summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9393.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc9393.txt')
-rw-r--r--doc/rfc/rfc9393.txt3460
1 files changed, 3460 insertions, 0 deletions
diff --git a/doc/rfc/rfc9393.txt b/doc/rfc/rfc9393.txt
new file mode 100644
index 0000000..cf0ffa2
--- /dev/null
+++ b/doc/rfc/rfc9393.txt
@@ -0,0 +1,3460 @@
+
+
+
+
+Internet Engineering Task Force (IETF) H. Birkholz
+Request for Comments: 9393 Fraunhofer SIT
+Category: Standards Track J. Fitzgerald-McKay
+ISSN: 2070-1721 National Security Agency
+ C. Schmidt
+ The MITRE Corporation
+ D. Waltermire
+ NIST
+ June 2023
+
+
+ Concise Software Identification Tags
+
+Abstract
+
+ ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an
+ extensible XML-based structure to identify and describe individual
+ software components, patches, and installation bundles. SWID tag
+ representations can be too large for devices with network and storage
+ constraints. This document defines a concise representation of SWID
+ tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics
+ and features that are similar to those for SWID tags, as well as new
+ semantics that allow CoSWIDs to describe additional types of
+ information, all in a more memory-efficient format.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9393.
+
+Copyright Notice
+
+ Copyright (c) 2023 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Revised BSD License text as described in Section 4.e of the
+ Trust Legal Provisions and are provided without warranty as described
+ in the Revised BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 1.1. The SWID and CoSWID Tag Lifecycle
+ 1.2. Concise SWID Format
+ 1.3. Requirements Notation
+ 2. Concise SWID Data Definition
+ 2.1. Character Encoding
+ 2.2. Concise SWID Extensions
+ 2.3. The concise-swid-tag Map
+ 2.4. concise-swid-tag Co-constraints
+ 2.5. The global-attributes Group
+ 2.6. The entity-entry Map
+ 2.7. The link-entry Map
+ 2.8. The software-meta-entry Map
+ 2.9. The Resource Collection Definition
+ 2.9.1. The hash-entry Array
+ 2.9.2. The resource-collection Group
+ 2.9.3. The payload-entry Map
+ 2.9.4. The evidence-entry Map
+ 2.10. Full CDDL Specification
+ 3. Determining the Type of CoSWID
+ 4. CoSWID Indexed Label Values
+ 4.1. Version Scheme
+ 4.2. Entity Role Values
+ 4.3. Link Ownership Values
+ 4.4. Link Rel Values
+ 4.5. Link Use Values
+ 5. "swid" and "swidpath" Expressions
+ 5.1. "swid" Expressions
+ 5.2. "swidpath" Expressions
+ 6. IANA Considerations
+ 6.1. CoSWID Items Registry
+ 6.2. Registries for Software ID Values
+ 6.2.1. Registration Procedures
+ 6.2.2. Private Use of Index and Name Values
+ 6.2.3. Expert Review Criteria
+ 6.2.4. Software ID Version Scheme Values Registry
+ 6.2.5. Software ID Entity Role Values Registry
+ 6.2.6. Software ID Link Ownership Values Registry
+ 6.2.7. Software ID Link Relationship Values Registry
+ 6.2.8. Software ID Link Use Values Registry
+ 6.3. swid+cbor Media Type Registration
+ 6.4. CoAP Content-Format Registration
+ 6.5. CBOR Tag Registration
+ 6.6. URI Scheme Registrations
+ 6.6.1. URI Scheme "swid"
+ 6.6.2. URI Scheme "swidpath"
+ 6.7. CoSWID Model for Use in SWIMA Registration
+ 7. Signed CoSWID Tags
+ 8. CBOR-Tagged CoSWID Tags
+ 9. Security Considerations
+ 10. Privacy Considerations
+ 11. References
+ 11.1. Normative References
+ 11.2. Informative References
+ Acknowledgments
+ Contributors
+ Authors' Addresses
+
+1. Introduction
+
+ SWID tags, as defined in ISO-19770-2:2015 [SWID], provide a
+ standardized XML-based record format that identifies and describes a
+ specific release of software, a patch, or an installation bundle,
+ which are referred to as software components in this document.
+ Different software components, and even different releases of a
+ particular software component, each have a different SWID tag record
+ associated with them. SWID tags are meant to be flexible and able to
+ express a broad set of metadata about a software component.
+
+ SWID tags are used to support a number of processes, including but
+ not limited to:
+
+ * Software Inventory Management, representing a part of a Software
+ Asset Management process [SAM], which requires an accurate list of
+ discernible deployed software components.
+
+ * Vulnerability Assessment, which requires a semantic link between
+ standardized vulnerability descriptions and software components
+ installed on IT assets [X.1520].
+
+ * Remote Attestation, which requires a link between Reference
+ Integrity Manifests (RIMs) and Attester-produced event logs that
+ complement attestation evidence [RFC9334].
+
+ While there are very few required fields in SWID tags, there are many
+ optional fields that support different uses. A SWID tag consisting
+ of only required fields might be a few hundred bytes in size;
+ however, a tag containing many of the optional fields can be many
+ orders of magnitude larger. Thus, real-world instances of SWID tags
+ can be fairly large, and the communication of SWID tags in usage
+ scenarios, such as those described earlier, can cause a large amount
+ of data to be transported. This can be larger than acceptable for
+ constrained devices and networks. Concise SWID (CoSWID) tags
+ significantly reduce the amount of data transported as compared to a
+ typical SWID tag through the use of the Concise Binary Object
+ Representation (CBOR) [RFC8949].
+
+ Size comparisons between XML SWID and CoSWID mainly depend on domain-
+ specific applications and the complexity of attributes used in
+ instances. While the values stored in CoSWID are often unchanged and
+ therefore not reduced in size compared to an XML SWID, the
+ scaffolding that the CoSWID encoding represents is significantly
+ smaller by taking up 10 percent or less in size. This effect is
+ visible in representation sizes, which in early experiments benefited
+ from a 50 percent to 85 percent reduction in generic usage scenarios.
+ Additional size reduction is enabled with respect to the memory
+ footprint of XML parsing/validation.
+
+ In a CoSWID, the human-readable labels of SWID data items are
+ replaced with more concise integer labels (indices). This approach
+ allows SWID and CoSWID to share a common implicit information model,
+ with CoSWID providing an alternate data model [RFC3444]. While SWID
+ and CoSWID are intended to share the same implicit information model,
+ this specification does not define this information model or a
+ mapping between the two data formats. While an attempt to align SWID
+ and CoSWID tags has been made here, future revisions of ISO/IEC
+ 19770-2:2015 or this specification might cause this implicit
+ information model to diverge, since these specifications are
+ maintained by different standards groups.
+
+ The use of CBOR to express SWID information in CoSWID tags allows
+ both CoSWID and SWID tags to be part of an enterprise security
+ solution for a wider range of endpoints and environments.
+
+1.1. The SWID and CoSWID Tag Lifecycle
+
+ In addition to defining the format of a SWID tag record, ISO/IEC
+ 19770-2:2015 defines requirements concerning the SWID tag lifecycle.
+ Specifically, when a software component is installed on an endpoint,
+ that software component's SWID tag is also installed. Likewise, when
+ the software component is uninstalled or replaced, the SWID tag is
+ deleted or replaced, as appropriate. As a result, ISO/IEC
+ 19770-2:2015 describes a system wherein there is a correspondence
+ between the set of installed software components on an endpoint and
+ the presence of the corresponding SWID tags for these components on
+ that endpoint. CoSWIDs share the same lifecycle requirements as a
+ SWID tag.
+
+ The SWID specification and supporting guidance provided in NIST
+ Internal Report (NISTIR) 8060 ("Guidelines for the Creation of
+ Interoperable Software Identification (SWID) Tags") [SWID-GUIDANCE]
+ define four types of SWID tags: primary, patch, corpus, and
+ supplemental. The following text is paraphrased from these sources.
+
+ Primary Tag: A SWID or CoSWID tag that identifies and describes an
+ installed software component on an endpoint. A primary tag is
+ intended to be installed on an endpoint along with the
+ corresponding software component.
+
+ Patch Tag: A SWID or CoSWID tag that identifies and describes an
+ installed patch that has made incremental changes to a software
+ component installed on an endpoint. A patch tag is intended to be
+ installed on an endpoint along with the corresponding software
+ component patch.
+
+ Corpus Tag: A SWID or CoSWID tag that identifies and describes an
+ installable software component in its pre-installation state. A
+ corpus tag can be used to represent metadata about an installation
+ package or installer for a software component, a software update,
+ or a patch.
+
+ Supplemental Tag: A SWID or CoSWID tag that allows additional
+ information to be associated with a referenced SWID tag. This
+ allows tools and users to record their own metadata about a
+ software component without modifying CoSWID primary or patch tags
+ created by a software provider.
+
+ The type of a tag is determined by specific data elements, which are
+ discussed in Section 3. Section 3 also provides normative language
+ for CoSWID semantics that implement this lifecycle. The following
+ information helps to explain how these semantics apply to the use of
+ a CoSWID tag.
+
+ Corpus, primary, and patch tags have similar functions in that they
+ describe the existence and/or presence of different types of software
+ components (e.g., software installers, software installations,
+ software patches) and, potentially, different states of these
+ software components. Supplemental tags have the same structure as
+ other tags but are used to provide information not contained in the
+ referenced corpus, primary, and patch tags. All four tag types come
+ into play at various points in the software lifecycle and support
+ software management processes that depend on the ability to
+ accurately determine where each software component is in its
+ lifecycle.
+
+ +------------+
+ v |
+ Software Software Software Software Software
+ Deployment -> Installation -> Patching -> Upgrading -> Removal
+
+ Corpus Primary Primary xPrimary xPrimary
+ Supplemental Supplemental Supplemental xSupplemental xSupplemental
+ Patch xPatch
+ Primary
+ Supplemental
+
+ Figure 1: Use of Tag Types in the Software Lifecycle
+
+ Figure 1 illustrates the steps in the software lifecycle and the
+ relationships among those lifecycle events supported by the four
+ types of SWID and CoSWID tags. A detailed description of the four
+ tag types is provided in Section 2.3. The figure identifies the
+ types of tags that are used in each lifecycle event.
+
+ There are many ways in which software tags might be managed for the
+ host the software is installed on. For example, software tags could
+ be made available on the host or to an external software manager when
+ storage is limited on the host.
+
+ In these cases, the host or external software manager is responsible
+ for management of the tags, including deployment and removal of the
+ tags as indicated by the above lifecycle. Tags are deployed, and
+ previously deployed tags are typically removed (indicated by an "x"
+ prefix) at each lifecycle stage as follows:
+
+ Software Deployment: Before the software component is installed
+ (i.e., pre-installation), and while the product is being
+ deployed, a corpus tag provides information about the
+ installation files and distribution media (e.g., CD/DVD,
+ distribution package).
+
+ Corpus tags are not actually deployed on the target system but are
+ intended to support deployment procedures and their dependencies at
+ install time, such as to verify the installation media.
+
+ Software Installation: A primary tag will be installed with the
+ software component (or subsequently created) to uniquely
+ identify and describe the software component. Supplemental
+ tags are created to augment primary tags with additional site-
+ specific or extended information. While not illustrated in the
+ figure, patch tags can also be installed during software
+ installation to provide information about software fixes
+ deployed along with the base software installation.
+
+ Software Patching: When a patch is applied to the software
+ component, a new patch tag is provided, supplying details about
+ the patch and its dependencies. While not illustrated in the
+ figure, a corpus tag can also provide information about the
+ patch installer and patching dependencies that need to be
+ installed before the patch.
+
+ Software Upgrading: As a software component is upgraded to a new
+ version, new primary and supplemental tags replace existing
+ tags, enabling timely and accurate tracking of updates to
+ software inventory. While not illustrated in the figure, a
+ corpus tag can also provide information about the upgrade
+ installer and dependencies that need to be installed before the
+ upgrade.
+
+ | Note: In the context of software tagging, software
+ | patching and updating differ in an important way. When
+ | installing a patch, a set of file modifications are made
+ | to pre-installed software; these modifications do not
+ | alter the version number or the descriptive metadata of
+ | an installed software component. An update can also make
+ | a set of file modifications; in that case, the version
+ | number or the descriptive metadata of an installed
+ | software component is changed.
+
+ Software Removal: Upon removal of the software component,
+ relevant SWID tags are removed. This removal event can trigger
+ timely updates to software inventory reflecting the removal of
+ the product and any associated patch or supplemental tags.
+
+ As illustrated in the figure, supplemental tags can be associated
+ with any corpus, primary, or patch tag to provide additional metadata
+ about an installer, installed software, or installed patch,
+ respectively.
+
+ Understanding the use of CoSWIDs in the software lifecycle provides a
+ basis for understanding the information provided in a CoSWID and the
+ associated semantics of this information. Each different SWID and
+ CoSWID tag type provides different sets of information. For example,
+ a "corpus tag" is used to describe a software component's
+ installation image on an installation medium, while a "patch tag" is
+ meant to describe a patch that modifies some other software
+ component.
+
+1.2. Concise SWID Format
+
+ This document defines the CoSWID tag format, which is based on CBOR.
+ CBOR-based CoSWID tags offer a more concise representation of SWID
+ information as compared to the XML-based SWID tag representation in
+ ISO-19770-2:2015. The structure of a CoSWID is described via the
+ Concise Data Definition Language (CDDL) [RFC8610]. The resulting
+ CoSWID data definition is aligned with the information able to be
+ expressed with the XML Schema definition of ISO-19770-2:2015 [SWID].
+ This alignment allows both SWID and CoSWID tags to represent a common
+ set of software component information and allows CoSWID tags to
+ support the same uses as a SWID tag.
+
+ The vocabulary (i.e., the CDDL names of the types and members used in
+ the CoSWID CDDL specification) is mapped to more concise labels
+ represented as small integer values (indices). The names used in the
+ CDDL specification and the mapping to the CBOR representation using
+ integer indices are based on the vocabulary of the XML attribute and
+ element names defined in ISO/IEC 19770-2:2015.
+
+1.3. Requirements Notation
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+2. Concise SWID Data Definition
+
+ The following describes the general rules and processes for encoding
+ data using CDDL representation. Prior familiarity with CBOR and CDDL
+ concepts will be helpful in understanding this CoSWID specification.
+
+ This section describes the conventions by which a CoSWID is
+ represented in the CDDL structure. The CamelCase notation
+ [CamelCase] used in the XML Schema definition is changed to a hyphen-
+ separated notation [KebabCase] (e.g., "ResourceCollection" is named
+ "resource-collection") in the CoSWID CDDL specification. This
+ deviation from the original notation used in the XML representation
+ reduces ambiguity when referencing certain attributes in
+ corresponding textual descriptions. An attribute referred to by its
+ name in CamelCase notation explicitly relates to XML SWID tags; an
+ attribute referred to by its name in KebabCase notation explicitly
+ relates to CBOR CoSWID tags. This approach simplifies the
+ composition of further work that will reference both XML SWID and
+ CBOR CoSWID documents.
+
+ In most cases, mapping attribute names between SWID and CoSWID can be
+ done automatically by converting between CamelCase and KebabCase
+ attribute names. However, some CoSWID CDDL attribute names show
+ greater variation relative to their corresponding SWID XML Schema
+ attributes. This is done when the change improves clarity in the
+ CoSWID specification. For example, the "name" and "version" SWID
+ fields correspond to the "software-name" and "software-version"
+ CoSWID fields, respectively. As such, it is not always possible to
+ mechanically translate between corresponding attribute names in the
+ two formats. In such cases, a manual mapping will need to be used.
+ XPath expressions [W3C.REC-xpath20-20101214] need to use SWID names;
+ see Section 5.2.
+
+ The 57 human-readable text labels of the CDDL-based CoSWID vocabulary
+ are mapped to integer indices via a block of rules at the bottom of
+ the definition. This allows a more concise integer-based form to be
+ stored or transported, as compared to the less efficient text-based
+ form of the original vocabulary.
+
+ Through the use of CDDL-based integer labels, CoSWID allows for
+ future expansion in subsequent revisions of this specification and
+ through extensions (see Section 2.2). New constructs can be
+ associated with a new integer index. A deprecated construct can be
+ replaced by a new construct with a new integer index. An
+ implementation can use these integer indices to identify the
+ construct to parse. The "CoSWID Items" registry, defined in
+ Section 6.1, is used to ensure that new constructs are assigned a
+ unique index value. This approach avoids the need to have an
+ explicit CoSWID version.
+
+ In a number of places, the value encoding admits both integer values
+ and text strings. The integer values are defined in a registry
+ specific to the kind of value; the text values are not intended for
+ interchange and are exclusively meant for private use as defined in
+ Section 6.2.2. Encoders SHOULD NOT use string values based on the
+ names registered in the registry, as these values are less concise
+ than their index value equivalent; a decoder MUST, however, be
+ prepared to accept text strings that are not specified in this
+ document (and ignore the construct if a string is unknown). In the
+ rest of this document, we call this an "integer label with text
+ escape".
+
+ The root of the CDDL specification provided by this document is the
+ rule coswid (as defined in Section 8):
+
+ start = coswid
+
+ In CBOR, an array is encoded using bytes that identify the array, and
+ the array's length or stop point (see [RFC8949]). To make items that
+ support one or more values, the following CDDL notation is used.
+
+ _name_ = (_label_ => _data_ / [ 2* _data_ ])
+
+ The CDDL rule above allows either a single data item or an array of
+ two or more data values to be provided. When a singleton data value
+ is provided, the CBOR markers for the array, array length, and stop
+ point are not needed, saving bytes. When two or more data values are
+ provided, these values are encoded as an array. This modeling
+ pattern is used frequently in the CoSWID CDDL specification to allow
+ for more efficient encoding of singleton values.
+
+ Usage of this construct can be simplified using
+
+ one-or-more<T> = T / [ 2* T ]
+
+ simplifying the above example to
+
+ _name_ = (_label_ => one-or-more<_data_>)
+
+ The following subsections describe the different parts of the CoSWID
+ model.
+
+2.1. Character Encoding
+
+ The CDDL "text" type is represented in CBOR as a major type 3, which
+ represents a string of Unicode characters that are encoded as UTF-8
+ [RFC3629] (see Section 3.1 of [RFC8949]). Thus, both SWID and CoSWID
+ use UTF-8 for the encoding of characters in text strings.
+
+ To ensure that UTF-8 character strings are able to be encoded/decoded
+ and exchanged interoperably, text strings in CoSWID MUST be encoded
+ in a way that is consistent with the Net-Unicode definition provided
+ in [RFC5198].
+
+ All names registered with IANA according to the requirements in
+ Section 6.2 also MUST be valid according to the XML Schema NMTOKEN
+ data type (see [W3C.REC-xmlschema-2-20041028], Section 3.3.4) to
+ ensure compatibility with the SWID specification where these names
+ are used.
+
+2.2. Concise SWID Extensions
+
+ The CoSWID specification contains two features that are not included
+ in the SWID specification on which it is based. These features are:
+
+ * The explicit definition of types for some attributes in the ISO-
+ 19770-2:2015 XML representation that are typically represented by
+ the any-attribute item in the SWID model. These are covered in
+ Section 2.5.
+
+ * The inclusion of extension points in the CoSWID specification
+ using CDDL sockets (see Section 3.9 of [RFC8610]). The use of
+ CDDL sockets allows for well-formed extensions to be defined in
+ supplementary CDDL descriptions that support additional uses of
+ CoSWID tags that go beyond the original scope of ISO-19770-2:2015
+ tags.
+
+ The following CDDL sockets (extension points) are defined in this
+ document; they allow the addition of new information structures to
+ their respective CDDL groups.
+
+ +=====================+=================================+=========+
+ | Map Name | CDDL Socket | Defined |
+ | | | in |
+ +=====================+=================================+=========+
+ | concise-swid-tag | $$coswid-extension | Section |
+ | | | 2.3 |
+ +---------------------+---------------------------------+---------+
+ | entity-entry | $$entity-extension | Section |
+ | | | 2.6 |
+ +---------------------+---------------------------------+---------+
+ | link-entry | $$link-extension | Section |
+ | | | 2.7 |
+ +---------------------+---------------------------------+---------+
+ | software-meta-entry | $$software-meta-extension | Section |
+ | | | 2.8 |
+ +---------------------+---------------------------------+---------+
+ | resource-collection | $$resource-collection-extension | Section |
+ | | | 2.9.2 |
+ +---------------------+---------------------------------+---------+
+ | file-entry | $$file-extension | Section |
+ | | | 2.9.2 |
+ +---------------------+---------------------------------+---------+
+ | directory-entry | $$directory-extension | Section |
+ | | | 2.9.2 |
+ +---------------------+---------------------------------+---------+
+ | process-entry | $$process-extension | Section |
+ | | | 2.9.2 |
+ +---------------------+---------------------------------+---------+
+ | resource-entry | $$resource-extension | Section |
+ | | | 2.9.2 |
+ +---------------------+---------------------------------+---------+
+ | payload-entry | $$payload-extension | Section |
+ | | | 2.9.3 |
+ +---------------------+---------------------------------+---------+
+ | evidence-entry | $$evidence-extension | Section |
+ | | | 2.9.4 |
+ +---------------------+---------------------------------+---------+
+
+ Table 1: CoSWID CDDL Group Extension Points
+
+ The "CoSWID Items" registry, defined in Section 6.1, provides a
+ registration mechanism allowing new items, and their associated index
+ values, to be added to the CoSWID model through the use of the CDDL
+ sockets described in the table above. This registration mechanism
+ provides for well-known index values for data items in CoSWID
+ extensions, allowing these index values to be recognized by
+ implementations supporting a given extension.
+
+ The following additional CDDL sockets are defined in this document to
+ allow for adding new values to corresponding type choices (i.e., to
+ represent enumerations) via custom CDDL specifications.
+
+ +==================+=================+=============+
+ | Enumeration Name | CDDL Socket | Defined in |
+ +==================+=================+=============+
+ | version-scheme | $version-scheme | Section 4.1 |
+ +------------------+-----------------+-------------+
+ | role | $role | Section 4.2 |
+ +------------------+-----------------+-------------+
+ | ownership | $ownership | Section 4.3 |
+ +------------------+-----------------+-------------+
+ | rel | $rel | Section 4.4 |
+ +------------------+-----------------+-------------+
+ | use | $use | Section 4.5 |
+ +------------------+-----------------+-------------+
+
+ Table 2: CoSWID CDDL Enumeration Extension Points
+
+ A number of IANA registries for CoSWID values are also defined in
+ Section 6.2; these registries allow new values to be registered with
+ IANA for the enumerations above. This registration mechanism
+ supports the definition of new well-known index values and names for
+ new enumeration values used by CoSWID, which can also be used by
+ other software tagging specifications. This registration mechanism
+ allows new standardized enumerated values to be shared between
+ multiple tagging specifications (and associated implementations) over
+ time.
+
+2.3. The concise-swid-tag Map
+
+ The CDDL specification for the root concise-swid-tag map is as
+ follows. This rule and its constraints MUST be followed when
+ creating or validating a CoSWID tag:
+
+ concise-swid-tag = {
+ tag-id => text / bstr .size 16,
+ tag-version => integer,
+ ? corpus => bool,
+ ? patch => bool,
+ ? supplemental => bool,
+ software-name => text,
+ ? software-version => text,
+ ? version-scheme => $version-scheme,
+ ? media => text,
+ ? software-meta => one-or-more<software-meta-entry>,
+ entity => one-or-more<entity-entry>,
+ ? link => one-or-more<link-entry>,
+ ? payload-or-evidence,
+ * $$coswid-extension,
+ global-attributes,
+ }
+
+ payload-or-evidence //= ( payload => payload-entry )
+ payload-or-evidence //= ( evidence => evidence-entry )
+
+ tag-id = 0
+ software-name = 1
+ entity = 2
+ evidence = 3
+ link = 4
+ software-meta = 5
+ payload = 6
+ corpus = 8
+ patch = 9
+ media = 10
+ supplemental = 11
+ tag-version = 12
+ software-version = 13
+ version-scheme = 14
+
+ $version-scheme /= multipartnumeric
+ $version-scheme /= multipartnumeric-suffix
+ $version-scheme /= alphanumeric
+ $version-scheme /= decimal
+ $version-scheme /= semver
+ $version-scheme /= int / text
+ multipartnumeric = 1
+ multipartnumeric-suffix = 2
+ alphanumeric = 3
+ decimal = 4
+ semver = 16384
+
+ The following list describes each member of the concise-swid-tag root
+ map.
+
+ global-attributes: A list of items, including an optional language
+ definition to support the processing of text-string values and an
+ unbounded set of any-attribute items. Described in Section 2.5.
+
+ tag-id (index 0): A 16-byte binary string, or a textual identifier,
+ uniquely referencing a software component. The tag identifier
+ MUST be globally unique. Failure to ensure global uniqueness can
+ create ambiguity in tag use, since the tag-id serves as the global
+ key for matching and lookups. If represented as a 16-byte binary
+ string, the identifier MUST be a valid Universally Unique
+ Identifier (UUID) as defined by [RFC4122]. There are no strict
+ guidelines on how the identifier is structured, but examples
+ include a 16-byte Globally Unique Identifier (GUID) (e.g., class 4
+ UUID) [RFC4122], or a DNS domain name followed by a "/" and a text
+ string, where the domain name serves to ensure uniqueness across
+ organizations. A textual tag-id value MUST NOT contain a sequence
+ of two underscores ("__"). This is because a sequence of two
+ underscores is used to separate the TAG_CREATOR_REGID value and
+ UNIQUE_ID value in a Software Identifier and a sequence of two
+ underscores in a tag-id value could create ambiguity when parsing
+ this identifier. See Section 6.7.
+
+ software-name (index 1): A textual item that provides the software
+ component's name. This name is likely the same name that would
+ appear in a package management tool. This item maps to
+ '/SoftwareIdentity/@name' in [SWID].
+
+ entity (index 2): Provides information about one or more
+ organizations responsible for producing the CoSWID tag, and
+ producing or releasing the software component referenced by this
+ CoSWID tag. Described in Section 2.6.
+
+ evidence (index 3): Can be used to record the results of a software
+ discovery process used to identify untagged software on an
+ endpoint or to represent indicators for why software is believed
+ to be installed on the endpoint. In either case, a CoSWID tag can
+ be created by the tool performing an analysis of the software
+ components installed on the endpoint. This item is mutually
+ exclusive to payload, as evidence is always generated on the
+ target device ad hoc. Described in Section 2.9.4.
+
+ link (index 4): Provides a means to establish relationship arcs
+ between the tag and another item. A given link can be used to
+ establish the relationship between tags or to reference another
+ resource that is related to the CoSWID tag, e.g., vulnerability
+ database association, Resource-Oriented Lightweight Information
+ Exchange (ROLIE) Feed [RFC8322], Manufacturer Usage Description
+ (MUD) resource [RFC8520], software download location, etc.). This
+ is modeled after the HTML "link" element. Described in
+ Section 2.7.
+
+ software-meta (index 5): An open-ended map of key/value data pairs.
+ A number of predefined keys can be used within this item providing
+ for common usage and semantics across the industry. The use of
+ this map allows any additional attribute to be included in the
+ tag. It is expected that industry groups will use a common set of
+ attribute names to allow for interoperability within their
+ communities. Described in Section 2.8. This item maps to
+ '/SoftwareIdentity/Meta' in [SWID].
+
+ payload (index 6): Represents a collection of software artifacts
+ (described by child items) that compose the target software. For
+ example, these artifacts could be the files included with an
+ installer for a corpus tag or installed on an endpoint when the
+ software component is installed for a primary or patch tag. The
+ artifacts listed in a payload may be a superset of the software
+ artifacts that are actually installed. Based on user selections
+ at install time, an installation might not include every artifact
+ that could be created or executed on the endpoint when the
+ software component is installed or run. This item is mutually
+ exclusive to evidence, as payload can only be provided by an
+ external entity. Described in Section 2.9.3.
+
+ corpus (index 8): A boolean value that indicates if the tag
+ identifies and describes an installable software component in its
+ pre-installation state. Installable software includes an
+ installation package or installer for a software component, a
+ software update, or a patch. If the CoSWID tag represents
+ installable software, the corpus item MUST be set to "true". If
+ not provided, the default value MUST be considered "false".
+
+ patch (index 9): A boolean value that indicates if the tag
+ identifies and describes an installed patch that has made
+ incremental changes to a software component installed on an
+ endpoint. If a CoSWID tag is for a patch, the patch item MUST be
+ set to "true". If not provided, the default value MUST be
+ considered "false". A patch item's value MUST NOT be set to
+ "true" if the installation of the associated software package
+ changes the version of a software component.
+
+ media (index 10): A text value that provides a hint to the tag
+ consumer to understand what target platform this tag applies to.
+ This item MUST be formatted as a query as defined by the W3C
+ "Media Queries Level 3" Recommendation (see
+ [W3C.REC-mediaqueries-3-20220405]). Support for media queries is
+ included here for interoperability with [SWID], which does not
+ provide any further requirements for media query use. Thus, this
+ specification does not clarify how a media query is to be used for
+ a CoSWID.
+
+ supplemental (index 11): A boolean value that indicates if the tag
+ is providing additional information to be associated with another
+ referenced SWID or CoSWID tag. This allows tools and users to
+ record their own metadata about a software component without
+ modifying SWID primary or patch tags created by a software
+ provider. If a CoSWID tag is a supplemental tag, the supplemental
+ item MUST be set to "true". If not provided, the default value
+ MUST be considered "false".
+
+ tag-version (index 12): An integer value that indicates the specific
+ release revision of the tag. Typically, the initial value of this
+ field is set to 0 and the value is increased for subsequent tags
+ produced for the same software component release. This value
+ allows a CoSWID tag producer to correct an incorrect tag
+ previously released without indicating a change to the underlying
+ software component the tag represents. For example, the tag-
+ version could be changed to add new metadata, to correct a broken
+ link, to add a missing payload entry, etc. When producing a
+ revised tag, the new tag-version value MUST be greater than the
+ old tag-version value.
+
+ software-version (index 13): A textual value representing the
+ specific release or development version of the software component.
+ This item maps to '/SoftwareIdentity/@version' in [SWID].
+
+ version-scheme (index 14): An integer or textual value representing
+ the versioning scheme used for the software-version item, as an
+ integer label with text escape. For the "Version Scheme" values,
+ see Section 4.1. If an integer value is used, it MUST be an index
+ value in the range -256 to 65535. Integer values in the range
+ -256 to -1 are reserved for testing and use in closed environments
+ (see Section 6.2.2). Integer values in the range 0 to 65535
+ correspond to registered entries in the IANA "Software ID Version
+ Scheme Values" registry (see Section 6.2.4).
+
+ $$coswid-extension: A CDDL socket that is used to add new
+ information structures to the concise-swid-tag root map. See
+ Section 2.2.
+
+2.4. concise-swid-tag Co-constraints
+
+ The following co-constraints apply to the information provided in the
+ concise-swid-tag group.
+
+ * The patch and supplemental items MUST NOT both be set to "true".
+
+ * If the patch item is set to "true", the tag MUST contain at least
+ one link item (see Section 2.7) with both the rel item value of
+ "patches" and an href item specifying an association with the
+ software that was patched. Without at least one link item, the
+ target of the patch cannot be identified and the patch tag cannot
+ be applied without external context.
+
+ * If all of the corpus, patch, and supplemental items are "false" or
+ if the corpus item is set to "true", then a software-version item
+ MUST be included with a value set to the version of the software
+ component.
+
+2.5. The global-attributes Group
+
+ The global-attributes group provides a list of items, including an
+ optional language definition to support the processing of text-string
+ values, and an unbounded set of any-attribute items allowing for
+ additional items to be provided as a general point of extension in
+ the model.
+
+ The CDDL for the global-attributes group follows:
+
+ global-attributes = (
+ ? lang => text,
+ * any-attribute,
+ )
+
+ any-attribute = (
+ label => one-or-more<text> / one-or-more<int>
+ )
+
+ label = text / int
+
+ The following list describes each child item of this group.
+
+ lang (index 15): A textual language tag that conforms with the IANA
+ "Language Subtag Registry" [RFC5646]. The context of the
+ specified language applies to all sibling and descendant textual
+ values, unless a descendant object has defined a different
+ language tag. Thus, a new context is established when a
+ descendant object redefines a new language tag. All textual
+ values within a given context MUST be considered expressed in the
+ specified language.
+
+ any-attribute: A sub-group that provides a means to include
+ arbitrary information via label/index ("key") value pairs. Labels
+ can be either a single integer or text string. Values can be a
+ single integer, a text string, or an array of integers or text
+ strings.
+
+2.6. The entity-entry Map
+
+ The CDDL for the entity-entry map follows:
+
+ entity-entry = {
+ entity-name => text,
+ ? reg-id => any-uri,
+ role => one-or-more<$role>,
+ ? thumbprint => hash-entry,
+ * $$entity-extension,
+ global-attributes,
+ }
+
+ entity-name = 31
+ reg-id = 32
+ role = 33
+ thumbprint = 34
+
+ $role /= tag-creator
+ $role /= software-creator
+ $role /= aggregator
+ $role /= distributor
+ $role /= licensor
+ $role /= maintainer
+ $role /= int / text
+ tag-creator=1
+ software-creator=2
+ aggregator=3
+ distributor=4
+ licensor=5
+ maintainer=6
+
+ The following list describes each child item of this group.
+
+ global-attributes: The global-attributes group as described in
+ Section 2.5.
+
+ entity-name (index 31): The textual name of the organizational
+ entity claiming the roles specified by the role item for the
+ CoSWID tag. This item maps to '/SoftwareIdentity/Entity/@name' in
+ [SWID].
+
+ reg-id (index 32): Registration ID. This value is intended to
+ uniquely identify a naming authority in a given scope (e.g.,
+ global, organization, vendor, customer, administrative domain,
+ etc.) for the referenced entity. The value of a registration ID
+ MUST be a URI as defined in [RFC3986]; it is not intended to be
+ dereferenced. The scope will usually be the scope of an
+ organization.
+
+ role (index 33): An integer or textual value (integer label with
+ text escape; see Section 2) representing the relationship(s)
+ between the entity and this tag or the referenced software
+ component. If an integer value is used, it MUST be an index value
+ in the range -256 to 255. Integer values in the range -256 to -1
+ are reserved for testing and use in closed environments (see
+ Section 6.2.2). Integer values in the range 0 to 255 correspond
+ to registered entries in the IANA "Software ID Entity Role Values"
+ registry (see Section 6.2.5).
+
+ The following additional requirements exist for the use of the
+ role item:
+
+ * An entity item MUST be provided with the role of "tag-creator"
+ for every CoSWID tag. This indicates the organization that
+ created the CoSWID tag.
+
+ * An entity item SHOULD be provided with the role of "software-
+ creator" for every CoSWID tag, if this information is known to
+ the tag creator. This indicates the organization that created
+ the referenced software component.
+
+ thumbprint (index 34): Value that provides a hash (i.e., the
+ thumbprint) of the signing entity's public key certificate. This
+ item provides an indicator of which entity signed the CoSWID tag,
+ which will typically be the tag creator. See Section 2.9.1 for
+ more details on the use of the hash-entry data structure.
+
+ $$entity-extension: A CDDL socket that can be used to extend the
+ entity-entry group model. See Section 2.2.
+
+2.7. The link-entry Map
+
+ The CDDL for the link-entry map follows:
+
+ link-entry = {
+ ? artifact => text,
+ href => any-uri,
+ ? media => text,
+ ? ownership => $ownership,
+ rel => $rel,
+ ? media-type => text,
+ ? use => $use,
+ * $$link-extension,
+ global-attributes,
+ }
+
+ media = 10
+ artifact = 37
+ href = 38
+ ownership = 39
+ rel = 40
+ media-type = 41
+ use = 42
+
+ $ownership /= shared
+ $ownership /= private
+ $ownership /= abandon
+ $ownership /= int / text
+ abandon=1
+ private=2
+ shared=3
+
+ $rel /= ancestor
+ $rel /= component
+ $rel /= feature
+ $rel /= installationmedia
+ $rel /= packageinstaller
+ $rel /= parent
+ $rel /= patches
+ $rel /= requires
+ $rel /= see-also
+ $rel /= supersedes
+ $rel /= supplemental
+ $rel /= -256..65536 / text
+ ancestor=1
+ component=2
+ feature=3
+ installationmedia=4
+ packageinstaller=5
+ parent=6
+ patches=7
+ requires=8
+ see-also=9
+ supersedes=10
+ supplemental=11
+
+ $use /= optional
+ $use /= required
+ $use /= recommended
+ $use /= int / text
+ optional=1
+ required=2
+ recommended=3
+
+ The following list describes each member of this map.
+
+ global-attributes: The global-attributes group as described in
+ Section 2.5.
+
+ media (index 10): A value that provides a hint to the consumer of
+ the link so that the consumer understands what target platform the
+ link is applicable to. This item represents a query as defined by
+ the W3C "Media Queries Level 3" Recommendation (see
+ [W3C.REC-mediaqueries-3-20220405]). As highlighted in the
+ definition of the media item provided in Section 2.3, support for
+ media queries is included here for interoperability with [SWID],
+ which does not provide any further requirements for media query
+ use. Thus, this specification does not clarify how a media query
+ is to be used for a CoSWID.
+
+ artifact (index 37): To be used with rel="installationmedia". This
+ item's value provides the absolute filesystem path to the
+ installer executable or script that can be run to launch the
+ referenced installation. Links with the same artifact name MUST
+ be considered mirrors of each other, allowing the installation
+ media to be acquired from any of the described sources.
+
+ href (index 38): A URI-reference [RFC3986] for the referenced
+ resource. The href item's value can be, but is not limited to,
+ the following (which is a slightly modified excerpt from [SWID]):
+
+ * If no URI scheme is provided, then the URI-reference is a
+ relative reference to the base URI of the CoSWID tag, i.e., the
+ URI under which the CoSWID tag was provided -- for example,
+ "./folder/supplemental.coswid".
+
+ * This item can be a physical resource location with any
+ acceptable URI scheme (e.g., <file://>, <http://>, <https://>,
+ <ftp://>).
+
+ * A URI-like expression with "swid:" as the scheme refers to
+ another SWID or CoSWID by the referenced tag's tag-id. This
+ expression needs to be resolved in the context of the endpoint
+ by software that can look up other SWID or CoSWID tags. For
+ example, "swid:2df9de35-0aff-4a86-ace6-f7dddd1ade4c" references
+ the tag with the tag-id value "2df9de35-0aff-
+ 4a86-ace6-f7dddd1ade4c". See Section 5.1 for guidance on the
+ "swid" expressions.
+
+ * This item can be a URI-like expression with "swidpath:" as the
+ scheme, which refers to another software tag via an XPath query
+ [W3C.REC-xpath20-20101214] that matches items in that tag
+ (Section 5.2). This scheme is provided for compatibility with
+ [SWID]. This specification does not define how to resolve an
+ XPath query in the context of CBOR. See Section 5.2 for
+ guidance on the "swidpath" expressions.
+
+ ownership (index 39): An integer or textual value (integer label
+ with text escape; see Section 2). See Section 4.3 for the list of
+ values available for this item. This item is used when the href
+ item references another software component to indicate the degree
+ of ownership between the software component referenced by the
+ CoSWID tag and the software component referenced by the link. If
+ an integer value is used, it MUST be an index value in the range
+ -256 to 255. Integer values in the range -256 to -1 are reserved
+ for testing and use in closed environments (see Section 6.2.2).
+ Integer values in the range 0 to 255 correspond to registered
+ entries in the "Software ID Link Ownership Values" registry.
+
+ rel (index 40): An integer or textual value (integer label with text
+ escape; see Section 2). See Section 4.4 for the list of values
+ available for this item. This item identifies the relationship
+ between this CoSWID and the target resource identified by the href
+ item. If an integer value is used, it MUST be an index value in
+ the range -256 to 65535. Integer values in the range -256 to -1
+ are reserved for testing and use in closed environments (see
+ Section 6.2.2). Integer values in the range 0 to 65535 correspond
+ to registered entries in the IANA "Software ID Link Relationship
+ Values" registry (see Section 6.2.7). If a string value is used,
+ it MUST be either a private use name as defined in Section 6.2.2
+ or a "Relation Name" from the IANA "Link Relation Types" registry
+ (see <https://www.iana.org/assignments/link-relations/>) as
+ defined by [RFC8288]. When a string value defined in the IANA
+ "Software ID Link Relationship Values" registry matches a Relation
+ Name defined in the IANA "Link Relation Types" registry, the index
+ value in the IANA "Software ID Link Relationship Values" registry
+ MUST be used instead, as this relationship has a specialized
+ meaning in the context of a CoSWID tag. String values correspond
+ to registered entries in the "Software ID Link Relationship
+ Values" registry.
+
+ media-type (index 41): Supplies the resource consumer with a hint
+ regarding what type of resource to expect. A link can point to
+ arbitrary resources on the endpoint, local network, or Internet
+ using the href item. (This is a _hint_: there is no obligation
+ for the server hosting the target of the URI to use the indicated
+ media type when the URI is dereferenced.) Media types are
+ identified by referencing a "Name" from the IANA "Media Types"
+ registry (see <https://www.iana.org/assignments/media-types/>).
+ This item maps to '/SoftwareIdentity/Link/@type' in [SWID].
+
+ use (index 42): An integer or textual value (integer label with text
+ escape; see Section 2). See Section 4.5 for the list of values
+ available for this item. This item is used to determine if the
+ referenced software component has to be installed before
+ installing the software component identified by the CoSWID tag.
+ If an integer value is used, it MUST be an index value in the
+ range -256 to 255. Integer values in the range -256 to -1 are
+ reserved for testing and use in closed environments (see
+ Section 6.2.2). Integer values in the range 0 to 255 correspond
+ to registered entries in the IANA "Software ID Link Use Values"
+ registry (see Section 6.2.8). If a string value is used, it MUST
+ be a private use name as defined in Section 6.2.2. String values
+ correspond to registered entries in the "Software ID Link Use
+ Values" registry.
+
+ $$link-extension: A CDDL socket that can be used to extend the link-
+ entry map model. See Section 2.2.
+
+2.8. The software-meta-entry Map
+
+ The CDDL for the software-meta-entry map follows:
+
+ software-meta-entry = {
+ ? activation-status => text,
+ ? channel-type => text,
+ ? colloquial-version => text,
+ ? description => text,
+ ? edition => text,
+ ? entitlement-data-required => bool,
+ ? entitlement-key => text,
+ ? generator => text / bstr .size 16,
+ ? persistent-id => text,
+ ? product => text,
+ ? product-family => text,
+ ? revision => text,
+ ? summary => text,
+ ? unspsc-code => text,
+ ? unspsc-version => text,
+ * $$software-meta-extension,
+ global-attributes,
+ }
+
+ activation-status = 43
+ channel-type = 44
+ colloquial-version = 45
+ description = 46
+ edition = 47
+ entitlement-data-required = 48
+ entitlement-key = 49
+ generator = 50
+ persistent-id = 51
+ product = 52
+ product-family = 53
+ revision = 54
+ summary = 55
+ unspsc-code = 56
+ unspsc-version = 57
+
+ The following list describes each child item of this group.
+
+ global-attributes: The global-attributes group as described in
+ Section 2.5.
+
+ activation-status (index 43): A textual value that identifies how
+ the software component has been activated, which might relate to
+ specific terms and conditions for its use (e.g., trial,
+ serialized, licensed, unlicensed, etc.) and relate to an
+ entitlement. This attribute is typically used in supplemental
+ tags, as it contains information that might be selected during a
+ specific install.
+
+ channel-type (index 44): A textual value that identifies which
+ sales, licensing, or marketing channel the software component has
+ been targeted for (e.g., volume, retail, original equipment
+ manufacturer (OEM), academic, etc.). This attribute is typically
+ used in supplemental tags, as it contains information that might
+ be selected during a specific install.
+
+ colloquial-version (index 45): A textual value for the software
+ component's informal or colloquial version. Examples may include
+ a year value, a major version number, or a similar value used to
+ identify a group of specific software component releases that are
+ part of the same release/support cycle. This version can be the
+ same through multiple releases of a software component, while the
+ software-version specified in the concise-swid-tag group is much
+ more specific and will change for each software component release.
+ This version is intended to be used for string comparison (byte by
+ byte) only and is not intended to be used to determine if a
+ specific value is earlier or later in a sequence.
+
+ description (index 46): A textual value that provides a detailed
+ description of the software component. This value MAY be multiple
+ paragraphs separated by CR LF characters as described by
+ [RFC5198].
+
+ edition (index 47): A textual value indicating that the software
+ component represents a functional variation of the code base used
+ to support multiple software components. For example, this item
+ can be used to differentiate enterprise, standard, or professional
+ variants of a software component.
+
+ entitlement-data-required (index 48): A boolean value that can be
+ used to determine if accompanying proof of entitlement is needed
+ when a software license reconciliation process is performed.
+
+ entitlement-key (index 49): A vendor-specific textual key that can
+ be used to identify and establish a relationship to an
+ entitlement. Examples of an entitlement-key might include a
+ serial number, product key, or license key. For values that
+ relate to a given software component install (e.g., license key),
+ a supplemental tag will typically contain this information. In
+ other cases, where a general-purpose key can be provided that
+ applies to all possible installs of the software component on
+ different endpoints, a primary tag will typically contain this
+ information. Since CoSWID tags are not intended to contain
+ confidential information, tag authors are advised not to record
+ unprotected, private software license keys in this field.
+
+ generator (index 50): The name (or tag-id) of the software component
+ that created the CoSWID tag. If the generating software component
+ has a SWID or CoSWID tag, then the tag-id for the generating
+ software component SHOULD be provided.
+
+ persistent-id (index 51): A globally unique identifier used to
+ identify a set of software components that are related. Software
+ components sharing the same persistent-id can be different
+ versions. This item can be used to relate software components,
+ released at different points in time or through different release
+ channels, that may not be able to be related through the use of
+ the link item.
+
+ product (index 52): A basic name for the software component that can
+ be common across multiple tagged software components (e.g., Apache
+ HTTP daemon (HTTPD)).
+
+ product-family (index 53): A textual value indicating the software
+ components' overall product family. This should be used when
+ multiple related software components form a larger capability that
+ is installed on multiple different endpoints. For example, some
+ software families may consist of a server, a client, and shared
+ service components that are part of a larger capability. Email
+ systems, enterprise applications, backup services, web
+ conferencing, and similar capabilities are examples of families.
+ The use of this item is not intended to represent groups of
+ software that are bundled or installed together. The persistent-
+ id or link items SHOULD be used to relate bundled software
+ components.
+
+ revision (index 54): A string value indicating an informal or
+ colloquial release version of the software. This value can
+ provide a different version value as compared to the software-
+ version specified in the concise-swid-tag group. This is useful
+ when one or more releases need to have an informal version label
+ that differs from the specific exact version value specified by
+ software-version. Examples can include SP1, RC1, Beta, etc.
+
+ summary (index 55): A short description of the software component.
+ This MUST be a single sentence suitable for display in a user
+ interface.
+
+ unspsc-code (index 56): An 8-digit United Nations Standard Products
+ and Services Code (UNSPSC) classification code for the software
+ component as defined by the UNSPSC [UNSPSC].
+
+ unspsc-version (index 57): The UNSPSC version used to define the
+ unspsc-code value.
+
+ $$software-meta-extension: A CDDL socket that can be used to extend
+ the software-meta-entry group model. See Section 2.2.
+
+2.9. The Resource Collection Definition
+
+2.9.1. The hash-entry Array
+
+ CoSWID adds explicit support for the representation of hash entries
+ using algorithms that are registered in the IANA "Named Information
+ Hash Algorithm Registry" [IANA.named-information]. This array is
+ used by both the hash (index 7) and thumbprint (index 34) values.
+ This is the equivalent of the namespace qualified "hash" attribute in
+ [SWID].
+
+ hash-entry = [
+ hash-alg-id: int,
+ hash-value: bytes,
+ ]
+
+ The number used as a value for hash-alg-id is an integer-based hash
+ algorithm identifier whose value MUST refer to an ID in the IANA
+ "Named Information Hash Algorithm Registry" [IANA.named-information]
+ with a Status of "current" (at the time the generator software was
+ built or later); other hash algorithms MUST NOT be used. If the
+ hash-alg-id is not known, then the integer value "0" MUST be used.
+ This allows for conversion from ISO SWID tags [SWID], which do not
+ allow an algorithm to be identified for this field.
+
+ The hash-value MUST represent the raw hash value as a byte string (as
+ opposed to, for example, base64 encoded) generated from the
+ representation of the resource using the hash algorithm indicated by
+ hash-alg-id.
+
+2.9.2. The resource-collection Group
+
+ The resource-collection group provides a list of items used in both
+ evidence (created by a software discovery process) and payload
+ (installed in an endpoint) content of a CoSWID tag document to
+ structure and differentiate the content of specific CoSWID tag types.
+ Potential content includes directories, files, processes, or
+ resources.
+
+ The CDDL for the resource-collection group follows:
+
+ path-elements-group = ( ? directory => one-or-more<directory-entry>,
+ ? file => one-or-more<file-entry>,
+ )
+
+ resource-collection = (
+ path-elements-group,
+ ? process => one-or-more<process-entry>,
+ ? resource => one-or-more<resource-entry>,
+ * $$resource-collection-extension,
+ )
+
+ filesystem-item = (
+ ? key => bool,
+ ? location => text,
+ fs-name => text,
+ ? root => text,
+ )
+
+ file-entry = {
+ filesystem-item,
+ ? size => uint,
+ ? file-version => text,
+ ? hash => hash-entry,
+ * $$file-extension,
+ global-attributes,
+ }
+
+ directory-entry = {
+ filesystem-item,
+ ? path-elements => { path-elements-group },
+ * $$directory-extension,
+ global-attributes,
+ }
+
+ process-entry = {
+ process-name => text,
+ ? pid => integer,
+ * $$process-extension,
+ global-attributes,
+ }
+
+ resource-entry = {
+ type => text,
+ * $$resource-extension,
+ global-attributes,
+ }
+
+ hash = 7
+ directory = 16
+ file = 17
+ process = 18
+ resource = 19
+ size = 20
+ file-version = 21
+ key = 22
+ location = 23
+ fs-name = 24
+ root = 25
+ path-elements = 26
+ process-name = 27
+ pid = 28
+ type = 29
+
+ The following list describes each member of the groups and maps
+ illustrated above.
+
+ filesystem-item: A list of common items used for representing the
+ filesystem root, relative location, name, and significance of a
+ file or directory item.
+
+ global-attributes: The global-attributes group as described in
+ Section 2.5.
+
+ hash (index 7): Value that provides a hash of a file. This item
+ provides an integrity measurement with respect to a specific file.
+ See Section 2.9.1 for more details on the use of the hash-entry
+ data structure.
+
+ directory (index 16): Item that allows child directory and file
+ items to be defined within a directory hierarchy for the software
+ component.
+
+ file (index 17): Item that allows details about a file to be
+ provided for the software component.
+
+ process (index 18): Item that allows details to be provided about
+ the runtime behavior of the software component, such as
+ information that will appear in a process listing on an endpoint.
+
+ resource (index 19): Item that can be used to provide details about
+ an artifact or capability expected to be found on an endpoint or
+ evidence collected related to the software component. This can be
+ used to represent concepts not addressed directly by the
+ directory, file, or process items. Examples include registry
+ keys, bound ports, etc. The equivalent construct in [SWID] is
+ currently underspecified. As a result, this item might be further
+ defined through extensions in the future.
+
+ size (index 20): The file's size in bytes.
+
+ file-version (index 21): The file's version as reported by querying
+ information on the file from the operating system (if available).
+ This item maps to
+ '/SoftwareIdentity/(Payload|Evidence)/File/@version' in [SWID].
+
+ key (index 22): A boolean value indicating if a file or directory is
+ significant or required for the software component to execute or
+ function properly. These are files or directories that can be
+ used to affirmatively determine if the software component is
+ installed on an endpoint.
+
+ location (index 23): The filesystem path where a file is expected to
+ be located when installed or copied. The location MUST be either
+ an absolute path, a path relative to the path value included in
+ the parent directory item (preferred), or a path relative to the
+ location of the CoSWID tag if no parent is defined. The location
+ MUST NOT include a file's name, which is provided by the fs-name
+ item.
+
+ fs-name (index 24): The name of the directory or file without any
+ path information. This aligns with a file "name" in [SWID]. This
+ item maps to
+ '/SoftwareIdentity/(Payload|Evidence)/(File|Directory)/@name' in
+ [SWID].
+
+ root (index 25): A host-specific name for the root of the
+ filesystem. The location item is considered relative to this
+ location if specified. If not provided, the value provided by the
+ location item is expected to be relative to its parent or the
+ location of the CoSWID tag if no parent is provided.
+
+ path-elements (index 26): Group that allows a hierarchy of directory
+ and file items to be defined in payload or evidence items. This
+ is a construction within the CDDL definition of CoSWID to support
+ shared syntax and does not appear in [SWID].
+
+ process-name (index 27): The software component's process name as it
+ will appear in an endpoint's process list. This aligns with a
+ process "name" in [SWID]. This item maps to
+ '/SoftwareIdentity/(Payload|Evidence)/Process/@name' in [SWID].
+
+ pid (index 28): The process ID identified for a running instance of
+ the software component in the endpoint's process list. This is
+ used as part of the evidence item.
+
+ type (index 29): A human-readable string indicating the type of
+ resource.
+
+ $$resource-collection-extension: A CDDL socket that can be used to
+ extend the resource-collection group model. This can be used to
+ add new specialized types of resources. See Section 2.2.
+
+ $$file-extension: A CDDL socket that can be used to extend the file-
+ entry group model. See Section 2.2.
+
+ $$directory-extension: A CDDL socket that can be used to extend the
+ directory-entry group model. See Section 2.2.
+
+ $$process-extension: A CDDL socket that can be used to extend the
+ process-entry group model. See Section 2.2.
+
+ $$resource-extension: A CDDL socket that can be used to extend the
+ resource-entry group model. See Section 2.2.
+
+2.9.3. The payload-entry Map
+
+ The CDDL for the payload-entry map follows:
+
+ payload-entry = {
+ resource-collection,
+ * $$payload-extension,
+ global-attributes,
+ }
+
+ The following list describes each child item of this group.
+
+ global-attributes: The global-attributes group as described in
+ Section 2.5.
+
+ resource-collection: The resource-collection group as described in
+ Section 2.9.2.
+
+ $$payload-extension: A CDDL socket that can be used to extend the
+ payload-entry group model. See Section 2.2.
+
+2.9.4. The evidence-entry Map
+
+ The CDDL for the evidence-entry map follows:
+
+ evidence-entry = {
+ resource-collection,
+ ? date => integer-time,
+ ? device-id => text,
+ ? location => text,
+ * $$evidence-extension,
+ global-attributes,
+ }
+
+ date = 35
+ device-id = 36
+
+ The following list describes each child item of this group.
+
+ global-attributes: The global-attributes group as described in
+ Section 2.5.
+
+ resource-collection: The resource-collection group as described in
+ Section 2.9.2.
+
+ location (index 23): The filesystem path of the location of the
+ CoSWID tag generated as evidence. This path is always an absolute
+ file path (unlike the value of a location item found within a
+ filesystem-item as described in Section 2.9.2, which can be either
+ a relative path or an absolute path).
+
+ date (index 35): The date and time the information was collected
+ pertaining to the evidence item in epoch-based date/time format as
+ specified in Section 3.4.2 of [RFC8949].
+
+ device-id (index 36): The endpoint's string identifier from which
+ the evidence was collected.
+
+ $$evidence-extension: A CDDL socket that can be used to extend the
+ evidence-entry group model. See Section 2.2.
+
+2.10. Full CDDL Specification
+
+ In order to create a valid CoSWID document, the structure of the
+ corresponding CBOR message MUST adhere to the following CDDL
+ specification.
+
+ <CODE BEGINS> file "concise-swid-tag.cddl"
+ concise-swid-tag = {
+ tag-id => text / bstr .size 16,
+ tag-version => integer,
+ ? corpus => bool,
+ ? patch => bool,
+ ? supplemental => bool,
+ software-name => text,
+ ? software-version => text,
+ ? version-scheme => $version-scheme,
+ ? media => text,
+ ? software-meta => one-or-more<software-meta-entry>,
+ entity => one-or-more<entity-entry>,
+ ? link => one-or-more<link-entry>,
+ ? payload-or-evidence,
+ * $$coswid-extension,
+ global-attributes,
+ }
+
+ payload-or-evidence //= ( payload => payload-entry )
+ payload-or-evidence //= ( evidence => evidence-entry )
+
+ any-uri = uri
+ label = text / int
+
+ $version-scheme /= multipartnumeric
+ $version-scheme /= multipartnumeric-suffix
+ $version-scheme /= alphanumeric
+ $version-scheme /= decimal
+ $version-scheme /= semver
+ $version-scheme /= int / text
+
+ any-attribute = (
+ label => one-or-more<text> / one-or-more<int>
+ )
+
+ one-or-more<T> = T / [ 2* T ]
+
+ global-attributes = (
+ ? lang => text,
+ * any-attribute,
+ )
+
+ hash-entry = [
+ hash-alg-id: int,
+ hash-value: bytes,
+ ]
+
+ entity-entry = {
+ entity-name => text,
+ ? reg-id => any-uri,
+ role => one-or-more<$role>,
+ ? thumbprint => hash-entry,
+ * $$entity-extension,
+ global-attributes,
+ }
+
+ $role /= tag-creator
+ $role /= software-creator
+ $role /= aggregator
+ $role /= distributor
+ $role /= licensor
+ $role /= maintainer
+ $role /= int / text
+
+ link-entry = {
+ ? artifact => text,
+ href => any-uri,
+ ? media => text,
+ ? ownership => $ownership,
+ rel => $rel,
+ ? media-type => text,
+ ? use => $use,
+ * $$link-extension,
+ global-attributes,
+ }
+
+ $ownership /= shared
+ $ownership /= private
+ $ownership /= abandon
+ $ownership /= int / text
+
+ $rel /= ancestor
+ $rel /= component
+ $rel /= feature
+ $rel /= installationmedia
+ $rel /= packageinstaller
+ $rel /= parent
+ $rel /= patches
+ $rel /= requires
+ $rel /= see-also
+ $rel /= supersedes
+ $rel /= supplemental
+ $rel /= -256..65536 / text
+
+ $use /= optional
+ $use /= required
+ $use /= recommended
+ $use /= int / text
+
+ software-meta-entry = {
+ ? activation-status => text,
+ ? channel-type => text,
+ ? colloquial-version => text,
+ ? description => text,
+ ? edition => text,
+ ? entitlement-data-required => bool,
+ ? entitlement-key => text,
+ ? generator => text / bstr .size 16,
+ ? persistent-id => text,
+ ? product => text,
+ ? product-family => text,
+ ? revision => text,
+ ? summary => text,
+ ? unspsc-code => text,
+ ? unspsc-version => text,
+ * $$software-meta-extension,
+ global-attributes,
+ }
+
+ path-elements-group = ( ? directory => one-or-more<directory-entry>,
+ ? file => one-or-more<file-entry>,
+ )
+
+ resource-collection = (
+ path-elements-group,
+ ? process => one-or-more<process-entry>,
+ ? resource => one-or-more<resource-entry>,
+ * $$resource-collection-extension,
+ )
+
+ file-entry = {
+ filesystem-item,
+ ? size => uint,
+ ? file-version => text,
+ ? hash => hash-entry,
+ * $$file-extension,
+ global-attributes,
+ }
+
+ directory-entry = {
+ filesystem-item,
+ ? path-elements => { path-elements-group },
+ * $$directory-extension,
+ global-attributes,
+ }
+
+ process-entry = {
+ process-name => text,
+ ? pid => integer,
+ * $$process-extension,
+ global-attributes,
+ }
+
+ resource-entry = {
+ type => text,
+ * $$resource-extension,
+ global-attributes,
+ }
+
+ filesystem-item = (
+ ? key => bool,
+ ? location => text,
+ fs-name => text,
+ ? root => text,
+ )
+
+ payload-entry = {
+ resource-collection,
+ * $$payload-extension,
+ global-attributes,
+ }
+
+ evidence-entry = {
+ resource-collection,
+ ? date => integer-time,
+ ? device-id => text,
+ ? location => text,
+ * $$evidence-extension,
+ global-attributes,
+ }
+
+ integer-time = #6.1(int)
+
+ ; "global map member" integer indices
+ tag-id = 0
+ software-name = 1
+ entity = 2
+ evidence = 3
+ link = 4
+ software-meta = 5
+ payload = 6
+ hash = 7
+ corpus = 8
+ patch = 9
+ media = 10
+ supplemental = 11
+ tag-version = 12
+ software-version = 13
+ version-scheme = 14
+ lang = 15
+ directory = 16
+ file = 17
+ process = 18
+ resource = 19
+ size = 20
+ file-version = 21
+ key = 22
+ location = 23
+ fs-name = 24
+ root = 25
+ path-elements = 26
+ process-name = 27
+ pid = 28
+ type = 29
+ entity-name = 31
+ reg-id = 32
+ role = 33
+ thumbprint = 34
+ date = 35
+ device-id = 36
+ artifact = 37
+ href = 38
+ ownership = 39
+ rel = 40
+ media-type = 41
+ use = 42
+ activation-status = 43
+ channel-type = 44
+ colloquial-version = 45
+ description = 46
+ edition = 47
+ entitlement-data-required = 48
+ entitlement-key = 49
+ generator = 50
+ persistent-id = 51
+ product = 52
+ product-family = 53
+ revision = 54
+ summary = 55
+ unspsc-code = 56
+ unspsc-version = 57
+
+ ; "version-scheme" integer indices
+ multipartnumeric = 1
+ multipartnumeric-suffix = 2
+ alphanumeric = 3
+ decimal = 4
+ semver = 16384
+
+ ; "role" integer indices
+ tag-creator=1
+ software-creator=2
+ aggregator=3
+ distributor=4
+ licensor=5
+ maintainer=6
+
+ ; "ownership" integer indices
+ abandon=1
+ private=2
+ shared=3
+
+ ; "rel" integer indices
+ ancestor=1
+ component=2
+ feature=3
+ installationmedia=4
+ packageinstaller=5
+ parent=6
+ patches=7
+ requires=8
+ see-also=9
+ supersedes=10
+ ; supplemental=11 ; already defined
+
+ ; "use" integer indices
+ optional=1
+ required=2
+ recommended=3
+ <CODE ENDS>
+
+3. Determining the Type of CoSWID
+
+ The operational model for SWID and CoSWID tags was introduced in
+ Section 1.1, which described four different CoSWID tag types. The
+ following additional rules apply to the use of CoSWID tags to ensure
+ that created tags properly identify the tag type.
+
+ The first matching rule MUST determine the type of the CoSWID tag.
+
+ Primary Tag: A CoSWID tag MUST be considered a primary tag if the
+ corpus, patch, and supplemental items are "false".
+
+ Supplemental Tag: A CoSWID tag MUST be considered a supplemental tag
+ if the supplemental item is set to "true".
+
+ Corpus Tag: A CoSWID tag MUST be considered a corpus tag if the
+ corpus item is "true".
+
+ Patch Tag: A CoSWID tag MUST be considered a patch tag if the patch
+ item is "true".
+
+ | Note: It is possible for some or all of the corpus, patch, and
+ | supplemental items to simultaneously have values set as "true".
+ | The rules above provide a means to determine the tag's type in
+ | such a case. For example, a SWID or CoSWID tag for a patch
+ | installer might have both corpus and patch items set to "true".
+ | In such a case, the tag is a "corpus tag". The tag installed
+ | by this installer would have only the patch item set to "true",
+ | making the installed tag type a "patch tag".
+
+4. CoSWID Indexed Label Values
+
+ This section defines multiple kinds of indexed label values that are
+ maintained in several IANA registries. See Section 6 for details.
+ These values are represented as positive integers. In each registry,
+ the value 0 is marked as Reserved.
+
+4.1. Version Scheme
+
+ The following table contains a set of values for use in the concise-
+ swid-tag group's version-scheme item. The "Index" value indicates
+ the value to use as the version-scheme item's value. Strings in the
+ "Version Scheme Name" column provide human-readable text for the
+ value and match the version schemes defined in the ISO/IEC
+ 19770-2:2015 specification [SWID]. The "Definition" column describes
+ the syntax of allowed values for each entry.
+
+ +=======+=========================+===============================+
+ | Index | Version Scheme Name | Definition |
+ +=======+=========================+===============================+
+ | 1 | multipartnumeric | Numbers separated by dots, |
+ | | | where the numbers are |
+ | | | interpreted as decimal |
+ | | | integers (e.g., 1.2.3, |
+ | | | 1.2.3.4.5.6.7, 1.4.5, 1.21) |
+ +-------+-------------------------+-------------------------------+
+ | 2 | multipartnumeric+suffix | Numbers separated by dots, |
+ | | | where the numbers are |
+ | | | interpreted as decimal |
+ | | | integers with an additional |
+ | | | textual suffix (e.g., 1.2.3a) |
+ +-------+-------------------------+-------------------------------+
+ | 3 | alphanumeric | Strictly a string, no |
+ | | | interpretation as number |
+ +-------+-------------------------+-------------------------------+
+ | 4 | decimal | A single decimal floating- |
+ | | | point number |
+ +-------+-------------------------+-------------------------------+
+ | 16384 | semver | A semantic version as defined |
+ | | | by [SWID]. Also see the |
+ | | | [SEMVER] specification for |
+ | | | more information |
+ +-------+-------------------------+-------------------------------+
+
+ Table 3: Version Scheme Values
+
+ "multipartnumeric" and the numbers part of "multipartnumeric+suffix"
+ are interpreted as a sequence of numbers and are sorted in
+ lexicographical order by these numbers (i.e., not by the digits in
+ the numbers) and then the textual suffix (for
+ "multipartnumeric+suffix"). "alphanumeric" strings are sorted
+ lexicographically as character strings. "decimal" version numbers
+ are interpreted as single floating-point numbers (e.g., 1.25 is less
+ than 1.3).
+
+ The values above are registered in the IANA "Software ID Version
+ Scheme Values" registry, defined in Section 6.2.4. Additional
+ entries will likely be registered over time in this registry.
+
+ A CoSWID producer that is aware of the version scheme that has been
+ used to select the version value SHOULD include the optional version-
+ scheme item to avoid semantic ambiguity. If the CoSWID producer does
+ not have this information, it SHOULD omit the version-scheme item.
+ The following heuristics can be used by a CoSWID consumer, based on
+ the version schemes' partially overlapping value spaces:
+
+ * "decimal" and "multipartnumeric" partially overlap in their value
+ space when a value matches a decimal number. When a corresponding
+ software-version item's value falls within this overlapping value
+ space, it is expected that the "decimal" version scheme is used.
+
+ * "multipartnumeric" and "semver" partially overlap in their value
+ space when a "multipartnumeric" value matches the semantic
+ versioning syntax. When a corresponding software-version item's
+ value falls within this overlapping value space, it is expected
+ that the "semver" version scheme is used.
+
+ * "alphanumeric" and other version schemes might overlap in their
+ value space. When a corresponding software-version item's value
+ falls within this overlapping value space, it is expected that the
+ other version scheme is used and "alphanumeric" is not used.
+
+ Note that these heuristics are imperfect and can guess wrong, which
+ is the reason the version-scheme item SHOULD be included by the
+ producer.
+
+4.2. Entity Role Values
+
+ The following table indicates the index value to use for the entity-
+ entry group's role item (see Section 2.6). These values match the
+ entity roles defined in the ISO/IEC 19770-2:2015 specification
+ [SWID]. The "Index" value indicates the value to use as the role
+ item's value. Items in the "Role Name" column provide human-readable
+ text for the value. The "Definition" column describes the semantic
+ meaning of each entry.
+
+ +=======+=================+========================================+
+ | Index | Role Name | Definition |
+ +=======+=================+========================================+
+ | 1 | tagCreator | The person or organization that |
+ | | | created the containing SWID or CoSWID |
+ | | | tag. |
+ +-------+-----------------+----------------------------------------+
+ | 2 | softwareCreator | The person or organization entity that |
+ | | | created the software component. |
+ +-------+-----------------+----------------------------------------+
+ | 3 | aggregator | From [SWID], "An organization or |
+ | | | system that encapsulates software from |
+ | | | their own and/or other organizations |
+ | | | into a different distribution process |
+ | | | (as in the case of virtualization), or |
+ | | | as a completed system to accomplish a |
+ | | | specific task (as in the case of a |
+ | | | value added reseller)." |
+ +-------+-----------------+----------------------------------------+
+ | 4 | distributor | From [SWID], "An entity that furthers |
+ | | | the marketing, selling and/or |
+ | | | distribution of software from the |
+ | | | original place of manufacture to the |
+ | | | ultimate user without modifying the |
+ | | | software, its packaging or its |
+ | | | labelling." |
+ +-------+-----------------+----------------------------------------+
+ | 5 | licensor | From [SAM], as a "software licensor", |
+ | | | a "person or organization who owns or |
+ | | | holds the rights to issue a software |
+ | | | license for a specific software |
+ | | | [component]." |
+ +-------+-----------------+----------------------------------------+
+ | 6 | maintainer | The person or organization that is |
+ | | | responsible for coordinating and |
+ | | | making updates to the source code for |
+ | | | the software component. This SHOULD |
+ | | | be used when the "maintainer" is a |
+ | | | different person or organization than |
+ | | | the original "softwareCreator". |
+ +-------+-----------------+----------------------------------------+
+
+ Table 4: Entity Role Values
+
+ The values above are registered in the IANA "Software ID Entity Role
+ Values" registry, defined in Section 6.2.5. Additional values will
+ likely be registered over time.
+
+4.3. Link Ownership Values
+
+ The following table indicates the index value to use for the link-
+ entry group's ownership item (see Section 2.7). These values match
+ the link ownership values defined in the ISO/IEC 19770-2:2015
+ specification [SWID]. The "Index" value indicates the value to use
+ as the link-entry group ownership item's value. Items in the
+ "Ownership Type" column provide human-readable text for the value.
+ The "Definition" column describes the semantic meaning of each entry.
+
+ +=======+===========+===============================================+
+ | Index | Ownership | Definition |
+ | | Type | |
+ +=======+===========+===============================================+
+ | 1 | abandon | If the software component referenced |
+ | | | by the CoSWID tag is uninstalled, |
+ | | | then the referenced software SHOULD |
+ | | | NOT be uninstalled. |
+ +-------+-----------+-----------------------------------------------+
+ | 2 | private | If the software component referenced |
+ | | | by the CoSWID tag is uninstalled, |
+ | | | then the referenced software SHOULD |
+ | | | be uninstalled as well. |
+ +-------+-----------+-----------------------------------------------+
+ | 3 | shared | If the software component referenced |
+ | | | by the CoSWID tag is uninstalled, |
+ | | | then the referenced software SHOULD |
+ | | | be uninstalled if no other |
+ | | | components are sharing the software. |
+ +-------+-----------+-----------------------------------------------+
+
+ Table 5: Link Ownership Values
+
+ The values above are registered in the IANA "Software ID Link
+ Ownership Values" registry, defined in Section 6.2.6. Additional
+ values will likely be registered over time.
+
+4.4. Link Rel Values
+
+ The following table indicates the index value to use for the link-
+ entry group's rel item (see Section 2.7). These values match the
+ link rel values defined in the ISO/IEC 19770-2:2015 specification
+ [SWID]. The "Index" value indicates the value to use as the link-
+ entry group ownership item's value. Items in the "Relationship Type"
+ column provide human-readable text for the value. The "Definition"
+ column describes the semantic meaning of each entry.
+
+ +=======+===================+======================================+
+ | Index | Relationship Type | Definition |
+ +=======+===================+======================================+
+ | 1 | ancestor | The link references a software tag |
+ | | | for a previous release of this |
+ | | | software. This can be useful to |
+ | | | define an upgrade path. |
+ +-------+-------------------+--------------------------------------+
+ | 2 | component | The link references a software tag |
+ | | | for a separate component of this |
+ | | | software. |
+ +-------+-------------------+--------------------------------------+
+ | 3 | feature | The link references a configurable |
+ | | | feature of this software that can be |
+ | | | enabled or disabled without changing |
+ | | | the installed files. |
+ +-------+-------------------+--------------------------------------+
+ | 4 | installationmedia | The link references the installation |
+ | | | package that can be used to install |
+ | | | this software. |
+ +-------+-------------------+--------------------------------------+
+ | 5 | packageinstaller | The link references the installation |
+ | | | software needed to install this |
+ | | | software. |
+ +-------+-------------------+--------------------------------------+
+ | 6 | parent | The link references a software tag |
+ | | | that is the parent of the |
+ | | | referencing tag. This relationship |
+ | | | can be used when multiple software |
+ | | | components are part of a software |
+ | | | bundle, where the "parent" is the |
+ | | | software tag for the bundle and each |
+ | | | child is a "component". In such a |
+ | | | case, each child component can |
+ | | | provide a "parent" link relationship |
+ | | | to the bundle's software tag, and |
+ | | | the bundle can provide a "component" |
+ | | | link relationship to each child |
+ | | | software component. |
+ +-------+-------------------+--------------------------------------+
+ | 7 | patches | The link references a software tag |
+ | | | that the referencing software |
+ | | | patches. Typically only used for |
+ | | | patch tags (see Section 1.1). |
+ +-------+-------------------+--------------------------------------+
+ | 8 | requires | The link references a prerequisite |
+ | | | for installing this software. A |
+ | | | patch tag (see Section 1.1) can use |
+ | | | this to represent base software or |
+ | | | another patch that needs to be |
+ | | | installed first. |
+ +-------+-------------------+--------------------------------------+
+ | 9 | see-also | The link references other software |
+ | | | that may be of interest that relates |
+ | | | to this software. |
+ +-------+-------------------+--------------------------------------+
+ | 10 | supersedes | The link references other software |
+ | | | (e.g., an older software version) |
+ | | | that this software replaces. A |
+ | | | patch tag (see Section 1.1) can use |
+ | | | this to represent another patch that |
+ | | | this patch incorporates or replaces. |
+ +-------+-------------------+--------------------------------------+
+ | 11 | supplemental | The link references a software tag |
+ | | | that the referencing tag |
+ | | | supplements. Used on supplemental |
+ | | | tags (see Section 1.1). |
+ +-------+-------------------+--------------------------------------+
+
+ Table 6: Link Relationship Values
+
+ The values above are registered in the IANA "Software ID Link
+ Relationship Values" registry, defined in Section 6.2.7. Additional
+ values will likely be registered over time.
+
+4.5. Link Use Values
+
+ The following table indicates the index value to use for the link-
+ entry group's use item (see Section 2.7). These values match the
+ link use values defined in the ISO/IEC 19770-2:2015 specification
+ [SWID]. The "Index" value indicates the value to use as the link-
+ entry group use item's value. Items in the "Use Type" column provide
+ human-readable text for the value. The "Definition" column describes
+ the semantic meaning of each entry.
+
+ +=======+=============+========================================+
+ | Index | Use Type | Definition |
+ +=======+=============+========================================+
+ | 1 | optional | From [SWID], "Not absolutely required; |
+ | | | the [Link]'d software is installed |
+ | | | only when specified." |
+ +-------+-------------+----------------------------------------+
+ | 2 | required | From [SWID], "The [Link]'d software is |
+ | | | absolutely required for an operation |
+ | | | software installation." |
+ +-------+-------------+----------------------------------------+
+ | 3 | recommended | From [SWID], "Not absolutely required; |
+ | | | the [Link]'d software is installed |
+ | | | unless specified otherwise." |
+ +-------+-------------+----------------------------------------+
+
+ Table 7: Link Use Values
+
+ The values above are registered in the IANA "Software ID Link Use
+ Values" registry, defined in Section 6.2.8. Additional values will
+ likely be registered over time.
+
+5. "swid" and "swidpath" Expressions
+
+ This specification defines the following scheme names for use in
+ CoSWID and to provide interoperability with scheme names used in
+ [SWID]. Because both the "swid" and "swidpath" scheme names are to
+ be interpreted within a local (rather than a global) context, neither
+ of these are technically URI scheme names as defined in [RFC3986].
+ For this reason, the "swid" and "swidpath" scheme names are
+ registered with IANA as provisional, rather than permanent, scheme
+ names. However, registering these scheme names as provisional
+ ensures that the scheme names are reserved and that they are properly
+ defined going forward.
+
+ The swid and swidpath expressions conform to all rules for URI
+ syntax. All uses of these expressions encountered within a CoSWID
+ are to be interpreted as described in this section.
+
+5.1. "swid" Expressions
+
+ Expressions specifying the "swid" scheme are used to reference a
+ software tag by its tag-id. A tag-id referenced in this way can be
+ used to identify the tag resource in the context of where it is
+ referenced from. For example, when a tag is installed on a given
+ device, that tag can reference related tags on the same device using
+ expressions with this scheme.
+
+ For expressions that use the "swid" scheme, the scheme-specific part
+ MUST consist of a referenced software tag's tag-id. This tag-id MUST
+ be URI encoded according to Section 2.1 of [RFC3986].
+
+ The following expression is a valid example:
+
+ swid:2df9de35-0aff-4a86-ace6-f7dddd1ade4c
+
+5.2. "swidpath" Expressions
+
+ Expressions specifying the "swidpath" scheme are used to filter tags
+ out of a base collection, so that matching tags are included in the
+ identified tag collection. The XPath expression
+ [W3C.REC-xpath20-20101214] references the data that must be found in
+ a given software tag out of the base collection for that tag to be
+ considered a matching tag. Tags to be evaluated (the base
+ collection) include all tags in the context of where the "swidpath"
+ expression is referenced from. For example, when a tag is installed
+ on a given device, that tag can reference related tags on the same
+ device using an expression with this scheme.
+
+ For URIs that use the "swidpath" scheme, the following requirements
+ apply:
+
+ * The scheme-specific part MUST be an XPath expression as defined by
+ [W3C.REC-xpath20-20101214]. The included XPath expression will be
+ URI encoded according to Section 2.1 of [RFC3986].
+
+ * This XPath is evaluated over SWID tags, or CoSWID tags transformed
+ into SWID tags, found on a system. A given tag MUST be considered
+ a match if the XPath evaluation result value has an effective
+ boolean value of "true" according to [W3C.REC-xpath20-20101214],
+ Section 2.4.3.
+
+6. IANA Considerations
+
+ This document has a number of IANA considerations, as described in
+ the following subsections. In summary, six new registries are
+ established by this document, with initial entries provided for each
+ registry. New values for five other registries are also defined.
+
+6.1. CoSWID Items Registry
+
+ This document defines a new registry titled "CoSWID Items". This
+ registry uses integer values as index values in CBOR maps. Future
+ registrations for this registry are to be made based on [BCP26] as
+ follows:
+
+ +==================+=====================================+
+ | Range | Registration Procedures |
+ +==================+=====================================+
+ | 0-32767 | Standards Action with Expert Review |
+ +------------------+-------------------------------------+
+ | 32768-4294967295 | Specification Required |
+ +------------------+-------------------------------------+
+
+ Table 8: CoSWID Items Registration Procedures
+
+ All negative values are reserved for private use.
+
+ Initial registrations for the "CoSWID Items" registry are provided
+ below. Assignments consist of an integer index value, the item name,
+ and a reference to the defining specification.
+
+ +===============+===========================+===========+
+ | Index | Item Name | Reference |
+ +===============+===========================+===========+
+ | 0 | tag-id | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 1 | software-name | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 2 | entity | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 3 | evidence | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 4 | link | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 5 | software-meta | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 6 | payload | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 7 | hash | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 8 | corpus | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 9 | patch | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 10 | media | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 11 | supplemental | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 12 | tag-version | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 13 | software-version | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 14 | version-scheme | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 15 | lang | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 16 | directory | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 17 | file | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 18 | process | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 19 | resource | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 20 | size | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 21 | file-version | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 22 | key | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 23 | location | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 24 | fs-name | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 25 | root | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 26 | path-elements | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 27 | process-name | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 28 | pid | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 29 | type | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 30 | Unassigned | |
+ +---------------+---------------------------+-----------+
+ | 31 | entity-name | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 32 | reg-id | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 33 | role | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 34 | thumbprint | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 35 | date | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 36 | device-id | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 37 | artifact | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 38 | href | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 39 | ownership | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 40 | rel | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 41 | media-type | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 42 | use | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 43 | activation-status | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 44 | channel-type | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 45 | colloquial-version | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 46 | description | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 47 | edition | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 48 | entitlement-data-required | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 49 | entitlement-key | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 50 | generator | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 51 | persistent-id | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 52 | product | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 53 | product-family | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 54 | revision | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 55 | summary | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 56 | unspsc-code | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 57 | unspsc-version | RFC 9393 |
+ +---------------+---------------------------+-----------+
+ | 58-4294967295 | Unassigned | |
+ +---------------+---------------------------+-----------+
+
+ Table 9: CoSWID Items Initial Registrations
+
+6.2. Registries for Software ID Values
+
+ The following IANA registries provide a mechanism for new values to
+ be added over time to common enumerations used by SWID and CoSWID.
+ While neither the CoSWID specification nor the SWID specification is
+ subordinate to the other and will evolve as their respective
+ standards group chooses, there is value in supporting alignment
+ between the two standards. Shared use of common code points, as
+ spelled out in these registries, will facilitate this alignment --
+ hence the intent for shared use of these registries and the decision
+ to use "swidsoftware-id" (rather than "swid" or "coswid") in registry
+ names.
+
+6.2.1. Registration Procedures
+
+ The following registries allow for the registration of index values
+ and names. New registrations will be permitted through either a
+ Standards Action with Expert Review policy or a Specification
+ Required policy [BCP26].
+
+ The following registries also reserve the integer-based index values
+ in the range of -1 to -256 for private use as defined by Section 4.1
+ of [BCP26]. This allows values -1 to -24 to be expressed as a single
+ uint8_t in CBOR and values -25 to -256 to be expressed using an
+ additional uint8_t in CBOR.
+
+6.2.2. Private Use of Index and Name Values
+
+ The integer-based index values in the private use range (-1 to -256)
+ are intended for testing purposes and closed environments; values in
+ other ranges SHOULD NOT be assigned for testing.
+
+ For names that correspond to private use index values, an
+ Internationalized Domain Name prefix MUST be used to prevent name
+ conflicts using the form
+
+ domainprefix/name
+
+ where both "domainprefix" and "name" MUST each be either a Non-
+ Reserved LDH (NR-LDH) label or a U-label as defined by [RFC5890], and
+ "name" also MUST be a unique name within the namespace defined by the
+ "domainprefix". ("LDH" is an abbreviation for "letters, digits,
+ hyphen".) Using a prefix in this way allows for a name to be used in
+ the private use range. This is consistent with the guidance in
+ [BCP178].
+
+6.2.3. Expert Review Criteria
+
+ Designated experts MUST ensure that new registration requests meet
+ the following additional criteria:
+
+ * The requesting specification MUST provide a clear semantic
+ definition for the new entry. This definition MUST clearly
+ differentiate the requested entry from other previously registered
+ entries.
+
+ * The requesting specification MUST describe the intended use of the
+ entry, including any co-constraints that exist between (1) the use
+ of the entry's index value or name and (2) other values defined
+ within the SWID/CoSWID model.
+
+ * Index values and names outside the private use space MUST NOT be
+ used without registration. This is considered "squatting" and
+ MUST be avoided. Designated experts MUST ensure that reviewed
+ specifications register all appropriate index values and names.
+
+ * Standards Track documents MAY include entries registered in the
+ range reserved for entries under the Specification Required
+ policy. This can occur when a Standards Track document provides
+ further guidance on the use of index values and names that are in
+ common use but were not registered with IANA. This situation
+ SHOULD be avoided.
+
+ * All registered names MUST be valid according to the XML Schema
+ NMTOKEN data type (see [W3C.REC-xmlschema-2-20041028],
+ Section 3.3.4). This ensures that registered names are compatible
+ with the SWID format [SWID] where they are used.
+
+ * Registration of vanity names SHOULD be discouraged. The
+ requesting specification MUST provide a description of how a
+ requested name will allow for use by multiple stakeholders.
+
+6.2.4. Software ID Version Scheme Values Registry
+
+ This document establishes a new registry titled "Software ID Version
+ Scheme Values". This registry provides index values for use as
+ version-scheme item values in this document and Version Scheme Names
+ for use in [SWID].
+
+ This registry uses the registration procedures defined in
+ Section 6.2.1, with the following associated ranges:
+
+ +=============+=====================================+
+ | Range | Registration Procedures |
+ +=============+=====================================+
+ | 0-16383 | Standards Action with Expert Review |
+ +-------------+-------------------------------------+
+ | 16384-65535 | Specification Required |
+ +-------------+-------------------------------------+
+
+ Table 10: Software ID Version Scheme Registration
+ Procedures
+
+ Assignments MUST consist of an integer index value, the Version
+ Scheme Name, and a reference to the defining specification.
+
+ Initial registrations for the "Software ID Version Scheme Values"
+ registry are provided below and are derived from the textual Version
+ Scheme Names defined in [SWID].
+
+ +=============+=========================+=======================+
+ | Index | Version Scheme Name | Reference |
+ +=============+=========================+=======================+
+ | 0 | Reserved | |
+ +-------------+-------------------------+-----------------------+
+ | 1 | multipartnumeric | RFC 9393, Section 4.1 |
+ +-------------+-------------------------+-----------------------+
+ | 2 | multipartnumeric+suffix | RFC 9393, Section 4.1 |
+ +-------------+-------------------------+-----------------------+
+ | 3 | alphanumeric | RFC 9393, Section 4.1 |
+ +-------------+-------------------------+-----------------------+
+ | 4 | decimal | RFC 9393, Section 4.1 |
+ +-------------+-------------------------+-----------------------+
+ | 5-16383 | Unassigned | |
+ +-------------+-------------------------+-----------------------+
+ | 16384 | semver | RFC 9393, Section 4.1 |
+ +-------------+-------------------------+-----------------------+
+ | 16385-65535 | Unassigned | |
+ +-------------+-------------------------+-----------------------+
+
+ Table 11: Software ID Version Scheme Initial Registrations
+
+ Registrations MUST conform to the expert review criteria defined in
+ Section 6.2.3.
+
+ Designated experts MUST also ensure that newly requested entries
+ define a value space for the corresponding software-version item that
+ is unique from other previously registered entries.
+
+ | Note: The initial registrations violate this requirement but
+ | are included for backwards compatibility with [SWID]. See also
+ | Section 4.1.
+
+6.2.5. Software ID Entity Role Values Registry
+
+ This document establishes a new registry titled "Software ID Entity
+ Role Values". This registry provides index values for use as entity-
+ entry role item values in this document and entity role names for use
+ in [SWID].
+
+ This registry uses the registration procedures defined in
+ Section 6.2.1, with the following associated ranges:
+
+ +=========+=====================================+
+ | Range | Registration Procedures |
+ +=========+=====================================+
+ | 0-127 | Standards Action with Expert Review |
+ +---------+-------------------------------------+
+ | 128-255 | Specification Required |
+ +---------+-------------------------------------+
+
+ Table 12: Software ID Entity Role
+ Registration Procedures
+
+ Assignments consist of an integer index value, a role name, and a
+ reference to the defining specification.
+
+ Initial registrations for the "Software ID Entity Role Values"
+ registry are provided below and are derived from the textual entity
+ role names defined in [SWID].
+
+ +=======+=================+=======================+
+ | Index | Role Name | Reference |
+ +=======+=================+=======================+
+ | 0 | Reserved | |
+ +-------+-----------------+-----------------------+
+ | 1 | tagCreator | RFC 9393, Section 4.2 |
+ +-------+-----------------+-----------------------+
+ | 2 | softwareCreator | RFC 9393, Section 4.2 |
+ +-------+-----------------+-----------------------+
+ | 3 | aggregator | RFC 9393, Section 4.2 |
+ +-------+-----------------+-----------------------+
+ | 4 | distributor | RFC 9393, Section 4.2 |
+ +-------+-----------------+-----------------------+
+ | 5 | licensor | RFC 9393, Section 4.2 |
+ +-------+-----------------+-----------------------+
+ | 6 | maintainer | RFC 9393, Section 4.2 |
+ +-------+-----------------+-----------------------+
+ | 7-255 | Unassigned | |
+ +-------+-----------------+-----------------------+
+
+ Table 13: Software ID Entity Role Initial
+ Registrations
+
+ Registrations MUST conform to the expert review criteria defined in
+ Section 6.2.3.
+
+6.2.6. Software ID Link Ownership Values Registry
+
+ This document establishes a new registry titled "Software ID Link
+ Ownership Values". This registry provides index values for use as
+ link-entry ownership item values in this document and link ownership
+ names for use in [SWID].
+
+ This registry uses the registration procedures defined in
+ Section 6.2.1, with the following associated ranges:
+
+ +=========+=====================================+
+ | Range | Registration Procedures |
+ +=========+=====================================+
+ | 0-127 | Standards Action with Expert Review |
+ +---------+-------------------------------------+
+ | 128-255 | Specification Required |
+ +---------+-------------------------------------+
+
+ Table 14: Software ID Link Ownership
+ Registration Procedures
+
+ Assignments consist of an integer index value, an ownership type
+ name, and a reference to the defining specification.
+
+ Initial registrations for the "Software ID Link Ownership Values"
+ registry are provided below and are derived from the textual entity
+ role names defined in [SWID].
+
+ +=======+=====================+=======================+
+ | Index | Ownership Type Name | Reference |
+ +=======+=====================+=======================+
+ | 0 | Reserved | |
+ +-------+---------------------+-----------------------+
+ | 1 | abandon | RFC 9393, Section 4.3 |
+ +-------+---------------------+-----------------------+
+ | 2 | private | RFC 9393, Section 4.3 |
+ +-------+---------------------+-----------------------+
+ | 3 | shared | RFC 9393, Section 4.3 |
+ +-------+---------------------+-----------------------+
+ | 4-255 | Unassigned | |
+ +-------+---------------------+-----------------------+
+
+ Table 15: Software ID Link Ownership Initial
+ Registrations
+
+ Registrations MUST conform to the expert review criteria defined in
+ Section 6.2.3.
+
+6.2.7. Software ID Link Relationship Values Registry
+
+ This document establishes a new registry titled "Software ID Link
+ Relationship Values". This registry provides index values for use as
+ link-entry rel item values in this document and link ownership names
+ for use in [SWID].
+
+ This registry uses the registration procedures defined in
+ Section 6.2.1, with the following associated ranges:
+
+ +=============+=====================================+
+ | Range | Registration Procedures |
+ +=============+=====================================+
+ | 0-32767 | Standards Action with Expert Review |
+ +-------------+-------------------------------------+
+ | 32768-65535 | Specification Required |
+ +-------------+-------------------------------------+
+
+ Table 16: Software ID Link Relationship
+ Registration Procedures
+
+ Assignments consist of an integer index value, the relationship type
+ name, and a reference to the defining specification.
+
+ Initial registrations for the "Software ID Link Relationship Values"
+ registry are provided below and are derived from the link
+ relationship values defined in [SWID].
+
+ +==========+========================+=======================+
+ | Index | Relationship Type Name | Reference |
+ +==========+========================+=======================+
+ | 0 | Reserved | |
+ +----------+------------------------+-----------------------+
+ | 1 | ancestor | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 2 | component | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 3 | feature | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 4 | installationmedia | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 5 | packageinstaller | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 6 | parent | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 7 | patches | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 8 | requires | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 9 | see-also | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 10 | supersedes | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 11 | supplemental | RFC 9393, Section 4.4 |
+ +----------+------------------------+-----------------------+
+ | 12-65535 | Unassigned | |
+ +----------+------------------------+-----------------------+
+
+ Table 17: Software ID Link Relationship Initial Registrations
+
+ Registrations MUST conform to the expert review criteria defined in
+ Section 6.2.3.
+
+ Designated experts MUST also ensure that a newly requested entry
+ documents the URI schemes allowed to be used in an href associated
+ with the link relationship and the expected resolution behavior of
+ these URI schemes. This will help to ensure that applications
+ processing software tags are able to interoperate when resolving
+ resources referenced by a link of a given type.
+
+6.2.8. Software ID Link Use Values Registry
+
+ This document establishes a new registry titled "Software ID Link Use
+ Values". This registry provides index values for use as link-entry
+ use item values in this document and link use names for use in
+ [SWID].
+
+ This registry uses the registration procedures defined in
+ Section 6.2.1, with the following associated ranges:
+
+ +=========+=====================================+
+ | Range | Registration Procedures |
+ +=========+=====================================+
+ | 0-127 | Standards Action with Expert Review |
+ +---------+-------------------------------------+
+ | 128-255 | Specification Required |
+ +---------+-------------------------------------+
+
+ Table 18: Software ID Link Use Registration
+ Procedures
+
+ Assignments consist of an integer index value, the link use type
+ name, and a reference to the defining specification.
+
+ Initial registrations for the "Software ID Link Use Values" registry
+ are provided below and are derived from the link relationship values
+ defined in [SWID].
+
+ +=======+====================+=======================+
+ | Index | Link Use Type Name | Reference |
+ +=======+====================+=======================+
+ | 0 | Reserved | |
+ +-------+--------------------+-----------------------+
+ | 1 | optional | RFC 9393, Section 4.5 |
+ +-------+--------------------+-----------------------+
+ | 2 | required | RFC 9393, Section 4.5 |
+ +-------+--------------------+-----------------------+
+ | 3 | recommended | RFC 9393, Section 4.5 |
+ +-------+--------------------+-----------------------+
+ | 4-255 | Unassigned | |
+ +-------+--------------------+-----------------------+
+
+ Table 19: Software ID Link Use Initial Registrations
+
+ Registrations MUST conform to the expert review criteria defined in
+ Section 6.2.3.
+
+6.3. swid+cbor Media Type Registration
+
+ IANA has added the following to the "Media Types" registry
+ [IANA.media-types].
+
+ Type name: application
+
+ Subtype name: swid+cbor
+
+ Required parameters: none
+
+ Optional parameters: none
+
+ Encoding considerations: Binary (encoded as CBOR [RFC8949]). See
+ RFC 9393 for details.
+
+ Security considerations: See Section 9 of RFC 9393.
+
+ Interoperability considerations: Applications MAY ignore any key
+ value pairs that they do not understand. This allows backwards-
+ compatible extensions to this specification.
+
+ Published specification: RFC 9393
+
+ Applications that use this media type: The type is used by software
+ asset management systems and vulnerability assessment systems and
+ is used in applications that use remote integrity verification.
+
+ Fragment Identifier Considerations: The syntax and semantics of
+ fragment identifiers specified for "application/swid+cbor" are as
+ specified for "application/cbor". (At publication of RFC 9393,
+ there is no fragment identification syntax defined for
+ "application/cbor".)
+
+ Additional information:
+ Magic number(s): If tagged, the first five bytes in hex: da 53 57
+ 49 44 (see Section 8 of RFC 9393).
+ File extension(s): coswid
+ Macintosh file type code(s): none
+ Macintosh Universal Type Identifier code: org.ietf.coswid
+ conforms to public.data.
+
+ Person & email address to contact for further information:
+ IESG <iesg@ietf.org>
+
+ Intended usage: COMMON
+
+ Restrictions on usage: none
+
+ Author: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
+
+ Change controller: IESG
+
+6.4. CoAP Content-Format Registration
+
+ IANA has assigned a CoAP Content-Format ID for the CoSWID media type
+ in the "CoAP Content-Formats" subregistry, from the "IETF Review or
+ IESG Approval" space (256..999), within the "CoRE Parameters"
+ registry [RFC7252] [IANA.core-parameters]:
+
+ +=======================+================+=====+===========+
+ | Content Type | Content Coding | ID | Reference |
+ +=======================+================+=====+===========+
+ | application/swid+cbor | - | 258 | RFC 9393 |
+ +-----------------------+----------------+-----+-----------+
+
+ Table 20: CoAP Content-Format IDs
+
+6.5. CBOR Tag Registration
+
+ IANA has allocated a tag in the "CBOR Tags" registry
+ [IANA.cbor-tags]:
+
+ +============+===========+=====================+===========+
+ | Tag | Data Item | Semantics | Reference |
+ +============+===========+=====================+===========+
+ | 1398229316 | map | Concise Software | RFC 9393 |
+ | | | Identifier (CoSWID) | |
+ +------------+-----------+---------------------+-----------+
+
+ Table 21: CoSWID CBOR Tag
+
+6.6. URI Scheme Registrations
+
+ The ISO 19770-2:2015 SWID specification [SWID] describes the use of
+ the "swid" and "swidpath" URI schemes, which are currently in use in
+ implementations. This document continues this use for CoSWID. The
+ following subsections provide registrations for these schemes to
+ ensure that a registration for these schemes exists that is suitable
+ for use in the SWID and CoSWID specifications.
+
+ URI schemes are registered within the "Uniform Resource Identifier
+ (URI) Schemes" registry maintained at [IANA.uri-schemes].
+
+6.6.1. URI Scheme "swid"
+
+ IANA has registered the URI scheme "swid". This registration
+ complies with [RFC7595].
+
+ Scheme name: swid
+
+ Status: Provisional
+
+ Applications/protocols that use this scheme name: Applications that
+ require Software IDs (SWIDs) or Concise Software IDs (CoSWIDs);
+ see Section 5.1 of RFC 9393.
+
+ Contact: IETF Chair <chair@ietf.org>
+
+ Change controller: IESG <iesg@ietf.org>
+
+ Reference: Section 5.1 of RFC 9393
+
+ | Note: This scheme has been documented by an IETF working group
+ | and is mentioned in an IETF Standard specification. However,
+ | as it describes a locally scoped, limited-purpose form of
+ | identification, it does not fully meet the requirements for
+ | permanent registration.
+ |
+ | As long as this specification (or any successors that describe
+ | this scheme) is a current IETF specification, this scheme
+ | should be considered to be "in use" and not considered for
+ | removal from the registry.
+
+6.6.2. URI Scheme "swidpath"
+
+ IANA has registered the URI scheme "swidpath". This registration
+ complies with [RFC7595].
+
+ Scheme name: swidpath
+
+ Status: Provisional
+
+ Applications/protocols that use this scheme name: Applications that
+ require Software IDs (SWIDs) or Concise Software IDs (CoSWIDs);
+ see Section 5.2 of RFC 9393.
+
+ Contact: IETF Chair <chair@ietf.org>
+
+ Change controller: IESG <iesg@ietf.org>
+
+ Reference: Section 5.2 of RFC 9393
+
+ | Note: This scheme has been documented by an IETF working group
+ | and is mentioned in an IETF Standard specification. However,
+ | as it describes a locally scoped, limited-purpose form of
+ | identification, it does not fully meet the requirements for
+ | permanent registration.
+ |
+ | As long as this specification (or any successors that describe
+ | this scheme) is a current IETF specification, this scheme
+ | should be considered to be "in use" and not considered for
+ | removal from the registry.
+
+6.7. CoSWID Model for Use in SWIMA Registration
+
+ "Software Inventory Message and Attributes (SWIMA) for PA-TNC"
+ [RFC8412] defines a standardized method for collecting an endpoint
+ device's software inventory. A CoSWID can provide evidence of
+ software installation that can then be used and exchanged with SWIMA.
+ This registration adds a new entry to the IANA "Software Data Model
+ Types" registry defined by [RFC8412] and [IANA.pa-tnc-parameters] to
+ support CoSWID use in SWIMA as follows:
+
+ Pen: 0
+
+ Integer: 2
+
+ Name: Concise Software Identifier (CoSWID)
+
+ Reference: RFC 9393
+
+ Deriving Software Identifiers: A Software Identifier generated from
+ a CoSWID tag is expressed as a concatenation of the form used in
+ [RFC5234] as follows --
+
+ TAG_CREATOR_REGID "_" "_" UNIQUE_ID
+
+ where TAG_CREATOR_REGID is the reg-id item value of the tag's
+ entity item having the role value of 1 (corresponding to "tag-
+ creator"), and the UNIQUE_ID is the same tag's tag-id item. If
+ the tag-id item's value is expressed as a 16-byte binary string,
+ the UNIQUE_ID MUST be represented using the UUID string
+ representation defined in [RFC4122], including the "urn:uuid:"
+ prefix.
+
+ The TAG_CREATOR_REGID and the UNIQUE_ID are connected with a
+ double underscore (_), without any other connecting character or
+ whitespace.
+
+7. Signed CoSWID Tags
+
+ SWID tags, as defined in the ISO-19770-2:2015 XML Schema, can include
+ cryptographic signatures to protect the integrity of the SWID tag.
+ In general, tags are signed by the tag creator (typically, although
+ not exclusively, the vendor of the software component that the SWID
+ tag identifies). Cryptographic signatures can make any modification
+ of the tag detectable, which is especially important if the integrity
+ of the tag is important, such as when the tag is providing RIMs for
+ files. The ISO-19770-2:2015 XML Schema uses XML Digital Signatures
+ (XMLDSIG) to support cryptographic signatures.
+
+ Signing CoSWID tags follows the procedures defined in CBOR Object
+ Signing and Encryption (COSE) [RFC9052]. A CoSWID tag MUST be
+ wrapped in a COSE Signature structure, either COSE_Sign1 or
+ COSE_Sign. In the first case, a Single Signer Data Object
+ (COSE_Sign1) contains a single signature and MUST be signed by the
+ tag creator. The following CDDL specification defines a restrictive
+ subset of COSE header parameters that MUST be used in the protected
+ header in this case.
+
+ <CODE BEGINS> file "sign1.cddl"
+ COSE_Sign1-coswid<payload> = [
+ protected: bstr .cbor protected-signed-coswid-header,
+ unprotected: unprotected-signed-coswid-header,
+ payload: bstr .cbor payload,
+ signature: bstr,
+ ]
+
+ cose-label = int / tstr
+ cose-values = any
+
+ protected-signed-coswid-header = {
+ 1 => int, ; algorithm identifier
+ 3 => "application/swid+cbor",
+ * cose-label => cose-values,
+ }
+
+ unprotected-signed-coswid-header = {
+ * cose-label => cose-values,
+ }
+ <CODE ENDS>
+
+ The COSE_Sign structure allows for more than one signature, one of
+ which MUST be issued by the tag creator, to be applied to a CoSWID
+ tag and MAY be used. The corresponding usage scenarios are domain
+ specific and require well-specified application guidance.
+
+ <CODE BEGINS> file "sign.cddl"
+ COSE_Sign-coswid<payload> = [
+ protected: bstr .cbor protected-signed-coswid-header1,
+ unprotected: unprotected-signed-coswid-header,
+ payload: bstr .cbor payload,
+ signature: [ * COSE_Signature ],
+ ]
+
+ protected-signed-coswid-header1 = {
+ 3 => "application/swid+cbor",
+ * cose-label => cose-values,
+ }
+
+ protected-signature-coswid-header = {
+ 1 => int, ; algorithm identifier
+ * cose-label => cose-values,
+ }
+
+ unprotected-signed-coswid-header = {
+ * cose-label => cose-values,
+ }
+
+ COSE_Signature = [
+ protected: bstr .cbor protected-signature-coswid-header,
+ unprotected: unprotected-signed-coswid-header,
+ signature: bstr
+ ]
+ <CODE ENDS>
+
+ Additionally, the COSE header countersignature MAY be used as an
+ attribute in the unprotected header map of the COSE envelope of a
+ CoSWID [RFC9338]. The application of countersigning enables second
+ parties to provide a signature on a signature allowing for proof that
+ a signature existed at a given time (i.e., a timestamp).
+
+ A CoSWID MUST be signed, using the above mechanism, to protect the
+ integrity of the CoSWID tag. See Section 9 ("Security
+ Considerations") for more information on why a signed CoSWID is
+ valuable in most cases.
+
+8. CBOR-Tagged CoSWID Tags
+
+ This specification allows for tagged and untagged CBOR data items
+ that are CoSWID tags. Consequently, the CBOR tag defined by this
+ document (Table 21) for CoSWID tags SHOULD be used in conjunction
+ with CBOR data items that are CoSWID tags. Other CBOR tags MUST NOT
+ be used with a CBOR data item that is a CoSWID tag. If tagged, both
+ signed and unsigned CoSWID tags MUST use the CoSWID CBOR tag. If a
+ signed CoSWID is tagged, a CoSWID CBOR tag MUST be appended before
+ the COSE envelope, whether it is a COSE_Untagged_Message or a
+ COSE_Tagged_Message. If an unsigned CoSWID is tagged, a CoSWID CBOR
+ tag MUST be appended before the CBOR data item that is the CoSWID
+ tag.
+
+ <CODE BEGINS> file "tags.cddl"
+ coswid = unsigned-coswid / signed-coswid
+ unsigned-coswid = concise-swid-tag / tagged-coswid<concise-swid-tag>
+ signed-coswid1 = signed-coswid-for<unsigned-coswid>
+ signed-coswid = signed-coswid1 / tagged-coswid<signed-coswid1>
+
+ tagged-coswid<T> = #6.1398229316(T)
+
+ signed-coswid-for<payload> = #6.18(COSE_Sign1-coswid<payload>)
+ / #6.98(COSE_Sign-coswid<payload>)
+ <CODE ENDS>
+
+ This specification allows for a CBOR-tagged CoSWID tag to reside in a
+ COSE envelope that is also tagged with a CoSWID CBOR tag. In cases
+ where a tag creator is not a signer (e.g., hand-offs between entities
+ in a trusted portion of a supply chain), retaining CBOR tags attached
+ to unsigned CoSWID tags can be of great use. Nevertheless, redundant
+ use of tags SHOULD be avoided when possible.
+
+9. Security Considerations
+
+ The following security considerations for the use of CoSWID tags
+ focus on:
+
+ * ensuring the integrity and authenticity of a CoSWID tag
+
+ * the application of CoSWID tags to address security challenges
+ related to unmanaged or unpatched software
+
+ * reducing the potential for unintended disclosure of a device's
+ software load
+
+ A tag is considered "authoritative" if the CoSWID tag was created by
+ the software provider. An authoritative CoSWID tag contains
+ information about a software component provided by the supplier of
+ the software component, who is expected to be an expert in their own
+ software. Thus, authoritative CoSWID tags can represent
+ authoritative information about the software component. The degree
+ to which this information can be trusted depends on the tag's chain
+ of custody and the ability to verify a signature provided by the
+ supplier if present in the CoSWID tag. The provisioning and
+ validation of CoSWID tags are handled by local policy and are outside
+ the scope of this document.
+
+ A signed CoSWID tag (see Section 7) whose signature has been
+ validated can be relied upon to be unchanged since the time at which
+ it was signed. By contrast, the data contained in unsigned tags can
+ be altered by any user or process with write access to the tag. To
+ support signature validation, there is a need to associate the right
+ key with the software provider or party originating the signature in
+ a secure way. This operation is application specific and needs to be
+ addressed by the application or a user of the application; a specific
+ approach for this topic is out of scope for this document.
+
+ When an authoritative tag is signed, the originator of the signature
+ can be verified. A trustworthy association between the signature and
+ the originator of the signature can be established via trust anchors.
+ A certification path between a trust anchor and a certificate,
+ including a public key enabling the validation of a tag signature,
+ can realize the assessment of trustworthiness of an authoritative
+ tag. Verifying that the software provider is the signer is a
+ different matter. This requires verifying that the party that signed
+ the tag is the same party given in the software-creator role of the
+ tag's entity item. No mechanism is defined in this document to make
+ this association; therefore, this association will need to be handled
+ by local policy. As always, the validity of a signature does not
+ imply the veracity of the signed statements: anyone can sign
+ assertions such that the software is from a specific software-creator
+ or that a specific persistent-id applies; policy needs to be applied
+ to evaluate these statements and to determine their suitability for a
+ specific use.
+
+ Loss of control of signing credentials used to sign CoSWID tags would
+ cast doubt on the authenticity and integrity of any CoSWID tags
+ signed using the compromised keys. In such cases, the legitimate tag
+ signer (namely, the software provider for an authoritative CoSWID
+ tag) can employ uncompromised signing credentials to create a new
+ signature on the original tag. The tag's version number would not be
+ incremented, since the tag itself was not modified. Consumers of
+ CoSWID tags would need to validate the tag using the new credentials
+ and would also need to make use of revocation information available
+ for the compromised credentials to avoid validating tags signed with
+ them. The process for doing this is beyond the scope of this
+ specification.
+
+ The CoSWID format allows the use of hash values without an
+ accompanying hash algorithm identifier. This exposes the tags to
+ some risk of cross-algorithm attacks. We believe that this can
+ become a practical problem only if some implementations allow the use
+ of insecure hash algorithms. Since it may not become known
+ immediately when an algorithm becomes insecure, this leads to a
+ strong recommendation to only include support for hash algorithms
+ that are generally considered secure, and not just marginally so.
+
+ CoSWID tags are intended to contain public information about software
+ components and, as such, the contents of a CoSWID tag (as opposed to
+ the set of tags that apply to the endpoint; see below) do not need to
+ be protected against unintended disclosure on an endpoint.
+ Conversely, generators of CoSWID tags need to ensure that only public
+ information is disclosed. The entitlement-key item is an example of
+ information for which particular care is required; tag authors are
+ advised not to record unprotected, private software license keys in
+ this field.
+
+ CoSWID tags are intended to be easily discoverable by authorized
+ applications and users on an endpoint in order to make it easy to
+ determine the tagged software load. Access to the collection of an
+ endpoint's CoSWID tags needs to be limited to authorized applications
+ and users using an appropriate access control mechanism.
+
+ Since the tag-id of a CoSWID tag can be used as a global index value,
+ failure to ensure the tag-id's uniqueness can cause collisions or
+ ambiguity in CoSWID tags that are retrieved or processed using this
+ identifier. CoSWID is designed to not require a registry of
+ identifiers. As a result, CoSWID requires the tag creator to employ
+ a method of generating a unique tag identifier. Specific methods of
+ generating a unique identifier are beyond the scope of this
+ specification. A collision in tag-ids may result in false positives/
+ negatives in software integrity checks or misidentification of
+ installed software, undermining CoSWID use cases such as
+ vulnerability identification, software inventory, etc. If such a
+ collision is detected, then the tag consumer may want to contact the
+ maintainer of the CoSWID to have them issue a correction addressing
+ the collision; however, this also discloses to the maintainer that
+ the consumer has the other tag with the given tag-id in their
+ database. More generally speaking, a tag consumer needs to be robust
+ against such collisions lest the collision become a viable attack
+ vector.
+
+ CoSWID tags are designed to be easily added and removed from an
+ endpoint along with the installation or removal of software
+ components. On endpoints where the addition or removal of software
+ components is tightly controlled, the addition or removal of CoSWID
+ tags can be similarly controlled. On more open systems, where many
+ users can manage the software inventory, CoSWID tags can be easier to
+ add or remove. On such systems, it can be possible to add or remove
+ CoSWID tags in a way that does not reflect the actual presence or
+ absence of corresponding software components. Similarly, not all
+ software products automatically install CoSWID tags, so products can
+ be present on an endpoint without providing a corresponding CoSWID
+ tag. As such, any collection of CoSWID tags cannot automatically be
+ assumed to represent either a complete or fully accurate
+ representation of the software inventory of the endpoint. However,
+ especially on endpoint devices that more strictly control the ability
+ to add or remove applications, CoSWID tags are an easy way to provide
+ a preliminary understanding of that endpoint's software inventory.
+
+ As CoSWID tags do not expire, inhibiting new CoSWID tags from
+ reaching an intended consumer would render that consumer stuck with
+ outdated information, potentially leaving associated vulnerabilities
+ or weaknesses unmitigated. Therefore, a CoSWID tag consumer should
+ actively check for updated tag-versions via more than one means.
+
+ This specification makes use of relative paths (e.g., filesystem
+ paths) in several places. A signed CoSWID tag cannot make use of
+ these to derive information that is considered to be covered under
+ the signature. Typically, relative filesystem paths will be used to
+ identify targets for an installation, not sources of tag information.
+
+ Any report of an endpoint's CoSWID tag collection provides
+ information about the software inventory of that endpoint. If such a
+ report is exposed to an attacker, this can tell them which software
+ products and versions thereof are present on the endpoint. By
+ examining this list, the attacker might learn of the presence of
+ applications that are vulnerable to certain types of attacks. As
+ noted earlier, CoSWID tags are designed to be easily discoverable by
+ authorized applications and users on an endpoint, but this does not
+ present a significant risk, since an attacker would already need to
+ have access to the endpoint to view that information. However, when
+ the endpoint transmits its software inventory to another party or
+ that inventory is stored on a server for later analysis, this can
+ potentially expose this information to attackers who do not yet have
+ access to the endpoint. For this reason, it is important to protect
+ the confidentiality of CoSWID tag information that has been collected
+ from an endpoint in transit and at rest, not because those tags
+ individually contain sensitive information but because the collection
+ of CoSWID tags and their association with an endpoint reveals
+ information about that endpoint's attack surface.
+
+ Finally, both the ISO-19770-2:2015 XML Schema SWID definition and the
+ CoSWID CDDL specification allow for the construction of "infinite"
+ tags with link item loops or tags that contain malicious content with
+ the intent of creating non-deterministic states during validation or
+ processing of those tags. While software providers are unlikely to
+ do this, CoSWID tags can be created by any party and the CoSWID tags
+ collected from an endpoint could contain a mixture of tags created by
+ vendors and tags not created by vendors. For this reason, a CoSWID
+ tag might contain potentially malicious content. Input sanitization,
+ loop detection, and signature verification are ways that
+ implementations can address this concern.
+
+ More generally speaking, the Security Considerations sections of
+ [RFC8949], [RFC9052], and [RFC9338] apply.
+
+10. Privacy Considerations
+
+ As noted in Section 9, collected information about an endpoint's
+ software load, such as what might be represented by an endpoint's
+ CoSWID tag collection, could be used by attackers to identify
+ vulnerable software. Collections of endpoint software information
+ also can have privacy implications for users. The set of
+ applications a user installs can provide clues regarding personal
+ matters such as political affiliation, banking and investments,
+ gender, sexual orientation, medical concerns, etc. While the
+ collection of CoSWID tags on an endpoint wouldn't increase privacy
+ risks (since a party able to view those tags could also view the
+ applications themselves), if those CoSWID tags are gathered and
+ stored in a repository somewhere, visibility into the repository now
+ also provides visibility into a user's application collection. For
+ this reason, not only do repositories of collected CoSWID tags need
+ to be protected against collection by malicious parties but even
+ authorized parties will need to be vetted and made aware of privacy
+ responsibilities associated with having access to this information.
+ Likewise, users should be made aware that their software inventories
+ are being collected from endpoints. Furthermore, when collected and
+ stored by authorized parties or systems, the inventory data needs to
+ be protected as both security and privacy-sensitive information.
+
+11. References
+
+11.1. Normative References
+
+ [BCP178] Saint-Andre, P., Crocker, D., and M. Nottingham,
+ "Deprecating the "X-" Prefix and Similar Constructs in
+ Application Protocols", BCP 178, RFC 6648, June 2012.
+
+ <https://www.rfc-editor.org/info/bcp178>
+
+ [BCP26] Cotton, M., Leiba, B., and T. Narten, "Guidelines for
+ Writing an IANA Considerations Section in RFCs", BCP 26,
+ RFC 8126, June 2017.
+
+ <https://www.rfc-editor.org/info/bcp26>
+
+ [IANA.cbor-tags]
+ IANA, "Concise Binary Object Representation (CBOR) Tags",
+ <https://www.iana.org/assignments/cbor-tags>.
+
+ [IANA.core-parameters]
+ IANA, "Constrained RESTful Environments (CoRE)
+ Parameters",
+ <https://www.iana.org/assignments/core-parameters>.
+
+ [IANA.media-types]
+ IANA, "Media Types",
+ <https://www.iana.org/assignments/media-types>.
+
+ [IANA.named-information]
+ IANA, "Named Information",
+ <https://www.iana.org/assignments/named-information>.
+
+ [IANA.pa-tnc-parameters]
+ IANA, "Posture Attribute (PA) Protocol Compatible with
+ Trusted Network Connect (TNC) Parameters",
+ <https://www.iana.org/assignments/pa-tnc-parameters>.
+
+ [IANA.uri-schemes]
+ IANA, "Uniform Resource Identifier (URI) Schemes",
+ <https://www.iana.org/assignments/uri-schemes>.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
+ 10646", STD 63, RFC 3629, DOI 10.17487/RFC3629, November
+ 2003, <https://www.rfc-editor.org/info/rfc3629>.
+
+ [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
+ Resource Identifier (URI): Generic Syntax", STD 66,
+ RFC 3986, DOI 10.17487/RFC3986, January 2005,
+ <https://www.rfc-editor.org/info/rfc3986>.
+
+ [RFC5198] Klensin, J. and M. Padlipsky, "Unicode Format for Network
+ Interchange", RFC 5198, DOI 10.17487/RFC5198, March 2008,
+ <https://www.rfc-editor.org/info/rfc5198>.
+
+ [RFC5234] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax
+ Specifications: ABNF", STD 68, RFC 5234,
+ DOI 10.17487/RFC5234, January 2008,
+ <https://www.rfc-editor.org/info/rfc5234>.
+
+ [RFC5646] Phillips, A., Ed. and M. Davis, Ed., "Tags for Identifying
+ Languages", BCP 47, RFC 5646, DOI 10.17487/RFC5646,
+ September 2009, <https://www.rfc-editor.org/info/rfc5646>.
+
+ [RFC5890] Klensin, J., "Internationalized Domain Names for
+ Applications (IDNA): Definitions and Document Framework",
+ RFC 5890, DOI 10.17487/RFC5890, August 2010,
+ <https://www.rfc-editor.org/info/rfc5890>.
+
+ [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained
+ Application Protocol (CoAP)", RFC 7252,
+ DOI 10.17487/RFC7252, June 2014,
+ <https://www.rfc-editor.org/info/rfc7252>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+ [RFC8288] Nottingham, M., "Web Linking", RFC 8288,
+ DOI 10.17487/RFC8288, October 2017,
+ <https://www.rfc-editor.org/info/rfc8288>.
+
+ [RFC8412] Schmidt, C., Haynes, D., Coffin, C., Waltermire, D., and
+ J. Fitzgerald-McKay, "Software Inventory Message and
+ Attributes (SWIMA) for PA-TNC", RFC 8412,
+ DOI 10.17487/RFC8412, July 2018,
+ <https://www.rfc-editor.org/info/rfc8412>.
+
+ [RFC8610] Birkholz, H., Vigano, C., and C. Bormann, "Concise Data
+ Definition Language (CDDL): A Notational Convention to
+ Express Concise Binary Object Representation (CBOR) and
+ JSON Data Structures", RFC 8610, DOI 10.17487/RFC8610,
+ June 2019, <https://www.rfc-editor.org/info/rfc8610>.
+
+ [RFC8949] Bormann, C. and P. Hoffman, "Concise Binary Object
+ Representation (CBOR)", STD 94, RFC 8949,
+ DOI 10.17487/RFC8949, December 2020,
+ <https://www.rfc-editor.org/info/rfc8949>.
+
+ [RFC9052] Schaad, J., "CBOR Object Signing and Encryption (COSE):
+ Structures and Process", STD 96, RFC 9052,
+ DOI 10.17487/RFC9052, August 2022,
+ <https://www.rfc-editor.org/info/rfc9052>.
+
+ [RFC9338] Schaad, J., "CBOR Object Signing and Encryption (COSE):
+ Countersignatures", STD 96, RFC 9338,
+ DOI 10.17487/RFC9338, December 2022,
+ <https://www.rfc-editor.org/info/rfc9338>.
+
+ [SAM] "Information technology - IT asset management - Part 5:
+ Overview and vocabulary", ISO/IEC 19770-5:2015, August
+ 2015, <https://www.iso.org/standard/68291.html>.
+
+ [SWID] "Information technology - IT asset management - Part 2:
+ Software identification tag", ISO/IEC 19770-2:2015,
+ October 2015, <https://www.iso.org/standard/65666.html>.
+
+ [UNSPSC] "United Nations Standard Products and Services Code",
+ 2022, <https://www.unspsc.org/>.
+
+ [W3C.REC-mediaqueries-3-20220405]
+ Rivoal, F., Ed., "Media Queries Level 3", W3C
+ Recommendation REC-mediaqueries-3-20220405, 5 April 2022,
+ <https://www.w3.org/TR/mediaqueries-3/>.
+
+ [W3C.REC-xmlschema-2-20041028]
+ Biron, P. V., Ed. and A. Malhotra, Ed., "XML Schema Part
+ 2: Datatypes Second Edition", W3C Recommendation REC-
+ xmlschema-2-20041028, 28 October 2004,
+ <https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/>.
+
+ [W3C.REC-xpath20-20101214]
+ Berglund, A., Ed., Boag, S., Ed., Chamberlin, D., Ed.,
+ Fernández, M. F., Ed., Kay, M., Ed., Robie, J., Ed., and
+ J. Siméon, Ed., "XML Path Language (XPath) 2.0 (Second
+ Edition)", W3C Recommendation REC-xpath20-20101214, 14
+ December 2010,
+ <https://www.w3.org/TR/2010/REC-xpath20-20101214/>.
+
+11.2. Informative References
+
+ [CamelCase]
+ "Camel Case (upper camel case)", 18 December 2014,
+ <http://wiki.c2.com/?CamelCase>.
+
+ [KebabCase]
+ "Kebab Case", 29 August 2014,
+ <http://wiki.c2.com/?KebabCase>.
+
+ [RFC3444] Pras, A. and J. Schoenwaelder, "On the Difference between
+ Information Models and Data Models", RFC 3444,
+ DOI 10.17487/RFC3444, January 2003,
+ <https://www.rfc-editor.org/info/rfc3444>.
+
+ [RFC4122] Leach, P., Mealling, M., and R. Salz, "A Universally
+ Unique IDentifier (UUID) URN Namespace", RFC 4122,
+ DOI 10.17487/RFC4122, July 2005,
+ <https://www.rfc-editor.org/info/rfc4122>.
+
+ [RFC7595] Thaler, D., Ed., Hansen, T., and T. Hardie, "Guidelines
+ and Registration Procedures for URI Schemes", BCP 35,
+ RFC 7595, DOI 10.17487/RFC7595, June 2015,
+ <https://www.rfc-editor.org/info/rfc7595>.
+
+ [RFC8322] Field, J., Banghart, S., and D. Waltermire, "Resource-
+ Oriented Lightweight Information Exchange (ROLIE)",
+ RFC 8322, DOI 10.17487/RFC8322, February 2018,
+ <https://www.rfc-editor.org/info/rfc8322>.
+
+ [RFC8520] Lear, E., Droms, R., and D. Romascanu, "Manufacturer Usage
+ Description Specification", RFC 8520,
+ DOI 10.17487/RFC8520, March 2019,
+ <https://www.rfc-editor.org/info/rfc8520>.
+
+ [RFC9334] Birkholz, H., Thaler, D., Richardson, M., Smith, N., and
+ W. Pan, "Remote ATtestation procedureS (RATS)
+ Architecture", RFC 9334, DOI 10.17487/RFC9334, January
+ 2023, <https://www.rfc-editor.org/info/rfc9334>.
+
+ [SEMVER] Preston-Werner, T., "Semantic Versioning 2.0.0",
+ <https://semver.org/spec/v2.0.0.html>.
+
+ [SWID-GUIDANCE]
+ Waltermire, D., Cheikes, B. A., Feldman, L., and G. Witte,
+ "Guidelines for the Creation of Interoperable Software
+ Identification (SWID) Tags", NISTIR 8060, April 2016,
+ <https://doi.org/10.6028/NIST.IR.8060>.
+
+ [X.1520] ITU-T, "Common vulnerabilities and exposures", ITU-T
+ Recommendation X.1520, January 2014,
+ <https://www.itu.int/rec/T-REC-X.1520>.
+
+Acknowledgments
+
+ This document draws heavily on the concepts defined in the ISO/IEC
+ 19770-2:2015 specification. The authors of this document are
+ grateful for the prior work of the 19770-2 contributors.
+
+ We are also grateful for the careful reviews provided by the IESG
+ reviewers. Special thanks go to Benjamin Kaduk.
+
+Contributors
+
+ Carsten Bormann
+ Universität Bremen TZI
+ Postfach 330440
+ D-28359 Bremen
+ Germany
+ Phone: +49-421-218-63921
+ Email: cabo@tzi.org
+
+
+ Carsten Bormann contributed to the CDDL specifications and the IANA
+ considerations.
+
+Authors' Addresses
+
+ Henk Birkholz
+ Fraunhofer SIT
+ Rheinstrasse 75
+ 64295 Darmstadt
+ Germany
+ Email: henk.birkholz@sit.fraunhofer.de
+
+
+ Jessica Fitzgerald-McKay
+ National Security Agency
+ 9800 Savage Road
+ Ft. Meade, Maryland 20755
+ United States of America
+ Email: jmfitz2@cyber.nsa.gov
+
+
+ Charles Schmidt
+ The MITRE Corporation
+ 202 Burlington Road
+ Bedford, Massachusetts 01730
+ United States of America
+ Email: cmschmidt@mitre.org
+
+
+ David Waltermire
+ National Institute of Standards and Technology
+ 100 Bureau Drive
+ Gaithersburg, Maryland 20877
+ United States of America
+ Email: david.waltermire@nist.gov