<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.5) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY SELF "RFCthis">
]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-suit-report-17" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SUIT Reports">Secure Reporting of SUIT Update Status</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>

    <date year="2025" month="November" day="25"/>

    <area>Security</area>
    <workgroup>SUIT</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 62?>

<t>The Software Update for the Internet of Things (SUIT) manifest provides
a way for many different update and boot
workflows to be described by a common format.
This document specifies a lightweight feedback mechanism that
allows a developer in possession of a manifest to reconstruct the
decisions made and actions performed by a manifest processor.</t>



    </abstract>



  </front>

  <middle>


<?line 71?>

<section anchor="introduction"><name>Introduction</name>

<t>This document specifies a
logging container, specific to Software Update for the Internet of Things (SUIT) Manifests (<xref target="I-D.ietf-suit-manifest"/>)
that creates a lightweight feedback mechanism for
developers in the event that an update or boot fails in the manifest
processor. In this way, it provides the necessary link between the
Status Tracker Client and the Status Tracker Server as defined in
<xref section="2.3" sectionFormat="of" target="RFC9019"/>.</t>

<t>A SUIT Manifest Processor can fail to install or boot an update for many
reasons. Frequently, the error codes generated by such systems fail to
provide developers with enough information to find root causes and
produce corrective actions, resulting in extra effort to reproduce
failures. Logging the results of each SUIT command can simplify this
process.</t>

<t>While it is possible to report the results of SUIT commands through
existing logging or attestation mechanisms, this comes with several
drawbacks:</t>

<t><list style="symbols">
  <t>data inflation, particularly when designed for text-based logging</t>
  <t>missing information elements</t>
  <t>missing support for multiple components</t>
</list></t>

<t>The CBOR objects defined in this document allow devices to:</t>

<t><list style="symbols">
  <t>report a trace of how an update was performed</t>
  <t>report expected vs. actual values for critical checks</t>
  <t>describe the installation of complex multi-component architectures</t>
  <t>describe the measured properties of a system</t>
  <t>report the exact reason for a parsing failure</t>
</list></t>

</section>
<section anchor="terminology"><name>Conventions and Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>The terms "Author", "Recipient", and "Manifest" are defined in 
<xref section="2" sectionFormat="of" target="I-D.ietf-suit-manifest"/>.</t>

<t>Additionally, this document uses the term
Boot: initialization of an executable image. Although this
document refers to boot, any boot-specific operations described
are equally applicable to starting an executable in an OS context.</t>

</section>
<section anchor="suit-record"><name>The SUIT_Record</name>

<t>The SUIT_Record is a record of a decision taken by the Manifest Processor.
It contains the information that the Manifest Processor used to make the
decision. The decision can be inferred from this information, so it is not
included.
If the developer has a copy of the
manifest, then they need little information to reconstruct what the
manifest processor has done. They need any data that influences
the control flow of the manifest. The manifest only supports the
following control flow primitives:</t>

<t><list style="symbols">
  <t>Set Component</t>
  <t>Set/Override Parameters</t>
  <t>Try-Each</t>
  <t>Run Sequence</t>
  <t>Conditions</t>
</list></t>

<t>Of these, only conditions change the behavior of the processor from the
default, and then only when the condition fails.</t>

<t>To reconstruct the flow of a manifest, a developer needs
a list of metadata about failed conditions:</t>

<t><list style="symbols">
  <t>the current manifest</t>
  <t>the current Command Sequence (<xref section="5.3.3" sectionFormat="of" target="I-D.ietf-suit-manifest"/>)</t>
  <t>the offset into the current Command Sequence</t>
  <t>the current component index</t>
  <t>the "reason" for failure</t>
</list></t>

<t>Most conditions compare a parameter to an actual value, so the "reason"
is typically the actual value.</t>

<t>Since it is possible that a non-condition command (directive) may fail in an
exceptional circumstance,
a failure code for a non condition command must be communicated to the developer. However,
a failed directive will terminate processing of the manifest. To accommodate
for a failed command and for explicit "completion," an additional "result"
element is included as well; however, this is included in the SUIT_Report (<xref target="suit-report"/>).
In the case of a command failure,
the failure reason is typically a numeric error code. However, these error
codes need to be standardised in order to be useful.</t>

<t>This approach effectively compacts the log of operations taken using the SUIT Manifest
as a dictionary. This enables a full reconstruction of the log using a matching
decompaction tool. The following CDDL (<xref target="RFC8610"/>) shows the structure of a SUIT_Record.</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Record = [
    suit-record-manifest-id        : [* uint ],
    suit-record-manifest-section   : int,
    suit-record-section-offset     : uint,
    suit-record-component-index    : uint,
    suit-record-properties         : SUIT_Parameters,
    $$SUIT_Record_Extensions
]
]]></sourcecode></figure>

<t>suit-record-manifest-id is used to identify which manifest contains the
command that caused the record to be generated. The manifest id is a
list of integers that form a walk of the manifest tree, starting at the
root. An empty list indicates that the command was contained in the
root manifest. If the list is not empty, the command was contained in
one of the root manifest's dependencies, or nested even further below
that.</t>

<t>For example, suppose that the root manifest has 3 dependencies
and each of those dependencies has 2 dependencies of its own:</t>

<t><list style="symbols">
  <t>Root  <list style="symbols">
      <t>Dependency A (index 0)      <list style="symbols">
          <t>Dependency AA (index 0,0)</t>
          <t>Dependency AB (index 0,1)</t>
        </list></t>
      <t>Dependency B (index 1)      <list style="symbols">
          <t>Dependency BA (index 1,0)</t>
          <t>Dependency BB (index 1,1)</t>
        </list></t>
      <t>Dependency C (index 2)      <list style="symbols">
          <t>Dependency CA (index 2,0)</t>
          <t>Dependency CB (index 2,1)</t>
        </list></t>
    </list></t>
</list></t>

<t>A suit-record-manifest-id of [1,0] would indicate that the current command was
contained within Dependency BA. Similarly, a suit-record-manifest-id of [2,1]
would indicate Dependency CB</t>

<t>suit-record-manifest-section indicates which Command Sequence of the manifest was
active. Only the "top level" Command Sequences, with entries in the Manifest are
identified by this element. These are:</t>

<t><list style="symbols">
  <t>suit-validate = 7</t>
  <t>suit-load = 8</t>
  <t>suit-invoke = 9</t>
  <t>suit-dependency-resolution  = 15</t>
  <t>suit-payload-fetch = 16</t>
  <t>suit-candidate-verification = 18</t>
  <t>suit-install = 20</t>
</list></t>

<t>This list may be extended through extensions to the SUIT_Manifest.</t>

<t>suit-record-manifest-section is used in addition to an offset so that the developer can
index into severable Command Sequences in a predictable way. The value of this
element is the value of the key that identified the Command Sequence in the
manifest.</t>

<t>suit-record-section-offset is the number of bytes into the current
Command Sequence at which the current command is located.</t>

<t>suit-record-component-index is the index of the component that was
specified at the time that the report was generated. This field is
necessary due to the availability of set-current-component values of
True and a list of components. Both of these values cause the manifest
processor to loop over commands using a series of component-ids, so the
developer needs to know which was selected when the command executed.</t>

<t>suit-record-properties contains any measured properties that led to the
command failure.
For example, this could be the actual value of a SUIT_Digest or
class identifier. This is encoded in a SUIT_Parameters block as defined
in <xref section="8.4.8" sectionFormat="of" target="I-D.ietf-suit-manifest"/>.</t>

</section>
<section anchor="suit-report"><name>The SUIT_Report</name>

<t>The SUIT_Report is a SUIT-specific logging container. It contains
the SUIT_Records needed to reconstruct the decisions made by a
Manifest Processor as well as references to the Manifest being 
processed, the result of processing, and an optional capability
report.</t>

<t>Some metadata is common to all records, such as the root manifest:
the manifest that is the entry-point for the manifest processor. This
metadata is aggregated with a list of SUIT_Records as defined in 
<xref target="suit-record"/>. The SUIT_Report
may also contain a list of any System Properties that were measured
and reported, and a reason for a failure if one occurred.
The following CDDL describes the structure of a SUIT_Report and
a SUIT_Reference:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Report = {
  suit-reference              => SUIT_Reference,
  ? suit-report-nonce         => bstr,
  suit-report-records         => \
        \[ * SUIT_Record / system-property-claims \],
  suit-report-result          => true / {
    suit-report-result-code   => int,
    suit-report-result-record => SUIT_Record,
    suit-report-result-reason => SUIT_Report_Reasons,
  },
  ? suit-report-capability-report => SUIT_Capability_Report,
  $$SUIT_Report_Extensions
}

system-property-claims = {
  system-component-id => SUIT_Component_Identifier,
  + SUIT_Parameters,
}

SUIT_Reference = [
    suit-report-manifest-uri  : tstr,
    suit-report-manifest-digest : SUIT_Digest,
]
]]></sourcecode></figure>

<t>Further details for each element appear in subsequent sections: the
encoding of <spanx style="verb">suit-report-records</spanx> is defined in <xref target="suit-report-records"/>,
the result semantics in <xref target="suit-report-result"/>, and the optional
capability report in <xref target="capabilities"/>.</t>

<t>The suit-reference provides a reference URI and digest for a suit
manifest. The URI <bcp14>MUST</bcp14> exactly match the suit-reference-uri
(<xref section="8.4.3" sectionFormat="of" target="I-D.ietf-suit-manifest"/>) that is provided in the
manifest. The digest is the digest of the manifest, exactly as reported in
SUIT_Authentication, element 0 (<xref section="8.3" sectionFormat="of" target="I-D.ietf-suit-manifest"/>).</t>

<t>NOTE: The digest is used
in preference to other identifiers in the manifest because it allows
a manifest to be uniquely identified (collision resistance) whereas
other identifiers, such as the sequence number, can collide,
particularly in scenarios with multiple trusted signers.</t>

<t>suit-report-nonce provides a container for freshness or replay
protection information. This field <bcp14>MAY</bcp14> be omitted where the suit-report
is authenticated within a container that provides freshness already.
For example, attestation evidence typically contains a proof of
freshness.</t>

<t>suit-report-manifest-digest provides a SUIT_Digest (as defined in
<xref section="10" sectionFormat="of" target="I-D.ietf-suit-manifest"/>) that is the characteristic digest of the
Root manifest. This digest <bcp14>MUST</bcp14> be the same digest as is held in
the first element of SUIT_Authentication in the referenced
Manifest_Envelope.</t>

<t>suit-report-manifest-uri provides the reference URI that was provided in
the root manifest.</t>

<section anchor="suit-report-records"><name>suit-report-records</name>

<t>suit-report-records is a list of 0 or more SUIT_Records or
system-property-claims. Because SUIT_Records are only generated on failure,
in simple cases this can be an empty list. SUIT_Records and
suit-system-property-claims are merged into a single list because this
reduces the overhead for a constrained node that generates this report.
The use of a single log allows report generators to use simple
memory management. Because the system-property-claims
are encoded as maps and SUIT_Records are encoded as lists, a recipient need
only filter the CBOR Type-5 entries from suit-report-records to obtain all 
system-property-claims.</t>

<t>System Properties can be extracted from suit-report-records by filtering
suit-report-records for maps. System Properties are a list of measured
or asserted properties
of the system that creates the SUIT_Report. These properties are scoped by
component identifier. Because this list is expected to be constructed on
the fly by a constrained node, component identifiers may appear more than
once. A recipient may convert the result to a more conventional structure:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Record_System_Properties = {
  * component-id => {
    + SUIT_Parameters,
  }
}
]]></sourcecode></figure>

</section>
<section anchor="suit-report-result"><name>SUIT_Report Result</name>

<t>suit-report-result provides a mechanism to show that the SUIT procedure
completed successfully (value is true) or why it failed (value is a map
of an error code and a SUIT_Record).</t>

<t>suit-report-result-reason gives a high-level explanation of the failure.
These reasons are intended for interoperable implementations. The reasons
are divided into a small number of groups:</t>

<t><list style="symbols">
  <t>suit-report-reason-cbor-parse: a parsing error was encountered by the
CBOR parser.</t>
  <t>suit-report-reason-cose-unsupported: an unsupported COSE (<xref target="RFC9052"/>) structure or
header was encountered.</t>
  <t>suit-report-reason-alg-unsupported: an unsupported COSE algorithm was
encountered.</t>
  <t>suit-report-reason-unauthorised: Signature/MAC verification failed.</t>
  <t>suit-report-reason-command-unsupported: an unsupported command was
encountered.</t>
  <t>suit-report-reason-component-unsupported: The manifest declared a
component/prefix that does not exist.</t>
  <t>suit-report-reason-component-unauthorised: The manifest declared a
component that is not accessible by the signer.</t>
  <t>suit-report-reason-parameter-unsupported: The manifest used a
parameter that does not exist.</t>
  <t>suit-report-reason-severing-unsupported: The manifest used severable fields
but the Manifest Processor does not support them.</t>
  <t>suit-report-reason-condition-failed: A condition failed with soft-
failure off.</t>
  <t>suit-report-reason-operation-failed: A command failed (e.g.,
download/copy/swap/write)</t>
  <t>suit-report-reason-invoke-pending: Invocation is about to be attempted
and the final outcome is not yet known.</t>
</list></t>

<t>The suit-report-result-code reports an internal error code that is
provided for debugging reasons. This code is not intended for
interoperability.</t>

<t>The suit-report-result-record indicates the exact point in the manifest
or manifest dependency tree where the error occurred.</t>

<t>NOTE: Some deployments use <spanx style="verb">SUIT_Command_Invoke</spanx>, which can transfer
control to invoked code that never returns to the Manifest Processor.
When a SUIT_Report is produced for remote attestation, implementations
often need to sign the report before attempting the invoke. Signing with
an unconditional "success" result would be misleading if the invocation
ultimately fails. Implementers can leave the invoke outcome
implicit—allowing a verifier to infer that execution was handed off—or,
when the result must be reported before invocation, use
<spanx style="verb">suit-report-reason-invoke-pending</spanx> to signal that invocation is about to
occur without asserting a final outcome.</t>

<t>suit-report-capability-report provides a mechanism to report the capabilities of the Manifest Processor. The SUIT_Capability_Report is described in <xref target="capabilities"/>. The capability report is optional to include in the SUIT_Report, according to an application-specific policy. While the SUIT_Capability_Report is not expected to be very large, applications should ensure that they only report capabilities when necessary in order to conserve bandwidth. A capability report is not necessary except when:</t>

<t><list style="numbers" type="1">
  <t>A client explicitly requests the capability report, or</t>
  <t>A manifest attempts to use a capability that the Manifest Processor does not implement.</t>
</list></t>

</section>
</section>
<section anchor="attestation"><name>Attestation</name>

<t>Where Remote Attestation (see <xref target="RFC9334"/>, the RATS Architecture) is in use, the RATS Verifier (Verifier hereafter) requires a set of
Attestation Evidence. Attestation Evidence contains Evidence Claims about the Attester. These Evidence Claims
contain measurements about the Attester. Many of these measurements are the same measurements that are generated in SUIT,
which means that a SUIT_Report contains most of the Claims and some of the Endorsements that a Verifier requires.</t>

<t>Using a SUIT_Manifest and a SUIT_Report improves a Verifier's ability to 
appraise the trustworthiness of a remote device.
Remote attestation is done by using the SUIT_Envelope
along with the SUIT_Report in Evidence to reconstruct the state of the device at boot time.
Additionally, by including SUIT_Report data as telemetry (i.e., debug/failure information) next to measurements in Evidence, both types of Evidence data can be notarized via verifiable data structure, such as an append-only log (<xref section="3" sectionFormat="of" target="I-D.ietf-scitt-architecture"/>) using the same conceptual message.</t>

<t>For the SUIT_Report to be usable as Attestation Evidence, the environment that
generated the SUIT_Report also needs to be measured. Typically, this means that
the software that executes the commands in the Manifest (the Manifest
Processor) must be measured; similarly, the piece of software that assembles
the measurements, taken by the Manifest Processor, into the SUIT_Report (the
Report Generator) must also be measured. Any bootloaders or operating systems
that facilitate the running of the Manifest Processor or Report Generator also need
to be measured in order to demonstrate the integrity of the measuring environment.</t>

<t>Therefore, if a Remote Attestation format that conveys Attestation Evidence, such as an Entity Attestation Token (EAT, see <xref target="RFC9711"/>), contains a SUIT_Report, then it <bcp14>MUST</bcp14> also include an integrity measurement of the Manifest Processor, the Report Generator and any bootloader or OS environment that ran before or during the 
execution of both.</t>

<t>If Reference Values (<xref section="8.3" sectionFormat="of" target="RFC9334"/>) required by the Verifier are delivered in a SUIT_Envelope, this codifies the delivery of appraisal information to the Verifier:</t>

<t><list style="symbols">
  <t>The Firmware Distributor:
  <list style="symbols">
      <t>sends the SUIT_Envelope to the Verifier without payload or text, but with Reference Values</t>
      <t>sends the SUIT_Envelope to the Recipient without Reference Values, or text, but with payload</t>
    </list></t>
  <t>The Recipient:
  <list style="symbols">
      <t>Installs the firmware as described in the SUIT_Manifest and generates a SUIT_Report, which is encapsulated in an EAT by the installer and sent to the Firmware Distributor.</t>
      <t>Boots the firmware as described in the SUIT_Manifest and creates a SUIT_Report, which is encapsulated in an EAT by the installer and sent to the Firmware Distributor.</t>
    </list></t>
  <t>The Firmware Distributor sends both reports to the Verifier (separately or together)</t>
  <t>The Verifier:
  <list style="symbols">
      <t>Reconstructs the state of the device using the manifest</t>
      <t>Compares this state to the Reference Values</t>
      <t>Returns an Attestation Report to the Firmware Distributor</t>
    </list></t>
</list></t>

<t>This approach simplifies the design of the bootloader since it is able to use an append-only log. It allows a Verifier to validate this report against signed Reference Values that is provided by the firmware author, which simplifies the delivery chain of verification information to the Verifier.</t>

<t>For a Verifier to consume the SUIT_Report, it requires a copy of the
SUIT_Manifest. The Verifier then replays the SUIT_Manifest, using the
SUIT_Report to resolve whether each condition is met. It identifies each
measurement that is required by attestation policy and records this
measurement as a Claim (<xref section="4" sectionFormat="of" target="RFC9711"/>). It evaluates whether the SUIT_Report
correctly matches the SUIT_Manifest as an element of evaluating
trustworthiness. For example there are several indicators that would show
that a SUIT_Report does not match a SUIT_Manifest. If any of the following
(not an exhaustive list) occur, then the Manifest Processor that created the
report is not trustworthy:</t>

<t><list style="symbols">
  <t>Hash of SUIT_Manifest at suit-report-manifest-uri does not match suit-report-manifest-digest</t>
  <t>A SUIT_Record is issued for a SUIT_Command_Sequence that does not exist 
in the SUIT_Manifest at suit-report-manifest-uri.</t>
  <t>A SUIT_Record is identified at an offset that is not a condition and does
not have a reporting policy that would indicate a SUIT_Record is needed.</t>
</list></t>

<t>Many architectures require multiple Verifiers, for example where one Verifier
handles hardware trust, and another handles software trust, especially the
evaluation of software authenticity and freshness. Some Verifiers may not
be capable of processing a SUIT_Report and, for separation of roles, it
may be preferable to divide that responsibility. In this case, the Verifier
of the SUIT_Report should perform an Evidence Transformation
<xref target="I-D.ietf-rats-evidence-trans"/> and
produce general purpose Measurement Results Claims that can be consumed by a
downstream Verifier, for example a Verifying Relying Party, that does not
understand SUIT_Reports.</t>

</section>
<section anchor="capabilities"><name>Capability Reporting</name>

<t>Because SUIT is extensible, a manifest author must know what capabilities a device has available. To enable this, a capability report is a set of lists that define which commands, parameters, algorithms, and component IDs are supported by a manifest processor.</t>

<t>The CDDL for a SUIT_Capability_Report follows:</t>

<figure><sourcecode type="~CDDL"><![CDATA[
SUIT_Capability_Report = {
  suit-component-capabilities  => [+ SUIT_Component_Capability ]
  suit-command-capabilities          => [+ int],
  suit-parameters-capabilities       => [+ int],
  suit-crypt-algo-capabilities       => [+ int],
  ? suit-envelope-capabilities       => [+ int],
  ? suit-manifest-capabilities       => [+ int],
  ? suit-common-capabilities         => [+ int],
  ? suit-text-capabilities           => [+ int],
  ? suit-text-component-capabilities => [+ int],
  ? suit-dependency-capabilities     => [+ int],
  * [+int]                           => [+ int],
  $$SUIT_Capability_Report_Extensions
}

SUIT_Component_Capability = [*bstr,?true]
]]></sourcecode></figure>

<t>A SUIT_Component_Capability is similar to a SUIT_Component_ID, with one difference: it may optionally be terminated by a CBOR 'true' which acts as a wild-card match for any component with a prefix matching the SUIT_Component_Capability leading up to the 'true.' This feature is for use with filesystem storage, key value stores, or any other arbitrary-component-id storage systems.</t>

<t>When reporting capabilities, it is <bcp14>OPTIONAL</bcp14> to report capabilities that are declared mandatory by the SUIT Manifest <xref target="I-D.ietf-suit-manifest"/>. Capabilities defined by extensions <bcp14>MUST</bcp14> be reported.</t>

<t>Additional capability reporting can be added as follows: if a manifest element does not exist in this map, it can be added by specifying the CBOR path to the manifest element in an array and using this as the key. For example SUIT_Dependencies, as described in <xref section="5.2.2" sectionFormat="of" target="I-D.ietf-suit-trust-domains"/>,  could have an extension added, which was key 3 in the SUIT_Dependencies map. This capability would be reported as: [3, 3, 1] =&gt; [3], where the key consists of the key for SUIT_Manifest (3), the key for SUIT_Common (3), and the key for SUIT_Dependencies (1). Then the value indicates that this manifest processor supports the extension (3).</t>

</section>
<section anchor="eat"><name>EAT Claim</name>

<t>The Entity Attestation Token (EAT, see <xref target="RFC9711"/>) is a secure container for conveying
Attestation Evidence, such as measurements, and Attestation Results.
The SUIT_Report is a form of measurement done by the SUIT Manifest Processor as it attempts to invoke a manifest or install a manifest. As a result, the SUIT_Report can be captured in an EAT measurements type.</t>

<t>The log-based structure of the SUIT_Report is not conducive to processing by a
typical Relying Party: it contains only a list of waypoints through the SUIT
Manifest--unless system parameter records are included--and requires additional 
information (the SUIT_Manifest) to reconstruct the values that must have been
present at each test. A Verifier in posession of the SUIT_Manifest can reconstruct 
the measurements that would produce the waypoints in the SUIT_Report. The Verifier 
<bcp14>SHOULD</bcp14> convert a SUIT_Report into a more consumable version of the EAT claim by, for 
example, constructing a measurement results claim that contains the digest of a 
component, the Vendor ID and Class ID of a component, etc.</t>

</section>
<section anchor="container"><name>SUIT_Report Container</name>

<t>Transmission of the SUIT_Report <bcp14>MUST</bcp14> satisfy the requirements of <xref section="4.3.16" sectionFormat="of" target="RFC9124"/>: REQ.SEC.REPORTING.</t>

<t>Status reports from the device to any remote system <bcp14>MUST</bcp14> be performed over an authenticated, confidential channel in order to prevent modification or spoofing of the reports.</t>

<t>As a result, the SUIT_Report <bcp14>MUST</bcp14> be transported using one of the following methods:</t>

<t><list style="symbols">
  <t>As part of a larger document that provides authenticity guarantees, such as within a <spanx style="verb">measurements</spanx> claim in an Entity Attestation Token (EAT, <xref section="4.2.16" sectionFormat="of" target="RFC9711"/>).</t>
  <t>As the payload of a message transmitted over a communication security protocol, such as DTLS <xref target="RFC9147"/>.</t>
  <t>Encapsulated within a secure container, such as a COSE structure. In the case of COSE, the container <bcp14>MUST</bcp14> be either a <spanx style="verb">COSE_Encrypt0</spanx> or <spanx style="verb">COSE_Sign1</spanx> structure. The SUIT_Report <bcp14>MUST</bcp14> be the sole payload, as illustrated by the CDDL fragment below.</t>
</list></t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Report_Protected /= SUIT_Report_COSE_Sign1 \
                         .and SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_Sign1_Tagged \
                         .and SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0 \
                         .and SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0_Tagged \
                         .and SUIT_COSE_Profiles

SUIT_Report_COSE_Sign1_Tagged = #6.18(SUIT_Report_COSE_Sign1)
SUIT_Report_COSE_Sign1 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    signature : bstr
]
SUIT_Report_COSE_MAC0_Tagged = #6.17(SUIT_Report_COSE_MAC0)
SUIT_Report_COSE_MAC0 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    tag : bstr
]
SUIT_Report_Unprotected = SUIT_Report / SUIT_Report_COSE_Encrypt0
SUIT_Report_COSE_Encrypt0 = COSE_Encrypt0
]]></sourcecode></figure>

<t>Note that SUIT_Report_COSE_Sign1 and SUIT_Report_COSE_MAC0 <bcp14>MUST</bcp14> be combined with a SUIT_COSE_Profiles from <xref target="I-D.ietf-suit-mti"/> using the CDDL .and directive. The SUIT_Report_COSE_Encrypt0 carries a ciphertext payload that <bcp14>MUST</bcp14> contain just the ciphertext obtained by encrypting the following CDDL:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_Report_plaintext = bstr .cbor SUIT_Report
]]></sourcecode></figure>

<t>SUIT_COSE_Profiles, which use AES-CTR encryption, are not integrity protected and authenticated. For this purpose, SUIT_Report_Protected defines authenticated containers with an encrypted payload.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<t>IANA is requested to rename the overall SUIT registry group (https://www.iana.org/assignments/suit/suit.xhtml) "Software Update for the Internet of Things (SUIT)".</t>

<t>IANA is requested to allocate a CBOR tag for each of the following items. Please see <xref target="cbor-tag"/> for further details.</t>

<t><list style="symbols">
  <t>SUIT_Report_Protected</t>
  <t>SUIT_Reference</t>
  <t>SUIT_Capability_Report</t>
</list></t>

<t>IANA is requested to allocate a CoAP content-format <xref target="RFC7252"/> and a media-type for SUIT_Report <xref target="media-type"/>. Please see <xref target="media-type"/> and <xref target="coap-cf"/> for further details.</t>

<t>IANA is also requested to add the following registries to the SUIT registry group (https://www.iana.org/assignments/suit/suit.xhtml).</t>

<t><list style="symbols">
  <t>SUIT_Report Elements <xref target="iana-suit-report-elements"/></t>
  <t>SUIT_Record Elements <xref target="iana-suit-record-elements"/></t>
  <t>SUIT_Report Reasons <xref target="iana-suit-report-reasons"/></t>
  <t>SUIT_Capability_Report Elements <xref target="iana-suit-capability-report"/></t>
</list></t>

<t>For each of these registries, registration policy is:</t>

<t><list style="symbols">
  <t>-256 to 255: Standards Action</t>
  <t>-65536 to 257, 256 to 65535: Specification Required</t>
  <t>-4294967296 to -65537, 65536 to 4294967295: First Come First Served</t>
</list></t>

<t>Requests in the Standards Action and Specification Required ranges <bcp14>MUST</bcp14> also
undergo designated expert review as described below; this guidance supplements
the normal IANA processing for those policies.</t>

<section anchor="expert-review-instructions"><name>Expert Review Instructions</name>

<t>The IANA registries established in this document allow values to be added based on expert review. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason, so they should be given substantial latitude.</t>

<t>Expert reviewers should take into consideration the following points:</t>

<t><list style="symbols">
  <t>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments. The zones tagged as private use are intended for testing purposes and closed environments; code points in other ranges should not be assigned for testing.</t>
  <t>Specifications are required for the standards track range of point assignment. Specifications should exist for all other ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</t>
  <t>Experts should take into account the expected usage of fields when approving point assignment. The fact that there is a range for standards track documents does not mean that a standards track document cannot have points assigned outside of that range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
</list></t>

</section>
<section anchor="media-type"><name>Media Type Registration</name>

<section anchor="applicationsuit-reportcose"><name>application/suit-report+cose</name>

<t>IANA is requested to register application/suit-report+cose as a media type for the SUIT_Report.</t>

<dl spacing="compact">
  <dt>Type name:</dt>
  <dd>
    <t>application</t>
  </dd>
  <dt>Subtype name:</dt>
  <dd>
    <t>suit-report+cose</t>
  </dd>
  <dt>Required parameters:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Encoding considerations:</dt>
  <dd>
    <t>binary (CBOR)</t>
  </dd>
  <dt>Security considerations:</dt>
  <dd>
    <t><xref target="seccons"/> of &SELF;</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>n/a</t>
  </dd>
  <dt>Published specification:</dt>
  <dd>
    <t>&SELF;</t>
  </dd>
  <dt>Applications that use this media type:</dt>
  <dd>
    <t>SUIT Manifest Processor, SUIT Manifest Distributor, SUIT Manifest Author, RATS Attesters, RATS Verifiers</t>
  </dd>
  <dt>Fragment identifier considerations:</dt>
  <dd>
    <t>The syntax and semantics of fragment identifiers are as specified for "application/cose".</t>
  </dd>
  <dt>Person &amp; email address to contact for further information:</dt>
  <dd>
    <t>SUIT WG mailing list (suit@ietf.org)</t>
  </dd>
  <dt>Intended usage:</dt>
  <dd>
    <t>COMMON</t>
  </dd>
  <dt>Restrictions on usage:</dt>
  <dd>
    <t>none</t>
  </dd>
  <dt>Author/Change controller:</dt>
  <dd>
    <t>IETF</t>
  </dd>
  <dt>Provisional registration:</dt>
  <dd>
    <t>no</t>
  </dd>
</dl>

</section>
</section>
<section anchor="coap-cf"><name>CoAP Content-Format Registration</name>

<t>IANA is requested to assign a CoAP Content-Format ID for the SUIT_Report media type in the "CoAP Content-Formats" registry, from the "IETF Review with Expert Review or IESG Approval with Expert Review" space (256..9999), within the "CoRE Parameters" registry group <xref target="RFC7252"/> <xref target="IANA.core-parameters"/>:</t>

<texttable>
      <ttcol align='left'>Content Type</ttcol>
      <ttcol align='left'>Content Coding</ttcol>
      <ttcol align='left'>ID</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>application/suit-report+cose</c>
      <c>&#160;</c>
      <c>TBA</c>
      <c>&SELF;</c>
</texttable>

</section>
<section anchor="cbor-tag"><name>CBOR Tag Registration</name>

<t>IANA is requested to allocate a tag in the "CBOR Tags" registry <xref target="IANA.cbor-tags"/>, preferably in the Specification Required range:</t>

<texttable>
      <ttcol align='left'>Tag</ttcol>
      <ttcol align='left'>Data Item</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c>TBA</c>
      <c>array</c>
      <c>SUIT_Report_Protected</c>
      <c>TBA</c>
      <c>array</c>
      <c>SUIT_Reference</c>
      <c>TBA</c>
      <c>map</c>
      <c>SUIT_Capability_Report</c>
</texttable>

</section>
<section anchor="iana-suit-report-elements"><name>SUIT_Report Elements</name>

<t>IANA is requested to create a new registry for SUIT_Report Elements.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>2</c>
      <c>Nonce</c>
      <c>suit-report-nonce</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>3</c>
      <c>Records</c>
      <c>suit-report-records</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>4</c>
      <c>Result</c>
      <c>suit-report-result</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>5</c>
      <c>Result Code</c>
      <c>suit-report-result-code</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>6</c>
      <c>Result Record</c>
      <c>suit-report-result-record</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>7</c>
      <c>Result Reason</c>
      <c>suit-report-result-reason</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>8</c>
      <c>Capability Report</c>
      <c>suit-report-capability-report</c>
      <c><xref target="suit-report"/> of &SELF;</c>
      <c>99</c>
      <c>Reference</c>
      <c>suit-reference</c>
      <c><xref target="suit-report"/> of &SELF;</c>
</texttable>

</section>
<section anchor="iana-suit-record-elements"><name>SUIT_Record Elements</name>

<t>IANA is requested to create a new registry for SUIT_Record Elements.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>Manifest ID</c>
      <c>suit-record-manifest-id</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>1</c>
      <c>Manifest Section</c>
      <c>suit-record-manifest-section</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>2</c>
      <c>Section Offset</c>
      <c>suit-record-section-offset</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>3</c>
      <c>Component Index</c>
      <c>suit-record-component-index</c>
      <c><xref target="suit-record"/> of &SELF;</c>
      <c>4</c>
      <c>Record Properties</c>
      <c>suit-record-properties</c>
      <c><xref target="suit-record"/> of &SELF;</c>
</texttable>

</section>
<section anchor="iana-suit-report-reasons"><name>SUIT_Report Reasons</name>

<t>IANA is requested to create a new registry for SUIT_Report Reasons.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>CDDL Label</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>Result OK</c>
      <c>suit-report-reason-ok</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>1</c>
      <c>CBOR Parse Failure</c>
      <c>suit-report-reason-cbor-parse</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>2</c>
      <c>Unsupported COSE Structure or Header</c>
      <c>suit-report-reason-cose-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>3</c>
      <c>Unsupported COSE Algorithm</c>
      <c>suit-report-reason-alg-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>4</c>
      <c>Signature / MAC verification failed</c>
      <c>suit-report-reason-unauthorised</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>5</c>
      <c>Unsupported SUIT Command</c>
      <c>suit-report-reason-command-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>6</c>
      <c>Unsupported SUIT Component</c>
      <c>suit-report-reason-component-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>7</c>
      <c>Unauthorized SUIT Component</c>
      <c>suit-report-reason-component-unauthorised</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>8</c>
      <c>Unsupported SUIT Parameter</c>
      <c>suit-report-reason-parameter-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>9</c>
      <c>Severing Unsupported</c>
      <c>suit-report-reason-severing-unsupported</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>10</c>
      <c>Condition Failed</c>
      <c>suit-report-reason-condition-failed</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>11</c>
      <c>Operation Failed</c>
      <c>suit-report-reason-operation-failed</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
      <c>12</c>
      <c>Invocation Pending</c>
      <c>suit-report-reason-invoke-pending</c>
      <c><xref target="suit-report-result"/> of &SELF;</c>
</texttable>

</section>
<section anchor="iana-suit-capability-report"><name> SUIT Capability Report Elements</name>

<t>IANA is requested to create a new registry for SUIT Capability Report Elements.</t>

<texttable>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <ttcol align='left'>&#160;</ttcol>
      <c>1</c>
      <c>Components</c>
      <c>suit-component-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>2</c>
      <c>Commands</c>
      <c>suit-command-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>3</c>
      <c>Parameters</c>
      <c>suit-parameters-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>4</c>
      <c>Cryptographic Algorithms</c>
      <c>suit-crypt-algo-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>5</c>
      <c>Envelope Elements</c>
      <c>suit-envelope-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>6</c>
      <c>Manifest Elements</c>
      <c>suit-manifest-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>7</c>
      <c>Common Elements</c>
      <c>suit-common-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>8</c>
      <c>Text Elements</c>
      <c>suit-text-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>9</c>
      <c>Component Text Elements</c>
      <c>suit-text-component-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
      <c>10</c>
      <c>Dependency Capabilities</c>
      <c>suit-dependency-capabilities</c>
      <c><xref target="capabilities"/> of &SELF;</c>
</texttable>

</section>
</section>
<section anchor="seccons"><name>Security Considerations</name>

<t>The SUIT_Report serves four primary security objectives:</t>

<t><list style="symbols">
  <t>Validated Identity</t>
  <t>Integrity</t>
  <t>Replay protection</t>
  <t>Confidentiality</t>
</list></t>

<t>The mechanisms for achieving these protections are outlined in <xref target="container"/>.</t>

<t>Ideally, a SUIT_Report <bcp14>SHOULD</bcp14> be conveyed as part of a remote attestation procedure,
such as embeding it in EAT tokens that represent RATS conceptual messages. This approach ensures that the SUIT_Report
is cryptographically bound to the environment (hardware, software, or both) in
which it was generated, thereby strengthening its authenticity.</t>

<t>A SUIT_Report may disclose sensitive information about the device on which it
were produced. In such cases, the SUIT_Report <bcp14>MUST</bcp14> be encrypted, as specified in
<xref target="container"/>.</t>

<t>Furthermore, failure reports, particularly those involving cryptographic operations,
can unintentionally reveal insights into system weaknesses or vulnerabilities. As such,
SUIT_Reports <bcp14>SHOULD</bcp14> be encrypted whenever possible, to minimize the risk of information
leakage.</t>

<t>In addition to these core security requirements, operational considerations must be taken
into account. When a SUIT_Report is included within another protocol message (e.g., inside
an encrypted EAT), care must be taken to avoid inadvertently leaking information and
to uphold the principle of least privilege. For example, in many EAT-based remote attestation flows,
the Verifier may not require the full SUIT_Report. Similarly, the Relying Party might not
need access to it either.</t>

<t>To support least-privilege access, the SUIT_Report should be independently encrypted, even
when the transport or enclosing token is also encrypted. This layered encryption ensures that
only authorized entities can access the contents of the SUIT_Report.</t>

<t>In other scenarios, the EAT Verifier might require full access to a SUIT_Report.
For example, the SUIT_Report must be accessible in its entirety for the EAT Verifier
to extract or convert the SUIT_Report content into specific EAT claims, such as <spanx style="verb">measres</spanx>
(Measurement Results). A typical case
involves translating a successful <spanx style="verb">suit-condition-image</spanx> check into a digest-based claim within
the EAT.</t>

<t>When applying cryptographic protection to the SUIT_Report, the same algorithm profile used for
the corresponding SUIT manifest <bcp14>SHOULD</bcp14> be reused. The available algorithm profiles are detailed
in <xref target="I-D.ietf-suit-mti"/>. If using the same profile is not feasible (e.g., due to constraints
imposed by <spanx style="verb">suit-sha256-hsslms-a256kw-a256ctr</spanx>), then a profile offering comparable security
strength <bcp14>SHOULD</bcp14> be selected—for instance, <spanx style="verb">suit-sha256-esp256-ecdh-a128ctr</spanx>.</t>

<t>In exceptional cases, if no suitable profile can be applied, the necessity of disabling a SUIT_Report functionality altogether might arise.</t>

<t>SUIT_Reports may expose information about the user to the Verifier, Firmware Distributor, or Manifest Author. Implementors <bcp14>MUST</bcp14> carefully consider user consent in the reporting system.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank Dave Thaler for his feedback.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="I-D.ietf-suit-manifest">
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname="Brendan Moran" initials="B." surname="Moran">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
      </author>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Koen Zandberg" initials="K." surname="Zandberg">
         <organization>Inria</organization>
      </author>
      <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day="28" month="May" year="2025"/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an Internet of Things (IoT) device), where to find
   the code/data, the devices to which it applies, and cryptographic
   information protecting the manifest.  Software updates and Trusted
   Invocation both tend to use sequences of common operations, so the
   manifest encodes those sequences of operations, rather than declaring
   the metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-manifest-34"/>
   
</reference>
<reference anchor="RFC9019">
  <front>
    <title>A Firmware Update Architecture for Internet of Things</title>
    <author fullname="B. Moran" initials="B." surname="Moran"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="D. Brown" initials="D." surname="Brown"/>
    <author fullname="M. Meriac" initials="M." surname="Meriac"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
      <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9019"/>
  <seriesInfo name="DOI" value="10.17487/RFC9019"/>
</reference>
<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>
<reference anchor="RFC9711">
  <front>
    <title>The Entity Attestation Token (EAT)</title>
    <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
    <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
    <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
    <author fullname="C. Wallace" initials="C." surname="Wallace"/>
    <date month="April" year="2025"/>
    <abstract>
      <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
      <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9711"/>
  <seriesInfo name="DOI" value="10.17487/RFC9711"/>
</reference>
<reference anchor="RFC8610">
  <front>
    <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="C. Vigano" initials="C." surname="Vigano"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2019"/>
    <abstract>
      <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8610"/>
  <seriesInfo name="DOI" value="10.17487/RFC8610"/>
</reference>
<reference anchor="RFC8792">
  <front>
    <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <author fullname="Q. Wu" initials="Q." surname="Wu"/>
    <date month="June" year="2020"/>
    <abstract>
      <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8792"/>
  <seriesInfo name="DOI" value="10.17487/RFC8792"/>
</reference>
<reference anchor="RFC9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>

<reference anchor="I-D.ietf-suit-mti">
   <front>
      <title>Cryptographic Algorithms for Internet of Things (IoT) Devices</title>
      <author fullname="Brendan Moran" initials="B." surname="Moran">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
         <organization>Nordic Semiconductor</organization>
      </author>
      <author fullname="Akira Tsukamoto" initials="A." surname="Tsukamoto">
         <organization>Openchip &amp; Software Technologies, S.L.</organization>
      </author>
      <date day="22" month="July" year="2025"/>
      <abstract>
	 <t>   The SUIT manifest, as defined in &quot;A Manifest Information Model for
   Firmware Updates in Internet of Things (IoT) Devices&quot; (RFC 9124),
   provides a flexible and extensible format for describing how firmware
   and software updates are to be fetched, verified, decrypted, and
   installed on resource-constrained devices.  To ensure the security of
   these update processes, the manifest relies on cryptographic
   algorithms for functions such as digital signature verification,
   integrity checking, and confidentiality.

   This document defines cryptographic algorithm profiles for use with
   the Software Updates for Internet of Things (SUIT) manifest.  These
   profiles specify sets of algorithms to promote interoperability
   across implementations.

   Given the diversity of IoT deployments and the evolving cryptographic
   landscape, algorithm agility is essential.  This document groups
   algorithms into named profiles to accommodate varying levels of
   device capabilities and security requirements.  These profiles
   support the use cases laid out in the SUIT architecture, published in
   &quot;A Firmware Update Architecture for Internet of Things&quot; (RFC 9019).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-mti-23"/>
   
</reference>
<reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
  <front>
    <title>Concise Binary Object Representation (CBOR) Tags</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
<reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
  <front>
    <title>Constrained RESTful Environments (CoRE) Parameters</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.ietf-suit-trust-domains">
   <front>
      <title>Software Update for the Internet of Things (SUIT) Manifest Extensions for Multiple Trust Domain</title>
      <author fullname="Brendan Moran" initials="B." surname="Moran">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Ken Takayama" initials="K." surname="Takayama">
         <organization>SECOM CO., LTD.</organization>
      </author>
      <date day="22" month="July" year="2025"/>
      <abstract>
	 <t>   A device has more than one trust domain when it enables delegation of
   different rights to mutually distrusting entities for use for
   different purposes or Components in the context of firmware or
   software update.  This specification describes extensions to the
   Software Update for the Internet of Things (SUIT) Manifest format for
   use in deployments with multiple trust domains.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-trust-domains-12"/>
   
</reference>

<reference anchor="I-D.ietf-scitt-architecture">
   <front>
      <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
         <organization>Microsoft Research</organization>
      </author>
      <author fullname="Cedric Fournet" initials="C." surname="Fournet">
         <organization>Microsoft Research</organization>
      </author>
      <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
         <organization>ARM</organization>
      </author>
      <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
      <date day="10" month="October" year="2025"/>
      <abstract>
	 <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
   
</reference>

<reference anchor="I-D.ietf-rats-evidence-trans">
   <front>
      <title>Evidence Transformations</title>
      <author fullname="Fabrizio Damato" initials="F." surname="Damato">
         <organization>AMD</organization>
      </author>
      <author fullname="Andrew Draper" initials="A." surname="Draper">
         <organization>Independent</organization>
      </author>
      <author fullname="Ned Smith" initials="N." surname="Smith">
         <organization>Independent</organization>
      </author>
      <date day="17" month="October" year="2025"/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester to decide if continued
   interaction is warrented.  Evidence structures can vary making
   appraisals challenging for Verifiers.  Verifiers need to understand
   Evidence encoding formats and some of the Evidence semantics to
   appraise it.  Consequently, Evidence may require format
   transformation to an internal representation that preserves original
   semantics.  This document specifies Evidence transformation methods
   for DiceTcbInfo, concise evidence, and SPDM measurements block
   structures.  These Evidence structures are converted to the CoRIM
   internal representation and follow CoRIM defined appraisal
   procedures.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-evidence-trans-02"/>
   
</reference>
<reference anchor="RFC9124">
  <front>
    <title>A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices</title>
    <author fullname="B. Moran" initials="B." surname="Moran"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <date month="January" year="2022"/>
    <abstract>
      <t>Vulnerabilities with Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism that is also suitable for constrained devices. Ensuring that devices function and remain secure over their service lifetime requires such an update mechanism to fix vulnerabilities, update configuration settings, and add new functionality.</t>
      <t>One component of such a firmware update is a concise and machine-processable metadata document, or manifest, that describes the firmware image(s) and offers appropriate protection. This document describes the information that must be present in the manifest.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9124"/>
  <seriesInfo name="DOI" value="10.17487/RFC9124"/>
</reference>
<reference anchor="RFC9147">
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9147"/>
  <seriesInfo name="DOI" value="10.17487/RFC9147"/>
</reference>
<reference anchor="RFC7252">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>



    </references>

</references>


<?line 815?>

<section anchor="full-cddl"><name>Full CDDL</name>
<t>In order to create a valid SUIT_Report document the structure of the corresponding CBOR message <bcp14>MUST</bcp14> adhere to the following CDDL (<xref target="RFC8610"/>) data definition.</t>

<t>To be valid, the following CDDL <bcp14>MUST</bcp14> have the COSE CDDL appended to it. The COSE CDDL can be obtained by following the directions in <xref section="1.4" sectionFormat="of" target="RFC9052"/>. It must also have the CDDL from <xref target="I-D.ietf-suit-mti"/> appended to it. This CDDL is line-wrapped per <xref target="RFC8792"/>.</t>

<figure><sourcecode type="CDDL"><![CDATA[
; NOTE: '\' line wrapping per RFC 8792
=============== NOTE: '\' line wrapping per RFC 8792 ================

SUIT_Report_Tool_Tweak /= SUIT_start
SUIT_Report_Tool_Tweak /= SUIT_Report_Protected
SUIT_Report_Protected /= SUIT_COSE_tool_tweak

SUIT_Report_Protected /= SUIT_Report_COSE_Sign1 .and \
                                                   SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_Sign1_Tagged .and \
                                                   SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0 .and \
                                                   SUIT_COSE_Profiles
SUIT_Report_Protected /= SUIT_Report_COSE_MAC0_Tagged .and \
                                                   SUIT_COSE_Profiles

SUIT_Report_COSE_Sign1_Tagged = #6.18(SUIT_Report_COSE_Sign1)
SUIT_Report_COSE_Sign1 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    signature : bstr
]
SUIT_Report_COSE_MAC0_Tagged = #6.17(SUIT_Report_COSE_MAC0)
SUIT_Report_COSE_MAC0 = [
    protected : bstr,
    unprotected : {* int => any},
    payload : bstr .cbor SUIT_Report_Unprotected,
    tag : bstr
]
SUIT_Report_Unprotected = SUIT_Report / SUIT_Report_COSE_Encrypt0
SUIT_Report_COSE_Encrypt0 = COSE_Encrypt0

SUIT_Report = {
  suit-reference              => SUIT_Reference,
  ? suit-report-nonce         => bstr,
  suit-report-records         => [
    * SUIT_Record / system-property-claims ],
  suit-report-result          => true / {
    suit-report-result-code   => int,
    suit-report-result-record => SUIT_Record,
    suit-report-result-reason => SUIT_Report_Reasons,
  },
  ? suit-report-capability-report => SUIT_Capability_Report,
  $$SUIT_Report_Extensions
}

SUIT_Reference = [
    suit-report-manifest-uri : tstr,
    suit-report-manifest-digest : SUIT_Digest
]

SUIT_Record = [
    suit-record-manifest-id        : [* uint ],
    suit-record-manifest-section   : int,
    suit-record-section-offset     : uint,
    suit-record-component-index    : uint,
    suit-record-properties         : {*$$SUIT_Parameters},
    $$SUIT_Record_Extensions
]

system-property-claims = {
  system-component-id => SUIT_Component_Identifier,
  + $$SUIT_Parameters,
}

SUIT_Capability_Report = {
  suit-component-capabilities  => [+ SUIT_Component_Capability]
  suit-command-capabilities          => [+ int],
  suit-parameters-capabilities       => [+ int],
  suit-crypt-algo-capabilities       => [+ int],
  ? suit-envelope-capabilities       => [+ int],
  ? suit-manifest-capabilities       => [+ int],
  ? suit-common-capabilities         => [+ int],
  ? suit-text-capabilities           => [+ int],
  ? suit-text-component-capabilities => [+ int],
  ? suit-dependency-capabilities     => [+ int],
  * [+int]                           => [+ int],
  $$SUIT_Capability_Report_Extensions
}

SUIT_Component_Capability = [*bstr,?true]

suit-report-nonce = 2
suit-report-records = 3
suit-report-result = 4
suit-report-result-code = 5
suit-report-result-record = 6
suit-report-result-reason = 7
suit-report-capability-report = 8
suit-reference = 99

system-component-id = 0

suit-record-manifest-id = 0
suit-record-manifest-section = 1
suit-record-section-offset = 2
suit-record-component-index = 3
suit-record-properties = 4

SUIT_Report_Reasons /= suit-report-reason-ok
SUIT_Report_Reasons /= suit-report-reason-cbor-parse
SUIT_Report_Reasons /= suit-report-reason-cose-unsupported
SUIT_Report_Reasons /= suit-report-reason-alg-unsupported
SUIT_Report_Reasons /= suit-report-reason-unauthorised
SUIT_Report_Reasons /= suit-report-reason-command-unsupported
SUIT_Report_Reasons /= suit-report-reason-component-unsupported
SUIT_Report_Reasons /= suit-report-reason-component-unauthorised
SUIT_Report_Reasons /= suit-report-reason-parameter-unsupported
SUIT_Report_Reasons /= suit-report-reason-severing-unsupported
SUIT_Report_Reasons /= suit-report-reason-condition-failed
SUIT_Report_Reasons /= suit-report-reason-operation-failed
SUIT_Report_Reasons /= suit-report-reason-invoke-pending

suit-report-reason-ok = 0
suit-report-reason-cbor-parse = 1
suit-report-reason-cose-unsupported = 2
suit-report-reason-alg-unsupported = 3
suit-report-reason-unauthorised = 4
suit-report-reason-command-unsupported = 5
suit-report-reason-component-unsupported = 6
suit-report-reason-component-unauthorised = 7
suit-report-reason-parameter-unsupported = 8
suit-report-reason-severing-unsupported = 9
suit-report-reason-condition-failed = 10
suit-report-reason-operation-failed = 11
suit-report-reason-invoke-pending = 12

suit-component-capabilities        = 1
suit-command-capabilities          = 2
suit-parameters-capabilities       = 3
suit-crypt-algo-capabilities       = 4
suit-envelope-capabilities         = 5
suit-manifest-capabilities         = 6
suit-common-capabilities           = 7
suit-text-capabilities             = 8
suit-text-component-capabilities   = 9
suit-dependency-capabilities       = 10
  
]]></sourcecode></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

