<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tiloca-core-oscore-discovery-19" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="OSCORE group discovery with the CoRE RD">Discovery of OSCORE Groups with the CoRE Resource Directory</title>
    <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-discovery-19"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <street>Hollandstr. 12/4</street>
          <city>Vienna</city>
          <code>1020</code>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="P." surname="van der Stok" fullname="Peter van der Stok">
      <organization/>
      <address>
        <email>stokcons@kpnmail.nl</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Web and Internet Transport</area>
    <workgroup>CoRE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 130?>

<t>Group communication over the Constrained Application Protocol (CoAP) can be secured by means of Group Object Security for Constrained RESTful Environments (Group OSCORE). At deployment time, devices may not know the exact security groups to join, the respective Group Manager, or other information required to perform the joining process. This document defines how a CoAP endpoint can use descriptions and links of resources registered at the CoRE Resource Directory to discover security groups and to acquire information for joining them through the respective Group Manager. A given security group can be used to protect communications in multiple application groups, which are separately announced in the Resource Directory as sets of endpoints sharing a pool of resources. This approach is consistent with, but not limited to, the joining of security groups based on the ACE framework for Authentication and Authorization in constrained environments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Constrained RESTful Environments Working Group mailing list (core@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://gitlab.com/crimson84/draft-tiloca-core-oscore-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 134?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The Constrained Application Protocol (CoAP) <xref target="RFC7252"/> supports group communication <xref target="I-D.ietf-core-groupcomm-bis"/>, e.g., over IP multicast, to improve efficiency and latency of communication and reduce bandwidth requirements. A set of CoAP endpoints constitutes an application group by sharing a common pool of resources, which can be efficiently accessed through group communication. The members of an application group can be members of a security group, thus sharing a common set of keying material to secure group communication.</t>
      <t>The security protocol Group Object Security for Constrained RESTful Environments (Group OSCORE) <xref target="I-D.ietf-core-oscore-groupcomm"/> builds on OSCORE <xref target="RFC8613"/> and protects CoAP messages end-to-end in group communication contexts through CBOR Object Signing and Encryption (COSE) <xref target="RFC9052"/><xref target="RFC9053"/>. An application group can rely on one or more security groups, and a security group can be used by multiple application groups at the same time.</t>
      <t>A CoAP endpoint relies on a Group Manager (GM) to join a security group and obtain the corresponding group keying material. The joining process specified in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/> is based on the ACE framework for Authentication and Authorization in constrained environments <xref target="RFC9200"/>, with the joining endpoint and the GM acting as ACE client and resource server, respectively. That is, the joining endpoint accesses the group-membership resource exported by the GM and associated with the security group to join.</t>
      <t>Typically, devices store a static X.509 IDevID certificate installed at manufacturing time <xref target="RFC8995"/>. This is used at deployment time during an enrollment process that provides the devices with an Operational Certificate, possibly updated during the device lifetime. Operational Certificates may specify information to join security groups, especially a reference to the group-membership resources to access at the respective GMs.</t>
      <t>However, it is usually impossible to provide such precise information to freshly deployed devices, as part of their (early) Operational Certificate. This can be due to a number of reasons: (1) the security group(s) to join and the responsible GM(s) are generally unknown at manufacturing time; (2) a security group of interest is created, or the responsible GM is deployed, only after the device is enrolled and fully operative in the network; (3) information related to existing security groups or to their GMs has changed. This requires a method for CoAP endpoints to dynamically discover security groups and their GM, and to retrieve relevant information about deployed groups.</t>
      <t>To this end, CoAP endpoints can use descriptions and links of group-membership resources at GMs, to discover security groups and retrieve the information required for joining them. With the discovery process of security groups expressed in terms of links to resources, the remaining problem is the discovery of those links. The CoRE Resource Directory (RD) <xref target="RFC9176"/> makes it possible to perform such discovery in an efficient way and it is expected to be used in many setups that would benefit of security group discovery.</t>
      <t>This document builds on that approach and defines how CoAP endpoints can use the RD to perform the link discovery steps, in order to discover security groups and retrieve the information required to join them through their GM. In short, the GM registers as an endpoint with the RD. The resulting registration resource includes one link per security group under that GM, specifying the path to the related group-membership resource to access for joining that group.</t>
      <t>Additional descriptive information about the security group is stored with the registered link. In an RD based on the Constrained RESTful Environments (CoRE) Link Format <xref target="RFC6690"/> as defined in <xref target="RFC9176"/>, this information is specified as target attributes of the registered link and includes the identifiers of the application groups that use that security group. This enables a lookup of those application groups at the RD, where they are separately announced by a Commissioning Tool (see <xref section="A" sectionFormat="of" target="RFC9176"/>).</t>
      <t>When querying the RD for security groups, a CoAP endpoint can use CoAP observation <xref target="RFC7641"/>. This results in automatic notifications on the creation of new security groups or on the update of existing groups. Thus, it facilitates the early deployment of CoAP endpoints, i.e., even before the GM is deployed and security groups are created.</t>
      <t>Interaction examples are provided in the CoRE Link Format as well as in the Constrained RESTful Application Language CoRAL <xref target="I-D.ietf-core-coral"/> with reference to a CoRAL-based RD <xref target="I-D.hartke-t2trg-coral-reef"/>.</t>
      <t>The examples in CoRAL are expressed in the Concise Binary Object Representation (CBOR) extended diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/> ("diagnostic notation"), and they refer to values from external dictionaries using Packed CBOR <xref target="I-D.ietf-cbor-packed"/>. Diagnostic notation comments are often used to provide a textual representation of the numeric parameter names and values. <xref target="sec-coral-examples-notation"/> introduces the notation and assumptions used in the CoRAL examples.</t>
      <t>The approach defined in this document is consistent with, but not limited to, the joining of security groups defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>Readers are expected to be familiar with the terms and concepts from the following specifications.</t>
        <ul spacing="normal">
          <li>
            <t>The CoRE Link Format <xref target="RFC6690"/> and the CoRE Resource Directory <xref target="RFC9176"/>.</t>
          </li>
          <li>
            <t>The Constrained RESTful Application Language (CoRAL) <xref target="I-D.ietf-core-coral"/> and Constrained Resource Identifiers (CRIs) <xref target="I-D.ietf-core-href"/>.</t>
          </li>
          <li>
            <t>CBOR <xref target="RFC8949"/> and Packed CBOR <xref target="I-D.ietf-cbor-packed"/>.</t>
          </li>
          <li>
            <t>CoAP <xref target="RFC7252"/>, also in group communication scenarios <xref target="I-D.ietf-core-groupcomm-bis"/>.</t>
          </li>
          <li>
            <t>The security protocol Group Object Security for Constrained RESTful Environments (Group OSCORE) <xref target="I-D.ietf-core-oscore-groupcomm"/> and the joining of security groups defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
          </li>
        </ul>
        <t>Consistently with the definitions from <xref section="2.1" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>, this document also refers to the following terminology.</t>
        <ul spacing="normal">
          <li>
            <t>CoAP group: a set of CoAP endpoints that are all configured to receive CoAP multicast messages sent to the group's associated IP multicast address and UDP port number. An endpoint can be a member of multiple CoAP groups by subscribing to multiple IP multicast addresses.</t>
          </li>
          <li>
            <t>Security group: a set of CoAP endpoints that share the same security material and use it to protect and verify exchanged messages. A CoAP endpoint can be a member of multiple security groups. Between CoAP groups and security groups, there can be a many-to-many, one-to-many, many-to-one, or one-to-one relationship.  </t>
            <t>
This document especially considers a security group to be an OSCORE group, i.e., all members share one Group OSCORE Security Context to protect group communication with Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>. However, the approach defined in this document can be used to support the discovery of different security groups than OSCORE groups.</t>
          </li>
          <li>
            <t>Application group: a set of CoAP endpoints that share a common set of resources. An endpoint can be a member of multiple application groups. Between application groups and security groups, there can be a many-to-many, one-to-many, many-to-one, or one-to-one relationship. Application groups are announced in the RD by a Commissioning Tool, according to the RD-Groups usage pattern (see <xref section="A" sectionFormat="of" target="RFC9176"/>).</t>
          </li>
        </ul>
        <t>Like <xref target="I-D.ietf-core-oscore-groupcomm"/>, this document also uses the following term.</t>
        <ul spacing="normal">
          <li>
            <t>Authentication credential: information associated with an entity, including that entity's public key and parameters associated with the public key. Examples of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC5280"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</t>
          </li>
        </ul>
        <t>Terminology for constrained environments, such as "constrained device" and "constrained-node network", is defined in <xref target="RFC7228"/>.</t>
      </section>
      <section anchor="sec-coral-examples-notation">
        <name>Notation and Assumptions in the CoRAL Examples</name>
        <t>As per <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-coral"/>, CoRAL expresses Uniform Resource Identifiers (URIs) <xref target="RFC3986"/> as Constrained Resource Identifier (CRI) references <xref target="I-D.ietf-core-href"/>.</t>
        <t>Throughout this document, the examples in CoRAL use the following notation.</t>
        <t>When using the CURIE syntax <xref target="CURIE-20101216"/>, the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>'linkformat' stands for http://www.iana.org/assignments/linkformat/  </t>
            <t>
This URI is to be defined with IANA, together with other URIs that build on it through further path segments, e.g., http://www.iana.org/assignments/linkformat/rt</t>
          </li>
          <li>
            <t>'rel' stands for http://www.iana.org/assignments/relation/  </t>
            <t>
This URI is to be defined with IANA, together with other URIs that build on it through further path segments, e.g., http://www.iana.org/assignments/relation/hosts</t>
          </li>
          <li>
            <t>'reef' stands for http://coreapps.org/reef</t>
          </li>
        </ul>
        <t>When using a URI http://www.iana.org/assignments/linkformat/SEG1/SEG2</t>
        <ul spacing="normal">
          <li>
            <t>The path segment SEG1 is the name of a web link target attribute.  </t>
            <t>
Names of target attributes used in the CoRE Link Format <xref target="RFC6690"/> are expected to be coordinated through the "Target Attributes" registry <xref target="Target.Attributes"/> defined in <xref target="RFC9423"/>.</t>
          </li>
          <li>
            <t>The path segment SEG2 is the value of the target attribute.</t>
          </li>
        </ul>
        <t>When using a URI http://www.iana.org/assignments/relation/SEG , the path segment SEG denotes a Web Linking relation type <xref target="RFC8288"/>.</t>
        <t>The application-extension identifier "cri" defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-cbor-edn-literals"/> is used to notate a CBOR Extended Diagnostic Notation (EDN) literal for a CRI or CRI reference. This format is not expected to be sent over the network.</t>
        <t>Packed CBOR <xref target="I-D.ietf-cbor-packed"/> is also used, thus reducing representation size. The examples especially refer to the values from the three shared item tables in <xref target="sec-packed-cbor-tables"/>.</t>
        <t>Finally, the examples use the CoAP Content-Format ID 65087 for the media type "application/coral+cbor".</t>
      </section>
    </section>
    <section anchor="sec-GM-registration">
      <name>Registration of Group Manager Endpoints</name>
      <t>During deployment, a Group Manager (GM) can find the CoRE Resource Directory (RD) as described in <xref section="4" sectionFormat="of" target="RFC9176"/>.</t>
      <t>Afterwards, the GM registers as an endpoint with the RD, as described in <xref section="5" sectionFormat="of" target="RFC9176"/>. The GM <bcp14>SHOULD NOT</bcp14> use the Simple Registration approach described in <xref section="5.1" sectionFormat="of" target="RFC9176"/>.</t>
      <t>When registering with the RD, the GM also registers the links to all the group-membership resources that it has at that point in time, i.e., one for each of its security groups.</t>
      <t>In the registration request, each link to a group-membership resource has as target the URI of that resource at the GM. Also, it specifies a number of descriptive parameters as defined in <xref target="ssec-parameters"/>.</t>
      <t>Furthermore, the GM <bcp14>MAY</bcp14> additionally register the link to its resource implementing the ACE authorization information endpoint (see <xref section="5.10.1" sectionFormat="of" target="RFC9200"/>). A joining node can provide the GM with its own access token by sending it in a request targeting that resource, thus proving to be authorized to join certain security groups (see <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>). In such a case, the link <bcp14>MUST</bcp14> include the parameter 'rt', with value "ace.ai" (see <xref section="8.2" sectionFormat="of" target="RFC9200"/>).</t>
      <section anchor="ssec-parameters">
        <name>Parameters</name>
        <t>For each registered link to a group-membership resource at a GM, the following parameters are specified together with the link.</t>
        <t>In the RD defined in <xref target="RFC9176"/> and based on the CoRE Link Format, each parameter is specified in a target attribute with the same name.</t>
        <t>In an RD based on CoRAL, such as the one defined in <xref target="I-D.hartke-t2trg-coral-reef"/>, each parameter is specified in a nested element with the same name.</t>
        <ul spacing="normal">
          <li>
            <t>'ct', specifying 261 as the ID of the CoAP Content-Format used for interactions with the group-membership resource at the Group Manager. This is associated with the media type "application/ace-groupcomm+cbor" and is registered in <xref section="11.2" sectionFormat="of" target="RFC9594"/>.</t>
          </li>
          <li>
            <t>'rt', specifying the resource type of the group-membership resource at the Group Manager, with value "core.osc.gm" registered in <xref section="17.10" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
          </li>
          <li>
            <t>'if', specifying the interface description for accessing the group-membership resource at the Group Manager, with value "ace.group" registered in <xref section="11.5" sectionFormat="of" target="RFC9594"/>.</t>
          </li>
          <li>
            <t>'sec-gp', specifying the name of the security group of interest as a stable and invariant identifier, such as the group name used in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>. This parameter <bcp14>MUST</bcp14> specify a single value.</t>
          </li>
          <li>
            <t>'app-gp', specifying the name of an application group associated with the security group of interest indicated by 'sec-gp'. This parameter <bcp14>MUST</bcp14> occur once for each application group associated with the security group, and each occurrence <bcp14>MUST</bcp14> specify only a single application group.  </t>
            <t>
When a security group is created at the GM, the names of the application groups using it are also specified as part of the security group configuration (see <xref target="I-D.ietf-ace-oscore-gm-admin"/><xref target="I-D.ietf-ace-oscore-gm-admin-coral"/>). Thus, when registering the links to its group-membership resource, the GM is aware of those application groups and their names.  </t>
            <t>
If a different entity than the GM registers the security groups to the RD (e.g., a Commissioning Tool), this entity has to also be aware of the application groups and their names to specify. To this end, it can obtain them from the GM or from the Administrator that created the security groups at the GM (see <xref target="I-D.ietf-ace-oscore-gm-admin"/><xref target="I-D.ietf-ace-oscore-gm-admin-coral"/>).</t>
          </li>
        </ul>
        <t>Optionally, the following parameters can also be specified. If the CoRE Link Format is used, the value of each of these parameters is encoded as a text string.</t>
        <ul spacing="normal">
          <li>
            <t>'hkdf', specifying the HKDF algorithm used in the security group, e.g., aligned with the parameter HKDF Algorithm in the Group OSCORE Security Context (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Algorithms" Registry <xref target="COSE.Algorithms"/>.</t>
          </li>
          <li>
            <t>'cred-fmt', specifying the format of the authentication credentials used in the security group, e.g., aligned with the parameter Authentication Credential Format in the Group OSCORE Security Context (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Label' column of the "COSE Header Parameters" Registry <xref target="COSE.Header.Parameters"/>. Acceptable values denote a format that <bcp14>MUST</bcp14> explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).  </t>
            <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claim Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC5280"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Further formats may be available in the future, and would be acceptable to use as long as they comply with the criteria defined above.  </t>
            <t>
[ As to C509 certificates, there is a pending registration requested by draft-ietf-cose-cbor-encoded-cert. ]</t>
          </li>
          <li>
            <t>'gp-enc-alg', specifying the encryption algorithm used to encrypt messages in the security group when these are also signed, e.g., aligned with the parameter Group Encryption Algorithm in the Group OSCORE Security Context (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>) to be used with the group mode of Group OSCORE (see <xref section="7" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Algorithms" Registry <xref target="COSE.Algorithms"/>.</t>
          </li>
          <li>
            <t>'sign-alg', specifying the algorithm used to sign messages in the security group, e.g., aligned with the parameter Signature Algorithm in the Group OSCORE Security Context (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>) to be used with the group mode of Group OSCORE (see <xref section="7" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Algorithms" Registry <xref target="COSE.Algorithms"/>.</t>
          </li>
          <li>
            <t>'sign-key-kty', specifying the key type of signing keys used to sign messages in the security group. If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Key Types" Registry <xref target="COSE.Key.Types"/>.</t>
          </li>
          <li>
            <t>'sign-key-crv', specifying the elliptic curve (if applicable) of signing keys used to sign messages in the security group. If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Elliptic Curves" Registry <xref target="COSE.Elliptic.Curves"/>.</t>
          </li>
          <li>
            <t>'alg', specifying the encryption algorithm used to encrypt messages in the security group when these are encrypted with pairwise encryption keys, e.g., aligned with the parameter AEAD Algorithm in the Group OSCORE Security Context (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>) to be used with the pairwise mode of Group OSCORE (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Algorithms" Registry <xref target="COSE.Algorithms"/>.</t>
          </li>
          <li>
            <t>'ecdh-alg', specifying the ECDH algorithm used to derive pairwise encryption keys in the security group, e.g., aligned with the parameter Pairwise Key Agreement Algorithm in the Group OSCORE Security Context (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>) to be used with the pairwise mode of Group OSCORE (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Algorithms" Registry <xref target="COSE.Algorithms"/>.</t>
          </li>
          <li>
            <t>'ecdh-alg-crv', specifying the elliptic curve for the ECDH algorithm used to derive pairwise encryption keys in the security group. If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Elliptic Curves" Registry <xref target="COSE.Elliptic.Curves"/>.</t>
          </li>
          <li>
            <t>'ecdh-key-kty', specifying the key type of keys used with an ECDH algorithm to derive pairwise encryption keys in the security group. If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Key Types" Registry <xref target="COSE.Key.Types"/>.</t>
          </li>
          <li>
            <t>'ecdh-key-crv', specifying the elliptic curve of keys used with an ECDH algorithm to derive pairwise encryption keys in the security group. If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Elliptic Curves" Registry <xref target="COSE.Elliptic.Curves"/>.</t>
          </li>
          <li>
            <t>'det-hash-alg', specifying the hash algorithm used in the security group when producing deterministic requests, e.g., as defined in <xref target="I-D.ietf-core-cacheable-oscore"/>. If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "COSE Algorithms" Registry <xref target="COSE.Algorithms"/>. This parameter <bcp14>MUST NOT</bcp14> be present if the security group does not use deterministic requests.</t>
          </li>
          <li>
            <t>'rekeying-scheme', specifying the rekeying scheme used in the security group for distributing new group keying meterial to the group members. If present, this parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Value' column of the "ACE Groupcomm Rekeying Schemes" registry defined in <xref section="11.13" sectionFormat="of" target="RFC9594"/>.</t>
          </li>
        </ul>
        <t>If the security group does not recur to message signing, then the parameters 'gp-enc-alg', 'sign-alg', 'sign-key-kty', and 'sign-key-crv' <bcp14>MUST NOT</bcp14> be present. For instance, this is the case for a security group that uses Group OSCORE and uses only the pairwise mode (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
        <t>If the security group does not recur to message encryption through pairwise encryption keys, then the parameters 'alg', 'ecdh-alg', 'ecdh-alg-crv', 'ecdh-key-kty', and 'ecdh-key-crv' <bcp14>MUST NOT</bcp14> be present. For instance, this is the case for a security group that uses Group OSCORE and uses only the group mode see <xref section="7" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
        <t>Note that the values registered in the COSE Registries <xref target="COSE.Algorithms"/><xref target="COSE.Elliptic.Curves"/><xref target="COSE.Key.Types"/> are strongly typed. On the contrary, the CoRE Link Format is weakly typed and thus does not distinguish between, for instance, the string value "-10" and the integer value -10.</t>
        <t>Thus, in RDs that return responses in the CoRE Link Format, string values which look like an integer are not supported. Therefore, such values <bcp14>MUST NOT</bcp14> be advertised through the corresponding parameters above.</t>
        <t>A CoAP endpoint that queries the RD to discover security groups and their group-membership resource to access (see <xref target="sec-group-discovery"/>) would benefit from the information above as follows.</t>
        <ul spacing="normal">
          <li>
            <t>The values of 'cred-fmt', 'sign-alg', 'sign-key-kty', 'sign-key-crv', 'ecdh-alg', 'ecdh-alg-crv', 'ecdh-key-kty', and 'ecdh-key-crv' related to a group-membership resource provide an early knowledge of the format of authentication credentials as well as of the type of public keys used in the security group.  </t>
            <t>
Thus, the CoAP endpoint does not need to ask the GM for this information as a preliminary step before the joining process, or to perform a trial-and-error joining exchange with the GM. Hence, at the very first step of the joining process, the CoAP endpoint is able to provide the GM with its own authentication credential in the correct expected format and including a public key of the correct expected type.</t>
          </li>
          <li>
            <t>The values of 'hkdf', 'gp-enc-alg', 'sign-alg', 'alg', and 'ecdh-alg' related to a group-membership resource provide an early knowledge of the algorithms used in the security group.  </t>
            <t>
Thus, the CoAP endpoint is able to decide whether to actually proceed with the joining process, depending on its support for the indicated algorithms.</t>
          </li>
        </ul>
      </section>
      <section anchor="ssec-link-as">
        <name>Relation Link to Authorization Server</name>
        <t>For each registered link to a group-membership resource, the GM <bcp14>MAY</bcp14> additionally specify the link to the ACE authorization server (AS) <xref target="RFC9200"/> associated with the GM and that issues authorization credentials to join the security group as described in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
        <t>The link to the AS has as target the URI of the resource where to send an authorization request to.</t>
        <t>In the RD defined in <xref target="RFC9176"/> and based on the CoRE Link Format, the link to the AS is separately registered with the RD and includes the following parameters as target attributes.</t>
        <ul spacing="normal">
          <li>
            <t>'rel', with value "authorization_server".</t>
          </li>
          <li>
            <t>'anchor', with value the target of the link to the group-membership resource at the GM.</t>
          </li>
        </ul>
        <t>In an RD based on CoRAL, such as the one defined in <xref target="I-D.hartke-t2trg-coral-reef"/>, this is mapped (as describe there) to a link from the registration resource to the AS, using the &lt;http://www.iana.org/assignments/relation/authorization_server&gt; link relation type.</t>
      </section>
      <section anchor="ssec-registration--ex">
        <name>Registration Example</name>
        <t>The example below shows a GM with endpoint name "gm1" and address [2001:db8::ab] that registers with the RD.</t>
        <t>The GM specifies the value of the 'sec-gp' parameter for accessing the security group with name "feedca570000". The security group is used by the application group with name "group1" specified with the value of the 'app-gp' parameter.</t>
        <t>The signature algorithm used in the security group is Ed25519 (-19), i.e., the EdDSA algorithm used with the elliptic curve Ed25519 (see <xref target="RFC9864"/>).</t>
        <t>Authentication credentials used in the security group are X.509 certificates <xref target="RFC5280"/>, which is indicated through the COSE Header Parameter "x5chain" (33). The ECDH algorithm used in the security group is ECDH-SS + HKDF-256 (-27), with elliptic curve X25519 (4).</t>
        <t>In addition, the GM specifies the link to the ACE authorization server associated with the GM, to which a CoAP endpoint should can send an Authorization Request for obtaining an authorization credential to use for joining the corresponding security group (see <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>).</t>
        <section anchor="sssec-registration--ex-link-format">
          <name>Example in Link Format</name>
          <t>Request:  GM -&gt; RD</t>
          <artwork><![CDATA[
Req: POST coap://rd.example.com/rd?ep=gm1
Content-Format: 40 (application/link-format)

Payload:
</ace-group/feedca570000>;ct=261;rt="core.osc.gm";if="ace.group";
                             sec-gp="feedca570000";app-gp="group1";
                             cred-fmt="33";gp-enc-alg="10";
                             sign-alg="-19";alg="10";
                             ecdh-alg="-27";ecdh-alg-crv="4",
<coap://as.example.com/token>;rel="authorization-server";
      anchor="coap://[2001:db8::ab]/ace-group/feedca570000"
]]></artwork>
          <t>Response:  RD -&gt; GM</t>
          <artwork><![CDATA[
Res: 2.01 (Created)
Location-Path: /rd/4521
]]></artwork>
        </section>
        <section anchor="example-in-coral">
          <name>Example in CoRAL</name>
          <t>Request:  GM -&gt; RD</t>
          <artwork><![CDATA[
Req: POST coap://rd.example.com/rd
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[2001:db8::ab]'],
  [2, 6(-22) / item 59 for reef:ep /, "gm1"],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/feedca570000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [
        2, simple(6) / item 6 for linkformat:rt /,
        6(200) / item 416 for cri'http://www.iana.org/assignments/
                                  linkformat/rt/core.osc.gm' /
      ],
      [
        2, simple(7) / item 7 for linkformat:if /,
        6(250) / item 516 for cri'http://www.iana.org/assignments/
                                  linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "feedca570000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "group1"],
      [2, 6(4)  / item 24 for linkformat:cred-fmt / , 33],
      [2, 6(-5) / item 25 for linkformat:gp-enc-alg / , 10],
      [2, 6(5)  / item 26 for linkformat:sign-alg / , -19],
      [2, 6(-7) / item 29 for linkformat:alg / , 10],
      [2, 6(7)  / item 30 for linkformat:ecdh-alg / , -27],
      [2, 6(-8) / item 31 for linkformat:ecdh-alg-crv / , 4],
      [
        2, simple(1) / item 1 for rel:authorization-server / ,
        cri'coap://as.example.com/token'
      ]
    ]
  ]
]
]]></artwork>
          <t>Response:  RD -&gt; GM</t>
          <artwork><![CDATA[
Res: 2.01 (Created)
Location-Path: /rd/4521
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="sec-update-addition">
      <name>Addition and Update of Security Groups</name>
      <t>The GM is responsible to refresh the registration of all its group-membership resources in the RD. This means that the GM has to update the registration within its lifetime as per <xref section="5.3.1" sectionFormat="of" target="RFC9176"/> and that it has to change the content of the registration when a group-membership resource is added/removed, or if its parameters have to be changed, such as in the following cases:</t>
      <ul spacing="normal">
        <li>
          <t>The GM creates a new security group and starts exporting the related group-membership resource.</t>
        </li>
        <li>
          <t>The GM dismisses a security group and stops exporting the related group-membership resource.</t>
        </li>
        <li>
          <t>Information related to an existing security group changes, e.g., the list of associated application groups.</t>
        </li>
      </ul>
      <t>To perform an update of its registrations, the GM can re-register with the RD and fully specify all links to its group-membership resources.</t>
      <t>Alternatively, the GM can perform a PATCH/iPATCH <xref target="RFC8132"/> request to the RD, as per <xref section="5.3.3" sectionFormat="of" target="RFC9176"/>. This requires new media types to be defined in future standards, to apply a new document as a patch to an existing stored document.</t>
      <section anchor="ssec-addition--ex">
        <name>Addition Example</name>
        <t>The example below shows how the GM from <xref target="sec-GM-registration"/> re-registers with the RD. When doing so, it specifies:</t>
        <ul spacing="normal">
          <li>
            <t>The same previous group-membership resource associated with the security group with name "feedca570000".</t>
          </li>
          <li>
            <t>An additional group-membership resource associated with the security group with name "ech0ech00000". The security group is used by the application group with name "group2".</t>
          </li>
          <li>
            <t>A third group-membership resource associated with the security group with name "abcdef120000". The security group is used by two application groups with name "group3" and "group4".</t>
          </li>
        </ul>
        <t>Furthermore, the GM relates the same authorization server also to the security groups "ech0ech00000" and "abcdef120000".</t>
        <section anchor="example-in-link-format">
          <name>Example in Link Format</name>
          <t>Request:  GM -&gt; RD</t>
          <artwork><![CDATA[
Req: POST coap://rd.example.com/rd?ep=gm1
Content-Format: 40 (application/link-format)

Payload:
</ace-group/feedca570000>;ct=261;rt="core.osc.gm";if="ace.group";
                             sec-gp="feedca570000";app-gp="group1";
                             cred-fmt="33";gp-enc-alg="10";
                             sign-alg="-19";alg="10";
                             ecdh-alg="-27";ecdh-alg-crv="4",
</ace-group/ech0ech00000>;ct=261;rt="core.osc.gm";if="ace.group";
                             sec-gp="ech0ech00000";app-gp="group2";
                             cred-fmt="33";gp-enc-alg="10";
                             sign-alg="-19";alg="10";
                             ecdh-alg="-27";ecdh-alg-crv="4",
</ace-group/abcdef120000>;ct=261;rt="core.osc.gm";if="ace.group";
                             sec-gp="abcdef120000";app-gp="group3";
                             app-gp="group4";cred-fmt="33";
                             gp-enc-alg="10";sign-alg="-19";alg="10";
                             ecdh-alg="-27";ecdh-alg-crv="4",
<coap://as.example.com/token>;rel="authorization-server";
      anchor="coap://[2001:db8::ab]/ace-group/feedca570000",
<coap://as.example.com/token>;rel="authorization-server";
      anchor="coap://[2001:db8::ab]/ace-group/ech0ech00000",
<coap://as.example.com/token>;rel="authorization-server";
      anchor="coap://[2001:db8::ab]/ace-group/abcdef120000"
]]></artwork>
          <t>Response:  RD -&gt; GM</t>
          <artwork><![CDATA[
Res: 2.04 (Changed)
Location-Path: /rd/4521
]]></artwork>
        </section>
        <section anchor="example-in-coral-1">
          <name>Example in CoRAL</name>
          <t>Request:  GM -&gt; RD</t>
          <artwork><![CDATA[
Req: POST coap://rd.example.com/rd
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[2001:db8::ab]'],
  [2, 6(-22) / item 59 for reef:#ep /, "gm1"],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/feedca570000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [2, simple(6) / item 6 for linkformat:rt /,
       6(200) / item 416 for cri'http://www.iana.org/assignments/
                                 linkformat/rt/core.osc.gm' /
      ],
      [2, simple(7) / item 7 for linkformat:if /,
       6(250) / item 516 for cri'http://www.iana.org/assignments/
                                 linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "feedca570000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "group1"],
      [2, 6(4)  / item 24 for linkformat:cred-fmt / , 33],
      [2, 6(-5) / item 25 for linkformat:gp-enc-alg / , 10],
      [2, 6(5)  / item 26 for linkformat:sign-alg / , -19],
      [2, 6(-7) / item 29 for linkformat:alg / , 10],
      [2, 6(7)  / item 30 for linkformat:ecdh-alg / , -27],
      [2, 6(-8) / item 31 for linkformat:ecdh-alg-crv / , 4],
      [
        2, simple(1) / item 1 for rel:authorization-server / ,
        cri'coap://as.example.com/token'
      ]
    ]
  ],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/ech0ech00000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [
        2, simple(6) / item 6 for linkformat:rt /,
        6(200) / item 416 for cri'http://www.iana.org/assignments/
                                  linkformat/rt/core.osc.gm' /
      ],
      [
        2, simple(7) / item 7 for linkformat:if /,
        6(250) / item 516 for cri'http://www.iana.org/assignments/
                                  linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "ech0ech00000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "group2"],
      [2, 6(4)  / item 24 for linkformat:cred-fmt / , 33],
      [2, 6(-5) / item 25 for linkformat:gp-enc-alg / , 10],
      [2, 6(5)  / item 26 for linkformat:sign-alg / , -19],
      [2, 6(-7) / item 29 for linkformat:alg / , 10],
      [2, 6(7)  / item 30 for linkformat:ecdh-alg / , -27],
      [2, 6(-8) / item 31 for linkformat:ecdh-alg-crv / , 4],
      [
        2, simple(1) / item 1 for rel:authorization-server / ,
        cri'coap://as.example.com/token'
      ]
    ]
  ],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/abcdef120000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [2, simple(6) / item 6 for linkformat:rt /,
       6(200) / item 416 for cri'http://www.iana.org/assignments/
                                 linkformat/rt/core.osc.gm' /
      ],
      [
        2, simple(7) / item 7 for linkformat:if /,
        6(250) / item 516 for cri'http://www.iana.org/assignments/
                                  linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "abcdef120000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "group3"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "group4"],
      [2, 6(4)  / item 24 for linkformat:cred-fmt / , 33],
      [2, 6(-5) / item 25 for linkformat:gp-enc-alg / , 10],
      [2, 6(5)  / item 26 for linkformat:sign-alg / , -19],
      [2, 6(-7) / item 29 for linkformat:alg / , 10],
      [2, 6(7)  / item 30 for linkformat:ecdh-alg / , -27],
      [2, 6-(8) / item 31 for linkformat:ecdh-alg-crv / , 4],
      [2, simple(1) / item 1 for rel:authorization-server / ,
       cri'coap://as.example.com/token'
      ]
    ]
  ]
]
]]></artwork>
          <t>Response:  RD -&gt; GM</t>
          <artwork><![CDATA[
Res: 2.04 (Changed)
Location-Path: /rd/4521
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="sec-group-discovery">
      <name>Discovery of Security Groups</name>
      <t>A CoAP endpoint that wants to join a security group, hereafter denoted as joining node, might not have all the necessary information at deployment time. Also, it might want to know about possible new security groups created afterwards by the respective Group Managers.</t>
      <t>To this end, the joining node can perform a resource lookup at the RD as per <xref section="6.1" sectionFormat="of" target="RFC9176"/>, in order to retrieve the missing pieces of information that are needed to join the security group(s) of interest. The joining node can find the RD as described in <xref section="4" sectionFormat="of" target="RFC9176"/>.</t>
      <t>The joining node uses the following parameter value for the lookup filtering.</t>
      <ul spacing="normal">
        <li>
          <t>'rt' = "core.osc.gm", specifying the resource type of the group-membership resource at the Group Manager, with value "core.osc.gm" registered in <xref section="17.10" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
        </li>
      </ul>
      <t>The joining node may additionally consider the following parameters for the lookup filtering, depending on the information that it already has.</t>
      <ul spacing="normal">
        <li>
          <t>'sec-gp', specifying the name of the security group of interest. This parameter <bcp14>MUST</bcp14> specify a single value.</t>
        </li>
        <li>
          <t>'ep', specifying the registered endpoint of the GM.</t>
        </li>
        <li>
          <t>'app-gp', specifying the name of an application group associated with the security group of interest. This parameter <bcp14>MAY</bcp14> be included multiple times and each occurrence <bcp14>MUST</bcp14> specify the name of one application group.</t>
        </li>
        <li>
          <t>'if', specifying the interface description for accessing the group-membership resource at the Group Manager, with value "ace.group" registered in <xref section="11.5" sectionFormat="of" target="RFC9594"/>.</t>
        </li>
      </ul>
      <t>The response from the RD may include links to a group-membership resource specifying multiple application groups, as all using the same security group. In this case, the joining node is already expected to know the exact application group of interest.</t>
      <t>Furthermore, the response from the RD may include links to different group-membership resources, all specifying a same application group of interest for the joining node, if the corresponding security groups are all used by that application group.</t>
      <t>In this case, application policies on the joining node should define how to determine the exact security group to join (see <xref section="2.1" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>). For example, different security groups can reflect different security algorithms to use. Hence, a client application can take into account what the joining node supports and prefers, when selecting one particular security group among the indicated ones, while a server application would need to join all of them. Later on, the joining node will be anyway able to join only security groups for which it is actually authorized to be a member (see <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>).</t>
      <t>Note that, with RD-based discovery, including the 'app-gp' parameter multiple times would result in finding only the group-membership resource that serves all the specified application groups, i.e., not any group-membership resource that serves either. Therefore, a joining node needs to perform N separate queries with different values for 'app-gp', in order to safely discover the (different) group-membership resource(s) serving the N application groups.</t>
      <t>The discovery of security groups as defined in this document is applicable and useful to other CoAP endpoints than the actual joining nodes. In particular, other entities can be interested in discovering and interacting with the group-membership resource at the Group Manager. These include entities acting as signature checkers, e.g., intermediary gateways, that do not join a security group but can retrieve authentication credentials of group members from the Group Manager, in order to verify counter signatures of group messages (see <xref section="12.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
      <section anchor="ssec-group-discovery-ex1">
        <name>Discovery Example #1</name>
        <t>Consistently with the examples in <xref target="sec-GM-registration"/> and <xref target="sec-update-addition"/>, the examples below consider a joining node that wants to join the security group associated with the application group "group1", but that does not know the name of the security group, the responsible GM, and the group-membership resource to access.</t>
        <section anchor="example-in-link-format-1">
          <name>Example in Link Format</name>
          <t>Request:  Joining node -&gt; RD</t>
          <artwork><![CDATA[
Req: GET coap://rd.example.com/rd-lookup/res
  ?rt=core.osc.gm&app-gp=group1
]]></artwork>
          <t>Response:  RD -&gt; Joining node</t>
          <artwork><![CDATA[
Res: 2.05 (Content)

Payload:
<coap://[2001:db8::ab]/ace-group/feedca570000>;ct=261;
    rt="core.osc.gm";if="ace.group";sec-gp="feedca570000";
    app-gp="group1";cred-fmt="33";gp-enc-alg="10";
    sign-alg="-19";alg="10";ecdh-alg="-27";ecdh-alg-crv="4"
]]></artwork>
          <t>By performing the separate resource lookup below, the joining node can retrieve the link to the ACE authorization server associated with the GM, where to send an Authorization Request for obtaining an authorization credential to use for joining the corresponding security group (see <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>).</t>
          <t>Request:  Joining node -&gt; RD</t>
          <artwork><![CDATA[
Req: GET coap://rd.example.com/rd-lookup/res
  ?rel=authorization-server&
   anchor=coap://[2001:db8::ab]/ace-group/feedca570000
]]></artwork>
          <t>Response:  RD -&gt; Joining node</t>
          <artwork><![CDATA[
Res: 2.05 (Content)

Payload:
<coap://as.example.com/token>;rel=authorization-server;
      anchor="coap://[2001:db8::ab]/ace-group/feedca570000"
]]></artwork>
          <t>In order to retrieve the multicast IP address of the CoAP group used by the application group "group1", the joining node performs an endpoint lookup as shown below. The following assumes that the application group "group1" has been previously registered as per <xref section="A" sectionFormat="of" target="RFC9176"/>, with ff35:30:2001:db8::23 as multicast IP address of the associated CoAP group.</t>
          <t>Request:  Joining node -&gt; RD</t>
          <artwork><![CDATA[
Req: GET coap://rd.example.com/rd-lookup/ep
  ?et=core.rd-group&ep=group1
]]></artwork>
          <t>Response:  RD -&gt; Joining node</t>
          <artwork><![CDATA[
Res: 2.05 (Content)

Payload:
</rd/501>;ep="group1";et="core.rd-group";
          base="coap://[ff35:30:2001:db8::23]";rt="core.rd-ep"
]]></artwork>
        </section>
        <section anchor="example-in-coral-2">
          <name>Example in CoRAL</name>
          <t>Request:  Joining node -&gt; RD</t>
          <artwork><![CDATA[
Req: GET coap://rd.example.com/rd-lookup/res
  ?rt=core.osc.gm&app-gp=group1
Accept: 65087 (application/coral+cbor)
]]></artwork>
          <t>Response:  RD -&gt; Joining node</t>
          <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[2001:db8::ab]'],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/feedca570000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [2, simple(6) / item 6 for linkformat:rt /,
       6(200) / item 416 for cri'http://www.iana.org/assignments/
                                 linkformat/rt/core.osc.gm' /
      ],
      [2, simple(7) / item 7 for linkformat:if /,
       6(250) / item 516 for cri'http://www.iana.org/assignments/
                                 linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "feedca570000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "group1"],
      [2, 6(4)  / item 24 for linkformat:cred-fmt / , 33],
      [2, 6(-5) / item 25 for linkformat:gp-enc-alg / , 10],
      [2, 6(5)  / item 26 for linkformat:sign-alg / , -19],
      [2, 6(-7) / item 29 for linkformat:alg / , 10],
      [2, 6(7)  / item 30 for linkformat:ecdh-alg / , -27],
      [2, 6(-8) / item 31 for linkformat:ecdh-alg-crv / , 4],
      [2, simple(1) / item 1 for rel:authorization-server / ,
       cri'coap://as.example.com/token'
      ]
    ]
  ]
]
]]></artwork>
          <t>In order to retrieve the multicast IP address of the CoAP group used by the application group "group1", the joining node performs an endpoint lookup as shown below. The following assumes that the application group "group1" has been previously registered, with ff35:30:2001:db8::23 as multicast IP address of the associated CoAP group.</t>
          <t>Request:  Joining node -&gt; RD</t>
          <artwork><![CDATA[
Req: GET coap://rd.example.com/rd-lookup/ep
  ?et=core.rd-group&ep=group1
Accept: 65087 (application/coral+cbor)
]]></artwork>
          <t>Response:  RD -&gt; Joining node</t>
          <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [
    2, 6(20) / item 56 for reef:#rd-unit /, cri'/rd/501',
    [
      [2, 6(-22) / item 59 for reef:#ep /, "group1"],
      [2, 6(21) / item 58 for reef:#et /, "core.rd-group"],
      [
        2, 6(22) / item 60 for reef:#base /,
        cri'coap://[ff35:30:2001:db8::23]'
      ],
      [2, 6(-21) / item 57 for reef:#rt /, "core.rd-ep"],
    ]
  ]
]
]]></artwork>
        </section>
      </section>
      <section anchor="ssec-group-discovery-ex2">
        <name>Discovery Example #2</name>
        <t>Consistently with the examples in <xref target="sec-GM-registration"/> and <xref target="sec-update-addition"/>, the examples below consider a joining node that wants to join the security group with name "feedca570000", but that does not know the responsible GM, the group-membership resource to access, and the associated application groups.</t>
        <t>The examples also show how the joining node uses CoAP observation <xref target="RFC7641"/>, in order to be notified of possible changes to the parameters related to the group-membership resource. This is also useful to handle the case where the security group of interest has not been created yet, so that the joining node can receive the requested information when it becomes available at a later point in time.</t>
        <section anchor="example-in-link-format-2">
          <name>Example in Link Format</name>
          <t>Request:  Joining node -&gt; RD</t>
          <artwork><![CDATA[
Req: GET coap://rd.example.com/rd-lookup/res
  ?rt=core.osc.gm&sec-gp=feedca570000
Observe: 0
]]></artwork>
          <t>Response:  RD -&gt; Joining node</t>
          <artwork><![CDATA[
Res: 2.05 (Content)
Observe: 24

Payload:
<coap://[2001:db8::ab]/ace-group/feedca570000>;ct=261;
    rt="core.osc.gm";if="ace.group";sec-gp="feedca570000";
    app-gp="group1";cred-fmt="33";gp-enc-alg="10";
    sign-alg="-19";alg="10";ecdh-alg="-27";ecdh-alg-crv="4"
]]></artwork>
          <t>Depending on the search criteria, the joining node performing the resource lookup can get large responses. This can happen, for instance, when the lookup request targets all the group-membership resources at a specified GM, or all the group-membership resources of all the registered GMs, as in the example below.</t>
          <t>Request:  Joining node -&gt; RD</t>
          <artwork><![CDATA[
Req: GET coap://rd.example.com/rd-lookup/res?rt=core.osc.gm
]]></artwork>
          <t>Response:  RD -&gt; Joining node</t>
          <artwork><![CDATA[
Res: 2.05 (Content)

Payload:
<coap://[2001:db8::ab]/ace-group/feedca570000>;ct=261;
    rt="core.osc.gm";if="ace.group";sec-gp="feedca570000";
    app-gp="group1";cred-fmt="33";gp-enc-alg="10";
    sign-alg="-19";alg="10";ecdh-alg="-27";ecdh-alg-crv="4",
<coap://[2001:db8::ab]/ace-group/ech0ech00000>;ct=261;
    rt="core.osc.gm";if="ace.group";sec-gp="ech0ech00000";
    app-gp="group2";cred-fmt="33";gp-enc-alg="10";
    sign-alg="-19";alg="10";ecdh-alg="-27";ecdh-alg-crv="4",
<coap://[2001:db8::ab]/ace-group/abcdef120000>;ct=261;
    rt="core.osc.gm";if="ace.group";sec-gp="abcdef120000";
    app-gp="group3";app-gp="group4";cred-fmt="33";
    gp-enc-alg="10";sign-alg="-19";alg="10";ecdh-alg="-27";
    ecdh-alg-crv="4"
]]></artwork>
          <t>Therefore, it is <bcp14>RECOMMENDED</bcp14> that a joining node which performs a resource lookup with the CoAP Observe option specifies the value of the parameter 'sec-gp' in its GET request sent to the RD.</t>
        </section>
        <section anchor="example-in-coral-3">
          <name>Example in CoRAL</name>
          <t>Request:  Joining node -&gt; RD</t>
          <artwork><![CDATA[
Req: GET coap://rd.example.com/rd-lookup/res
  ?rt=core.osc.gm&sec-gp=feedca570000
Observe: 0
Accept: 65087 (application/coral+cbor)
]]></artwork>
          <t>Response:  RD -&gt; Joining node</t>
          <artwork><![CDATA[
Res: 2.05 (Content)
Observe: 24
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[2001:db8::ab]'],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/feedca570000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [2, simple(6) / item 6 for linkformat:rt /,
       6(200) / item 416 for cri'http://www.iana.org/assignments/
                                 linkformat/rt/core.osc.gm' /
      ],
      [2, simple(7) / item 7 for linkformat:if /,
       6(250) / item 516 for cri'http://www.iana.org/assignments/
                                 linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "feedca570000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "group1"],
      [2, 6(4)  / item 24 for linkformat:cred-fmt / , 33],
      [2, 6(-5) / item 25 for linkformat:gp-enc-alg / , 10],
      [2, 6(5)  / item 26 for linkformat:sign-alg / , -19],
      [2, 6(-7) / item 29 for linkformat:alg / , 10],
      [2, 6(7)  / item 30 for linkformat:ecdh-alg / , -27],
      [2, 6(-8) / item 31 for linkformat:ecdh-alg-crv / , 4],
      [
        2, simple(1) / item 1 for rel:authorization-server / ,
        cri'coap://as.example.com/token'
      ]
    ]
  ]
]
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="use-case-example">
      <name>Use Case Example With Full Discovery</name>
      <t>This section describes the discovery of security groups to support the process of a lighting installation in an office building. The described process is a simplified version of one of many processes.</t>
      <t>The process described in this section is intended as an example and does not have any particular ambition to serve as recommendation or best practice to adopt. That is, it shows a possible workflow involving a Commissioning Tool (CT) used in a certain way, while it is not meant to prescribe how the workflow should necessarily be.</t>
      <t>Assume the existence of four luminaires that are members of two application groups. In the first application group, the four luminaires receive presence messages and light intensity messages from sensors or their proxy. In the second application group, the four luminaires and several other pieces of equipment receive building state schedules.</t>
      <t>Each of the two application groups is associated with a different security group and with a different CoAP group that has its own dedicated multicast IP address.</t>
      <t>The Fairhair Alliance describes how a new device is accepted and commissioned in the network <xref target="Fairhair"/>, by means of its certificate stored during the manufacturing process. When commissioning the new device in the installation network, the new device gets a new identity defined by a newly allocated certificate, following the BRSKI specification <xref target="RFC8995"/>.</t>
      <t>Then, consistently with <xref section="7.1" sectionFormat="of" target="RFC9176"/>, the CT assigns an endpoint name based on the CN field (CN=ACME) and the serial number of the certificate (serial number = 123x, with 3 &lt; x &lt; 8). Corresponding ep-names ACME-1234, ACME-1235, ACME-1236, and ACME-1237 are also assumed.</t>
      <t>It is common practice that locations in the building are specified according to a coordinate system. After the acceptance of the luminaires into the installation network, the coordinate of each device is communicated to the CT. This can be done manually or automatically.</t>
      <t>The mapping between location and ep-name is calculated by the CT. For instance, on the basis of grouping criteria, the CT assigns: i) application group "grp_R2-4-015" to the four luminaires; and ii) application group "grp_schedule" to all schedule requiring devices. Also, the device with ep name ACME-123x has been assigned IP address: [2001:db8:4::x]. The RD is assigned IP address: [2001:db8:4:ff]. The used multicast addresses are: [ff05::5:1] and [ff05::5:2].</t>
      <t>The following assumes that each device is pre-configured with the name of the two application groups it belongs to. Additional mechanisms can be defined in the RD, for supporting devices to discover the application groups they belong to.</t>
      <t><xref target="use-case-example-coral"/> provides this same use case example using CoRAL.</t>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>The CT defines the application group "grp_R2-4-015", with resource /light and base address [ff05::5:1], as follows.</t>
      <t>Request:  CT -&gt; RD</t>
      <artwork><![CDATA[
Req: POST coap://[2001:db8:4::ff]/rd
  ?ep=grp_R2-4-015&et=core.rd-group&base=coap://[ff05::5:1]
Content-Format: 40 (application/link-format)

Payload:
</light>;rt="oic.d.light"
]]></artwork>
      <t>Response:  RD -&gt; CT</t>
      <artwork><![CDATA[
Res: 2.01 (Created)
Location-Path: /rd/501
]]></artwork>
      <t>Also, the CT defines a second application group "grp_schedule", with resource /schedule and base address [ff05::5:2], as follows.</t>
      <t>Request:  CT -&gt; RD</t>
      <artwork><![CDATA[
Req: POST coap://[2001:db8:4::ff]/rd
  ?ep=grp_schedule&et=core.rd-group&base=coap://[ff05::5:2]
Content-Format: 40 (application/link-format)

Payload:
</schedule>;rt="oic.r.time.period"
]]></artwork>
      <t>Response:  RD -&gt; CT</t>
      <artwork><![CDATA[
Res: 2.01 (Created)
Location-Path: /rd/502
]]></artwork>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>Finally, the CT defines the corresponding security groups. In particular, assuming a Group Manager responsible for both security groups and with address [2001:db8::ab], the CT specifies:</t>
      <t>Request:  CT -&gt; RD</t>
      <artwork><![CDATA[
Req: POST coap://[2001:db8:4::ff]/rd
  ?ep=gm1&base=coap://[2001:db8::ab]
Content-Format: 40 (application/link-format)

Payload:
</ace-group/feedca570000>;ct=261;rt="core.osc.gm";if="ace.group";
                          sec-gp="feedca570000";
                          app-gp="grp_R2-4-015",
</ace-group/feedsc590000>;ct=261;rt="core.osc.gm";if="ace.group";
                          sec-gp="feedsc590000";
                          app-gp="grp_schedule"
]]></artwork>
      <t>Response:  RD -&gt; CT</t>
      <artwork><![CDATA[
Res: 2.01 (Created)
Location-Path: /rd/4521
]]></artwork>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>The device with IP address [2001:db8:4::x] can retrieve the multicast IP address of the CoAP group used by the application group "grp_R2-4-015", by performing an endpoint lookup as shown below.</t>
      <t>Request:  Joining node -&gt; RD</t>
      <artwork><![CDATA[
Req: GET coap://[2001:db8:4::ff]/rd-lookup/ep
  ?et=core.rd-group&ep=grp_R2-4-015
]]></artwork>
      <t>Response:  RD -&gt; Joining node</t>
      <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 40 (application/link-format)

Payload:
</rd/501>;ep="grp_R2-4-015";et="core.rd-group";
          base="coap://[ff05::5:1]";rt="core.rd-ep"
]]></artwork>
      <t>Similarly, to retrieve the multicast IP address of the CoAP group used by the application group "grp_schedule", the device performs an endpoint lookup as shown below.</t>
      <t>Request:  Joining node -&gt; RD</t>
      <artwork><![CDATA[
Req: GET coap://[2001:db8:4::ff]/rd-lookup/ep
  ?et=core.rd-group&ep=grp_schedule
]]></artwork>
      <t>Response:  RD -&gt; Joining node</t>
      <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 40 (application/link-format)

Payload:
</rd/502>;ep="grp_schedule";et="core.rd-group";
          base="coap://[ff05::5:2]";rt="core.rd-ep"
]]></artwork>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>Consequently, the device learns the security groups that it has to join. In particular, it does the following for app-gp="grp_R2-4-015".</t>
      <t>Request:  Joining node -&gt; RD</t>
      <artwork><![CDATA[
Req: GET coap://[2001:db8:4::ff]/rd-lookup/res
  ?rt=core.osc.gm&app-gp=grp_R2-4-015
]]></artwork>
      <t>Response:  RD -&gt; Joining Node</t>
      <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 40 (application/link-format)

Payload:
<coap://[2001:db8::ab]/ace-group/feedca570000>;ct=261;
    rt="core.osc.gm";if="ace.group";sec-gp="feedca570000";
    app-gp="grp_R2-4-015"
]]></artwork>
      <t>Similarly, the device does the following for app-gp="grp_schedule".</t>
      <artwork><![CDATA[
Req: GET coap://[2001:db8:4::ff]/rd-lookup/res
  ?rt=core.osc.gm&app-gp=grp_schedule
]]></artwork>
      <t>Response:  RD -&gt; Joining Node</t>
      <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 40 (application/link-format)

Payload:
<coap://[2001:db8::ab]/ace-group/feedsc590000>;ct=261;
    rt="core.osc.gm";if="ace.group";sec-gp="feedsc590000";
    app-gp="grp_schedule"
]]></artwork>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>After this last discovery step, the device can ask permission to join the security groups and can effectively join them through the Group Manager, e.g., according to <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations as described in <xref section="8" sectionFormat="of" target="RFC9176"/> apply here as well.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-link-relation-type">
        <name>Link Relation Type Registry</name>
        <t>IANA is asked to register the following entry in the "Link Relation Type" registry as per <xref target="RFC8288"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Relation Name: authorization-server</t>
          </li>
          <li>
            <t>Description: Refers to a resource at an authorization server for requesting an authorization credential to access the link's context</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
          <li>
            <t>Notes: None</t>
          </li>
          <li>
            <t>Application Data: None</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-target-attributes">
        <name>Target Attributes Registry</name>
        <t>IANA is asked to register the following entries in the "Target Attributes" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group, as per <xref target="RFC9423"/>. For all entries, the Change Controller is IETF and the reference is [RFC-XXXX].</t>
        <table align="center">
          <name>Registrations in "Target Attributes" Registry</name>
          <thead>
            <tr>
              <th align="left">Attribute Name</th>
              <th align="left">Brief Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">sec-gp</td>
              <td align="left">Name of the security group that can be joined through this resource</td>
            </tr>
            <tr>
              <td align="left">app-gp</td>
              <td align="left">Name of an application group associated with a security group</td>
            </tr>
            <tr>
              <td align="left">hkdf</td>
              <td align="left">The HKDF algorithm to use</td>
            </tr>
            <tr>
              <td align="left">cred-fmt</td>
              <td align="left">The format of authentication credential to use</td>
            </tr>
            <tr>
              <td align="left">gp-enc-alg</td>
              <td align="left">The encryption algorithm to use for encrypting signed messages</td>
            </tr>
            <tr>
              <td align="left">sign-alg</td>
              <td align="left">The signature algorithm to use</td>
            </tr>
            <tr>
              <td align="left">sign-key-kty</td>
              <td align="left">The key type of the used signing keys</td>
            </tr>
            <tr>
              <td align="left">sign-key-crv</td>
              <td align="left">The curve of the used signing keys</td>
            </tr>
            <tr>
              <td align="left">alg</td>
              <td align="left">The encryption algorithm to use for encrypting non-signed messages</td>
            </tr>
            <tr>
              <td align="left">ecdh-alg</td>
              <td align="left">The ECDH algorithm to use</td>
            </tr>
            <tr>
              <td align="left">ecdh-alg-crv</td>
              <td align="left">The elliptic curve of the used ECDH algorithm</td>
            </tr>
            <tr>
              <td align="left">ecdh-key-kty</td>
              <td align="left">The key type of the used ECDH keys</td>
            </tr>
            <tr>
              <td align="left">ecdh-key-crv</td>
              <td align="left">The curve of the used ECDH keys</td>
            </tr>
            <tr>
              <td align="left">det-hash-alg</td>
              <td align="left">The hash algorithm to use for computing deterministic requests</td>
            </tr>
            <tr>
              <td align="left">rekeying-scheme</td>
              <td align="left">The rekeying scheme used to distribute new keying material</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-core-oscore-groupcomm">
          <front>
            <title>Group Object Security for Constrained RESTful Environments (Group OSCORE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <date day="23" month="December" year="2025"/>
            <abstract>
              <t>   This document defines the security protocol Group Object Security for
   Constrained RESTful Environments (Group OSCORE), providing end-to-end
   security of messages exchanged with the Constrained Application
   Protocol (CoAP) between members of a group, e.g., sent over IP
   multicast.  In particular, the described protocol defines how OSCORE
   is used in a group communication setting to provide source
   authentication for CoAP group requests, sent by a client to multiple
   servers, and for protection of the corresponding CoAP responses.
   Group OSCORE also defines a pairwise mode where each member of the
   group can efficiently derive a symmetric pairwise key with each other
   member of the group for pairwise OSCORE communication.  Group OSCORE
   can be used between endpoints communicating with CoAP or CoAP-
   mappable HTTP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-28"/>
        </reference>
        <reference anchor="I-D.ietf-core-coral">
          <front>
            <title>The Constrained RESTful Application Language (CoRAL)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>ARM</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   The Constrained RESTful Application Language (CoRAL) defines a data
   model and interaction model as well as a compact serialization
   formats for the description of typed connections between resources on
   the Web ("links"), possible operations on such resources ("forms"),
   and simple resource metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coral-06"/>
        </reference>
        <reference anchor="I-D.ietf-core-groupcomm-bis">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="10" month="February" year="2026"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP) is a web transfer
   protocol for constrained devices and constrained networks.  In a
   number of use cases, constrained devices often naturally operate in
   groups (e.g., in a building automation scenario, all lights in a
   given room may need to be switched on/off as a group).  This document
   specifies the use of CoAP for group communication, including the use
   of UDP/IP multicast as the default underlying data transport.  Both
   unsecured and secured CoAP group communication are specified.
   Security is achieved by use of the Group Object Security for
   Constrained RESTful Environments (Group OSCORE) protocol.  The target
   application area of this specification is any group communication use
   cases that involve resource-constrained devices or networks that
   support CoAP.  This document replaces and obsoletes RFC 7390, while
   it updates RFC 7252 and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-18"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-packed">
          <front>
            <title>Packed CBOR</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Mikolai Gütschow" initials="M." surname="Gütschow">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="2" month="February" year="2026"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949 == STD 94)
   is a data format whose design goals include the possibility of
   extremely small code size, fairly small message size, and
   extensibility without the need for version negotiation.

   CBOR does not provide any forms of data compression.  CBOR data
   items, in particular when generated from legacy data models, often
   allow considerable gains in compactness when applying data
   compression.  While traditional data compression techniques such as
   DEFLATE (RFC 1951) can work well for CBOR encoded data items, their
   disadvantage is that the recipient needs to decompress the compressed
   form before it can make use of the data.

   This specification describes Packed CBOR, a set of CBOR tags and
   simple values that enable a simple transformation of an original CBOR
   data item into a Packed CBOR data item that is almost as easy to
   consume as the original CBOR data item.  A separate decompression
   step is therefore often not required at the recipient.


   // (This cref will be removed by the RFC editor:) The present
   // revision -19 is a work-in-progress release in preparation for
   // another cbor-packed side meeting.  This revision resolves the use
   // of the tunables A/B/C by setting A=16, B=8, and C=8, and choosing
   // requested simple values and tag numbers, in preparation for
   // continuing the early allocation process.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-packed-19"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="21" month="November" year="2025"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) rather than as a
   sequence of characters.  This approach simplifies parsing,
   comparison, and reference resolution in environments with severe
   limitations on processing power, code size, and memory size.

   This RFC updates RFC 7595 by adding a column on the "URI Schemes"
   registry.


   // (This "cref" paragraph will be removed by the RFC editor:) After
   // approval of -28 and nit fixes in -29, the present revision -30
   // contains two more small fixes for nits that were uncovered in the
   // RPC intake process.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-30"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="16" month="October" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present -19
   // includes the definition of the cri'' application- extension. cri''
   // was previously defined in draft-ietf-core-href; however the latter
   // document overtook the present document in the approval process.
   // As the definition of cri'' is dependent on the present document
   // (and conversely has essentially no dependency on the technical
   // content of draft-ietf-core-href beyond its mere existence), the
   // text (including IANA considerations) has been moved here. -19 is
   // intended for use at the CBOR WG meeting at IETF 124.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-19"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for Group Object Security for Constrained RESTful Environments (Group OSCORE) Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="25" month="February" year="2026"/>
            <abstract>
              <t>   This document defines an application profile of the Authentication
   and Authorization for Constrained Environments (ACE) framework, to
   request and provision keying material in group communication
   scenarios that are based on the Constrained Application Protocol
   (CoAP) and are secured with Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  This application profile
   delegates the authentication and authorization of Clients, which join
   an OSCORE group through a Resource Server acting as Group Manager for
   that group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication, and proof of possession of a key owned by the Client
   and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-20"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9864">
          <front>
            <title>Fully-Specified Algorithms for JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="October" year="2025"/>
            <abstract>
              <t>This specification refers to cryptographic algorithm identifiers that fully specify the cryptographic operations to be performed, including any curve, key derivation function (KDF), and hash functions, as being "fully specified". It refers to cryptographic algorithm identifiers that require additional information beyond the algorithm identifier to determine the cryptographic operations to be performed as being "polymorphic". This specification creates fully-specified algorithm identifiers for registered JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) polymorphic algorithm identifiers, enabling applications to use only fully-specified algorithm identifiers. It deprecates those polymorphic algorithm identifiers.</t>
              <t>This specification updates RFCs 7518, 8037, and 9053. It deprecates polymorphic algorithms defined by RFCs 8037 and 9053 and provides fully-specified replacements for them. It adds to the instructions to designated experts in RFCs 7518 and 9053.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9864"/>
          <seriesInfo name="DOI" value="10.17487/RFC9864"/>
        </reference>
        <reference anchor="COSE.Algorithms" target="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Key.Types" target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">
          <front>
            <title>COSE Key Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Elliptic.Curves" target="https://www.iana.org/assignments/cose/cose.xhtml#elliptic-curves">
          <front>
            <title>COSE Elliptic Curves</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Target.Attributes" target="https://www.iana.org/assignments/core-parameters/core-parameters.xhtml#target-attributes">
          <front>
            <title>Target Attributes</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CURIE-20101216" target="http://www.w3.org/TR/2010/NOTE-curie-20101216">
          <front>
            <title>CURIE Syntax 1.0 - A syntax for expressing Compact URIs - W3C Working Group Note</title>
            <author initials="M." surname="Birbeck" fullname="Mark Birbeck">
              <organization/>
            </author>
            <author initials="S." surname="McCarron" fullname="Shane McCarron">
              <organization/>
            </author>
            <date year="2010" month="December" day="16"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-ace-oscore-gm-admin">
          <front>
            <title>Admin Interface for the OSCORE Group Manager</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
         </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="23" month="February" year="2026"/>
            <abstract>
              <t>   Group communication for the Constrained Application Protocol (CoAP)
   can be secured using Group Object Security for Constrained RESTful
   Environments (Group OSCORE).  A Group Manager is responsible for
   handling the joining of new group members, as well as for managing
   and distributing the group keying material.  This document defines a
   RESTful admin interface at the Group Manager that allows an
   Administrator entity to create and delete OSCORE groups, as well as
   to retrieve and update their configuration.  The ACE framework for
   Authentication and Authorization is used to enforce authentication
   and authorization of the Administrator at the Group Manager.
   Protocol-specific transport profiles of ACE are used to achieve
   communication security, proof of possession, and server
   authentication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-gm-admin-15"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-gm-admin-coral">
          <front>
            <title>Using the Constrained RESTful Application Language (CoRAL) with the Admin Interface for the OSCORE Group Manager</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <date day="7" month="January" year="2026"/>
            <abstract>
              <t>   Group communication for the Constrained Application Protocol (CoAP)
   can be secured using Group Object Security for Constrained RESTful
   Environments (Group OSCORE).  A Group Manager is responsible to
   handle the joining of new group members, as well as to manage and
   distribute the group keying material.  The Group Manager can provide
   a RESTful admin interface that allows an Administrator entity to
   create and delete OSCORE groups, as well as to retrieve and update
   their configuration.  This document specifies how an Administrator
   interacts with the admin interface at the Group Manager by using the
   Constrained RESTful Application Language (CoRAL).  The ACE framework
   for Authentication and Authorization is used to enforce
   authentication and authorization of the Administrator at the Group
   Manager.  Protocol-specific transport profiles of ACE are used to
   achieve communication security, proof-of-possession, and server
   authentication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-gm-admin-coral-05"/>
        </reference>
        <reference anchor="I-D.hartke-t2trg-coral-reef">
          <front>
            <title>Resource Discovery in Constrained RESTful Environments (CoRE) using the Constrained RESTful Application Language (CoRAL)</title>
            <author fullname="Klaus Hartke" initials="K." surname="Hartke">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="May" year="2020"/>
            <abstract>
              <t>   This document explores how the Constrained RESTful Application
   Language (CoRAL) might be used for two use cases in Constrained
   RESTful Environments (CoRE): CoRE Resource Discovery, which allows a
   client to discover the resources of a server given a host name or IP
   address, and CoRE Resource Directory, which provides a directory of
   resources on many servers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hartke-t2trg-coral-reef-04"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="25" month="January" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280, common certificate
   profiles and is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is over the CBOR encoding instead
   of the DER encoding, avoiding the use of ASN.1.  Both types of
   certificates have the same semantics as X.509 and the same reduced
   size compared to X.509.

   The document also specifies CBOR encoded data structures for
   certificate (signing) requests and certificate request templates, new
   COSE headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698; the TLSA selectors registry is
   extended to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-16"/>
        </reference>
        <reference anchor="I-D.ietf-core-cacheable-oscore">
          <front>
            <title>Cacheable OSCORE</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="22" month="September" year="2025"/>
            <abstract>
              <t>   Group communication with the Constrained Application Protocol (CoAP)
   can be secured end-to-end using Group Object Security for Constrained
   RESTful Environments (Group OSCORE), also across untrusted
   intermediary proxies.  However, this sidesteps the proxies' abilities
   to cache responses from the origin server(s).  This specification
   restores cacheability of protected responses at proxies, by
   introducing consensus requests which any client in a group can send
   to one server or multiple servers in the same group.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-cacheable-oscore-00"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC9423">
          <front>
            <title>Constrained RESTful Environments (CoRE) Target Attributes Registry</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>The Constrained RESTful Environments (CoRE) specifications apply web technologies to constrained environments. One such important technology is Web Linking (RFC 8288), which CoRE specifications use as the basis for a number of discovery protocols, such as the Link Format (RFC 6690) in the Constrained Application Protocol's (CoAP's) resource discovery process (Section 7.2 of RFC 7252) and the Resource Directory (RD) (RFC 9176).</t>
              <t>Web Links can have target attributes, the names of which are not generally coordinated by the Web Linking specification (Section 2.2 of RFC 8288). This document introduces an IANA registry for coordinating names of target attributes when used in CoRE. It updates the "RD Parameters" IANA registry created by RFC 9176 to coordinate with this registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9423"/>
          <seriesInfo name="DOI" value="10.17487/RFC9423"/>
        </reference>
        <reference anchor="RFC9594">
          <front>
            <title>Key Provisioning for Group Communication Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members that act as Clients and are authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as the Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9594"/>
          <seriesInfo name="DOI" value="10.17487/RFC9594"/>
        </reference>
        <reference anchor="Fairhair" target="https://openconnectivity.org/wp-content/uploads/2019/11/fairhair_security_wp_march-2018.pdf">
          <front>
            <title>Security Architecture for the Internet of Things (IoT) in Commercial Buildings</title>
            <author>
              <organization>FairHair Alliance</organization>
            </author>
            <date year="2018" month="March"/>
          </front>
          <seriesInfo name="White Paper, ed. Piotr Polak" value=""/>
        </reference>
      </references>
    </references>
    <?line 1125?>

<section anchor="use-case-example-coral">
      <name>Use Case Example With Full Discovery (CoRAL)</name>
      <t>This section provides the same use case example of <xref target="use-case-example"/> but using CoRAL <xref target="I-D.ietf-core-coral"/>.</t>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>The CT defines the application group "grp_R2-4-015", with resource /light and base address [ff05::5:1], as follows.</t>
      <t>Request:  CT -&gt; RD</t>
      <artwork><![CDATA[
Req: POST coap://[2001:db8:4::ff]/rd
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[ff05::5:1]'],
  [2, 6(-22) / item 59 for reef:#ep /, "grp_R2-4-015"],
  [2, 6(21) / item 58 for reef:#et /, "core.rd-group"],
  [
    2, 6(-20) / item 55 for reef:#rd-item /, cri'/light',
    [
      2, simple(6) / item 6 for linkformat:rt /,
      6(-201) / item 417 for cri'http://www.iana.org/assignments/
                                 linkformat/rt/oic.d.light' /
    ]
  ]
]
]]></artwork>
      <t>Response:  RD -&gt; CT</t>
      <artwork><![CDATA[
Res: 2.01 (Created)
Location-Path: /rd/501
]]></artwork>
      <t>Also, the CT defines a second application group "grp_schedule", with resource /schedule and base address [ff05::5:2], as follows.</t>
      <t>Request:  CT -&gt; RD</t>
      <artwork><![CDATA[
Req: POST coap://[2001:db8:4::ff]/rd
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[ff05::5:2]'],
  [2, 6(-22) / item 59 for reef:#ep /, "grp_schedule"],
  [2, 6(21) / item 58 for reef:#et /, "core.rd-group"],
  [
    2, 6(-20) / item 55 for reef:#rd-item /, cri'/schedule',
    [
      2, simple(6) / item 6 for linkformat:rt /,
      6(201) / item 418 for cri'http://www.iana.org/assignments/
                                 linkformat/rt/oic.r.time.period' /
    ]
  ]
]
]]></artwork>
      <t>Response:  RD -&gt; CT</t>
      <artwork><![CDATA[
Res: 2.01 (Created)
Location-Path: /rd/502
]]></artwork>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>Finally, the CT defines the corresponding security groups. In particular, assuming a Group Manager responsible for both security groups and with address [2001:db8::ab], the CT specifies:</t>
      <t>Request:  CT -&gt; RD</t>
      <artwork><![CDATA[
Req: POST coap://[2001:db8:4::ff]/rd
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[2001:db8::ab]'],
  [2, 6(-22) / item 59 for reef:#ep /, "gm1"],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/feedca570000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [
        2, simple(6) / item 6 for linkformat:rt /,
        6(200) / item 416 for cri'http://www.iana.org/assignments/
                                  linkformat/rt/core.osc.gm' /
      ],
      [
        2, simple(7) / item 7 for linkformat:if /,
        6(250) / item 516 for cri'http://www.iana.org/assignments/
                                  linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "feedca570000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "grp_R2-4-015"]
    ]
  ],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/feedsc590000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [
        2, simple(6) / item 6 for linkformat:rt /,
        6(200) / item 416 for cri'http://www.iana.org/assignments/
                                  linkformat/rt/core.osc.gm' /
        ],
      [
        2, simple(7) / item 7 for linkformat:if /,
        6(250) / item 516 for cri'http://www.iana.org/assignments/
                                  linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "feedsc590000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "grp_schedule"]
    ]
  ]
]
]]></artwork>
      <t>Response:  RD -&gt; CT</t>
      <artwork><![CDATA[
Res: 2.01 (Created)
Location-Path: /rd/4521
]]></artwork>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>The device with IP address [2001:db8:4::x] can retrieve the multicast IP address of the CoAP group used by the application group "grp_R2-4-015", by performing an endpoint lookup as shown below.</t>
      <t>Request:  Joining node -&gt; RD</t>
      <artwork><![CDATA[
Req: GET coap://[2001:db8:4::ff]/rd-lookup/ep
  ?et=core.rd-group&ep=grp_R2-4-015
]]></artwork>
      <t>Response:  RD -&gt; Joining node</t>
      <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[2001:db8:4::ff]/rd'],
  [
    2, 6(20) / item 56 for reef:#rd-unit /, cri'/501',
    [
      [2, 6(-22) / item 59 for reef:#ep /, "grp_R2-4-015"],
      [2, 6(21) / item 58 for reef:#et /, "core.rd-group"],
      [2, 6(22) / item 60 for reef:#base /, cri'coap://[ff05::5:1]/'],
      [2, 6(-21) / item 57 for reef:#rt /, "core.rd-ep"],
    ]
  ]
]
]]></artwork>
      <t>Similarly, to retrieve the multicast IP address of the CoAP group used by the application group "grp_schedule", the device performs an endpoint lookup as shown below.</t>
      <t>Request:  Joining node -&gt; RD</t>
      <artwork><![CDATA[
Req: GET coap://[2001:db8:4::ff]/rd-lookup/ep
  ?et=core.rd-group&ep=grp_schedule
]]></artwork>
      <t>Response:  RD -&gt; Joining node</t>
      <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[2001:db8:4::ff]/rd'],
  [
    2, 6(20) / item 56 for reef:#rd-unit /, cri'/502',
    [
      [2, 6(-22) / item 59 for reef:#ep /, "grp_schedule"],
      [2, 6(21) / item 58 for reef:#et /, "core.rd-group"],
      [2, 6(22) / item 60 for reef:#base /, cri'coap://[ff05::5:2]/'],
      [2, 6(-21) / item 57 for reef:#rt /, "core.rd-ep"],
    ]
  ]
]
]]></artwork>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>Consequently, the device learns the security groups that it has to join. In particular, it does the following for app-gp="grp_R2-4-015".</t>
      <t>Request:  Joining node -&gt; RD</t>
      <artwork><![CDATA[
Req: GET coap://[2001:db8:4::ff]/rd-lookup/res
  ?rt=core.osc.gm&app-gp=grp_R2-4-015
]]></artwork>
      <t>Response:  RD -&gt; Joining Node</t>
      <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[2001:db8::ab]'],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/feedca570000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [2, simple(6) / item 6 for linkformat:rt /,
       6(200) / item 416 for cri'http://www.iana.org/assignments/
                                 linkformat/rt/core.osc.gm' /
      ],
      [2, simple(7) / item 7 for linkformat:if /,
       6(250) / item 516 for cri'http://www.iana.org/assignments/
                                 linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "feedca570000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "grp_R2-4-015"]
    ]
  ]
]
]]></artwork>
      <t>Similarly, the device does the following for app-gp="grp_schedule".</t>
      <artwork><![CDATA[
Req: GET coap://[2001:db8:4::ff]/rd-lookup/res
  ?rt=core.osc.gm&app-gp=grp_schedule
]]></artwork>
      <t>Response:  RD -&gt; Joining Node</t>
      <artwork><![CDATA[
Res: 2.05 (Content)
Content-Format: 65087 (application/coral+cbor)

Payload:
[
  [1, cri'coap://[2001:db8::ab]'],
  [
    2, 6(-20) / item 55 for reef:#rd-item /,
    cri'/ace-group/feedsc590000',
    [
      [2, simple(8) / item 8 for linkformat:ct /, 261],
      [2, simple(6) / item 6 for linkformat:rt /,
       6(200) / item 416 for cri'http://www.iana.org/assignments/
                                 linkformat/rt/core.osc.gm' /
      ],
      [2, simple(7) / item 7 for linkformat:if /,
       6(250) / item 516 for cri'http://www.iana.org/assignments/
                                 linkformat/if/ace.group' /
      ],
      [2, 6(-3) / item 21 for linkformat:sec-gp / , "feedsc590000"],
      [2, 6(3)  / item 22 for linkformat:app-gp / , "grp_schedule"]
    ]
  ]
]
]]></artwork>
      <artwork><![CDATA[
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
]]></artwork>
      <t>After this last discovery step, the device can ask permission to join the security groups and can effectively join them through the Group Manager, e.g., according to <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
    </section>
    <section anchor="sec-packed-cbor-tables">
      <name>Shared item tables for Packed CBOR</name>
      <t>This appendix defines the three shared item tables that the examples in this document refer to for using Packed CBOR <xref target="I-D.ietf-cbor-packed"/>.</t>
      <t>The application-extension identifier "cri" defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-cbor-edn-literals"/> is used to notate a CBOR Extended Diagnostic Notation (EDN) literal for a CRI.</t>
      <section anchor="compacting-coral-predicates-with-packed-cbor">
        <name>Compacting CoRAL predicates with Packed CBOR</name>
        <t>The following shared item table is used for compacting CoRAL predicates, as per <xref section="2.2" sectionFormat="of" target="I-D.ietf-cbor-packed"/>.</t>
        <figure anchor="fig-packed-cbor-table-1">
          <name>Shared Item Table for Compacting CoRAL Predicates.</name>
          <artwork align="center"><![CDATA[
+-------+----------------------------------------------------------+
| Index | Item                                                     |
+-------+----------------------------------------------------------+
| 0     | cri'http://www.iana.org/assignments/relation/hosts'      |
+-------+----------------------------------------------------------+
| 1     | cri'http://www.iana.org/assignments/relation/            |
|       |     authorization-server'                                |
+-------+----------------------------------------------------------+
| 6     | cri'http://www.iana.org/assignments/linkformat/rt'       |
+-------+----------------------------------------------------------+
| 7     | cri'http://www.iana.org/assignments/linkformat/if'       |
+-------+----------------------------------------------------------+
| 8     | cri'http://www.iana.org/assignments/linkformat/ct'       |
+-------+----------------------------------------------------------+
| 9     | cri'http://www.iana.org/assignments/linkformat/anchor'   |
+-------+----------------------------------------------------------+
| 10    | cri'http://www.iana.org/assignments/linkformat/rel'      |
+-------+----------------------------------------------------------+
| 21    | cri'http://www.iana.org/assignments/linkformat/sec-gp'   |
+-------+----------------------------------------------------------+
| 22    | cri'http://www.iana.org/assignments/linkformat/app-gp'   |
+-------+----------------------------------------------------------+
| 23    | cri'http://www.iana.org/assignments/linkformat/hkdf'     |
+-------+----------------------------------------------------------+
| 24    | cri'http://www.iana.org/assignments/linkformat/cred-fmt' |
+-------+----------------------------------------------------------+
| 25    | cri'http://www.iana.org/assignments/linkformat/          |
|       |     gp-enc-alg'                                          |
+-------+----------------------------------------------------------+
| 26    | cri'http://www.iana.org/assignments/linkformat/sign-alg' |
+-------+----------------------------------------------------------+
| 27    | cri'http://www.iana.org/assignments/linkformat/          |
|       |     sign-key-kty'                                        |
+-------+----------------------------------------------------------+
| 28    | cri'http://www.iana.org/assignments/linkformat/          |
|       |     sign-key-crv'                                        |
+-------+----------------------------------------------------------+
| 29    | cri'http://www.iana.org/assignments/linkformat/alg'      |
+-------+----------------------------------------------------------+
| 30    | cri'http://www.iana.org/assignments/linkformat/ecdh-alg' |
+-------+----------------------------------------------------------+
| 31    | cri'http://www.iana.org/assignments/linkformat/          |
|       |     ecdh-alg-crv'                                        |
+-------+----------------------------------------------------------+
| 32    | cri'http://www.iana.org/assignments/linkformat/          |
|       |     ecdh-key-kty'                                        |
+-------+----------------------------------------------------------+
| 33    | cri'http://www.iana.org/assignments/linkformat/          |
|       |     ecdh-key-crv'                                        |
+-------+----------------------------------------------------------+
| 34    | cri'http://www.iana.org/assignments/linkformat/          |
|       |     det-hash-alg'                                        |
+-------+----------------------------------------------------------+
| 35    | cri'http://www.iana.org/assignments/linkformat/          |
|       |     rekeying-scheme'                                     |
+-------+----------------------------------------------------------+
| 55    | cri'http://coreapps.org/reef#rd-item'                    |
+-------+----------------------------------------------------------+
| 56    | cri'http://coreapps.org/reef#rd-unit'                    |
+-------+----------------------------------------------------------+
| 57    | cri'http://coreapps.org/reef#rt'                         |
+-------+----------------------------------------------------------+
| 58    | cri'http://coreapps.org/reef#et'                         |
+-------+----------------------------------------------------------+
| 59    | cri'http://coreapps.org/reef#ep'                         |
+-------+----------------------------------------------------------+
| 60    | cri'http://coreapps.org/reef#base'                       |
+-------+----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="compacting-values-of-the-rt-target-attribute-with-packed-cbor">
        <name>Compacting Values of the rt= Target Attribute with Packed CBOR</name>
        <t>The following shared item table is used for compacting values of the rt= target attribute, as per <xref section="2.2" sectionFormat="of" target="I-D.ietf-cbor-packed"/>.</t>
        <figure anchor="fig-packed-cbor-table-2">
          <name>Shared Item Table for Compacting Values of the rt= Target Attribute.</name>
          <artwork align="center"><![CDATA[
+-------+----------------------------------------------------+
| Index | Item                                               |
+-------+----------------------------------------------------+
| 416   | cri'http://www.iana.org/assignments/linkformat/rt/ |
|       |     core.osc.gm'                                   |
+-------+----------------------------------------------------+
| 417   | cri'http://www.iana.org/assignments/linkformat/rt/ |
|       |     oic.d.light'                                   |
+-------+----------------------------------------------------+
| 418   | cri'http://www.iana.org/assignments/linkformat/rt/ |
|       |     oic.r.time.period'                             |
+-------+----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="compacting-values-of-the-if-target-attribute-with-packed-cbor">
        <name>Compacting Values of the if= Target Attribute with Packed CBOR</name>
        <t>The following shared item table is used for compacting values of the if= target attribute, as per <xref section="2.2" sectionFormat="of" target="I-D.ietf-cbor-packed"/>.</t>
        <figure anchor="fig-packed-cbor-table-3">
          <name>Shared Item Table for Compacting Values of the if= Target Attribute.</name>
          <artwork align="center"><![CDATA[
+-------+----------------------------------------------------+
| Index | Item                                               |
+-------+----------------------------------------------------+
| 516   | cri'http://www.iana.org/assignments/linkformat/if/ |
|       |     ace.group'                                     |
+-------+----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowldegment">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Carsten Bormann"/>, <contact fullname="Klaus Hartke"/>, <contact fullname="Jaime Jiménez"/>, <contact fullname="Francesca Palombini"/>, <contact fullname="Dave Robin"/>, and <contact fullname="Jim Schaad"/> for their comments and feedback.</t>
      <t>The work on this document has been partly supported by the Sweden's Innovation Agency VINNOVA and the Celtic-Next projects CRITISEC and CYPRESS; by the H2020 project SIFIS-Home (Grant agreement 952652); and by the EIT-Digital High Impact Initiative ACTIVE.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
