Hi Eliot,

On Tue, May 20, 2025 at 09:28:15AM +0100, Independent Submissions Editor (Eliot 
Lear) wrote:
> Authors,
> 
> Please respond to the RFC Editor in a timely fashion.

Sure, we are working on the reply.
It should be relatively quick.

cheers, t

> 
> Regards,
> 
> Eliot
> 
> On 16.05.2025 01:54, rfc-edi...@rfc-editor.org wrote:
> > Authors,
> > 
> > While reviewing this document during AUTH48, please resolve (as necessary)
> > the following questions, which are also in the XML file.
> > 
> > 1) <!-- [rfced] Please insert any keywords (beyond those that appear in
> > the title) for use onhttps://www.rfc-editor.org/search. -->
> > 
> > 
> > 2) <!-- [rfced] The sentence below seems to be missing a verb (such as
> > designed, used, etc.). May we rephrase the sentence as follows to improve
> > readability?
> > 
> > Original:
> >     The Arm Platform Security Architecture (PSA) is a family of hardware
> >     and firmware security specifications, as well as open-source
> >     reference implementations, to help device makers and chip
> >     manufacturers build best-practice security into products.
> > 
> > Perhaps:
> >     The Arm Platform Security Architecture (PSA) is a family of hardware
> >     and firmware security specifications, as well as open-source
> >     reference implementations, that is designed to help device makers and
> >     chip manufacturers build best-practice security into products.
> > -->
> > 
> > 
> > 3) <!-- [rfced] Is the Application domain specified as the security domain
> > outside the SPE in the definition for NSPE? Please clarify.
> > 
> > Original:
> > NSPE:
> >     Non Secure Processing Environment, the security domain outside of
> >     the SPE, the Application domain, typically containing the
> >     application firmware, real-time operating systems, applications
> >     and general hardware.
> > 
> > Perhaps:
> > Non-Secure Processing Environment (NSPE):
> >     The security domain (Application domain) outside of the SPE that
> >     typically contains the application firmware, real-time operating
> >     systems, applications, and general hardware.
> > -->
> > 
> > 
> > 4) <!-- [rfced] Is "them" and "it" referring to "PSA claims" in this
> > sentence?
> > 
> > Original:
> >     The Attesting Environment is responsible for collecting the
> >     information to be represented in PSA claims and to assemble them into
> >     Evidence.  It is made of two cooperating components:
> > 
> > Perhaps:
> >     The Attesting Environment is responsible for collecting the
> >     information to be represented in PSA claims and assembling them into
> >     Evidence.  PSA claims are made of two cooperating components:
> > -->
> > 
> > 
> > 5) <!-- [rfced] May we rephrase the following sentence for clarity?
> > 
> > Original:
> > It MUST be represented as a string made of
> >     nineteen numeric characters: a thirteen-digit [EAN-13], followed by a
> >     dash "-", followed by the five-digit versioning information described
> >     in [PSA-Cert-Guide].
> > 
> > Perhaps:
> > It MUST be represented as a string made of
> >     nineteen numeric characters: a thirteen-digit [EAN-13], followed by a
> >     dash "-", followed by the five-digit versioning information described
> >     in [PSA-Cert-Guide].
> > -->
> > 
> > 
> > 6) <!-- [rfced] We have updated the following sentence for clarity. Please
> > review and let us know any objections.
> > 
> > Original:
> >     The following claims are part of the PSA token (and therefore still
> >     Evidence) but aim to help receivers, including relying parties, with
> >     the processing of the received attestation Evidence.
> > 
> > Current:
> >     The following claims are part of the PSA token (and are therefore still
> >     Evidence). However, they aim to help receivers, including Relying
> >     parties, with the processing of the received attestation Evidence.
> > -->
> > 
> > 
> > 7) <!-- [rfced] Please review whether any of the notes in this document
> > should be in the <aside> element. It is defined as "a container for
> > content that is semantically less important or tangential to the
> > content that surrounds it" 
> > (https://authors.ietf.org/en/rfcxml-vocabulary#aside).
> > -->
> > 
> > 
> > 8) <!-- [rfced] We have updated "certs" in the sentence below to
> > "certifications" for consistency. The use of "certs" has also been updated
> > throughout the rest of the document. Please let us know any objections.
> > 
> > Original:
> >     Certified public keys require the manufacturer to run the
> >     certification authority (CA) that issues X.509 certs for the IAKs.
> > 
> > Current:
> >     Certified public keys require the manufacturer to run the
> >     certification authority (CA) that issues X.509 certifications for the
> >     IAKs.
> > -->
> > 
> > 
> > 9) <!-- [rfced] To clarify, are the reference values described below
> > registered with the Verifier? Or are the claims in this profile compared
> > to reference values in addition to being registered with the Verifier?
> > 
> > Original:
> >     In addition, the Verifier will typically operate a policy where
> >     values of some of the claims in this profile can be compared to
> >     reference values, registered with the Verifier for a given
> >     deployment, in order to confirm that the device is endorsed by the
> >     manufacturer supply chain.
> > 
> > Perhaps:
> >     In addition, the Verifier will typically operate a policy where
> >     values of some of the claims in this profile can be compared to
> >     reference values and registered with the Verifier for a given
> >     deployment in order to confirm that the device is endorsed by the
> >     manufacturer supply chain.
> > 
> > Or:
> >     In addition, the Verifier will typically operate a policy where
> >     values of some of the claims in this profile can be compared to
> >     reference values that are registered with the Verifier for a given
> >     deployment in order to confirm that the device is endorsed by the
> >     manufacturer supply chain.
> > -->
> > 
> > 
> > 10) <!-- [rfced] Should "verification key material to the Verifier" be
> > rewritten as follows for clarity?
> > 
> > Original:
> >     [PSA-Endorsements] defines a protocol based on the [RATS-CoRIM] data
> >     model that can be used to convey PSA Endorsements, Reference Values
> >     and verification key material to the Verifier.
> > 
> > Perhaps:
> >     [PSA-Endorsements] defines a protocol based on the data model
> >     described in [RATS-CoRIM] that can be used to convey PSA Endorsements
> >     and Reference Values, and to verify key material to the Verifier.
> > -->
> > 
> > 
> > 11) <!-- [rfced] Reference-related questions:
> > 
> > a) The following reference appears to be a code repository that was last
> > updated in August 2023.  "iat-verifier" only appears on the page as a link;
> > is the goal to point readers to the iat-verifier tree?  Please review.
> > 
> > Currently, we have updated the document as described below to follow the
> > RFC style guidance 
> > (seehttps://www.rfc-editor.org/styleguide/part2/#ref_repo).  We may make 
> > more updates depending on the answer to the
> > question above.
> > 
> > Original:
> >     [IAT-VERIFIER]
> >                Linaro, "iat-verifier", 2023,
> >                <https://git.trustedfirmware.org/TF-M/tf-m-tools.git/tree/ 
> > iat-verifier>.
> > 
> > Current:
> > [IAT-VERIFIER]
> >      Trusted Firmware, "iat-verifier", commit: 
> > 0b49b00195b7733d6fe74e8f42ed4d7b81242801, 18 August 
> > 2023,<https://git.trustedfirmware.org/TF-M/tf-m-tools.git/tree/iat-verifier>.
> > 
> > 
> > 
> > b) Please review the following reference. The URL provided for [PSA]
> > redirects to the following 
> > link:https://www.arm.com/architecture/security-features.
> > We found
> > https://developer.arm.com/documentation/101892/0100/Security-Platform-Security-Architecture?lang=en
> > (please note that the actual URL contains three hyphens between "/Security"
> > and "Platform", but XML comments break when more than two hyphens appear
> > consecutively in a URL). If there are no objections, we will update the 
> > reference as follows.
> > 
> > Original:
> >     [PSA]      Arm, "Platform Security Architecture Resources", 2022,
> >                <https://developer.arm.com/architectures/security-
> > architectures/platform-security-architecture/ documentation>.
> > 
> > Perhaps:
> >     [PSA]      Arm, "Security - Platform Security Architecture",
> >                <https://developer.arm.com/architectures/security-
> > architectures/platform-security-architecture/ documentation>.
> > 
> > c) Note that we have updated the title of the following reference, as the
> > title of the webpage appears to have changed since 2022.  If another page 
> > is preferred, please let us know.
> > 
> > Original:
> >     [PSACertified]
> >                PSA Certified, "PSA Certified IoT Security Framework",
> >                2022,<https://psacertified.org>.
> > 
> > Current:
> >     [PSACertified]
> >                PSA Certified, "Expert IoT Security Framework and
> >                Certification",<https://psacertified.org>.
> > 
> > d) It appears as though the goal is to refer to the most recent I-D prior 
> > to deprecation of the "private use range" values.  As such, we have updated 
> > the reference to refer to version -08.  Please review and let us know if 
> > any updates are needed.
> > 
> > Original:
> >     [PSA-OLD]  Tschofenig, H., Frost, S., Brossard, M., Shaw, A. L., and
> >                T. Fossati, "Arm's Platform Security Architecture (PSA)
> >                Attestation Token", Work in Progress, Internet-Draft,
> >                draft-tschofenig-rats-psa-token-07, 1 February 2021,
> >                <https://datatracker.ietf.org/doc/html/draft-tschofenig-
> > rats-psa-token-07>.
> > -->
> > 
> > 
> > 12) <!-- [rfced] We have updated the reference for [STD96] to include 
> > entries for both of the RFCs (9052 and 9338) that comprise the STD.  Please 
> > review consider whether the text should specifically refer to RFC 9052 only 
> > or if the current update is acceptable.
> > 
> > Original:
> >     COSE_Sign1 is used for digital signatures and COSE_Mac0 for
> >     MACs, as defined in the COSE specification [STD96].
> > 
> > 
> >     [STD96]    Schaad, J., "CBOR Object Signing and Encryption (COSE):
> >                Structures and Process", STD 96, RFC 9052,
> >                DOI 10.17487/RFC9052, August 2022,
> >                <https://www.rfc-editor.org/rfc/rfc9052>.
> > 
> > Current:
> >     COSE_Sign1 is used for digital signatures and COSE_Mac0 for
> >     MACs as defined in the COSE specification [STD96].
> > 
> >     [STD96]    Internet Standard 96,
> >                <https://www.rfc-editor.org/info/std96>.
> >                At the time of writing, this STD comprises the following:
> > 
> >                Schaad, J., "CBOR Object Signing and Encryption (COSE):
> >                Structures and Process", STD 96, RFC 9052,
> >                DOI 10.17487/RFC9052, August 2022,
> >                <https://www.rfc-editor.org/info/rfc9052>.
> > 
> >                Schaad, J., "CBOR Object Signing and Encryption (COSE):
> >                Countersignatures", STD 96, RFC 9338,
> >                DOI 10.17487/RFC9338, December 2022,
> >                <https://www.rfc-editor.org/info/rfc9338>.
> > 
> > Perhaps:
> >     COSE_Sign1 is used for digital signatures and COSE_Mac0 for
> >     MACs as defined in the COSE specification [RFC9052].
> > -->
> > 
> > 
> > 13) <!-- [rfced] Please review each artwork element and let us know if any
> > should be marked as sourcecode (or another element) instead.
> > 
> > In addition, review the updates to sourcecode with type="cddl".  If
> > <sourcecode> is used elsewhere in the document, please consider whether the
> > type should be set.  The current list of preferred values for "type" is
> > available at
> > <https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types>.
> > If the current list does not contain an applicable type, feel free to
> > suggest additions for consideration. Note that it is also acceptable
> > to leave the "type" attribute not set.
> > -->
> > 
> > 
> > 14) <!-- [rfced] Terminology
> > 
> > a) We note that <tt> tags are used with a few terms
> > throughout the document. We also note that these terms also appear
> > without <tt> tags. Please consider whether updates are needed for
> > consistency. The pattern of use is unclear to us.
> > 
> > <tt>bootseed</tt> vs. bootseed
> > <tt>configuration</tt> vs. configuration
> > <tt>eat_profile</tt> vs. eat_profile
> > <tt>hardware</tt> vs. hardware
> > <tt>nonce</tt> vs. nonce
> > 
> > b) Please let us know how we should update the following terms for
> > consistency throughout the document.
> > 
> > EAT nonce claim vs. nonce claim vs. Nonce claim
> > Arm's Platform Security Architecture vs. The Arm Platform Security 
> > Architecture
> > Boot Seed vs. bootseed
> > claims-set vs. claims sets (Appendix A)
> > PSA-token claims-set vs. PSA claims-set (Appendix A)
> > -->
> > 
> > 
> > 15) <!-- [rfced] FYI - We have added expansions for abbreviations upon
> > first use per Section 3.6 of RFC 7322 ("RFC Style Guide"). The abbreviated
> > form of each term is used thereafter. Please review each expansion in the
> > document carefully to ensure correctness.
> > -->
> > 
> > 
> > 16) <!-- [rfced] Please review the "Inclusive Language" portion of the
> > online Style Guide
> > <https://www.rfc-editor.org/styleguide/part2/#inclusive_language> and let
> > us know if any changes are needed.  Updates of this nature typically
> > result in more precise language, which is helpful for readers. Note that
> > our script did not flag any words in particular, but this should still be
> > reviewed as a best practice. -->
> > 
> > 
> > Thank you.
> > 
> > RFC Editor
> > 
> > 
> > On May 15, 2025, at 4:45 PM,rfc-edi...@rfc-editor.org wrote:
> > 
> > *****IMPORTANT*****
> > 
> > Updated 2025/05/15
> > 
> > RFC Author(s):
> > --------------
> > 
> > Instructions for Completing AUTH48
> > 
> > Your document has now entered AUTH48.  Once it has been reviewed and
> > approved by you and all coauthors, it will be published as an RFC.
> > If an author is no longer available, there are several remedies
> > available as listed in the FAQ (https://www.rfc-editor.org/faq/).
> > 
> > You and you coauthors are responsible for engaging other parties
> > (e.g., Contributors or Working Group) as necessary before providing
> > your approval.
> > 
> > Planning your review
> > ---------------------
> > 
> > Please review the following aspects of your document:
> > 
> > *  RFC Editor questions
> > 
> >     Please review and resolve any questions raised by the RFC Editor
> >     that have been included in the XML file as comments marked as
> >     follows:
> > 
> >     <!-- [rfced] ... -->
> > 
> >     These questions will also be sent in a subsequent email.
> > 
> > *  Changes submitted by coauthors
> > 
> >     Please ensure that you review any changes submitted by your
> >     coauthors.  We assume that if you do not speak up that you
> >     agree to changes submitted by your coauthors.
> > 
> > *  Content
> > 
> >     Please review the full content of the document, as this cannot
> >     change once the RFC is published.  Please pay particular attention to:
> >     - IANA considerations updates (if applicable)
> >     - contact information
> >     - references
> > 
> > *  Copyright notices and legends
> > 
> >     Please review the copyright notice and legends as defined in
> >     RFC 5378 and the Trust Legal Provisions
> >     (TLP –https://trustee.ietf.org/license-info).
> > 
> > *  Semantic markup
> > 
> >     Please review the markup in the XML file to ensure that elements of
> >     content are correctly tagged.  For example, ensure that <sourcecode>
> >     and <artwork> are set correctly.  See details at
> >     <https://authors.ietf.org/rfcxml-vocabulary>.
> > 
> > *  Formatted output
> > 
> >     Please review the PDF, HTML, and TXT files to ensure that the
> >     formatted output, as generated from the markup in the XML file, is
> >     reasonable.  Please note that the TXT will have formatting
> >     limitations compared to the PDF and HTML.
> > 
> > 
> > Submitting changes
> > ------------------
> > 
> > To submit changes, please reply to this email using ‘REPLY ALL’ as all
> > the parties CCed on this message need to see your changes. The parties
> > include:
> > 
> >     *  your coauthors
> >     *rfc-edi...@rfc-editor.org (the RPC team)
> > 
> >     *  other document participants, depending on the stream (e.g.,
> >        IETF Stream participants are your working group chairs, the
> >        responsible ADs, and the document shepherd).
> >     *auth48archive@rfc-editor.org, which is a new archival mailing list
> >        to preserve AUTH48 conversations; it is not an active discussion
> >        list:
> >       *  More info:
> >          
> > https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
> >       *  The archive itself:
> >          https://mailarchive.ietf.org/arch/browse/auth48archive/
> > 
> >       *  Note: If only absolutely necessary, you may temporarily opt out
> >          of the archiving of messages (e.g., to discuss a sensitive matter).
> >          If needed, please add a note at the top of the message that you
> >          have dropped the address. When the discussion is concluded,
> >          auth48archive@rfc-editor.org will be re-added to the CC list and
> >          its addition will be noted at the top of the message.
> > 
> > You may submit your changes in one of two ways:
> > 
> > An update to the provided XML file
> >   — OR —
> > An explicit list of changes in this format
> > 
> > Section # (or indicate Global)
> > 
> > OLD:
> > old text
> > 
> > NEW:
> > new text
> > 
> > You do not need to reply with both an updated XML file and an explicit
> > list of changes, as either form is sufficient.
> > 
> > We will ask a stream manager to review and approve any changes that seem
> > beyond editorial in nature, e.g., addition of new text, deletion of text,
> > and technical changes.  Information about stream managers can be found in
> > the FAQ.  Editorial changes do not require approval from a stream manager.
> > 
> > 
> > Approving for publication
> > --------------------------
> > 
> > To approve your RFC for publication, please reply to this email stating
> > that you approve this RFC for publication.  Please use ‘REPLY ALL’,
> > as all the parties CCed on this message need to see your approval.
> > 
> > 
> > Files
> > -----
> > 
> > The files are available here:
> >     https://www.rfc-editor.org/authors/rfc9783.xml
> >     https://www.rfc-editor.org/authors/rfc9783.html
> >     https://www.rfc-editor.org/authors/rfc9783.pdf
> >     https://www.rfc-editor.org/authors/rfc9783.txt
> > 
> > Diff file of the text:
> >     https://www.rfc-editor.org/authors/rfc9783-diff.html
> >     https://www.rfc-editor.org/authors/rfc9783-rfcdiff.html (side by side)
> > 
> > Diff of the XML:
> >     https://www.rfc-editor.org/authors/rfc9783-xmldiff1.html
> > 
> > 
> > Tracking progress
> > -----------------
> > 
> > The details of the AUTH48 status of your document are here:
> >     https://www.rfc-editor.org/auth48/rfc9783
> > 
> > Please let us know if you have any questions.
> > 
> > Thank you for your cooperation,
> > 
> > RFC Editor
> > 
> > --------------------------------------
> > RFC 9783 (draft-tschofenig-rats-psa-token-24)
> > 
> > Title            : Arm's Platform Security Architecture (PSA) Attestation 
> > Token
> > Author(s)        : H. Tschofenig, S. Frost, M. Brossard, A. Shaw, T. Fossati
> > WG Chair(s)      :
> > Area Director(s) :
> > 
> > 

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org
  • [auth48] Re:... RFC Editor via auth48archive
    • [auth48... Independent Submissions Editor (Eliot Lear) via auth48archive
      • [au... Thomas Fossati via auth48archive
    • [auth48... Thomas Fossati via auth48archive
      • [au... Hannes Tschofenig via auth48archive
      • [au... Madison Church via auth48archive
        • ... Hannes Tschofenig via auth48archive
          • ... Thomas Fossati via auth48archive
        • ... Thomas Fossati via auth48archive
          • ... Independent Submissions Editor (Eliot Lear) via auth48archive
            • ... Madison Church via auth48archive
              • ... Madison Church via auth48archive
                • ... Mathias Brossard via auth48archive

Reply via email to