<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tiloca-lake-app-profiles-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="EDHOC Application Profiles">Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-tiloca-lake-app-profiles-01"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) requires certain parameters to be agreed out-of-band, in order to ensure its successful completion. To this end, application profiles specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. This document defines a number of means to coordinate the use and discovery of EDHOC application profiles. Also, it defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles. Finally, it defines a well-known EDHOC application profile.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://gitlab.com/crimson84/draft-tiloca-lake-app-profiles"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="I-D.ietf-lake-edhoc"/> is a lightweight authenticated key exchange protocol, especially intended for use in constrained scenarios.</t>
      <t>In order to successfully run EDHOC, the two peers acting as Initiator and Responder have to agree on certain parameters. Some of those are in-band and communicated through the protocol execution, during which a few of them may even be negotiated. However, other parameters have to be known out-of-band, before running the EDHOC protocol.</t>
      <t>As discussed in <xref section="3.9" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>, applications can use EDHOC application profiles, which specify the intended usage of EDHOC to allow for the relevant processing and verifications to be made. In particular, an EDHOC application profile may include both in-band and out-of-band parameters.</t>
      <t>This document defines a number of means to coordinate the use and discovery of EDHOC application profiles, that is:</t>
      <ul spacing="normal">
        <li>The new IANA registry "EDHOC Application Profiles" defined in <xref target="iana-edhoc-application-profiles"/>, where to register integer identifiers of EDHOC application profiles.</li>
        <li>The new target attribute "ed-prof" defined in <xref target="web-linking"/>, which can be used in a web link <xref target="RFC8288"/> to an EDHOC resource. This can be used, for instance, in a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/>, see <xref section="A.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> as well as <xref target="I-D.ietf-core-oscore-edhoc"/>.</li>
        <li>The new parameter "app_prof" for the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. The parameter is defined in <xref target="sec-edhoc-information-parameters"/>, and can be used, for example, in the EDHOC and OSCORE profile of the ACE framework <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> to indicate the EDHOC application profiles supported by a Resource Server.</li>
      </ul>
      <t>Furthermore, this document defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles (see <xref target="sec-app-profile-cbor"/>), as well as a well-known EDHOC application profile (see <xref target="sec-well-known-app-profile"/>).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>The reader is expected to be familiar with terms and concepts defined in EDHOC <xref target="I-D.ietf-lake-edhoc"/>, and with the use of EDHOC with CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> defined in <xref target="I-D.ietf-core-oscore-edhoc"/>.</t>
        <t>Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and Concise Data Definition Language (CDDL) <xref target="RFC8610"/> are used in this document. CDDL predefined type names, especially bstr for CBOR byte strings and tstr for CBOR text strings, are used extensively in this document.</t>
      </section>
    </section>
    <section anchor="web-linking">
      <name>Web Linking</name>
      <t><xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/> defines a number of target attributes that can be used in a web link <xref target="RFC8288"/> with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). This is the case, e.g., when using a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> as defined in <xref section="A.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>. This allows a client to obtain relevant pieces of information from the EDHOC application profile(s) to be used with a certain EDHOC resource.</t>
      <t>In the same spirit, this section defines the following additional parameter, which can be optionally specified as a target attribute with the same name in the link to the respective EDHOC resource, or among the filter criteria in a discovery request from a client.</t>
      <ul spacing="normal">
        <li>'ed-prof', specifying an EDHOC application profile supported by the server. This parameter MUST specify a single value, which is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document. This parameter MAY occur multiple times, with each occurrence specifying an EDHOC application profile.</li>
      </ul>
      <t>When specifying the parameter 'ed-prof' in a link to an EDHOC resource, the target attribute rt="core.edhoc" MUST be included.</t>
      <t>If a link to an EDHOC resource includes occurrences of the target attribute 'ed-prof', the link MUST NOT include other target attributes that provide information pertaining to an EDHOC application profile (see, e.g., <xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/>), which, if present, MUST be ignored by the recipient.</t>
      <t>The example in <xref target="fig-web-link-example"/> shows how a CoAP client discovers two EDHOC resources at a CoAP server, obtaining information elements from the respective application profile. The Link Format notation from <xref section="5" sectionFormat="of" target="RFC6690"/> is used.</t>
      <t>The example assumes the existence of an EDHOC application profile identified by the integer Profile ID 500, which is supported by the EDHOC resource at /edhoc-alt.</t>
      <figure anchor="fig-web-link-example">
        <name>The Web Link.</name>
        <artwork align="center"><![CDATA[
REQ: GET /.well-known/core

RES: 2.05 Content
    </sensors/temp>;osc,
    </sensors/light>;if=sensor,
    </.well-known/edhoc>;rt=core.edhoc;ed-csuite=0;ed-csuite=2;
        ed-method=0;ed-cred-t=1;ed-cred-t=3;ed-idcred-t=4;
        ed-i;ed-r;ed-comb-req,
    </edhoc-alt>;rt=core.edhoc;ed-prof=500
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-edhoc-information-parameters">
      <name>EDHOC_Information Parameters</name>
      <t><xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines the EDHOC_Information object, as including information that guides two peers towards executing the EDHOC protocol, and defines an initial set of its parameters.</t>
      <t>This document defines the new parameter "app_prof" of the EDHOC_Information object, as summarized in <xref target="fig-cbor-key-edhoc-params"/> and described further below.</t>
      <figure anchor="fig-cbor-key-edhoc-params">
        <name>EDHOC_Information Parameter "app_prof"</name>
        <artwork align="center"><![CDATA[
+----------+-------+-------+-------------+-----------------+
| Name     | CBOR  | CBOR  | Registry    | Description     |
|          | label | type  |             |                 |
+----------+-------+-------+-------------+-----------------+
| app_prof | 14    | int / | EDHOC       | Set of          |
|          |       | array | Application | supported EDHOC |
|          |       |       | Profiles    | Application     |
|          |       |       | Registry    | Profiles        |
+----------+-------+-------+-------------+-----------------+
]]></artwork>
      </figure>
      <ul spacing="normal">
        <li>app_prof: This parameter specifies a set of supported EDHOC application profiles, identified by their Profile ID. If the set is composed of a single EDHOC application profile, its Profile ID is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one Profile ID. In JSON, the "app_prof" value is an integer or an array of integers. In CBOR, "app_prof" is an integer or an array of integers, and has label 14. The integer values are taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</li>
      </ul>
      <section anchor="use-in-the-edhoc-and-oscore-profile-of-the-ace-framework">
        <name>Use in the EDHOC and OSCORE Profile of the ACE Framework</name>
        <t><xref section="3.2" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines how the EDHOC_Information object can be used within the workflow of the EDHOC and OSCORE transport profile of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>.</t>
        <t>In particular, the AS-to-C Access Token Response can include the parameter "edhoc_info", with value an EDHOC_Information object. This allows the ACE Authorization Server (AS) to provide the ACE Client (C) with information about how to run the EDHOC protocol with the ACE Resource Server (RS) for which the Access Token is issued.</t>
        <t>In such a case, the EDHOC_Information object above can include the parameter "app_prof" defined in this document. This parameter indicates a set of EDHOC application profiles associated with the EDHOC resource to use at the RS, which is either implied or specified by the parameter "uri_path" within the same EDHOC_Information object.</t>
        <t>If the EDHOC_Information object specified as value of "edhoc_info" includes the "app_prof" parameter, the object MUST NOT include other parameters that provide information pertaining to an EDHOC application profile. Such parameters MUST be ignored by C, if present in an EDHOC_Information object that also includes the "app_prof" parameter.</t>
        <t>At the time of writing this document, such parameters are: "methods", "cipher_suites", "message_4", "comb_req", "osc_ms_len", "osc_salt_len", "osc_version", "cred_types", "id_cred_types", "eads", "initiator", and "responder". These are all defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      </section>
    </section>
    <section anchor="sec-app-profile-cbor">
      <name>Representation of an EDHOC Application Profile</name>
      <t>This section defines the EDHOC_Application_Profile object, which can be used as a canonical representation of EDHOC application profiles for their description, distribution, and storage.</t>
      <t>An EDHOC_Application_Profile object is encoded as a CBOR map <xref target="RFC8949"/>. Each element of the CBOR map is an element of the CBOR-encoded EDHOC_Information object defined in <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>, and thus uses the corresponding CBOR abbreviations from the 'CBOR label' column of the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The CBOR map encoding the EDHOC application profile MUST include the element "app_prof" defined in this document. Its value is the unique identifier of the EDHOC application profile in question, taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in this document, and encoded as a CBOR integer.</t>
      <t>The following elements defined for the EDHOC_Information object MUST also be present: "methods" and "cred_types".</t>
      <t>The following elements defined for the EDHOC_Information object MUST NOT be present: "session_id", "uri_path", "initiator", and "responder".</t>
      <t>The CBOR map MAY include other elements defined for the EDHOC_Information object. Consistently with Sections <xref target="I-D.ietf-lake-edhoc" section="8" sectionFormat="bare"/> and <xref target="I-D.ietf-lake-edhoc" section="A.1" sectionFormat="bare"/> of <xref target="I-D.ietf-lake-edhoc"/> and with <xref section="5.4" sectionFormat="of" target="RFC8613"/>:</t>
      <ul spacing="normal">
        <li>If the element "cipher_suites" is not present in the CBOR map, this indicates that the EDHOC application profile uses the EDHOC cipher suites 2 and 3.</li>
        <li>If the element "id_cred_types" is not present in the CBOR map, this indicates that the EDHOC application profile uses "kid" as type of authentication credential identifiers for EDHOC.</li>
        <li>If the element "osc_ms_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE <xref target="RFC8613"/>, the size of the OSCORE Master Secret in bytes is equal to the size of the key length for the application AEAD Algorithm of the selected cipher suite for the EDHOC session.</li>
        <li>If the element "osc_salt_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the size of the OSCORE Master Salt in bytes is 8.</li>
        <li>If the element "osc_version" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the OSCORE Version Number has value 1.</li>
        <li>The absence of any other elements in the CBOR map MUST NOT result in assuming any value.</li>
      </ul>
      <t>If an element is present in the CBOR map and the information that it specifies is intrinsically a set of one or more co-existing alternatives, then all the specified alternatives apply for the EDHOC application profile in question.</t>
      <t>For example, the element "cipher_suites" with value the CBOR array [0, 2] means that, in order to adhere to the EDHOC application profile in question, an EDHOC peer has to implement both the EDHOC cipher suites 0 and 2, because either of them can be used by another EDHOC peer also adhering to the same EDHOC application profile.</t>
      <t>The CDDL grammar describing the EDHOC_Application_Profile object is:</t>
      <artwork><![CDATA[
EDHOC_Application_Profile = {
      1 => int / array,    ; methods
      9 => int / array,    ; cred_types
     14 => int,            ; app_prof
   * int / tstr => any
}
]]></artwork>
      <t>[ NOTE:</t>
      <t>Based on Sections <xref target="I-D.ietf-lake-edhoc" section="3.9" sectionFormat="bare"/> and <xref target="I-D.ietf-lake-edhoc" section="F" sectionFormat="bare"/> of <xref target="I-D.ietf-lake-edhoc"/>, further parameters can be defined for the EDHOC_Information object specified in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>, and then used for the EDHOC_Application_Profile object defined in this document. For example:</t>
      <ul spacing="normal">
        <li>The way(s) to express the identity of endpoints within authentication credentials, e.g., EUI-64.</li>
        <li>Limitations in the size of EDHOC messages (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>).</li>
        <li>
          <t>The transport(s) to use for EDHOC. How to indicate that? It is actually about multiple pieces of information, often transport-dependent.  </t>
          <ul spacing="normal">
            <li>
              <t>For example, if CoAP is indicated, it should be said over what CoAP is in turn transported, if any of the EDHOC-related CoAP Content-Format has to be indicated, etc. See, for instance, point 1 in Sections <xref target="I-D.ietf-lake-edhoc" section="3.9" sectionFormat="bare"/> and <xref target="I-D.ietf-lake-edhoc" section="F" sectionFormat="bare"/> of <xref target="I-D.ietf-lake-edhoc"/>.      </t>
              <t>
This might require another registry about "transport suites" to be used with EDHOC, each of which registered with a unique identifier, specifying the transport protocol together with additional (transport-dependent) pieces of information.</t>
            </li>
            <li>
              <t>At the same time, <xref section="3.9" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> says:      </t>
              <t>
"Note that it is not necessary for the endpoints to specify a single transport for the EDHOC messages. For example, a mix of CoAP and HTTP may be used along the path, and this may still allow correlation between messages."      </t>
              <t>
In order to take this into account, an application profile can specify two sets of supported transports, i.e., with a parameter "tp_i" pertaining to an Initiator that uses this profile and a parameter "tp_r" pertaining to a Responder that uses this profile. The two sets can independently specify the expected support for multiple transports, each together with related transport-dependent information.      </t>
              <t>
In order to handle the case where both "tp_i" and "tp_r" are equal, a single parameter "tp" can be used instead. In that case, an Initiator and a Responder using this profile are expected to use any of the transports from the set specified by the parameter "tp".</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>]</t>
    </section>
    <section anchor="sec-well-known-app-profile">
      <name>Well-known EDHOC Application Profile</name>
      <t>TBD</t>
      <t>[ NOTE:</t>
      <t>This well-known EDHOC application profile is <em>not</em> intended to be a "default" profile to use, in case no other indication is provided to the EDHOC peers.</t>
      <t>With particular reference to using EDHOC with CoAP, it must <em>not</em> be silently assumed that, unless otherwise indicated, the EDHOC resource at /.well-known/edhoc is used according to such a well-known profile.</t>
      <t>If this well-known EDHOC application profile was treated as a "default" profile, it might be suggesting what is generally mandatory to implement, which is instead limited to what is already defined by the compliance requirements in <xref section="8" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> (i.e., simply support for "kid" as type of credential identifier, as well as for cipher suites 2 and 3).</t>
      <t>That is, this well-known EDHOC application profile is <em>not</em> intended to practically replace the compliance requirements from <xref section="8" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>, which defines what is a de-facto, unnamed default EDHOC application profile.</t>
      <t>Instead, this well-known EDHOC application profile should reflect what is the most common and expected way to use EDHOC.</t>
      <t>]</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-media-type">
        <name>Media Type Registrations</name>
        <t>IANA is asked to register the media type "application/edhoc-app-profile+cbor-seq". This registration follows the procedures specified in <xref target="RFC6838"/>.</t>
        <t>Type name: application</t>
        <t>Subtype name: edhoc-app-profile+cbor-seq</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: Must be encoded as a CBOR sequence <xref target="RFC8742"/> of CBOR maps. Each element of each CBOR map is also defined as an element of the CBOR-encoded EDHOC_Information object from <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>Security considerations: See <xref target="sec-security-considerations"/> of [RFC-XXXX].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [RFC-XXXX]</t>
        <t>Applications that use this media type: Applications that need to describe, distribute, and store a representation of an EDHOC application profile (see <xref section="3.9" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>).</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information: N/A</t>
        <t>Person &amp; email address to contact for further information: LAKE WG mailing list (lake@ietf.org) or IETF Applications and Real-Time Area (art@ietf.org)</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: None</t>
        <t>Author/Change controller: IETF</t>
        <t>Provisional registration: No</t>
      </section>
      <section anchor="iana-content-type">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is asked to add the following entry to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <t>Content Type: application/edhoc-app-profile+cbor-seq</t>
        <t>Content Coding: -</t>
        <t>ID: TBD</t>
        <t>Reference: [RFC-XXXX]</t>
      </section>
      <section anchor="iana-edhoc-application-profiles">
        <name>EDHOC Application Profiles Registry</name>
        <t>IANA is requested to create a new "EDHOC Application Profiles" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="I-D.ietf-lake-edhoc"/>.</t>
        <t>The registry uses the "Expert Review" registration procedure <xref target="RFC8126"/>. Expert Review guidelines are provided in <xref target="iana-expert-review"/>. Values in this registry are covered by different registration policies as indicated. It should be noted that, in addition to the expert review, some portions of the registry require a specification, potentially a Standards Track RFC, to be supplied as well.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Profile ID: This field contains the value used to identify the EDHOC application profile. These values MUST be unique. The value can be an unsigned integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>:  </t>
            <ul spacing="normal">
              <li>Integer values from -24 to 23 are designated as "Standards Action With Expert Review".</li>
              <li>Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required".</li>
              <li>Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</li>
            </ul>
          </li>
          <li>Name: This field contains the name of the EDHOC application profile.</li>
          <li>Description: This field contains a short description of the EDHOC application profile.</li>
          <li>Reference: This field contains a pointer to the public specification for the EDHOC application profile.</li>
        </ul>
      </section>
      <section anchor="iana-target-attributes">
        <name>Target Attributes Registry</name>
        <t>IANA is asked to register the following entry in the "Target Attributes" registry within the "Constrained RESTful Environments (CoRE) Parameters", as per <xref target="I-D.ietf-core-target-attr"/>.</t>
        <ul spacing="normal">
          <li>Attribute Name: ed-prof</li>
          <li>Brief Description: A supported EDHOC application profile</li>
          <li>Change Controller: IETF</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-edhoc-information-registry">
        <name>EDHOC Information Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <ul spacing="normal">
          <li>Name: app_prof</li>
          <li>CBOR Value: 14</li>
          <li>CBOR Type: int / array</li>
          <li>Registry: EDHOC Application Profiles Registry</li>
          <li>Description: Set of supported EDHOC Application Profiles</li>
          <li>Specification: [RFC-XXXX], <xref target="I-D.ietf-lake-edhoc"/></li>
        </ul>
      </section>
      <section anchor="iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>The IANA registry established in this document is defined as "Expert Review". This section gives some general guidelines for what the experts should be looking for; but they are being designated as experts for a reason, so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts need to make sure that registered identifiers indicate an EDHOC application profile that is clearly defined in the corresponding specification. Identifiers of EDHOC application profiles that do not meet these objective of clarity and completeness must not be registered.</li>
          <li>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. The zones tagged as "Private Use" are intended for testing purposes and closed environments. Code points in other ranges should not be assigned for testing.</li>
          <li>Specifications are required for the "Standards Action With Expert Review" range of point assignment. Specifications should exist for "Specification Required" ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</li>
          <li>Experts should take into account the expected usage of fields when approving point assignment. The fact that there is a range for Standards Track documents does not mean that a Standards Track document cannot have points assigned outside of that range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC6690">
        <front>
          <title>Constrained RESTful Environments (CoRE) Link Format</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <date month="August" year="2012"/>
          <abstract>
            <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6690"/>
        <seriesInfo name="DOI" value="10.17487/RFC6690"/>
      </reference>
      <reference anchor="RFC6838">
        <front>
          <title>Media Type Specifications and Registration Procedures</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <author fullname="T. Hansen" initials="T." surname="Hansen"/>
          <date month="January" year="2013"/>
          <abstract>
            <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="13"/>
        <seriesInfo name="RFC" value="6838"/>
        <seriesInfo name="DOI" value="10.17487/RFC6838"/>
      </reference>
      <reference anchor="RFC7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="RFC8126">
        <front>
          <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
          <author fullname="M. Cotton" initials="M." surname="Cotton"/>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <author fullname="T. Narten" initials="T." surname="Narten"/>
          <date month="June" year="2017"/>
          <abstract>
            <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
            <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
            <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="26"/>
        <seriesInfo name="RFC" value="8126"/>
        <seriesInfo name="DOI" value="10.17487/RFC8126"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC8288">
        <front>
          <title>Web Linking</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
          <date month="October" year="2017"/>
          <abstract>
            <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
            <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8288"/>
        <seriesInfo name="DOI" value="10.17487/RFC8288"/>
      </reference>
      <reference anchor="RFC8610">
        <front>
          <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="C. Vigano" initials="C." surname="Vigano"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8610"/>
        <seriesInfo name="DOI" value="10.17487/RFC8610"/>
      </reference>
      <reference anchor="RFC8613">
        <front>
          <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <date month="July" year="2019"/>
          <abstract>
            <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
            <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8613"/>
        <seriesInfo name="DOI" value="10.17487/RFC8613"/>
      </reference>
      <reference anchor="RFC8742">
        <front>
          <title>Concise Binary Object Representation (CBOR) Sequences</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="February" year="2020"/>
          <abstract>
            <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
            <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8742"/>
        <seriesInfo name="DOI" value="10.17487/RFC8742"/>
      </reference>
      <reference anchor="RFC8949">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="RFC9200">
        <front>
          <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
          <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9200"/>
        <seriesInfo name="DOI" value="10.17487/RFC9200"/>
      </reference>
      <reference anchor="I-D.ietf-lake-edhoc">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Francesca Palombini" initials="F." surname="Palombini">
            <organization>Ericsson AB</organization>
          </author>
          <date day="22" month="January" year="2024"/>
          <abstract>
            <t>   This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a
   very compact and lightweight authenticated Diffie-Hellman key
   exchange with ephemeral keys.  EDHOC provides mutual authentication,
   forward secrecy, and identity protection.  EDHOC is intended for
   usage in constrained scenarios and a main use case is to establish an
   OSCORE security context.  By reusing COSE for cryptography, CBOR for
   encoding, and CoAP for transport, the additional code size can be
   kept very low.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-23"/>
      </reference>
      <reference anchor="I-D.ietf-core-target-attr">
        <front>
          <title>CoRE Target Attributes Registry</title>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <date day="11" month="October" year="2023"/>
          <abstract>
            <t>   The Constrained RESTful Environments (CoRE) specifications apply Web
   technologies to constrained environments.  One important such
   technology is Web Linking (RFC 8288), which CoRE specifications use
   as the basis for a number of discovery protocols, such as the Link
   Format (RFC 6690) in CoAP's Resource Discovery Protocol (Section 7.2
   of RFC7252) and the Resource Directory (RD, RFC 9176).

   Web Links can have target attributes, the names of which are not
   generally coordinated by the Web Linking specification (Section 2.2
   of RFC 8288).  This document introduces an IANA registry for
   coordinating names of target attributes when used in CoRE.  It
   updates the RD Parameters IANA Registry created by RFC 9176 to
   coordinate with this registry.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-target-attr-06"/>
      </reference>
      <reference anchor="I-D.ietf-core-oscore-edhoc">
        <front>
          <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
          <author fullname="Francesca Palombini" initials="F." surname="Palombini">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Rikard Höglund" initials="R." surname="Höglund">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
            <organization>Fraunhofer AISEC</organization>
          </author>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson</organization>
          </author>
          <date day="29" month="November" year="2023"/>
          <abstract>
            <t>   The lightweight authenticated key exchange protocol Ephemeral Diffie-
   Hellman Over COSE (EDHOC) can be run over the Constrained Application
   Protocol (CoAP) and used by two peers to establish a Security Context
   for the security protocol Object Security for Constrained RESTful
   Environments (OSCORE).  This document details this use of the EDHOC
   protocol, by specifying a number of additional and optional
   mechanisms.  These especially include an optimization approach for
   combining the execution of EDHOC with the first OSCORE transaction.
   This combination reduces the number of round trips required to set up
   an OSCORE Security Context and to complete an OSCORE transaction
   using that Security Context.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-10"/>
      </reference>
      <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson</organization>
          </author>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE</organization>
          </author>
          <author fullname="Rikard Höglund" initials="R." surname="Höglund">
            <organization>RISE</organization>
          </author>
          <date day="23" month="October" year="2023"/>
          <abstract>
            <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an OAuth 2.0 Client and Resource
   Server, and it binds an authentication credential of the Client to an
   OAuth 2.0 access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-03"/>
      </reference>
      <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
        <front>
          <title>COSE Header Parameters</title>
          <author>
            <organization>IANA</organization>
          </author>
          <date/>
        </front>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Göran Selander"/>, and <contact fullname="Brian Sipos"/> for their feedback and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
