc="default">
      <name>Example C509 Certificates</name>
      <section anchor="example-rfc-7925-profiled-x509-certificate" numbered="true" toc="default">
        <name>Example RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925" format="default"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2020 GMT
            Not After : Feb  2 00:00:00 2021 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
         30:44:02:20:44:5d:79:8c:90:e7:f5:00:dc:74:7a:65:4c:ec:
         6c:fa:6f:03:72:76:e1:4e:52:ed:07:fc:16:29:4c:84:66:0d:
         02:20:5a:33:98:5d:fb:d4:bf:dd:6d:4a:cf:38:04:c3:d4:6e:
         bf:3b:7f:a6:26:40:67:4f:c0:35:4f:a0:56:db:ae:a6

]]></artwork>
        <t>The DER encoding of the above certificate is 314 bytes.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
30 82 01 36 30 81 DE A0 03 02 01 02 02 03 01 F5 0D 30 0A 06 08 2A 86
48 CE 3D 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0C 0B 52 46 43 20
74 65 73 74 20 43 41 30 1E 17 0D 32 30 30 31 30 31 30 30 30 30 30 30
5A 17 0D 32 31 30 32 30 32 30 30 30 30 30 30 5A 30 22 31 20 30 1E 06
03 55 04 03 0C 17 30 31 2D 32 33 2D 34 35 2D 46 46 2D 46 45 2D 36 37
2D 38 39 2D 41 42 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86
48 CE 3D 03 01 07 03 42 00 04 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E
69 3F 16 21 3A 04 52 5E D4 44 50 B1 01 9C 2D FD 38 38 AB AC 4E 14 D8
6C 09 83 ED 5E 9E EF 24 48 C6 86 1C C4 06 54 71 77 E6 02 60 30 D0 51
F7 79 2A C2 06 A3 0F 30 0D 30 0B 06 03 55 1D 0F 04 04 03 02 07 80 30
0A 06 08 2A 86 48 CE 3D 04 03 02 03 47 00 30 44 02 20 44 5D 79 8C 90
E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1 4E 52 ED 07 FC 16 29
4C 84 66 0D 02 20 5A 33 98 5D FB D4 BF DD 6D 4A CF 38 04 C3 D4 6E BF
3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork>
        <section anchor="example-c509-certificate-encoding" numbered="true" toc="default">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'445D798C90E7F500DC747A654CEC6CFA6F037276E14E52ED07
    FC16294C84660D5A33985DFBD4BFDD6D4ACF3804C3D46EBF3B
    7FA62640674FC0354FA056DBAEA6'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 44 5D 79 8C 90 E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1
4E 52 ED 07 FC 16 29 4C 84 66 0D 5A 33 98 5D FB D4 BF DD 6D 4A CF 38
04 C3 D4 6E BF 3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork>
        </section>
        <section anchor="example-natively-signed-c509-certificate" numbered="true" toc="default">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for c509CertificateType and signatureValue.</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'B27A0B781455F71B68290F6C2EC9A897F18FDE9B6C59575953
    BC67268AB0E4DDE99D273E04E4715383AB2257C6AAA35284E5
    ED18BDB91247E9F2C433136480B9'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 B2 7A 0B 78 14 55 F7 1B 68 29 0F 6C 2E C9 A8 97 F1 8F DE 9B 6C
59 57 59 53 BC 67 26 8A B0 E4 DD E9 9D 27 3E 04 E4 71 53 83 AB 22 57
C6 AA A3 52 84 E5 ED 18 BD B9 12 47 E9 F2 C4 33 13 64 80 B9
]]></artwork>
        </section>
        <section anchor="example-additonal-keys-for-the-example-certificates" numbered="true" toc="default">
          <name>Example: Additonal Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC8152" format="default"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork name="" type="" align="left" alt=""><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate" numbered="true" toc="default">
        <name>Example IEEE 802.1AR profiled X.509 Certificate</name>
        <t>EDITOR'S NOTE: To do</t>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate" numbered="true" toc="default">
        <name>Example CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1" numbered="true" toc="default">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate" numbered="true" toc="default">
        <name>Example CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2" numbered="true" toc="default">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombinini, Thomas Peterson, Michael Richardson, Maik Reichert, Stefan Santesson, Jim Schaad, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and helping with GitHub.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
