[Rats] FW: New Version Notification for draft-tschofenig-rats-psa-token-08.txt

Thomas Fossati <Thomas.Fossati@arm.com> Wed, 24 March 2021 10:12 UTC

Return-Path: <Thomas.Fossati@arm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A4663A2962 for <rats@ietfa.amsl.com>; Wed, 24 Mar 2021 03:12:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=eSCplV5l; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=eSCplV5l
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9pTe7qij8Dfs for <rats@ietfa.amsl.com>; Wed, 24 Mar 2021 03:12:23 -0700 (PDT)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2089.outbound.protection.outlook.com [40.107.21.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 318DD3A2960 for <rats@ietf.org>; Wed, 24 Mar 2021 03:12:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QQclxnc+mJ4HAfi7GRVtaNlRkZu4d+PRO/qXdCA/YHg=; b=eSCplV5lhvEIgOd1P2Q80bK88hSd+PVc6D8+gHrNRQ9tkpolZPlEH5WofeAznEEJVYnryEtNBY55VZIpXeC3asIxSCK9RE/rNGdkREH6Vx9J0QcV9wXM8Yji5RDaE7vPOjpEYWVql0LQAQ9v2mC/br+8kL1f3R6JYSO+k6mx0UU=
Received: from AM5PR0701CA0053.eurprd07.prod.outlook.com (2603:10a6:203:2::15) by AM6PR08MB4772.eurprd08.prod.outlook.com (2603:10a6:20b:cf::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3955.23; Wed, 24 Mar 2021 10:12:20 +0000
Received: from VE1EUR03FT056.eop-EUR03.prod.protection.outlook.com (2603:10a6:203:2:cafe::bd) by AM5PR0701CA0053.outlook.office365.com (2603:10a6:203:2::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.10 via Frontend Transport; Wed, 24 Mar 2021 10:12:20 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT056.mail.protection.outlook.com (10.152.19.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.25 via Frontend Transport; Wed, 24 Mar 2021 10:12:19 +0000
Received: ("Tessian outbound 1b6dfb84c254:v89"); Wed, 24 Mar 2021 10:12:19 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: f99f86f1e6e43751
X-CR-MTA-TID: 64aa7808
Received: from 48f34d5af19f.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id A5D2FA99-B676-46ED-A694-E8F43FD7FC52.1; Wed, 24 Mar 2021 10:12:12 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 48f34d5af19f.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 24 Mar 2021 10:12:12 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kAKBGKpGZ44FKjtWWWdPz+7JqsGiMPN6eN0MRg67f9cUnzWWCVjzdOrJHtAnR3GanNtwlCq0C+RBtlLssutG0R+/59Mf7YeE6CYI30by7B1VPx3oguFmODf7DvPAxb6jR59USSzS4WiJ/kpwUHJTfwJBfuUURAxwWiqHbUIqsHdlMU6YWMoN4G97VZS3zGTnlqbb6CUtIRcWGHDXZsH1KhBfkkekUzGw2pIaily6HiMYUO7QWlwKHeGUYcNSZ3xEz2FhGtPN4U1D6QiUg+QXsKq3UCrEr2JaZC6kemjS6sqgWDlaRsbaaTZq31fM61+FYUBYi0asXUg6IUdBVTi+PQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QQclxnc+mJ4HAfi7GRVtaNlRkZu4d+PRO/qXdCA/YHg=; b=KfoaRAwCPefzuEFnipj2SFypvtpurxuG9+m3HTlLFvFA6dP4iWdtQ3X0Qo7knU0Km9Byy5ZgW23YbHJErDdydIf6FuDSAqC9+ufPiiewUgtOFBvziOFcdJE+BM7ovoAUSmr+R2EU9eH96uxCuiEuZuQRWfLHBPyMQfdnXvQaGlJABEAvIFKFuSLl8uNupj7rXmRaASV1X0ZFKR+oZ1b2suGh/ktadK3JQb2mBrgrCXUU8kNRjCQpLkV332jiKlVVEAu06cvKsysSkZRdy9/uRwL+5YhKggvUFDyt6eMk8kkagA7yG7CO0/3z6Tpb7IFDgWEICo5D5plKRiLCyAW8Kw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QQclxnc+mJ4HAfi7GRVtaNlRkZu4d+PRO/qXdCA/YHg=; b=eSCplV5lhvEIgOd1P2Q80bK88hSd+PVc6D8+gHrNRQ9tkpolZPlEH5WofeAznEEJVYnryEtNBY55VZIpXeC3asIxSCK9RE/rNGdkREH6Vx9J0QcV9wXM8Yji5RDaE7vPOjpEYWVql0LQAQ9v2mC/br+8kL1f3R6JYSO+k6mx0UU=
Received: from AS8PR08MB6517.eurprd08.prod.outlook.com (2603:10a6:20b:31b::8) by AM6PR08MB3975.eurprd08.prod.outlook.com (2603:10a6:20b:a7::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3955.18; Wed, 24 Mar 2021 10:12:09 +0000
Received: from AS8PR08MB6517.eurprd08.prod.outlook.com ([fe80::b5e4:1338:b6a5:7c3a]) by AS8PR08MB6517.eurprd08.prod.outlook.com ([fe80::b5e4:1338:b6a5:7c3a%3]) with mapi id 15.20.3977.025; Wed, 24 Mar 2021 10:12:08 +0000
From: Thomas Fossati <Thomas.Fossati@arm.com>
To: "rats@ietf.org" <rats@ietf.org>
CC: Thomas Fossati <Thomas.Fossati@arm.com>
Thread-Topic: New Version Notification for draft-tschofenig-rats-psa-token-08.txt
Thread-Index: AQHXIJWkgLw69DiiWkyP2orUWqrG76qS6x6A
Date: Wed, 24 Mar 2021 10:12:08 +0000
Message-ID: <BEED5B7A-6AA7-487C-9638-79009099B8FE@arm.com>
References: <161658050035.26964.17305322772051555454@ietfa.amsl.com>
In-Reply-To: <161658050035.26964.17305322772051555454@ietfa.amsl.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.47.21031401
Authentication-Results-Original: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=arm.com;
x-originating-ip: [82.12.10.179]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 3c0ffcc1-01cc-46d6-6c76-08d8eead4f4b
x-ms-traffictypediagnostic: AM6PR08MB3975:|AM6PR08MB4772:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS: <AM6PR08MB47721753AB263436391EF2369C639@AM6PR08MB4772.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:8273;OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 8oa7oqalQsScGgK45P56FFALUwsQiUROpzVkrNnm5HyrxudTBX0er4706cwkV06VgaA1RlE5jCJ/faKsEoRRdE/tV7Das957l9FwJlidwzwRvwZHYSOB2Db3Jb5/cXvUmqUJyPBc6ENr9CzjikhuKxs7so0UV+AZdKTrqy011LXLYrCZfGGJ0/DoQegi9N+NVj61NBB+bUvog1WjkzQIGzBnIZCYfhrm8bbPPqHmqrTsYCWLm/HspsV6b04SwqdMLiVmgctfHXzTecEElWDYFpW7rVwrEm6ikGn/4XTzn7c5/DDVAgcaBJmZ4ghRXYYE0DBCWMICGvJn3Zm7NI7IoPRCZPU45FyY/S/qa/zurcBYH+dJxFC65KCthJ7pg31HIxcvxf7aFyMauID8QJayaqr2+AKWwNg3vJi51inuZ0+ugVn9vF/cCsZeM4Qlo7BHsd7y13P31bQAdT5WjY3gaxaG3kPVQzHlcB9rZ3MAC4rHBy1CJbJyVde9bEHJeY+wRVClVchtbndlz0LAshKO6yipRTrWLtT18cohXKl/jD/3SHf3mQXS36j8Sz55l8akzz2zAiymZxgDS4NeqTQa4ymMYLj6O3x2rHiF4MiCMh1qoDD65JYhtj0cTfw0xJkDc2wDO0O2r6pJ6ITsUabEx5luc6S1fGcMM3DPmu4UIUy2V8yZV3Kseqe8fPRL1gXOPeIg/6rPF9BDQIlsK/+KbNsiequ6EvlthXuIfc89AoywigQu58SQszqvxuhZiQjR143+/uUSIAFdjRdgLnjuMw==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR08MB6517.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(396003)(136003)(366004)(376002)(346002)(38100700001)(6916009)(2906002)(76116006)(66556008)(15650500001)(66946007)(91956017)(186003)(66446008)(64756008)(6486002)(5660300002)(66476007)(478600001)(2616005)(316002)(26005)(8936002)(966005)(6512007)(8676002)(71200400001)(4326008)(33656002)(36756003)(86362001)(6506007)(53546011)(66574015)(83380400001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: =?utf-8?B?emVnL09Sd2hNbSt0KzRlRG9DUTVkS0VxL2NvVFRxcnp5OVNrRGZtZThLaEh6?= =?utf-8?B?SFlZTlVFTjZPRmNEY3ROL3NJY2xIU2V0SW12MzVIR1RhbCtzMjlwTW9GUUZu?= =?utf-8?B?WElvdllXNDA1czNTWk9ZOFFBK1NMZHFWZFNHRE1La1Iyc1F3T3g5dHUydVZ0?= =?utf-8?B?QVV4V1BPbTR3UTZhTHNDcEFrNHZ3eVBOb1c1UFlJWEh5cWMzQ3hXMjcwSzhP?= =?utf-8?B?bTlidDVWaVU3NzJEcTdMUVh2WmRiT3Z2LzVQcWJEbmlhajNBWFgrazRIZFJY?= =?utf-8?B?MkhwWlVaUzJLai9pSWRMd0FmNVpnRlB1SkxTTzkwZjVBV1NqeHVjM09yR0Rk?= =?utf-8?B?eWFVUGR6ZVIyNklXUEFrZk9wNjg1RWVYODNyZWZ0WlAwdnA1OUZQQVgzaGho?= =?utf-8?B?ak9JOVZNU0pFV1VwRm1JYis0a1UvY25uYWM5V042NGhab0ZJS3k5Y3JqenBM?= =?utf-8?B?QVZiQ2RDSVloWmZpQzRiUzB0S1dRbExjLzV4Q3FidEc4ZUVuZkkxNVVVekda?= =?utf-8?B?MTgwbkh0V1N4ZUdCcVZuM0FYLzUxYXJRVVBvZXEvMWlrRFpLdU9CbTdGMy95?= =?utf-8?B?RjhYUDJxcW1FcW5lMXdhK0JsQkZZNWk5djJ1dGVCaTJkSklML2grZ2Q5SS9F?= =?utf-8?B?Q0crTWpDSnM1cFVVbkdDTHRsZXMzVzlyWnpTYkN6ZWpGMHRvSTlhLzRLYURt?= =?utf-8?B?QUtmbm1pOXVlMG82bW9iWnN1SkMwRGozelhFTHFUZGxHWFVraHYrUFJHWHY0?= =?utf-8?B?UjlxSU9pL2pnWU8wY1g2dkZQRUZmTi9YUnBZd3Zpdmp5ZHdCWlVLNC9zaDlo?= =?utf-8?B?dUEra214dFVzUEUzeXdnaFFpYW5VeVlub3k5eWxTa0RORFVpSS9VYi93QWtR?= =?utf-8?B?dE8wRURPY0tyK2d0bkw2L053TlU4VGpDYUtxa2xKL2Q4SkFIZDRqZ3EvU2hi?= =?utf-8?B?V2tFVHBiOG1tUi82TGR5ZmhaYmFGREJ2NHkwM2h2bjBReUFvZ0tlVTBMYTQ4?= =?utf-8?B?SlIwR0tOOWdGbzU0a2RON1E5V1B6bkpXdk1KeDZiZERJcm1TeVpUY2ZXVXNL?= =?utf-8?B?VlM5Q2ZER2NTTGJHbkFENFY3RXpHcGxaTFVDNnlZRWdGSmpnQ2l1L1pVb21P?= =?utf-8?B?b25acmo1aHZ5dnAxOGM1OE0ycnNaeUtZWllnTzZJSVhrZnp0bHNxemtLUXFN?= =?utf-8?B?R2JLbi9HdGltcmdUZ0xxdWpmVXpMNTBlN0ZYRUNRbmJ1ZlJiRWthZ2MvM3lp?= =?utf-8?B?QUNBb1BBRFlkYWVLUUdkd20zL3piMEg1ZkQ3L1ZEU0s3c2RYK0w3RXJSQ1R5?= =?utf-8?B?Ym9CNnZ1a2FEenk1bHBEZGx1bHFaQjV6NzhMakxHRHBpT1RYMjhrZ2NoTDhk?= =?utf-8?B?UUN1YWlxdmQ5NVZ0eGU2SUQwY1J4YmptUFJxZ2ZXT3VnRlR2cVczMGdnNFhz?= =?utf-8?B?TWk0NUltNUZlVWpqN2N0MzhPNjQrVkQxeDlWWlBwc1RMRE5nZU5saDdJbHVk?= =?utf-8?B?QWlqWHN1YXZENGpyOGlQemZscWRTSVpTL2x2SENkWDNxRVJRY0FSRGIzZVVX?= =?utf-8?B?WVJQNHVwS1prL2JCYlJUampicW5Qc2RtVUtzbVh4TE5LNWdlQnFob1ZnM2ha?= =?utf-8?B?SVhrWmlwV05UUG5MY005SDlNbEFKOWJRdEo3TGtrQmNnL3VqMHIwMHJtdTNt?= =?utf-8?B?Zlo2NUhuWlljdjNLbVEyK1JPQXg4VlliSXdTaXl5RjBZbXMrbHZIVDM2OUhN?= =?utf-8?Q?5izRxOFKdPg+WquI10JOf/Ep5KU1rFlMg13G+EL?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <280E941920E19C4F9C279ECAF13BE463@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3975
Original-Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: ade42dbf-0a0a-46ab-bef2-08d8eead48bb
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(376002)(346002)(396003)(39860400002)(136003)(46966006)(36840700001)(356005)(47076005)(83380400001)(186003)(70586007)(6916009)(966005)(70206006)(36756003)(316002)(82740400003)(6486002)(6506007)(86362001)(81166007)(36860700001)(336012)(66574015)(2906002)(478600001)(53546011)(82310400003)(8936002)(8676002)(6512007)(4326008)(2616005)(33656002)(26005)(15650500001)(5660300002); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2021 10:12:19.8314 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 3c0ffcc1-01cc-46d6-6c76-08d8eead4f4b
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4772
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/hsJQCzf0T1k9GD5y_MuuL81KSbY>
Subject: [Rats] FW: New Version Notification for draft-tschofenig-rats-psa-token-08.txt
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Mar 2021 10:12:28 -0000

Hi all,

The PSA token is now phrased as a EAT profile, using 3 EAT claims from
the IANA pre-registration list, instead of the private ones we have been
using until -07.

We have tried to diligently tick all the boxes in Section 5 ("Profiles")
of the EAT document -- we also added a discussion about the freshness
model that the PSA token assumes.  (Is this something that could be
added to Section 5?)

This is not a WG item, but reviews from WG members would be greatly
appreciated.  We want to get this right as it is likely to become a
blueprint for other profile documents.

Cheers, thank you!

On 24/03/2021, 10:08, "internet-drafts@ietf.org" <internet-drafts@ietf.org> wrote:
>
> A new version of I-D, draft-tschofenig-rats-psa-token-08.txt has been
> successfully submitted by Thomas Fossati and posted to the IETF
> repository.
>
> Name:         draft-tschofenig-rats-psa-token
> Revision:     08
> Title:                Arm's Platform Security Architecture (PSA) Attestation Token
> Document date:        2021-03-24
> Group:                Individual Submission
> Pages:                22
> URL:            https://www.ietf.org/archive/id/draft-tschofenig-rats-psa-token-08.txt
> Status:         https://datatracker.ietf.org/doc/draft-tschofenig-rats-psa-token/
> Html:           https://www.ietf.org/archive/id/draft-tschofenig-rats-psa-token-08.html
> Htmlized:       https://tools.ietf.org/html/draft-tschofenig-rats-psa-token-08
> Diff:           https://www.ietf.org/rfcdiff?url2=draft-tschofenig-rats-psa-token-08
>
> Abstract:
>    The Platform Security Architecture (PSA) is a family of hardware and
>    firmware security specifications, as well as open-source reference
>    implementations, to help device makers and chip manufacturers build
>    best-practice security into products.  Devices that are PSA compliant
>    are able to produce attestation tokens as described in this memo,
>    which are the basis for a number of different protocols, including
>    secure provisioning and network access control.  This document
>    specifies the PSA attestation token structure and semantics.
>
>    The PSA attestation token is a profiled Entity Attestation Token
>    (EAT).
>
>    This specification describes what claims are used in an attestation
>    token generated by PSA compliant systems, how these claims get
>    serialized to the wire, and how they are cryptographically protected.
>
>
>
> Please note that it may take a couple of minutes from the time of
> submission until the htmlized version and diff are available at
> tools.ietf.org.
>
> The IETF Secretariat

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.