<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cbor-file-magic-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="cbor-file-magic">On storing CBOR encoded items on stable storage</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-file-magic-11"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Postfach 330440</street>
          <city>D-28359 Bremen</city>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2022" month="April" day="04"/>
    <area>Internet</area>
    <workgroup>CBOR Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines an on-disk format for CBOR data items that
is friendly to common on-disk recognition systems such as the Unix file(1) command.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cbor-file-magic/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        cbor Working Group mailing list (<eref target="mailto:cbor@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cbor/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cbor-wg/cbor-magic-number"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Since very early in computing, operating systems have sought ways to mark which files could be processed by which programs.
In Unix, everything is a stream of bytes (related to the TCP/IP
socket model, where all network connectivity also is a stream of
bytes); identifying the contents of a stream of bytes became a heuristic activity.</t>
      <t>For instance, the Unix file(1) command, which has existed since 1973 <xref target="file"/>, has for decades been able to identify many file formats based upon the contents of the file.</t>
      <t>Many systems (Linux, macOS, Windows) will select the correct application based upon the file contents, if the system can not determine it by other means.
For instance, in classical MacOS, a resource fork was maintained that includes media type ("MIME type") information and therefore ideally never needs to know anything about the file.</t>
      <t>But, many other systems do this by file extensions.
Many common web servers derive the media-type information from file extensions.</t>
      <t>Having a media type associated with the file is a better solution in
general.
When files become disconnected from their type information, such as when attempting to do forensics on a damaged system, then being able to identify a file type can become very important.</t>
      <t>It is noted that in the media type registration template, a magic number is asked for, if available, as is a file extension.</t>
      <t>A challenge for the file(1) program is often that it can be confused by the encoding vs the content.
For instance, an Android "apk" used to transfer and store an application may be identified as a ZIP file.
Additionally, both OpenOffice and MSOffice files are ZIP files of XML files, and may also be identified as a ZIP file.</t>
      <t>As CBOR becomes a more and more common encoding for a wide variety of artifacts, identifying them as just "CBOR" is probably not sufficient.
This document provides a way to encode a magic number into the beginning of a CBOR format file.
As a CBOR format may use a single CBOR data item or a CBOR sequence of
data items <xref target="RFC8742"/>,
two possible methods of enveloping data are presented: a CBOR Protocol designer will specify one.
(A CBOR Protocol is a specification which uses CBOR as its encoding.)</t>
      <t>A third method is also proposed by which this CBOR format prepended tag is used to identify non-CBOR files.
This third method has been placed in an appendix because it is not
about identifying media types containing CBOR-encoded data items.</t>
      <t>This document also gives advice to designers of CBOR protocols on
choosing one of these mechanisms for identifying their contents.
This advice is informative.</t>
      <t>Examples of CBOR Protocols currently under development include Concise
Software Identification Tags (CoSWID, <xref target="I-D.ietf-sacm-coswid"/>) and
Entity Attestation Tokens (EAT, <xref target="I-D.ietf-rats-eat"/>).
COSE itself <xref target="RFC8152"/> is considered infrastructure.
The encoding of public keys in CBOR as described in <xref target="I-D.ietf-cose-cbor-encoded-cert"/> as <em>C509</em> would benefit from being an identified CBOR Protocol.</t>
      <t>A major inspiration for this document is observing the disarray in certain
ASN.1 based systems where most files are PEM encoded; these are then all identified by the extension "pem", confusing public keys, private keys, certificate requests, and S/MIME content.</t>
      <t>While the envelopes defined in this specification add information to how data conforming to CBOR Protocols are stored in files, there is no requirement that either type of envelope be transferred on the wire.</t>
      <t>In addition to the on-disk identification aspects, there are some protocols which may benefit from having such a magic number on the wire if they are presently using a different (legacy) encoding scheme.
The presence of the identifiable magic sequence signals that CBOR is
being used as opposed to a legacy scheme.</t>
      <t>In addition, for convenience, <xref target="headers"/> defines a simple way to
retroactively add a magic number to content-formats as defined by
<xref target="RFC7252"/>, even if not in CBOR form.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Byte is a synonym for octet.
The term "byte string" refers to the data item defined in <xref target="STD94"/>.</t>
        <t>The term "diagnostic notation" refers to the human-readable notation
for CBOR data items defined in <xref section="8" sectionFormat="of" target="STD94"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>.</t>
        <t>The term CDDL (Concise Data Definition Language) refers to the
language defined in <xref target="RFC8610"/>.</t>
      </section>
      <section anchor="requirements-for-a-magic-number">
        <name>Requirements for a Magic Number</name>
        <t>A magic number is ideally a fingerprint that is unique to a CBOR protocol, present in the first few (small multiple of 4) bytes of the file,
which does not change when the contents change, and does not depend upon the length of the file.</t>
        <t>Less ideal solutions have a pattern that needs to be matched, but in which some bytes need to be ignored.
While the Unix file(1) command can be told to ignore certain bytes, this can lead to ambiguities.</t>
      </section>
    </section>
    <section anchor="protocol">
      <name>Protocol</name>
      <t>This Section presents two enveloping methods.  Which one is to be used is up to the CBOR Protocol designer to determine.
Both use CBOR Tags in a way that results in a deterministic first 8 to 12 bytes.</t>
      <section anchor="the-cbor-protocol-specific-tag">
        <name>The CBOR Protocol Specific Tag</name>
        <t>In both enveloping methods,
CBOR Protocol designers need to obtain a CBOR tag for each kind of object that they might store on disk.
As there are more than 4 billion available 4-byte tags, there should be little issue in allocating a few to each available CBOR Protocol.</t>
        <t>The IANA policy for 4-byte CBOR Tags is First Come First Served, so all that is required is an email to IANA, having filled in the small template provided in <xref section="9.2" sectionFormat="of" target="STD94"/>.
In the template, it is suggested to include a reference to this
specification (RFC XXXX) alongside the Description of
semantics. <cref anchor="XXXX">(Note to RFC Editor: Please replace all occurrences of "RFC
XXXX" with the RFC number of the present specification and remove
this note.)</cref></t>
        <t>This tag needs to be allocated by the author of the CBOR Protocol.
In order to be in the four-byte range, and so that there are no
leading zeros, the value needs to be in the range 0x01000000 (decimal
16777216) to 0xFFFFFFFF (decimal 4294967295).
It is further suggested to avoid values that have an embedded zero byte in
the four bytes of their binary representation (such as 0x12003456), as
these may confuse implementations that treat the magic number as a C string.</t>
        <t>The use of a sequence of four US-ASCII codes which are mnemonic to the protocol is encouraged, but not required.</t>
        <t>For CBOR data items that form a representation that is
described by a CoAP Content-Format Number (<xref section="12.3" sectionFormat="of" target="RFC7252"/>,
Registry
<xref section="CoAP Content-Formats" relative="#content-formats" sectionFormat="bare" target="IANA.core-parameters"/>
of <xref target="IANA.core-parameters"/>),
a tag number has already been allocated in <xref target="iana-ct-tags"/> (see <xref target="ct-tags"/>
for details and examples).</t>
      </section>
      <section anchor="wrapped">
        <name>Enveloping Method: CBOR Tag Wrapped</name>
        <t>The CBOR Tag Wrapped method is appropriate for use with CBOR protocols that encode a single CBOR data item.
This data item is enveloped into two nested tags:</t>
        <t>The outer tag is a Self-described CBOR tag, 55799, as
described in <xref section="3.4.6" sectionFormat="of" target="STD94"/>.</t>
        <t>The tag content of that tag is a second CBOR Tag that has been allocated to describe the specific Protocol involved, as described above.</t>
        <t>This method wraps the CBOR value as tags usually do.
Applications that need to send the CBOR value across a constrained link may wish to remove the two tags if the use is implicitly understood.</t>
        <t>A CBOR Protocol specification may specify the use of two tags only for
specific cases.  For instance, it might use them when storing the
representation in a local file or for Web access, but not when using them
in protocol messages that already provide the necessary context.</t>
        <section anchor="tag-wrap-example">
          <name>Example</name>
          <t>To construct an example without registering a new tag, we use the technique described in <xref target="ct-tags"/> to translate the Content-Format number registered for <tt>application/senml+cbor</tt> (as per Registry <xref section="Content-Formats" relative="#content-formats" sectionFormat="bare" target="IANA.core-parameters"/> of <xref target="IANA.core-parameters"/>), the number 112, into the tag 1668546560+112 = 1668546672.</t>
          <t>With this tag, the SenML-CBOR pack <tt>[{0: "current", 6: 3, 2: 1.5}]</tt> would be enveloped as (in diagnostic notation):</t>
          <sourcecode type="cbor-diag">
55799(1668546672([{0: "current", 6: 3, 2: 1.5}]))
</sourcecode>
          <t>Or in hex:</t>
          <sourcecode type="cbor-pretty">
d9 d9f7                       # tag(55799)
   da 63740070                # tag(1668546672)
      81                      # array(1)
         a3                   # map(3)
            00                # unsigned(0)
            67                # text(7)
               63757272656e74 # "current"
            06                # unsigned(6)
            03                # unsigned(3)
            02                # unsigned(2)
            f9 3e00           # primitive(15872)
</sourcecode>
          <t>At the representation level, the unique fingerprint for <tt>application/senml+cbor</tt> is composed of the 8 bytes d9d9f7da63740070 hex, after which the unadorned CBOR data (81... for the SenML data) is appended.</t>
        </section>
      </section>
      <section anchor="sequences">
        <name>Enveloping Method: Labeled CBOR Sequence</name>
        <t>The Labeled CBOR Sequence method is appropriate for use with CBOR Sequences as described in <xref target="RFC8742"/>.</t>
        <t>This method prepends a newly constructed, separate data item to the
CBOR Sequence, the <em>label</em>.</t>
        <t>The label is a nesting of two tags, similar to but distinct from the
CBOR Tag Wrapped methods, with an inner tag content of a constant byte
string.
The total length of the label is 12 bytes.</t>
        <ol spacing="normal" type="1"><li>The outer tag is the self-described CBOR Sequence tag, 55800.</li>
          <li>The inner tag is a CBOR tag, from the First Come First Served space, that uniquely identifies the CBOR Protocol.
As with CBOR Tag Wrapped, the use of a four-byte tag is encouraged that encodes without zero bytes.</li>
          <li>The tag content is a three byte CBOR byte string containing
0x42_4F_52 ('BOR' in diagnostic notation).</li>
        </ol>
        <t>The outer tag in the label identifies the file as being a CBOR Sequence, and does so with all
the desirable properties explained in <xref section="3.4.6" sectionFormat="of" target="STD94"/>.
Specifically, it does not appear to conflict with any known file types, and it is not valid Unicode in any Unicode encoding.</t>
        <t>The inner tag in the label identifies which CBOR Protocol is used, as described above.</t>
        <t>The inner tag content is a constant byte string which is represented as
0x43_42_4f_52, the ASCII characters "CBOR",
which is the CBOR encoded data item for the three-byte string
0x42_4f_52 ('BOR' in diagnostic notation).</t>
        <t>The actual CBOR Protocol data then follow as the next data item(s) in the CBOR Sequence, without a need for any further specific tag.
The use of a CBOR Sequence allows the application to trivially remove the first item with the two tags.</t>
        <t>Should this file be reviewed by a human (directly in an
editor, or in a hexdump display), it will include the ASCII characters "CBOR" prominently.
This value is also included simply because the inner nested tag needs to tag something.</t>
      </section>
    </section>
    <section anchor="advice-to-protocol-designer">
      <name>Advice to Protocol Designer</name>
      <t>This document introduces a choice between wrapping a single CBOR data item into a (pair of) identifying CBOR tags, or prepending an identifying encoded CBOR data item (which in turn contains a pair of identifying CBOR tags) to a CBOR Sequence (which might be single data item).</t>
      <t>Which should a protocol designer use?</t>
      <t>In this discussion, one assumes that there is an object stored in a file, perhaps specified by a system operator in a configuration file.</t>
      <t>For example: a private key used in COSE operations, a public key/certificate in C509 (<xref target="I-D.ietf-cose-cbor-encoded-cert"/>) or CBOR format, a recorded sensor reading stored for later transmission, or a COVID vaccination certificate that needs to be displayed in QR code form.</t>
      <t>Both the Labeled CBOR Sequence and the wrapped tag can be trivially removed by an application before sending the CBOR content out on the wire.</t>
      <t>The Labeled CBOR Sequence can be slightly easier to remove as in most cases, CBOR parsers will return it as a unit, and then return the actual CBOR item, which could be anything at all, and could include CBOR tags that <em>do</em> need to be sent on wire.</t>
      <t>On the other hand, having the Labeled CBOR Sequence in the file requires that all programs that expect to examine that file are able to skip what appears to be a CBOR item with two tags nested around a three-byte byte string.
The three byte entry is not of the format the program would normally have processed, so it may be a surprise.
On the other hand, CBOR parsers are generally tolerant of tags that appear: many of them will process extra tags, making unknown tags available as meta information.
A program that is not expecting those tags may just ignore those extra tags.</t>
      <t>As an example of where there was a problem with previous security systems, "PEM" format certificate files grew to be able to contain multiple certificates by simple concatenation.
<!-- Note that PKCS1 is not an abbreviation any more in standard usage. -->
The PKCS1 format <xref target="RFC8017"/> could also contain a private key object followed by a one or more certificate objects: but only when in PEM format.
Annoyingly, when in binary DER format (<xref target="X.690"/>, which like CBOR is self-delimiting), concatenation of certificates was not compatible with most programs as they did not expect to read more than one item in the file.</t>
      <t>The use of CBOR Tag Wrapped format is easier to retrofit to an existing format with existing and unchangeable on-disk format for a single CBOR data item.
This new sequence of tags is expected to be trivially ignored by many
existing programs when reading CBOR from disk, even if the program only
supports decoding a single data item (and not a CBOR sequence).
But, a naive program might also then transmit the additional tags across the network.
Removing the CBOR Tag Wrapped format requires knowledge of the two tags involved.
Other tags present might be needed.</t>
      <t>For a representation matching a specific media-type that is carried in
a CBOR byte string, the byte string head will already have to be
removed for use as such a representation, so it should be easy to
remove the enclosing tag heads as well.
This is of particular interest with the pre-defined tags provided by
<xref target="ct-tags"/> for media-types with CoAP Content-Format numbers.</t>
      <t>Here are some considerations in the form of survey questions:</t>
      <section anchor="is-the-on-wire-format-new">
        <name>Is the on-wire format new?</name>
        <t>If the on-wire format is new, then it could be specified with the CBOR Tag Wrapped format if the extra eight bytes are not a problem.
The disk format is then identical to the on-wire format.</t>
        <t>If the eight bytes are a problem on the wire (and they often are if CBOR is being considered), then the Labeled CBOR Sequence format should be adopted for on-disk storage.</t>
      </section>
      <section anchor="can-many-items-be-trivially-concatenated">
        <name>Can many items be trivially concatenated?</name>
        <t>If the programs that read the contents of the file already expect to process all of the CBOR data items in the file (not just the first), then the Labeled CBOR Sequence format may be easily retrofitted.</t>
        <t>The program involved may throw errors or warnings on the Labeled CBOR Sequence if they have not yet been updated, but this may not be a problem.</t>
        <t>There are situations where multiple objects may be concatenated into a single file.
If each object is preceded by a  Labeled CBOR Sequence label then there may be
multiple such labels in the file.
<!-- ???If it is, then consideration should be given to CBOR Tag Wrapped instead.??? -->
        </t>
        <t>A protocol based on CBOR Sequences may specify that Labeled CBOR
Sequence labels can occur within a CBOR Sequence, possibly even to
switch to data items following in the sequence that are of a different type.</t>
        <t>If the CBOR Sequence based protocol does not define the semantics for
or at least tolerate embedded labels, care must be taken when
concatenating Labeled CBOR Sequences to remove the label from all but
the first part.</t>
        <aside>
          <t>As an example from legacy PEM encoded PKIX certificates, many programs accept a series of PKIX certificates in a single file in order to set up a certificate chain.
The file would contain not just the End-Entity (EE) certificate, but also any subordinate certification authorities (CA) needed to validate the EE.
This mechanism actually only works for PEM encoded certificates, and not DER encoded certificates.
One of the reasons for this specification is to make sure that CBOR encoded certificates do not suffer from this problem.</t>
          <t>As an example of mixing of types, some TLS server programs also can accept both their PEM encoded private key, and their PEM encoded certificate in the same file.</t>
        </aside>
        <t>If only one item is ever expected in the file, the use of Labeled CBOR Sequence may present an implementation hurdle to programs that previously just read a single data item and used it.</t>
      </section>
      <section anchor="are-there-tags-at-the-start">
        <name>Are there tags at the start?</name>
        <t>If the Protocol expects to use other tags values at the top-level, then the use
of the tag wrapped format may be easier to explain in the protocol description.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document provides a way to identify CBOR Protocol objects.
Clearly identifying CBOR contents on disk may have a variety of impacts.</t>
      <t>The most obvious is that it may allow malware to identify interesting objects on disk, and then exfiltrate or corrupt them.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>These IANA considerations are entirely about CBOR Tags, in the
registry <xref section="CBOR Tags" relative="#cbor-tags" sectionFormat="bare" target="IANA.cbor-tags"/> of <xref target="IANA.cbor-tags"/>.</t>
      <t><xref target="cbor-sequence-tag"/> documents the allocation that was done for a
CBOR tag to be used in a CBOR sequence to identify the sequence (an
example for using this tag is found in <xref target="openswan"/>).
<xref target="iana-ct-tags"/> allocates a CBOR tag for each actual or
potential CoAP Content-Format number (examples are in <xref target="ct-tags"/>).</t>
      <section anchor="cbor-sequence-tag">
        <name>Labeled CBOR Sequence Tag</name>
        <t>IANA has allocated tag 55800 as the tag for the Labeled CBOR Sequence
Enveloping Method from the CBOR Tags Registry.
IANA is asked to update this tag registration to point to this document.</t>
        <t>This tag is from the First Come/First Served area.</t>
        <t>The value has been picked to have properties similar to the 55799 tag (<xref section="3.4.6" sectionFormat="of" target="STD94"/>).</t>
        <t>The hexadecimal representation of the encoded tag head is: 0xd9_d9_f8.</t>
        <t>This is not valid UTF-8: the first 0xd9 introduces a three-byte sequence in UTF-8, but the 0xd9 as the second value is not a valid second byte for UTF-8.</t>
        <t>This is not valid UTF-16: the byte sequence 0xd9d9 (in either endian order) puts this value into the UTF-16 high-half zone, which would signal that this a 32-bit Unicode value.  However, the following 16-bit big-endian value 0xf8.. is not a valid second sequence according to <xref target="RFC2781"/>.
On a little-endian system, it would be necessary to examine the fourth byte to determine if it is valid.  That next byte is determined by the subsequent encoding, and <xref section="3.4.6" sectionFormat="of" target="STD94"/> has already determined that no valid CBOR encodings result in valid UTF-16.</t>
        <dl newline="true">
          <dt>Data Item:</dt>
          <dd>
            <t>tagged byte string
<!-- ouch: this needs to be updated in the registry -->
            </t>
          </dd>
          <dt>Semantics:</dt>
          <dd>
            <t>indicates that the file contains CBOR Sequences</t>
          </dd>
        </dl>
      </section>
      <section anchor="cbor-labeled-non-cbor-data-tag">
        <name>CBOR-Labeled Non-CBOR Data Tag</name>
        <t>IANA is requested to allocate tag 55801 as the tag for the CBOR-Labeled Non-CBOR Data
Enveloping Method (<xref target="headers"/>) from the CBOR Tags Registry.
IANA is asked to update this tag registration to point to this document.</t>
        <t>This tag is from the First Come/First Served area.</t>
        <t>The value has been picked to have properties similar to the 55799 tag (<xref section="3.4.6" sectionFormat="of" target="STD94"/>).</t>
        <t>The hexadecimal representation of the encoded tag head is: 0xd9_d9_f9.</t>
        <t>This is not valid UTF-8: the first 0xd9 introduces a three-byte sequence in UTF-8, but the 0xd9 as the second value is not a valid second byte for UTF-8.</t>
        <t>This is not valid UTF-16: the byte sequence 0xd9d9 (in either endian order) puts this value into the UTF-16 high-half zone, which would signal that this a 32-bit Unicode value.  However, the following 16-bit big-endian value 0xf9.. is not a valid second sequence according to <xref target="RFC2781"/>.
On a little-endian system, it would be necessary to examine the fourth byte to determine if it is valid.  That next byte is determined by the subsequent encoding, and <xref section="3.4.6" sectionFormat="of" target="STD94"/> has already determined that no valid CBOR encodings result in valid UTF-16.</t>
        <dl newline="true">
          <dt>Data Item:</dt>
          <dd>
            <t>tagged byte string
<!-- ouch: this needs to be updated in the registry -->
            </t>
          </dd>
          <dt>Semantics:</dt>
          <dd>
            <t>indicates that the file starts with a CBOR-Labeled Non-CBOR Data label.</t>
          </dd>
        </dl>
      </section>
      <section anchor="iana-ct-tags">
        <name>CBOR Tags for CoAP Content-Format Numbers</name>
        <t>IANA is requested to allocate the
tag numbers 1668546560 (0x63740000) to
1668612095 (0x6374FFFF) as follows:</t>
        <dl newline="true">
          <dt>Data Item:</dt>
          <dd>
            <t>byte string
<!-- Er, hmm. -->
            </t>
          </dd>
          <dt>Semantics:</dt>
          <dd>
            <t>for each tag number NNNNNNNN, the representation of content-format NNNNNNNN-1668546560</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
        </dl>
        <t>The Registry for <xref section="Content-Formats" relative="#content-formats" sectionFormat="bare" target="IANA.core-parameters"/> of <xref target="IANA.core-parameters"/> has been defined in <xref section="12.3" sectionFormat="of" target="RFC7252"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <displayreference target="STD94" to="STD94"/>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="STD94" target="https://www.rfc-editor.org/info/rfc8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq".  A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation.  This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="file" target="https://en.wikipedia.org/wiki/File_%28command%29">
          <front>
            <title>file (command)</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2021" month="January" day="20"/>
          </front>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8017" target="https://www.rfc-editor.org/info/rfc8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty">
              <organization/>
            </author>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski">
              <organization/>
            </author>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson">
              <organization/>
            </author>
            <author fullname="A. Rusch" initials="A." surname="Rusch">
              <organization/>
            </author>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series.  By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC9177" target="https://www.rfc-editor.org/info/rfc9177">
          <front>
            <title>Constrained Application Protocol (CoAP) Block-Wise Transfer Options Supporting Robust Transmission</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair">
              <organization/>
            </author>
            <author fullname="J. Shallow" initials="J." surname="Shallow">
              <organization/>
            </author>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document specifies alternative Constrained Application Protocol (CoAP) block-wise transfer options: Q-Block1 and Q-Block2.</t>
              <t>These options are similar to, but distinct from, the CoAP Block1 and Block2 options defined in RFC 7959. The Q-Block1 and Q-Block2 options are not intended to replace the Block1 and Block2 options but rather have the goal of supporting Non-confirmable (NON) messages for large amounts of data with fewer packet interchanges. Also, the Q-Block1 and Q-Block2 options support faster recovery should any of the blocks get lost in transmission.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9177"/>
          <seriesInfo name="DOI" value="10.17487/RFC9177"/>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.690"/>
          <seriesInfo name="ISO/IEC" value="8825-1"/>
        </reference>
        <reference anchor="I-D.ietf-sacm-coswid" target="https://www.ietf.org/archive/id/draft-ietf-sacm-coswid-21.txt">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jessica Fitzgerald-McKay">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Charles Schmidt">
              <organization>The MITRE Corporation</organization>
            </author>
            <author fullname="David Waltermire">
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an
   extensible XML-based structure to identify and describe individual
   software components, patches, and installation bundles.  SWID tag
   representations can be too large for devices with network and storage
   constraints.  This document defines a concise representation of SWID
   tags: Concise SWID (CoSWID) tags.  CoSWID supports a similar set of
   semantics and features as SWID tags, as well as new semantics that
   allow CoSWIDs to describe additional types of information, all in a
   more memory efficient format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sacm-coswid-21"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat" target="https://www.ietf.org/archive/id/draft-ietf-rats-eat-12.txt">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <date day="24" month="February" year="2022"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a phone, IoT device, network equipment or such.  This claims set is
   used by a relying party, server or service to determine how much it
   wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.  To a large degree, all this document
   does is extend CWT and JWT.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-12"/>
        </reference>
        <reference anchor="RFC8152" target="https://www.rfc-editor.org/info/rfc8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert" target="https://www.ietf.org/archive/id/draft-ietf-cose-cbor-encoded-cert-03.txt">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="January" year="2022"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-03"/>
        </reference>
        <reference anchor="RFC2781" target="https://www.rfc-editor.org/info/rfc2781">
          <front>
            <title>UTF-16, an encoding of ISO 10646</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="F. Yergeau" initials="F." surname="Yergeau">
              <organization/>
            </author>
            <date month="February" year="2000"/>
            <abstract>
              <t>This document describes the UTF-16 encoding of Unicode/ISO-10646, addresses the issues of serializing UTF-16 as an octet stream for transmission over the Internet, discusses MIME charset naming as described in [CHARSET-REG], and contains the registration for three MIME charset parameter values: UTF-16BE (big-endian), UTF-16LE (little- endian), and UTF-16.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2781"/>
          <seriesInfo name="DOI" value="10.17487/RFC2781"/>
        </reference>
      </references>
    </references>
    <section anchor="ct-tags">
      <name>CBOR Tags for CoAP Content Formats</name>
      <t><xref section="5.10.3" sectionFormat="of" target="RFC7252"/> defines the concept of a Content-Format,
which is a short 16-bit unsigned integer that identifies a specific
content type (media type plus optionally parameters), optionally
together with a content encoding.</t>
      <t>Outside of a transfer protocol that indicates the Content-Format for a representation, it may be necessary to identify the Content-Format of the representation when it is on disk, in firmware, or when debugging.</t>
      <t>This specification allocates CBOR tag numbers 1668546560 (0x63740000) to
1668612095 (0x6374FFFF) for the tagging of representations of specific
content formats.
The tag content tagged with tag number NNNNNNNN (in above range) is a byte
string that is to be interpreted as a representation of the content
format NNNNNNNN-1668546560.</t>
      <t>Exceptionally, when used immediately as tag content of one of the tags
55799, 55800, or 55801, the tag content is as follows:</t>
      <dl>
        <dt>Tag 55799 (<xref target="wrapped"/>):</dt>
        <dd>
          <t>One of:
</t>
          <ol spacing="normal" type="1"><li>The CBOR data item within the representation (without byte string
wrapping).  This only works for Content Formats that are represented
by a single CBOR data item in identity content-coding.</li>
            <li>The data items in the CBOR sequence within the representation, without byte string
wrapping, but wrapped in a CBOR array.
This works for Content Formats that are represented
by a CBOR sequence in identity content-coding.</li>
          </ol>
        </dd>
        <dt>Tags 55800 (<xref target="sequences"/>) or 55801 (<xref target="headers"/>):</dt>
        <dd>
          <t>the byte string 'BOR', signifying that the representation of the
given content-format follows in the file, in the way defined for these tags.</t>
        </dd>
      </dl>
      <section anchor="ct-examples">
        <name>Content-Format Tag Examples</name>
        <t>Registry <xref section="Content-Formats" relative="#content-formats" sectionFormat="bare" target="IANA.core-parameters"/> of <xref target="IANA.core-parameters"/> defines content formats that can be used as examples:</t>
        <ul spacing="normal">
          <li>
            <t>As discussed in <xref target="tag-wrap-example"/>, Content-Format 112 stands for
media type application/senml+cbor (no parameters).
The corresponding tag number is 1668546672 (i.e., 1668546560+112).  </t>
            <t>
So the following CDDL snippet can be used to identify
application/senml+cbor representations:  </t>
            <sourcecode type="cddl">
senml-cbor = #6.1668546672(bstr)
</sourcecode>
            <t>
Note that a byte string is used as the type of the tag content, because a
media type representation in general can be any byte string.</t>
          </li>
          <li>
            <t>Content-Format 272 stands for media type
application/missing-blocks+cbor-seq, a CBOR sequence
<xref target="RFC9177"/>.  </t>
            <t>
The corresponding tag number is 1668546832 (i.e., 1668546560+272).  </t>
            <t>
So the following CDDL snippet can be used to identify
application/missing-blocks+cbor-seq representations as embedded in a
CBOR byte string:  </t>
            <sourcecode type="cddl">
missing-blocks = #6.1668546832(bstr)
</sourcecode>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="openswan">
      <name>Example from Openswan</name>
      <t>The Openswan IPsec project has a daemon ("pluto"), and two control programs ("addconn", and "whack").
They communicate via a Unix-domain socket, over which a C-structure containing pointers to strings is serialized using a bespoke mechanism.
This is normally not a problem as the structure is compiled by the same compiler; but when there are upgrades it is possible for the daemon and the control programs to get out of sync by the bespoke serialization.
As a result, there are extra compensations to deal with shutting the daemon down.
During testing it is sometimes the case that upgrades are backed out.</t>
      <t>In addition, when doing unit testing, the easiest way to load policy is to use the
normal policy reading process, but that is not normally loaded in the daemon.
Instead the IPC that is normally sent across the wire is compiled/serialized and placed in a file.
The above magic number is included in the file, and also on the IPC in order to distinguish the "shutdown" command CBOR operation.</t>
      <t>In order to reduce the problems due to serialization, the serialization is being changed to CBOR.
Additionally, this change allows the IPC to be described by CDDL, and for any language that encode to CBOR can be used.</t>
      <t>IANA has allocated the tag 1330664270, or 0x4f_50_53_4e for this purpose.
As a result, each file and each IPC is prefixed with a CBOR TAG Sequence.</t>
      <t>In diagnostic notation:</t>
      <sourcecode type="cbor-diag">
55800(1330664270(h'424F52'))
</sourcecode>
      <t>Or in hex:</t>
      <sourcecode type="cbor-pretty">
D9 D9F8         # tag(55800)
   DA 4F50534E  # tag(1330664270)
      43        # bytes(3)
         424F52 # "BOR"
</sourcecode>
    </section>
    <section anchor="headers">
      <name>Using CBOR Labels for non-CBOR data</name>
      <t>The CBOR-Labeled non-CBOR data method is appropriate for adding a magic number to a
non-CBOR data format, particularly one that can be described by a
Content-Format tag (<xref target="ct-tags"/>).</t>
      <t>This method prepends a CBOR data item to the non-CBOR data; this data
item is called the "header" and, similarly to the Labeled
CBOR-Sequence label, consists of two nested tags around a constant
byte string for a total of 12 bytes.</t>
      <ol spacing="normal" type="1"><li>The outer tag is the CBOR-Labeled Non-CBOR Data tag, 55801.</li>
        <li>The inner tag is a CBOR tag, from the First Come First Served space, that uniquely identifies the CBOR Protocol.
As with CBOR Tag Wrapped, the use of a four-byte tag is encouraged that encodes without zero bytes.</li>
        <li>The tag content is a three byte CBOR byte string containing
0x42_4F_52 ('BOR' in diagnostic notation).</li>
      </ol>
      <t>The outer tag in the label identifies the file as being file as being prefixed by a non-CBOR
data label, and does so with all
the desirable properties explained in <xref section="3.4.6" sectionFormat="of" target="STD94"/>.
Specifically, it does not appear to conflict with any known file types, and it is not valid Unicode in any Unicode encoding.</t>
      <t>The inner tag in the label identifies which non-CBOR Protocol is used.</t>
      <t>The inner tag content is a constant byte string which is represented as
0x43_42_4f_52, the ASCII characters "CBOR",
which is the CBOR encoded data item for the three-byte string
0x42_4f_52 ('BOR' in diagnostic notation).</t>
      <t>The actual non-CBOR Protocol data then follow directly appended to the
CBOR representation of the header.
This allows the application to trivially remove the header item with
the two nested tags and the byte string.</t>
      <t>Should this file be reviewed by a human (directly in an
editor, or in a hexdump display), it will include the ASCII characters
"CBOR" prominently to indicate the nature of the header.
This value is also included simply because the two tags need to tag something.</t>
      <section anchor="header-ct-examples">
        <name>Content-Format Tag Examples</name>
        <t>Registry <xref section="Content-Formats" relative="#content-formats" sectionFormat="bare" target="IANA.core-parameters"/> of <xref target="IANA.core-parameters"/> defines content formats that can be used as examples:</t>
        <ul spacing="normal">
          <li>
            <t>Content-Format 432 stands for media type application/td+json (no
parameters).
The corresponding tag number is 1668546992 (i.e., 1668546560+432).  </t>
            <t>
So the following CDDL snippet can be used to identify a CBOR-Labeled non-CBOR data  for application/td+json representations:  </t>
            <sourcecode type="cddl">
td-json-header = #6.55801(#6.1668546992('BOR'))
</sourcecode>
          </li>
          <li>
            <t>Content-Format 11050 stands for media type application/json in
deflate content-coding.  </t>
            <t>
The corresponding tag number is 1668557610 (i.e., 1668546560+11050).  </t>
            <t>
So the following CDDL snippet can be used to identify a CBOR-Labeled non-CBOR data  for application/json representations compressed in deflate content-coding:  </t>
            <sourcecode type="cddl">
json-deflate-header = #6.55801(#6.1668557610('BOR'))
</sourcecode>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The CBOR WG brainstormed this protocol on January 20, 2021 via a number of productive email exchanges on the mailing list.</t>
      <!--  LocalWords:  prepending COVID exfiltrate
 -->

</section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J. 'Jeff'" surname="Sipek" fullname="Josef 'Jeff' Sipek">
        <organization/>
        <address>
          <email>jeffpc@josefsipek.net</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
