<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title type="text">I-D list for CBOR Object Signing and Encryption RSS Feed</title>
    <subtitle type="text">Document changes</subtitle>
    <id>urn:uuid:431157af-95b7-5a31-bc81-e9cd620ee547</id>
    <updated>2026-04-17T18:41:14.172483+00:00</updated>
    <link rel="alternate" type="text/html" hreflang="en" href="https://datatracker.ietf.org/"/>
    <link rel="self" type="application/atom+xml" href="https://datatracker.ietf.org/group/cose/documents/feed/"/>

    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1137961</id>
        
        <updated>2026-04-15T17:44:40.902449+00:00</updated>
        
        <published>2026-04-15T17:44:40.902449+00:00</published>
        
        <author>
            <name>David Dong</name>
        </author>

        <content type="html">IANA Experts State changed to &lt;b&gt;Issues identified&lt;/b&gt; from Reviews assigned</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_state</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1137571</id>
        
        <updated>2026-04-14T03:10:15.057530+00:00</updated>
        
        <published>2026-04-14T03:10:15.057530+00:00</published>
        
        <author>
            <name>Christopher Inacio</name>
        </author>

        <content type="html">Telechat date has been changed to &lt;b&gt;2026-04-30&lt;/b&gt; (Previous date was &lt;b&gt;2026-04-16&lt;/b&gt;)</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>scheduled_for_telechat</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1137570</id>
        
        <updated>2026-04-14T03:10:15.048073+00:00</updated>
        
        <published>2026-04-14T03:10:15.048073+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">Changed action holders to Christopher Inacio (IESG state changed)</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_action_holders</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1137569</id>
        
        <updated>2026-04-14T03:10:15.003594+00:00</updated>
        
        <published>2026-04-14T03:10:15.003594+00:00</published>
        
        <author>
            <name>Christopher Inacio</name>
        </author>

        <content type="html">IESG state changed to &lt;b&gt;IESG Evaluation - Defer&lt;/b&gt; from IESG Evaluation</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_state</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1137395</id>
        
        <updated>2026-04-13T12:21:15.536583+00:00</updated>
        
        <published>2026-04-13T12:21:15.536583+00:00</published>
        
        <author>
            <name>Corey Bonnell</name>
        </author>

        <content type="html">Request for Telechat review by SECDIR Completed: Has Nits. Reviewer: Corey Bonnell. Sent review to list.</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>closed_review_assignment</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1137379</id>
        
        <updated>2026-04-13T11:52:06.645444+00:00</updated>
        
        <published>2026-04-13T11:52:06.645444+00:00</published>
        
        <author>
            <name>Jim Guichard</name>
        </author>

        <content type="html">[Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_ballot_position</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1136812</id>
        
        <updated>2026-04-10T18:04:42.504696+00:00</updated>
        
        <published>2026-04-10T18:04:42.504696+00:00</published>
        
        <author>
            <name>Andy Newton</name>
        </author>

        <content type="html">[Ballot Position Update] New position, No Objection, has been recorded for Andy Newton</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_ballot_position</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1136726</id>
        
        <updated>2026-04-10T14:03:45.251999+00:00</updated>
        
        <published>2026-04-10T14:03:45.251999+00:00</published>
        
        <author>
            <name>Éric Vyncke</name>
        </author>

        <content type="html">[Ballot discuss]&lt;br&gt;&lt;br&gt;# Éric Vyncke INT AD comments for draft-ietf-cose-cbor-encoded-cert-17&lt;br&gt;CC @evyncke&lt;br&gt;&lt;br&gt;Thank you for the work put into this document.&lt;br&gt;&lt;br&gt;Please find below some blocking DISCUSS points, some non-blocking COMMENT points/nits (replies would be appreciated even if only for my own education).&lt;br&gt;&lt;br&gt;Special thanks to Ivaylo Petrov for the shepherd&#x27;s write-up including the WG consensus *BUT* it lacks the justification of the intended status.&lt;br&gt;&lt;br&gt;Other thanks to Ted Lemon, the DNS directorate reviewer:&lt;br&gt;https://datatracker.ietf.org/doc/review-ietf-cose-cbor-encoded-cert-17-dnsdir-telechat-lemon-2026-03-30/ (and I have read the previous email threads with the authors)&lt;br&gt;&lt;br&gt;I hope that this review helps to improve the document,&lt;br&gt;&lt;br&gt;Regards,&lt;br&gt;&lt;br&gt;-éric&lt;br&gt;&lt;br&gt;Note: this ballot comments follow the Markdown syntax of https://github.com/mnot/ietf-comments/tree/main, i.e., they can be processed by a tool to create github issues.&lt;br&gt;&lt;br&gt;## DISCUSS (blocking)&lt;br&gt;&lt;br&gt;As noted in https://datatracker.ietf.org/doc/statement-iesg-handling-ballot-positions-20220121/, a DISCUSS ballot is a request to have a discussion on the points below; I really think that the document would be improved with a change here, but can be convinced otherwise.&lt;br&gt;&lt;br&gt;### Section 3.3&lt;br&gt;&lt;br&gt;About &quot;IpAddrBlocks&quot;, the whole text is a little unclear to me to be honest, so I may have misread the specification BUT the text `It should be noted that using address differences for compactness prevents encoding an address range larger than 2**64 - 1 corresponding to the CBOR integer max value.` seems really a bad choice for IPv6 addresses as the usual prefix size if 64-bit long. I.e., the encoding cannot cope with 2001:db8::/63. There are no examples in the appendix about this encoding, and this does not help the reader.&lt;br&gt;&lt;br&gt;Also very unclear to me (missing references and how to use): `IPAddressFamily = (AFI: uint, SAFI: uint / null, IPAddressChoice)`&lt;br&gt;&lt;br&gt;The text `as specified in [I-D.ietf-lamps-macaddress-on]` makes the reference normative.</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1136725</id>
        
        <updated>2026-04-10T14:03:45.251978+00:00</updated>
        
        <published>2026-04-10T14:03:45.251978+00:00</published>
        
        <author>
            <name>Éric Vyncke</name>
        </author>

        <content type="html">[Ballot comment]&lt;br&gt;&lt;br&gt;## COMMENTS (non-blocking)&lt;br&gt;&lt;br&gt;### Section 1&lt;br&gt;&lt;br&gt;Please add a reference to `IEEE 802.1AR (DevID)`.&lt;br&gt;&lt;br&gt;Also add references to `C509 is deployed in, e.g.,...``&lt;br&gt;&lt;br&gt;### Section 3.1.8 (and others)&lt;br&gt;&lt;br&gt;What does `Not supported.` mean in this case ? Should the text be explicit and state that if this field exist in the X.509 then no C509 can be generated? (just to be clear)&lt;br&gt;&lt;br&gt;### Section 3.3&lt;br&gt;&lt;br&gt;About &quot;Name Constraints&quot; s/where the last octet indicates the number of bits in the *netmask*/where the last octet indicates the number of bits in the *prefix*/ &lt;br&gt;&lt;br&gt;About &quot;IPAddrBlocks&quot;, just wondering why not using the &#x27;number of used octets&#x27; as it is closer to the usual CIDR/IPv6 prefix notation in `Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint` ?&lt;br&gt;&lt;br&gt;`KeyIdentifier SHOULD be composed of the leftmost 160-bits of the SHA-256 hash of the CBOR encoded subjectPublicKey. Other methods of generating unique numbers can be used.` why a SHOULD as other methods can be used ? This sentence does not seem to follow https://datatracker.ietf.org/doc/statement-iesg-statement-on-clarifying-the-use-of-bcp-14-key-words/.&lt;br&gt;&lt;br&gt;### Section 9&lt;br&gt;&lt;br&gt;Suggest adding informative reference to the newly created IANA registries *AND* updated existing registries.&lt;br&gt;&lt;br&gt;Somehow like Med Boucadair, I am puzzled by the last paragraph as it is confusing at the best while trying to paraphrase RFC 8126. Let&#x27;s rather delete it.&lt;br&gt;&lt;br&gt;### Section A.3.1&lt;br&gt;&lt;br&gt;Please avoid using real FQDN (e.g., `sni.cloudflaressl.com`) in IETF documents, rather use &quot;example.org&quot;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1136724</id>
        
        <updated>2026-04-10T14:03:45.251899+00:00</updated>
        
        <published>2026-04-10T14:03:45.251899+00:00</published>
        
        <author>
            <name>Éric Vyncke</name>
        </author>

        <content type="html">[Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_ballot_position</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1136698</id>
        
        <updated>2026-04-10T10:54:45.845933+00:00</updated>
        
        <published>2026-04-10T10:54:45.845933+00:00</published>
        
        <author>
            <name>Mohamed Boucadair</name>
        </author>

        <content type="html">[Ballot discuss]&lt;br&gt;Hi John, Göran, Shahid, Joel, and Martin, &lt;br&gt;&lt;br&gt;Many thanks for the well-written document. Excellent work. &lt;br&gt;&lt;br&gt;I have two points to check. I flagged some few nits and minor edits that I will send to the authors in a PR.&lt;br&gt;&lt;br&gt;# IETF Review with Expert Review&lt;br&gt;&lt;br&gt;CURRENT:&lt;br&gt;  All assignments according to &quot;IETF Review with Expert Review&quot; are made on a &quot;IETF Review&quot; basis per {{Section 4.8 of RFC8126}} with &quot;Expert Review&quot; additionally required per {{Section 4.5 of RFC8126}}. &lt;br&gt;&lt;br&gt;and&lt;br&gt;&lt;br&gt; the registration procedure is &quot;IETF Review with Expert Review&quot;.&lt;br&gt;&lt;br&gt;I remember that Carsten edited draft-bormann-gendispatch-with-expert-review, but do we have a stable reference where such policy is defined?&lt;br&gt;&lt;br&gt;# The WG may be closed: not sure how this guidance will age&lt;br&gt;&lt;br&gt;CURRENT:&lt;br&gt;  In addition, working group chairs are encouraged to consult the expert(s) early during the process outlined in Section 3.1 of {{RFC7120}}.</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1136697</id>
        
        <updated>2026-04-10T10:54:45.845910+00:00</updated>
        
        <published>2026-04-10T10:54:45.845910+00:00</published>
        
        <author>
            <name>Mohamed Boucadair</name>
        </author>

        <content type="html">[Ballot comment]&lt;br&gt;# Is this already deployed there or these are deployment targets?&lt;br&gt;&lt;br&gt;CURRENT:&lt;br&gt;  C509 is deployed in, e.g., in-vehicle and vehicle-to-cloud communication, Uncrewed Aircraft Systems (UAS), and Global Navigation Satellite System (GNSS)&lt;br&gt;&lt;br&gt;“is deployed” won’t age well in an RFC, btw.&lt;br&gt;&lt;br&gt;# Please consider adding a reference&lt;br&gt;&lt;br&gt;CURRENT :&lt;br&gt;&lt;br&gt;  the CBOR encoding can in many cases reduce the size of  RFC7925 profiled certificates by over 50%.&lt;br&gt;&lt;br&gt;# Any reason why this is repeated here?&lt;br&gt;&lt;br&gt;CURRENT:&lt;br&gt;  The procedure for early IANA allocation of &quot;standards track code points&quot; defined in {{RFC7120}} also applies.&lt;br&gt;&lt;br&gt;Cheers,&lt;br&gt;Med</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1136696</id>
        
        <updated>2026-04-10T10:54:45.845832+00:00</updated>
        
        <published>2026-04-10T10:54:45.845832+00:00</published>
        
        <author>
            <name>Mohamed Boucadair</name>
        </author>

        <content type="html">[Ballot Position Update] New position, Discuss, has been recorded for Mohamed Boucadair</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_ballot_position</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>AES-CMAC for COSE</title>
        

        <link href="/doc/draft-sipos-cose-cmac/"/>

        <id>urn:datatracker-ietf-org:event:1136565</id>
        
        <updated>2026-04-09T17:47:20.027781+00:00</updated>
        
        <published>2026-04-09T17:47:20.027781+00:00</published>
        
        <author>
            <name>Brian Sipos</name>
        </author>

        <content type="html">New version available: &lt;b&gt;draft-sipos-cose-cmac-02.txt&lt;/b&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_revision</type>
          
          <group>none</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          
	  
	  <abstract>   The CBOR Object Signing and Encryption (COSE) specification defines
   structures for generating, conveying, and verifying Message
   Authentication Code (MAC) tags.  This document registers code points
   for using the Advanced Encryption Standard (AES) block cipher in
   Cipher-based Message Authentication Code (CMAC) mode within those
   COSE structures.  Specifically, these uses are for computing MAC tag
   values with no additional parameters.
</abstract>
	  <version>02</version>
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>AES-CMAC for COSE</title>
        

        <link href="/doc/draft-sipos-cose-cmac/"/>

        <id>urn:datatracker-ietf-org:event:1136564</id>
        
        <updated>2026-04-09T17:47:20.025195+00:00</updated>
        
        <published>2026-04-09T17:47:20.025195+00:00</published>
        
        <author>
            <name>Brian Sipos</name>
        </author>

        <content type="html">New version accepted (logged-in submitter: Brian Sipos)</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          
          <group>none</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>AES-CMAC for COSE</title>
        

        <link href="/doc/draft-sipos-cose-cmac/"/>

        <id>urn:datatracker-ietf-org:event:1136563</id>
        
        <updated>2026-04-09T17:47:19.969024+00:00</updated>
        
        <published>2026-04-09T17:47:19.969024+00:00</published>
        
        <author>
            <name>Brian Sipos</name>
        </author>

        <content type="html">Uploaded new revision</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          
          <group>none</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1136282</id>
        
        <updated>2026-04-08T11:06:00.377411+00:00</updated>
        
        <published>2026-04-08T11:06:00.377411+00:00</published>
        
        <author>
            <name>Gunter Van de Velde</name>
        </author>

        <content type="html">[Ballot comment]&lt;br&gt;Many thanks for the write-up. Appreciated.&lt;br&gt;&lt;br&gt;My observation is that while the shepherd writeup claims nothing noteworthy when running idnits, but when i run idnits (https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-cose-cbor-encoded-cert-17.txt) i end up with a long laundry list of observations. Maybe worthwhile to run through the list and explain why they are deemed not meaningful/relevant and add this context in the write-up? &lt;br&gt;&lt;br&gt;One of those idnits observations is that there may only be v4 examples and no v6 examples?&lt;br&gt;&lt;br&gt;G/</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
        

        <link href="/doc/draft-ietf-cose-cbor-encoded-cert/"/>

        <id>urn:datatracker-ietf-org:event:1136281</id>
        
        <updated>2026-04-08T11:06:00.377328+00:00</updated>
        
        <published>2026-04-08T11:06:00.377328+00:00</published>
        
        <author>
            <name>Gunter Van de Velde</name>
        </author>

        <content type="html">[Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_ballot_position</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iana-experts">expert-issues</state>
          
          <state type="draft-iana-review">changed</state>
          
          <state type="draft-iesg">defer</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136153</id>
        
        <updated>2026-04-07T18:04:16.457731+00:00</updated>
        
        <published>2026-04-07T18:04:16.457731+00:00</published>
        
        <author>
            <name>Ivaylo Petrov</name>
        </author>

        <content type="html"># Document Shepherd Write-Up for Group Documents&lt;br&gt;&lt;br&gt;*This version is dated 4 July 2022.*&lt;br&gt;&lt;br&gt;Thank you for your service as a document shepherd. Among the responsibilities is&lt;br&gt;answering the questions in this write-up to give helpful context to Last Call&lt;br&gt;and Internet Engineering Steering Group ([IESG][1]) reviewers, and your&lt;br&gt;diligence in completing it is appreciated. The full role of the shepherd is&lt;br&gt;further described in [RFC 4858][2]. You will need the cooperation of the authors&lt;br&gt;and editors to complete these checks.&lt;br&gt;&lt;br&gt;Note that some numbered items contain multiple related questions; please be sure&lt;br&gt;to answer all of them.&lt;br&gt;&lt;br&gt;## Document History&lt;br&gt;&lt;br&gt;1. Does the working group (WG) consensus represent the strong concurrence of a&lt;br&gt;   few individuals, with others being silent, or did it reach broad agreement?&lt;br&gt;&lt;br&gt;This document had broad discussion with a considerable number of people participating and providing input. At the end a number of people confirmed they believe the document is ready for publication.&lt;br&gt;&lt;br&gt;2. Was there controversy about particular points, or were there decisions where&lt;br&gt;   the consensus was particularly rough?&lt;br&gt;&lt;br&gt;There were many discussions - particularly over handling of the combinatory explosion when each triplet of &lt;KEM algorithm, KDF algorithm, AEAD algorithm&gt; is given a code point and concerns about implementing all of the available options for constrained devices, which took a long time to resolve, but in the end I believe everyone had their concerns addressed.&lt;br&gt;&lt;br&gt;3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If&lt;br&gt;   so, please summarize the areas of conflict in separate email messages to the&lt;br&gt;   responsible Area Director. (It should be in a separate email because this&lt;br&gt;   questionnaire is publicly available.)&lt;br&gt;&lt;br&gt;No.&lt;br&gt;&lt;br&gt;4. For protocol documents, are there existing implementations of the contents of&lt;br&gt;   the document? Have a significant number of potential implementers indicated&lt;br&gt;   plans to implement? Are any existing implementations reported somewhere,&lt;br&gt;   either in the document itself (as [RFC 7942][3] recommends) or elsewhere&lt;br&gt;   (where)?&lt;br&gt;&lt;br&gt;During IETF 125 the authors shared that there are 3 independent implementations that were used to validate the examples.&lt;br&gt;&lt;br&gt;## Additional Reviews&lt;br&gt;&lt;br&gt;5. Do the contents of this document closely interact with technologies in other&lt;br&gt;   IETF working groups or external organizations, and would it therefore benefit&lt;br&gt;   from their review? Have those reviews occurred? If yes, describe which&lt;br&gt;   reviews took place.&lt;br&gt;&lt;br&gt;This document is related to https://datatracker.ietf.org/doc/draft-ietf-jose-hpke-encrypt/. The WGLC of both documents asked reviewers to look at both, which appeared to have been the case.&lt;br&gt;&lt;br&gt;6. Describe how the document meets any required formal expert review criteria,&lt;br&gt;   such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.&lt;br&gt;&lt;br&gt;Such reviews were not necessary.&lt;br&gt;&lt;br&gt;7. If the document contains a YANG module, has the final version of the module&lt;br&gt;   been checked with any of the [recommended validation tools][4] for syntax and&lt;br&gt;   formatting validation? If there are any resulting errors or warnings, what is&lt;br&gt;   the justification for not fixing them at this time? Does the YANG module&lt;br&gt;   comply with the Network Management Datastore Architecture (NMDA) as specified&lt;br&gt;   in [RFC 8342][5]?&lt;br&gt;&lt;br&gt;There is no YANG module.&lt;br&gt;&lt;br&gt;8. Describe reviews and automated checks performed to validate sections of the&lt;br&gt;   final version of the document written in a formal language, such as XML code,&lt;br&gt;   BNF rules, MIB definitions, CBOR&#x27;s CDDL, etc.&lt;br&gt;&lt;br&gt;In sec 3.3.1 there is a CDDL structure. It is trivial, but I am not aware of automated checks performed on it.&lt;br&gt;&lt;br&gt;## Document Shepherd Checks&lt;br&gt;&lt;br&gt;9. Based on the shepherd&#x27;s review of the document, is it their opinion that this&lt;br&gt;   document is needed, clearly written, complete, correctly designed, and ready&lt;br&gt;   to be handed off to the responsible Area Director?&lt;br&gt;&lt;br&gt;Yes.&lt;br&gt;&lt;br&gt;10. Several IETF Areas have assembled [lists of common issues that their&lt;br&gt;    reviewers encounter][6]. For which areas have such issues been identified&lt;br&gt;    and addressed? For which does this still need to happen in subsequent&lt;br&gt;    Reviews?&lt;br&gt;&lt;br&gt;In my opinion the draft does not have any of the listed SEC issues.&lt;br&gt;&lt;br&gt;11. What type of RFC publication is being requested on the IETF stream ([Best&lt;br&gt;    Current Practice][12], [Proposed Standard, Internet Standard][13],&lt;br&gt;    [Informational, Experimental or Historic][14])? Why is this the proper type&lt;br&gt;    of RFC? Do all Datatracker state attributes correctly reflect this intent?&lt;br&gt;&lt;br&gt;The document is marked as “Proposed Standard”. Being in the standard track makes sense and it is not ready for “Internet Standard”, thus this status seems most reasonable.&lt;br&gt;&lt;br&gt;12. Have reasonable efforts been made to remind all authors of the intellectual&lt;br&gt;    property rights (IPR) disclosure obligations described in [BCP 79][7]? To&lt;br&gt;    the best of your knowledge, have all required disclosures been filed? If&lt;br&gt;    not, explain why. If yes, summarize any relevant discussion, including links&lt;br&gt;    to publicly-available messages when applicable.&lt;br&gt;&lt;br&gt;Yes, all authors have confirmed they are not aware of relevant IPR.&lt;br&gt;&lt;br&gt;13. Has each author, editor, and contributor shown their willingness to be&lt;br&gt;    listed as such? If the total number of authors and editors on the front page&lt;br&gt;    is greater than five, please provide a justification.&lt;br&gt;&lt;br&gt;Yes.&lt;br&gt;&lt;br&gt;14. Document any remaining I-D nits in this document. Simply running the [idnits&lt;br&gt;    tool][8] is not enough; please review the [&quot;Content Guidelines&quot; on&lt;br&gt;    authors.ietf.org][15]. (Also note that the current idnits tool generates&lt;br&gt;    some incorrect warnings; a rewrite is underway.)&lt;br&gt;&lt;br&gt;- In the PDF version of the document, there are problems with the test vectors in Appendix C (many are missing compared with the TXT version). I am informing the authors about that and they will hopefully fix it in a new version.&lt;br&gt;- Implementation status section could be added.&lt;br&gt;&lt;br&gt;15. Should any informative references be normative or vice-versa? See the [IESG&lt;br&gt;    Statement on Normative and Informative References][16].&lt;br&gt;&lt;br&gt;No&lt;br&gt;&lt;br&gt;16. List any normative references that are not freely available to anyone. Did&lt;br&gt;    the community have sufficient access to review any such normative&lt;br&gt;    References?&lt;br&gt;&lt;br&gt;There are no such references.&lt;br&gt;&lt;br&gt;17. Are there any normative downward references (see [RFC 3967][9] and [BCP&lt;br&gt;    97][10]) that are not already listed in the [DOWNREF registry][17]? If so,&lt;br&gt;    list them.&lt;br&gt;&lt;br&gt;RFC8937 is missing from the downref list. The others draft-ietf-hpke-hpke/RFC9180, RFC9053 are in the downrefs list.&lt;br&gt;&lt;br&gt;18. Are there normative references to documents that are not ready to be&lt;br&gt;    submitted to the IESG for publication or are otherwise in an unclear state?&lt;br&gt;    If so, what is the plan for their completion?&lt;br&gt;&lt;br&gt;All normative references, except for draft-ietf-hpke-hpke-03 are published RFCs. That one is in state publication requested.&lt;br&gt;&lt;br&gt;19. Will publication of this document change the status of any existing RFCs? If&lt;br&gt;    so, does the Datatracker metadata correctly reflect this and are those RFCs&lt;br&gt;    listed on the title page, in the abstract, and discussed in the&lt;br&gt;    introduction? If not, explain why and point to the part of the document&lt;br&gt;    where the relationship of this document to these other RFCs is discussed.&lt;br&gt;&lt;br&gt;This document will not update any existing RFCs.&lt;br&gt;&lt;br&gt;20. Describe the document shepherd&#x27;s review of the IANA considerations section,&lt;br&gt;    especially with regard to its consistency with the body of the document.&lt;br&gt;    Confirm that all aspects of the document requiring IANA assignments are&lt;br&gt;    associated with the appropriate reservations in IANA registries. Confirm&lt;br&gt;    that any referenced IANA registries have been clearly identified. Confirm&lt;br&gt;    that each newly created IANA registry specifies its initial contents,&lt;br&gt;    allocations procedures, and a reasonable name (see [RFC 8126][11]).&lt;br&gt;&lt;br&gt;The document clearly identifies its requests to IANA for new COSE Algorithms Registry and COSE Header Parameter registrations. These requests are necessary and minimal.&lt;br&gt;&lt;br&gt;21. List any new IANA registries that require Designated Expert Review for&lt;br&gt;    future allocations. Are the instructions to the Designated Expert clear?&lt;br&gt;    Please include suggestions of designated experts, if appropriate.&lt;br&gt;&lt;br&gt;There are no new IANA registries. In sec. 4 there is a new recommendation for the designated expert regarding IANA COSE algorithm registry when HPKE ciphersuites are registered.&lt;br&gt;&lt;br&gt;[1]: https://www.ietf.org/about/groups/iesg/&lt;br&gt;[2]: https://www.rfc-editor.org/rfc/rfc4858.html&lt;br&gt;[3]: https://www.rfc-editor.org/rfc/rfc7942.html&lt;br&gt;[4]: https://wiki.ietf.org/group/ops/yang-review-tools&lt;br&gt;[5]: https://www.rfc-editor.org/rfc/rfc8342.html&lt;br&gt;[6]: https://wiki.ietf.org/group/iesg/ExpertTopics&lt;br&gt;[7]: https://www.rfc-editor.org/info/bcp79&lt;br&gt;[8]: https://www.ietf.org/tools/idnits/&lt;br&gt;[9]: https://www.rfc-editor.org/rfc/rfc3967.html&lt;br&gt;[10]: https://www.rfc-editor.org/info/bcp97&lt;br&gt;[11]: https://www.rfc-editor.org/rfc/rfc8126.html&lt;br&gt;[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5&lt;br&gt;[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1&lt;br&gt;[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2&lt;br&gt;[15]: https://authors.ietf.org/en/content-guidelines-overview&lt;br&gt;[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/&lt;br&gt;[17]: https://datatracker.ietf.org/doc/downref/&lt;br&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_document</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136152</id>
        
        <updated>2026-04-07T18:04:16.443757+00:00</updated>
        
        <published>2026-04-07T18:04:16.443757+00:00</published>
        
        <author>
            <name>Ivaylo Petrov</name>
        </author>

        <content type="html">IETF WG state changed to &lt;b&gt;Submitted to IESG for Publication&lt;/b&gt; from In WG Last Call</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_state</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136151</id>
        
        <updated>2026-04-07T18:04:16.396919+00:00</updated>
        
        <published>2026-04-07T18:04:16.396919+00:00</published>
        
        <author>
            <name>Ivaylo Petrov</name>
        </author>

        <content type="html">IESG state changed to &lt;b&gt;Publication Requested&lt;/b&gt; from I-D Exists</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_state</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136150</id>
        
        <updated>2026-04-07T18:04:16.390652+00:00</updated>
        
        <published>2026-04-07T18:04:16.390652+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">Changed action holders to Christopher Inacio (IESG state changed)</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_action_holders</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136149</id>
        
        <updated>2026-04-07T18:04:16.324742+00:00</updated>
        
        <published>2026-04-07T18:04:16.324742+00:00</published>
        
        <author>
            <name>Ivaylo Petrov</name>
        </author>

        <content type="html">Responsible AD changed to Christopher Inacio</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_document</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136148</id>
        
        <updated>2026-04-07T18:04:16.273077+00:00</updated>
        
        <published>2026-04-07T18:04:16.273077+00:00</published>
        
        <author>
            <name>Ivaylo Petrov</name>
        </author>

        <content type="html">Document is now in IESG state &lt;b&gt;Publication Requested&lt;/b&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>started_iesg_process</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136147</id>
        
        <updated>2026-04-07T18:03:57.003814+00:00</updated>
        
        <published>2026-04-07T18:03:57.003814+00:00</published>
        
        <author>
            <name>Ivaylo Petrov</name>
        </author>

        <content type="html">Notification list changed to ivaylopetrov@google.com because the document shepherd was set</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136146</id>
        
        <updated>2026-04-07T18:03:57.003814+00:00</updated>
        
        <published>2026-04-07T18:03:57.003814+00:00</published>
        
        <author>
            <name>Ivaylo Petrov</name>
        </author>

        <content type="html">Document shepherd changed to Ivaylo Petrov</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136145</id>
        
        <updated>2026-04-07T18:03:19.117906+00:00</updated>
        
        <published>2026-04-07T18:03:19.117906+00:00</published>
        
        <author>
            <name>Ivaylo Petrov</name>
        </author>

        <content type="html"># Document Shepherd Write-Up for Group Documents&lt;br&gt;&lt;br&gt;*This version is dated 4 July 2022.*&lt;br&gt;&lt;br&gt;Thank you for your service as a document shepherd. Among the responsibilities is&lt;br&gt;answering the questions in this write-up to give helpful context to Last Call&lt;br&gt;and Internet Engineering Steering Group ([IESG][1]) reviewers, and your&lt;br&gt;diligence in completing it is appreciated. The full role of the shepherd is&lt;br&gt;further described in [RFC 4858][2]. You will need the cooperation of the authors&lt;br&gt;and editors to complete these checks.&lt;br&gt;&lt;br&gt;Note that some numbered items contain multiple related questions; please be sure&lt;br&gt;to answer all of them.&lt;br&gt;&lt;br&gt;## Document History&lt;br&gt;&lt;br&gt;1. Does the working group (WG) consensus represent the strong concurrence of a&lt;br&gt;   few individuals, with others being silent, or did it reach broad agreement?&lt;br&gt;&lt;br&gt;This document had broad discussion with a considerable number of people participating and providing input. At the end a number of people confirmed they believe the document is ready for publication.&lt;br&gt;&lt;br&gt;2. Was there controversy about particular points, or were there decisions where&lt;br&gt;   the consensus was particularly rough?&lt;br&gt;&lt;br&gt;There were many discussions - particularly over handling of the combinatory explosion when each triplet of &lt;KEM algorithm, KDF algorithm, AEAD algorithm&gt; is given a code point and concerns about implementing all of the available options for constrained devices, which took a long time to resolve, but in the end I believe everyone had their concerns addressed.&lt;br&gt;&lt;br&gt;3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If&lt;br&gt;   so, please summarize the areas of conflict in separate email messages to the&lt;br&gt;   responsible Area Director. (It should be in a separate email because this&lt;br&gt;   questionnaire is publicly available.)&lt;br&gt;&lt;br&gt;No.&lt;br&gt;&lt;br&gt;4. For protocol documents, are there existing implementations of the contents of&lt;br&gt;   the document? Have a significant number of potential implementers indicated&lt;br&gt;   plans to implement? Are any existing implementations reported somewhere,&lt;br&gt;   either in the document itself (as [RFC 7942][3] recommends) or elsewhere&lt;br&gt;   (where)?&lt;br&gt;&lt;br&gt;During IETF 125 the authors shared that there are 3 independent implementations that were used to validate the examples.&lt;br&gt;&lt;br&gt;## Additional Reviews&lt;br&gt;&lt;br&gt;5. Do the contents of this document closely interact with technologies in other&lt;br&gt;   IETF working groups or external organizations, and would it therefore benefit&lt;br&gt;   from their review? Have those reviews occurred? If yes, describe which&lt;br&gt;   reviews took place.&lt;br&gt;&lt;br&gt;This document is related to https://datatracker.ietf.org/doc/draft-ietf-jose-hpke-encrypt/. The WGLC of both documents asked reviewers to look at both, which appeared to have been the case.&lt;br&gt;&lt;br&gt;6. Describe how the document meets any required formal expert review criteria,&lt;br&gt;   such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.&lt;br&gt;&lt;br&gt;Such reviews were not necessary.&lt;br&gt;&lt;br&gt;7. If the document contains a YANG module, has the final version of the module&lt;br&gt;   been checked with any of the [recommended validation tools][4] for syntax and&lt;br&gt;   formatting validation? If there are any resulting errors or warnings, what is&lt;br&gt;   the justification for not fixing them at this time? Does the YANG module&lt;br&gt;   comply with the Network Management Datastore Architecture (NMDA) as specified&lt;br&gt;   in [RFC 8342][5]?&lt;br&gt;&lt;br&gt;There is no YANG module.&lt;br&gt;&lt;br&gt;8. Describe reviews and automated checks performed to validate sections of the&lt;br&gt;   final version of the document written in a formal language, such as XML code,&lt;br&gt;   BNF rules, MIB definitions, CBOR&#x27;s CDDL, etc.&lt;br&gt;&lt;br&gt;In sec 3.3.1 there is a CDDL structure. It is trivial, but I am not aware of automated checks performed on it.&lt;br&gt;&lt;br&gt;## Document Shepherd Checks&lt;br&gt;&lt;br&gt;9. Based on the shepherd&#x27;s review of the document, is it their opinion that this&lt;br&gt;   document is needed, clearly written, complete, correctly designed, and ready&lt;br&gt;   to be handed off to the responsible Area Director?&lt;br&gt;&lt;br&gt;Yes.&lt;br&gt;&lt;br&gt;10. Several IETF Areas have assembled [lists of common issues that their&lt;br&gt;    reviewers encounter][6]. For which areas have such issues been identified&lt;br&gt;    and addressed? For which does this still need to happen in subsequent&lt;br&gt;    Reviews?&lt;br&gt;&lt;br&gt;In my opinion the draft does not have any of the listed SEC issues.&lt;br&gt;&lt;br&gt;11. What type of RFC publication is being requested on the IETF stream ([Best&lt;br&gt;    Current Practice][12], [Proposed Standard, Internet Standard][13],&lt;br&gt;    [Informational, Experimental or Historic][14])? Why is this the proper type&lt;br&gt;    of RFC? Do all Datatracker state attributes correctly reflect this intent?&lt;br&gt;&lt;br&gt;The document is marked as “Proposed Standard”. Being in the standard track makes sense and it is not ready for “Internet Standard”, thus this status seems most reasonable.&lt;br&gt;&lt;br&gt;12. Have reasonable efforts been made to remind all authors of the intellectual&lt;br&gt;    property rights (IPR) disclosure obligations described in [BCP 79][7]? To&lt;br&gt;    the best of your knowledge, have all required disclosures been filed? If&lt;br&gt;    not, explain why. If yes, summarize any relevant discussion, including links&lt;br&gt;    to publicly-available messages when applicable.&lt;br&gt;&lt;br&gt;Yes, all authors have confirmed they are not aware of relevant IPR.&lt;br&gt;&lt;br&gt;13. Has each author, editor, and contributor shown their willingness to be&lt;br&gt;    listed as such? If the total number of authors and editors on the front page&lt;br&gt;    is greater than five, please provide a justification.&lt;br&gt;&lt;br&gt;Yes.&lt;br&gt;&lt;br&gt;14. Document any remaining I-D nits in this document. Simply running the [idnits&lt;br&gt;    tool][8] is not enough; please review the [&quot;Content Guidelines&quot; on&lt;br&gt;    authors.ietf.org][15]. (Also note that the current idnits tool generates&lt;br&gt;    some incorrect warnings; a rewrite is underway.)&lt;br&gt;&lt;br&gt;- In the PDF version of the document, there are problems with the test vectors in Appendix C (many are missing compared with the TXT version). I am informing the authors about that and they will hopefully fix it in a new version.&lt;br&gt;- Implementation status section could be added.&lt;br&gt;&lt;br&gt;15. Should any informative references be normative or vice-versa? See the [IESG&lt;br&gt;    Statement on Normative and Informative References][16].&lt;br&gt;&lt;br&gt;No&lt;br&gt;&lt;br&gt;16. List any normative references that are not freely available to anyone. Did&lt;br&gt;    the community have sufficient access to review any such normative&lt;br&gt;    References?&lt;br&gt;&lt;br&gt;There are no such references.&lt;br&gt;&lt;br&gt;17. Are there any normative downward references (see [RFC 3967][9] and [BCP&lt;br&gt;    97][10]) that are not already listed in the [DOWNREF registry][17]? If so,&lt;br&gt;    list them.&lt;br&gt;&lt;br&gt;RFC8937 is missing from the downref list. The others draft-ietf-hpke-hpke/RFC9180, RFC9053 are in the downrefs list.&lt;br&gt;&lt;br&gt;18. Are there normative references to documents that are not ready to be&lt;br&gt;    submitted to the IESG for publication or are otherwise in an unclear state?&lt;br&gt;    If so, what is the plan for their completion?&lt;br&gt;&lt;br&gt;All normative references, except for draft-ietf-hpke-hpke-03 are published RFCs. That one is in state publication requested.&lt;br&gt;&lt;br&gt;19. Will publication of this document change the status of any existing RFCs? If&lt;br&gt;    so, does the Datatracker metadata correctly reflect this and are those RFCs&lt;br&gt;    listed on the title page, in the abstract, and discussed in the&lt;br&gt;    introduction? If not, explain why and point to the part of the document&lt;br&gt;    where the relationship of this document to these other RFCs is discussed.&lt;br&gt;&lt;br&gt;This document will not update any existing RFCs.&lt;br&gt;&lt;br&gt;20. Describe the document shepherd&#x27;s review of the IANA considerations section,&lt;br&gt;    especially with regard to its consistency with the body of the document.&lt;br&gt;    Confirm that all aspects of the document requiring IANA assignments are&lt;br&gt;    associated with the appropriate reservations in IANA registries. Confirm&lt;br&gt;    that any referenced IANA registries have been clearly identified. Confirm&lt;br&gt;    that each newly created IANA registry specifies its initial contents,&lt;br&gt;    allocations procedures, and a reasonable name (see [RFC 8126][11]).&lt;br&gt;&lt;br&gt;The document clearly identifies its requests to IANA for new COSE Algorithms Registry and COSE Header Parameter registrations. These requests are necessary and minimal.&lt;br&gt;&lt;br&gt;21. List any new IANA registries that require Designated Expert Review for&lt;br&gt;    future allocations. Are the instructions to the Designated Expert clear?&lt;br&gt;    Please include suggestions of designated experts, if appropriate.&lt;br&gt;&lt;br&gt;There are no new IANA registries. In sec. 4 there is a new recommendation for the designated expert regarding IANA COSE algorithm registry when HPKE ciphersuites are registered.&lt;br&gt;&lt;br&gt;[1]: https://www.ietf.org/about/groups/iesg/&lt;br&gt;[2]: https://www.rfc-editor.org/rfc/rfc4858.html&lt;br&gt;[3]: https://www.rfc-editor.org/rfc/rfc7942.html&lt;br&gt;[4]: https://wiki.ietf.org/group/ops/yang-review-tools&lt;br&gt;[5]: https://www.rfc-editor.org/rfc/rfc8342.html&lt;br&gt;[6]: https://wiki.ietf.org/group/iesg/ExpertTopics&lt;br&gt;[7]: https://www.rfc-editor.org/info/bcp79&lt;br&gt;[8]: https://www.ietf.org/tools/idnits/&lt;br&gt;[9]: https://www.rfc-editor.org/rfc/rfc3967.html&lt;br&gt;[10]: https://www.rfc-editor.org/info/bcp97&lt;br&gt;[11]: https://www.rfc-editor.org/rfc/rfc8126.html&lt;br&gt;[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5&lt;br&gt;[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1&lt;br&gt;[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2&lt;br&gt;[15]: https://authors.ietf.org/en/content-guidelines-overview&lt;br&gt;[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/&lt;br&gt;[17]: https://datatracker.ietf.org/doc/downref/&lt;br&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_protocol_writeup</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136144</id>
        
        <updated>2026-04-07T17:56:08.410027+00:00</updated>
        
        <published>2026-04-07T17:56:08.410027+00:00</published>
        
        <author>
            <name>Michael Jones</name>
        </author>

        <content type="html">New version available: &lt;b&gt;draft-ietf-cose-hpke-25.txt&lt;/b&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_revision</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
	  <abstract>   This specification defines hybrid public-key encryption (HPKE) for
   use with CBOR Object Signing and Encryption (COSE).  HPKE offers a
   variant of public-key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE is a general encryption framework utilizing an asymmetric key
   encapsulation mechanism (KEM), a key derivation function (KDF), and
   an Authenticated Encryption with Associated Data (AEAD) algorithm.

   This document defines the use of HPKE with COSE.  Authentication for
   HPKE in COSE is provided by COSE-native security mechanisms or by the
   pre-shared key authenticated variant of HPKE.
</abstract>
	  <version>25</version>
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136143</id>
        
        <updated>2026-04-07T17:56:08.407119+00:00</updated>
        
        <published>2026-04-07T17:56:08.407119+00:00</published>
        
        <author>
            <name>Michael Jones</name>
        </author>

        <content type="html">New version approved</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136142</id>
        
        <updated>2026-04-07T17:50:27.772141+00:00</updated>
        
        <published>2026-04-07T17:50:27.772141+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">Request for posting confirmation emailed to previous authors: &quot;Ajitomi, Daisuke&quot; &lt;dajiaji@gmail.com&gt;, Hannes Tschofenig &lt;Hannes.Tschofenig@gmx.net&gt;, Laurence Lundblade &lt;lgl@securitytheory.com&gt;, Michael Jones &lt;michael_b_jones@hotmail.com&gt;, Orie Steele &lt;orie@or13.io&gt;, cose-chairs@ietf.org</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1136141</id>
        
        <updated>2026-04-07T17:50:27.413840+00:00</updated>
        
        <published>2026-04-07T17:50:27.413840+00:00</published>
        
        <author>
            <name>Michael Jones</name>
        </author>

        <content type="html">Uploaded new revision</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
        

        <link href="/doc/draft-ietf-cose-hpke/"/>

        <id>urn:datatracker-ietf-org:event:1135859</id>
        
        <updated>2026-04-06T07:52:10.240720+00:00</updated>
        
        <published>2026-04-06T07:52:10.240720+00:00</published>
        
        <author>
            <name>Ivaylo Petrov</name>
        </author>

        <content type="html"># Document Shepherd Write-Up for Group Documents&lt;br&gt;&lt;br&gt;*This version is dated 4 July 2022.*&lt;br&gt;&lt;br&gt;Thank you for your service as a document shepherd. Among the responsibilities is&lt;br&gt;answering the questions in this write-up to give helpful context to Last Call&lt;br&gt;and Internet Engineering Steering Group ([IESG][1]) reviewers, and your&lt;br&gt;diligence in completing it is appreciated. The full role of the shepherd is&lt;br&gt;further described in [RFC 4858][2]. You will need the cooperation of the authors&lt;br&gt;and editors to complete these checks.&lt;br&gt;&lt;br&gt;Note that some numbered items contain multiple related questions; please be sure&lt;br&gt;to answer all of them.&lt;br&gt;&lt;br&gt;## Document History&lt;br&gt;&lt;br&gt;1. Does the working group (WG) consensus represent the strong concurrence of a&lt;br&gt;   few individuals, with others being silent, or did it reach broad agreement?&lt;br&gt;&lt;br&gt;This document had broad discussion with a considerable number of people participating and providing input. At the end a number of people confirmed they believe the document is ready for publication.&lt;br&gt;&lt;br&gt;2. Was there controversy about particular points, or were there decisions where&lt;br&gt;   the consensus was particularly rough?&lt;br&gt;&lt;br&gt;There were many discussions - particularly over handling of the combinatory explosion when each triplet of &lt;KEM algorithm, KDF algorithm, AEAD algorithm&gt; is given a code point and concerns about implementing all of the available options for constrained devices, which took a long time to resolve, but in the end I believe everyone had their concerns addressed.&lt;br&gt;&lt;br&gt;3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If&lt;br&gt;   so, please summarize the areas of conflict in separate email messages to the&lt;br&gt;   responsible Area Director. (It should be in a separate email because this&lt;br&gt;   questionnaire is publicly available.)&lt;br&gt;&lt;br&gt;No.&lt;br&gt;&lt;br&gt;4. For protocol documents, are there existing implementations of the contents of&lt;br&gt;   the document? Have a significant number of potential implementers indicated&lt;br&gt;   plans to implement? Are any existing implementations reported somewhere,&lt;br&gt;   either in the document itself (as [RFC 7942][3] recommends) or elsewhere&lt;br&gt;   (where)?&lt;br&gt;&lt;br&gt;During IETF 125 the authors shared that there are 3 independent implementations that were used to validate the examples.&lt;br&gt;&lt;br&gt;## Additional Reviews&lt;br&gt;&lt;br&gt;5. Do the contents of this document closely interact with technologies in other&lt;br&gt;   IETF working groups or external organizations, and would it therefore benefit&lt;br&gt;   from their review? Have those reviews occurred? If yes, describe which&lt;br&gt;   reviews took place.&lt;br&gt;&lt;br&gt;This document is related to https://datatracker.ietf.org/doc/draft-ietf-jose-hpke-encrypt/. The WGLC of both documents asked reviewers to look at both, which appeared to have been the case.&lt;br&gt;&lt;br&gt;6. Describe how the document meets any required formal expert review criteria,&lt;br&gt;   such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.&lt;br&gt;&lt;br&gt;Such reviews were not necessary.&lt;br&gt;&lt;br&gt;7. If the document contains a YANG module, has the final version of the module&lt;br&gt;   been checked with any of the [recommended validation tools][4] for syntax and&lt;br&gt;   formatting validation? If there are any resulting errors or warnings, what is&lt;br&gt;   the justification for not fixing them at this time? Does the YANG module&lt;br&gt;   comply with the Network Management Datastore Architecture (NMDA) as specified&lt;br&gt;   in [RFC 8342][5]?&lt;br&gt;&lt;br&gt;There is no YANG module.&lt;br&gt;&lt;br&gt;8. Describe reviews and automated checks performed to validate sections of the&lt;br&gt;   final version of the document written in a formal language, such as XML code,&lt;br&gt;   BNF rules, MIB definitions, CBOR&#x27;s CDDL, etc.&lt;br&gt;&lt;br&gt;In sec 3.3.1 there is a CDDL like structure, which is not explicitly called CDDL. It is trivial and has the same style as RFC9052.&lt;br&gt;&lt;br&gt;## Document Shepherd Checks&lt;br&gt;&lt;br&gt;9. Based on the shepherd&#x27;s review of the document, is it their opinion that this&lt;br&gt;   document is needed, clearly written, complete, correctly designed, and ready&lt;br&gt;   to be handed off to the responsible Area Director?&lt;br&gt;&lt;br&gt;Yes.&lt;br&gt;&lt;br&gt;10. Several IETF Areas have assembled [lists of common issues that their&lt;br&gt;    reviewers encounter][6]. For which areas have such issues been identified&lt;br&gt;    and addressed? For which does this still need to happen in subsequent&lt;br&gt;    Reviews?&lt;br&gt;&lt;br&gt;I believe adding RFC9052 to the security considerations section would be beneficial in connection to the normative text around protected headers in sec 7.2.2.&lt;br&gt;&lt;br&gt;11. What type of RFC publication is being requested on the IETF stream ([Best&lt;br&gt;    Current Practice][12], [Proposed Standard, Internet Standard][13],&lt;br&gt;    [Informational, Experimental or Historic][14])? Why is this the proper type&lt;br&gt;    of RFC? Do all Datatracker state attributes correctly reflect this intent?&lt;br&gt;&lt;br&gt;The document is marked as “Proposed Standard”. Being in the standard track makes sense and it is not ready for “Internet Standard”, thus this status seems most reasonable.&lt;br&gt;&lt;br&gt;12. Have reasonable efforts been made to remind all authors of the intellectual&lt;br&gt;    property rights (IPR) disclosure obligations described in [BCP 79][7]? To&lt;br&gt;    the best of your knowledge, have all required disclosures been filed? If&lt;br&gt;    not, explain why. If yes, summarize any relevant discussion, including links&lt;br&gt;    to publicly-available messages when applicable.&lt;br&gt;&lt;br&gt;Yes, all authors have confirmed they are not aware of relevant IPR.&lt;br&gt;&lt;br&gt;13. Has each author, editor, and contributor shown their willingness to be&lt;br&gt;    listed as such? If the total number of authors and editors on the front page&lt;br&gt;    is greater than five, please provide a justification.&lt;br&gt;&lt;br&gt;Yes.&lt;br&gt;&lt;br&gt;14. Document any remaining I-D nits in this document. Simply running the [idnits&lt;br&gt;    tool][8] is not enough; please review the [&quot;Content Guidelines&quot; on&lt;br&gt;    authors.ietf.org][15]. (Also note that the current idnits tool generates&lt;br&gt;    some incorrect warnings; a rewrite is underway.)&lt;br&gt;&lt;br&gt;- In the PDF version of the document, there are problems with the test vectors in Appendix C (many are missing compared with the TXT version). I am informing the authors about that and they will hopefully fix it in a new version.&lt;br&gt;- Implementation status section could be added.&lt;br&gt;&lt;br&gt;15. Should any informative references be normative or vice-versa? See the [IESG&lt;br&gt;    Statement on Normative and Informative References][16].&lt;br&gt;&lt;br&gt;I believe RFC8937 should be a normative reference due to its usage in the security considerations. That would constitute a downward reference that is not listed in the DOWNREF registry.&lt;br&gt;&lt;br&gt;16. List any normative references that are not freely available to anyone. Did&lt;br&gt;    the community have sufficient access to review any such normative&lt;br&gt;    References?&lt;br&gt;&lt;br&gt;There are no such references.&lt;br&gt;&lt;br&gt;17. Are there any normative downward references (see [RFC 3967][9] and [BCP&lt;br&gt;    97][10]) that are not already listed in the [DOWNREF registry][17]? If so,&lt;br&gt;    list them.&lt;br&gt;&lt;br&gt;All downrefs are listed (draft-ietf-hpke-hpke/RFC9180, RFC9053).&lt;br&gt;&lt;br&gt;18. Are there normative references to documents that are not ready to be&lt;br&gt;    submitted to the IESG for publication or are otherwise in an unclear state?&lt;br&gt;    If so, what is the plan for their completion?&lt;br&gt;&lt;br&gt;All normative references, except for draft-ietf-hpke-hpke-03 are published RFCs. That one is in state publication requested.&lt;br&gt;&lt;br&gt;19. Will publication of this document change the status of any existing RFCs? If&lt;br&gt;    so, does the Datatracker metadata correctly reflect this and are those RFCs&lt;br&gt;    listed on the title page, in the abstract, and discussed in the&lt;br&gt;    introduction? If not, explain why and point to the part of the document&lt;br&gt;    where the relationship of this document to these other RFCs is discussed.&lt;br&gt;&lt;br&gt;This document will not update any existing RFCs.&lt;br&gt;&lt;br&gt;20. Describe the document shepherd&#x27;s review of the IANA considerations section,&lt;br&gt;    especially with regard to its consistency with the body of the document.&lt;br&gt;    Confirm that all aspects of the document requiring IANA assignments are&lt;br&gt;    associated with the appropriate reservations in IANA registries. Confirm&lt;br&gt;    that any referenced IANA registries have been clearly identified. Confirm&lt;br&gt;    that each newly created IANA registry specifies its initial contents,&lt;br&gt;    allocations procedures, and a reasonable name (see [RFC 8126][11]).&lt;br&gt;&lt;br&gt;The document clearly identifies its requests to IANA for new COSE Algorithms Registry and COSE Header Parameter registrations. These requests are necessary and minimal.&lt;br&gt;&lt;br&gt;21. List any new IANA registries that require Designated Expert Review for&lt;br&gt;    future allocations. Are the instructions to the Designated Expert clear?&lt;br&gt;    Please include suggestions of designated experts, if appropriate.&lt;br&gt;&lt;br&gt;There are no new IANA registries. In sec. 4 there is a new recommendation for the designated expert regarding IANA COSE algorithm registry when HPKE ciphersuites are registered.&lt;br&gt;&lt;br&gt;[1]: https://www.ietf.org/about/groups/iesg/&lt;br&gt;[2]: https://www.rfc-editor.org/rfc/rfc4858.html&lt;br&gt;[3]: https://www.rfc-editor.org/rfc/rfc7942.html&lt;br&gt;[4]: https://wiki.ietf.org/group/ops/yang-review-tools&lt;br&gt;[5]: https://www.rfc-editor.org/rfc/rfc8342.html&lt;br&gt;[6]: https://wiki.ietf.org/group/iesg/ExpertTopics&lt;br&gt;[7]: https://www.rfc-editor.org/info/bcp79&lt;br&gt;[8]: https://www.ietf.org/tools/idnits/&lt;br&gt;[9]: https://www.rfc-editor.org/rfc/rfc3967.html&lt;br&gt;[10]: https://www.rfc-editor.org/info/bcp97&lt;br&gt;[11]: https://www.rfc-editor.org/rfc/rfc8126.html&lt;br&gt;[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5&lt;br&gt;[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1&lt;br&gt;[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2&lt;br&gt;[15]: https://authors.ietf.org/en/content-guidelines-overview&lt;br&gt;[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/&lt;br&gt;[17]: https://datatracker.ietf.org/doc/downref/&lt;br&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_protocol_writeup</type>
          <stream>ietf</stream>
          <group>cose</group>
          <shepherd>Ivaylo Petrov</shepherd>
          <ad>Christopher Inacio</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    
</feed>
