<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bormann-restatement-05" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="The Restatement Anti-Pattern">The Restatement Anti-Pattern</title>
    <seriesInfo name="Internet-Draft" value="draft-bormann-restatement-05"/>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Postfach 330440</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2026" month="February" day="24"/>
    <abstract>
      <?line 126?>

<t>Normative documents that cite other normative documents often
<em>restate</em> normative content extracted out of the cited document in
their own words.</t>
      <t>The present memo explains why this can be an Antipattern, and
how it can be mitigated.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-bormann-restatement/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cabo/restatement"/>.</t>
    </note>
  </front>
  <middle>
    <?line 142?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Normative documents that cite other normative documents often
<em>restate</em> normative content extracted out of the cited document in
their own words.</t>
      <t>The present memo explains why this can be an Antipattern
<xref target="KOENIG"/><xref target="ANTIPATTERN"/>, and how it can be mitigated.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>Although this document is not an IETF Standards Track publication, it
adopts the conventions for normative language to provide clarity of
instructions to the implementer.
The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in <xref target="BCP14"/> (<xref target="RFC2119"/>) (<xref target="RFC8174"/>) when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -21?>

</section>
    </section>
    <section anchor="the-restatement-anti-pattern">
      <name>The Restatement Anti-Pattern</name>
      <t>A <em>Restatement</em> is the attempted expression of information that is
already expressed elsewhere.</t>
      <t>In this document, we are mostly concerned with <em>Normative
Restatements</em>, i.e., statements that are intended (or look like they
are intended!) to be normative.</t>
      <t>Restatements are rarely verbatim copies of the original statement and
the context needed to interpret that, so they tend to introduce
uncertainty about the interpretation of the restatement.</t>
      <t>Authors often presume a reader is well-versed enough to infer that
such an uncertainty (or outright contradiction) is not intended and
how it is to be resolved.
There is little reason to believe this is actually the case.</t>
      <t>An <em>internal restatement</em> is a restatement of information that has
been provided previously in the document under discussion.
Note that an unambiguous internal reference is not a restatement, as
it points to the original text and its context.
(There may still be uncertainties how to interpret the internal
restatement in the additional context.)</t>
      <t>A reference is <em>unambiguous</em> if the previous passage is clearly
identified and delimited.</t>
      <t>An <em>external restatement</em> is a restatement of information that has
been provided in (one or more) external documents.
Here there is increased danger of an unclear scope of the reference,
often by pointing to an entire document where only a specific passage
is actually intended to be referenced.</t>
      <t>Restatements can be entirely <em>hidden</em>, i.e., there is no indication
that information given is a restatement.  Restatements can also be
<em>explicit</em> by clearly being
identified as such, typically no longer using normative language.</t>
      <t>Restatements can be an Anti-Pattern because they can be "a common
response to a recurring problem that is usually ineffective and risks
being highly counterproductive" <xref target="WP-ANTIPATTERN"/>.  <xref target="reasons"/> discusses
the recurring problems as perceived by document authors, <xref target="perils"/>
explains why restatements can be ineffective and counterproductive,
and <xref target="defuse"/> discusses how to use restatements in a way that is not.</t>
    </section>
    <section anchor="reasons">
      <name>Reasons for making restatements</name>
      <t>There are many reasons that cause document authors to include
restatements in their work, many of which are actually good reasons
once the perils of restatements are properly managed.</t>
      <section anchor="integrating-a-complicated-base-standard-ecosystem">
        <name>Integrating a Complicated Base Standard Ecosystem</name>
        <t>Sometimes the source of the actual normative statement is complex and
would require considerable time to digest.
A <em>simplifying</em> restatement tries to shield the reader by rephrasing
or summarizing information from that source.</t>
        <t>Such a restatement can be of good intention, or it can try to hide
complexity that the referencing document actually does make required to incur.</t>
      </section>
      <section anchor="trying-to-be-a-textbook-for-the-implementer">
        <name>Trying to be a Textbook for the Implementer</name>
        <t>More generally, a restatement can attempt to be a directly useful
source for an implementer or user of a standard, e.g., by giving a
mere checklist of items (not necessarily complete!) that must be
implemented instead of actually identifying where the requirement and
possibly its finer points come from.</t>
      </section>
      <section anchor="increasing-availability-from-a-source-with-restricted-access">
        <name>Increasing Availability from a Source with Restricted Access</name>
        <t>In some cases, normative information from a cited document is not
openly available, but only under specific conditions that cannot be
expected to be satisfied by all users of the referencing document,
such as membership in an organization or payment of a non-trivial fee.
It may be appropriate to restate information from such a source so the
referencing document becomes useful.</t>
      </section>
      <section anchor="trying-to-raise-attention-to-a-detail-deemed-surprising">
        <name>Trying to Raise Attention to a Detail Deemed Surprising</name>
        <t>The author of the referencing document may see a need to alert the
reader to a detail of the cited document that might seem unintuitive
(i.e., not familiar) to the author.  By restating the detail in terms
more familiar to readers of the referencing document, this alert can
be more useful.</t>
      </section>
      <section anchor="limitations-in-formal-description-techniques">
        <name>Limitations in Formal Description Techniques</name>
        <t>Formal description techniques (<em>FDT</em>, such as ABNF <xref target="STD68"/>) are usually designed to
document a single specific artifact, not its evolution or its
embedding into another artifact.  This can lead to wholesale imports
of FDT material, without indication whether just the FDT was imported
(and which part of it)
or whether the importing document is intended to evolve with the donor
document.
See <xref target="example-8288"/> and <xref target="example-6991"/> for additional illustration of
this reason.</t>
      </section>
    </section>
    <section anchor="perils">
      <name>Perils of restatements</name>
      <t>The danger of restatements is that they might not be exactly
expressing the same normative statement that the cited document makes.</t>
      <t>One form of this is the <em>incomplete</em> restatement.</t>
      <t>Abridged copies of a normative statement from the cited document often
leave open whether the abridgment is intentional: Is the referencing
document only importing some of the requirements of the cited
document?
In the worst case, the restatement may appear to be <em>forking an
ecosystem</em>, i.e., an implementation of the cited document cannot be
used because it makes additional constraints that are not meant to be
included in the referencing document.
(This peril of course is also present with <em>intentional</em> changes to
the normative statements in a cited document, which are however likely
to receive
much more attention during review.)</t>
      <t><xref target="example-eat"/> presents an example for the situation where a reader
might infer behavior based on the common law statute interpretation
rule:</t>
      <ul empty="true">
        <li>
          <t><em>"Expressio unius est exclusio alterius"</em></t>
        </li>
      </ul>
      <t>which states that the reader is to presume that expressly referencing
one matter implies that other similar matters are intentionally not
mentioned and therefore are excluded.
This is particularly problematic with abridged statements, where this
rule may be invoked by the reader without an author being aware of it.</t>
      <t>Restatements may be slightly <em>semantically different</em> from the cited
document, in particular if the latter is based on a relatively
inaccessible (possibly poorly documented or poorly developed)
terminology.
Both authors and readers may not be aware that they need to use tools
that are commonplace in the ecosystem of the cited document.</t>
      <t>A large danger originates from restatements that are unclear whether a
<em>new</em> normative requirement is intended or a just a restatement of
known normative requirements of the cited document.  This is, of
course, particularly dangerous for <em>hidden</em> restatements.</t>
      <t>A restatement can cause <em>maintainability hazards</em>, as illustrated in
<xref target="example-8288"/>; it also can cause a referencing document to
<em>decouple</em> from the ecosystem of a cited document once that is
repaired (<xref target="example-6991"/>).</t>
      <t>Finally, to readers familiar with the cited document, the restatement
can be surprising; if there really is no information in the
restatement, the reader automatically searches for a specific reason
this restatement is made and starts to reinterpret it until it means
something specific that would justify its presence.
If the restatement is not clearly identified as such, this is likely
to cause misinterpretations, as if the usage envisioned attempts to
fork the cited ecosystem.
(Often, the people who need to interpret the document in question are
actually more familiar with the cited document and the surrounding
ecosystem than the authors of the referencing document, who may just
be pulling in the ecosystem to solve one of their problems.)</t>
    </section>
    <section anchor="defuse">
      <name>Defusing restatements</name>
      <t>A general recommendation for readers of a referencing document is that
they should try to detect restatements and read them in full knowledge
of their perils (<xref target="perils"/>).
If a resolution is required, the RFC errata process may provide a
(poor) mechanism to obtain the resolution and ensure it is documented
in the context of the referencing document.
Mailing list discussions are also a good way to obtain a resolution,
but for additional readers they can be hard to find, and, when found,
it can be hard to extract any consensus that was formed.</t>
      <t>The rest of this section provides a summary of the recommendations
made by this document, employing <xref target="RFC2119"/> keywords as an instruction
to the potential implementers of this document, i.e., document authors
and reviewers.</t>
      <t>Much of the danger of restatements can be averted if they are
sufficiently identified by the authors as such.</t>
      <ul spacing="normal">
        <li>
          <t>For identification of internal restatements, use phrases such as:
In other words, hence, in particular, as discussed in Section NN.</t>
        </li>
        <li>
          <t>For identification of external restatements: As described/defined in
…, as per …</t>
        </li>
        <li>
          <t>In both cases, make sure that any local reference is clear and any
non-local reference is resolvable and well-scoped.</t>
        </li>
        <li>
          <t>Rephrasing the statement as a Note can make clear that there is no
normative intention.</t>
        </li>
        <li>
          <t>Examples <bcp14>MUST</bcp14> be identified clearly as such, including identifying
any explanatory notes as such so that these are not misunderstood as
new normative statements.</t>
        </li>
      </ul>
      <t>If a larger copy from a cited document is made, it <bcp14>SHOULD</bcp14> be made
verbatim and differences introduced deliberately should be explicitly
identified, possibly in a second step.
Note that the FDT mechanisms and their evolution can make verbatim
copies less useful, in which case a systematic approach of first
copying and fixing and then, if necessary, modifying can help the
reader.
For instance, <xref target="RFC2397"/> uses a variant form of ABNF that can be
parsed only once the variant "<tt>:=</tt>" syntax is replaced by "<tt>=</tt>".
(This is an active specification and was cited as recently as in
<xref section="4.3" sectionFormat="of" target="RFC9399"/>, which provides a clearly identified
restatement in modern ABNF, with errata applied and rules referenced
from elsewhere added [we ignore the innocuous redefinition of "hex"
from "HEXDIG"].)</t>
      <t>By making the copy informative, repairs from the base document (in the
<xref target="RFC2397"/> example e.g. <xref target="errata2397"/>) can be imported, even future
ones.</t>
      <t>Where the copy is made because the cited document is not openly
available, this also often requires more processing than a verbatim
copy, increasing the probability of introducing errors and
misunderstandings.
This can be somewhat mitigated by clearly stating the purpose of a
restatement, and the intended result when the restatement and the
original diverge.</t>
      <!-- 
## Summary of Recommendations

(...Add nice checklist text for authors and reviewers based on {{defuse}} later...)
 -->

</section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="example-8288">
        <name>Example: Web linking <xref target="RFC8288"/></name>
        <t>This example is about an internal, FDT-induced restatement in
<xref target="RFC5988"/>, which turned into an external restatement in <xref target="RFC6690"/>,
which was not healed by the update to <xref target="RFC5988"/> in <xref target="RFC8288"/>.</t>
        <t><xref section="5" sectionFormat="of" target="RFC5988"/> defines a serialization of web links in a Link Header Field.
A link can have zero of more <tt>link-param</tt> parameters, each of which
has the form (simplified):</t>
        <sourcecode type="abnf"><![CDATA[
link-extension = parmname [ "=" ( ptoken / quoted-string ) ]
]]></sourcecode>
        <t>So link-extensions can always be written as a <tt>quoted-string</tt>, or,
alternatively, without quotes as a <tt>ptoken</tt> if the more limited character
repertoire of <tt>ptoken</tt>s suffices.</t>
        <t>However, <xref target="RFC5988"/> also defines the specifics of a few link parameters.
When simply inserting this into the overall ABNF, the ABNF given for
these link parameters needs to <em>restate</em> the ABNF
for link parameters in their common syntax (simplified):</t>
        <sourcecode type="abnf"><![CDATA[
link-param  = ( "rel" "=" relation-types )
            / ( "anchor" "=" <"> URI-Reference <"> )
            / ( "rev" "=" relation-types )
            / ( "hreflang" "=" Language-Tag )
            / ( "media" "=" ( MediaDesc / ( <"> MediaDesc <"> ) ) )
            / ( "title" "=" quoted-string )
            / ( "type" "=" ( media-type / quoted-mt ) )
]]></sourcecode>
        <t>This restatement loses the intended choice between <tt>ptoken</tt> and <tt>quoted-string</tt> for
many predefined link parameters, only keeping it for <tt>"media"</tt> and
<tt>"type"</tt> (and <tt>"rel"</tt> in the definition of <tt>relation-types</tt>, which is
arguably faulty by allowing non-ptoken characters in an unquoted URI).</t>
        <t>One could say that this restatement was caused by a limitation of ABNF:
ABNF
cannot separately express both the overall syntax of link-params (which yields
the link-param value)) and the specific syntax for the predefined
link-params, contaminating the former with the latter.
The specific syntax would really need to be in terms of the value
yielded as opposed to <em>restating</em> the link-param syntax that yields the value.</t>
        <t><xref section="3" sectionFormat="of" target="RFC8288"/> finally repairs this:</t>
        <blockquote>
          <artwork><![CDATA[
link-param = token BWS [ "=" BWS ( token / quoted-string ) ]
]]></artwork>
          <t>Note that any link-param can be generated with values using either
  the token or the quoted-string syntax; therefore, recipients <bcp14>MUST</bcp14> be
  able to parse both forms.  In other words, the following parameters
  are equivalent:</t>
          <artwork><![CDATA[
x=y
x="y"
]]></artwork>
          <t>Previous definitions of the Link header did not equate the token and
  quoted-string forms explicitly; the title parameter was always
  quoted, and the hreflang parameter was always a token.  Senders
  wishing to maximize interoperability will send them in those forms.</t>
          <t>Individual link-params specify their syntax in terms of the value
  after any necessary unquoting (as per <xref section="3.2.6" sectionFormat="comma" target="RFC7230"/>).</t>
        </blockquote>
        <t>Unfortunately, <xref target="RFC6690"/> adds an external restatement copying from
<xref target="RFC5988"/> in defining a few more link-params (simplified):</t>
        <sourcecode type="abnf"><![CDATA[
link-param     = ( "rel" "=" relation-types )  ; ...
               / ( "type" "=" ( media-type / quoted-mt ) )
               / ( "rt" "=" relation-types )
               / ( "if" "=" relation-types )
               / ( "sz" "=" cardinal )
cardinal       = "0" / ( %x31-39 *DIGIT )
]]></sourcecode>
        <t>The letter of this specification for instance prohibits <tt>sz="47"</tt>
(requiring this to be represented as <tt>sz=47</tt>).   The repair in
<xref target="RFC8288"/> cannot quite fix this as:</t>
        <ul spacing="normal">
          <li>
            <t>it is not clear that the repair actually applies to <xref target="RFC6690"/> (a
general problem with updated ["obsoleted"] references)</t>
          </li>
          <li>
            <t>the ABNF in <xref target="RFC6690"/> would need to be rewritten to apply the rule
<tt>cardinal</tt> to the extracted value of the link-param.</t>
          </li>
        </ul>
      </section>
      <section anchor="example-restatement-of-iso8601-in-rfc3339">
        <name>Example: Restatement of <xref target="ISO8601"/> in <xref target="RFC3339"/></name>
        <t><xref target="RFC3339"/> was largely intended as a freely available restatement of
the paywalled <xref target="ISO8601"/>, with focus added on formally defining the
parts that might be useful in the Internet.
However, when <xref target="ISO8601-2000"/> introduced additional text that seemed to
disallow the syntax used for one extension that <xref section="4.3" sectionFormat="of" target="RFC3339"/> had made to the semantics of <xref target="ISO8601"/>, the precedence
remained unclear.
Implementers of Internet-related standards largely ignored the
additional semantics of that extension anyway, while implementers of
<xref target="ISO8601"/> in general often performed input validation that made sure
the extension made by <xref target="RFC3339"/> wouldn't work.
(This is only now being addressed by <xref section="2" sectionFormat="of" target="RFC9557"/>.)</t>
      </section>
      <section anchor="example-6991">
        <name>Example: Date-Time in YANG (RFC6991)</name>
        <t><xref target="RFC6991"/> defines a YANG type <tt>date-and-time</tt> on page 11, restating
parts of <xref target="RFC3339"/> (the restatement is also faulty in its item (b),
with some cleanup in <xref target="RFC9911"/>).
Now that <xref target="RFC3339"/> is being bug-fixed via <xref section="2" sectionFormat="of" target="RFC9557"/>, it
is not clear whether the change applies to the YANG type as well.
This is more of a problem for YANG than it might be otherwise, as it might trigger
the YANG concept of a "non-backwards-compatible" change to that
datatype — a problem that is not entirely <em>caused</em> by restatements but gets
much harder to discuss.</t>
      </section>
      <section anchor="example-9444">
        <name>Example: ACME for Subdomains (RFC9444)</name>
        <t>A late draft of what became <xref target="RFC9444"/> defines a new feature added to <xref target="RFC8555"/>, referencing
the base standard in a number of places.</t>
        <t>Reviewing the draft <xref target="I-D.draft-ietf-acme-subdomains-04"/>, <xref target="acme-comment"/> states:</t>
        <ul empty="true">
          <li>
            <t>## restatement vs. new normative content</t>
            <t>Providing a specification of a new feature added to ACME, the text
explains a number basic ACME mechanisms that are relevant to this
specification.</t>
            <t>One pervasive problem is that these restatements of RFC 8555 content
are not always easy to distinguish from new, normative statements made
by this document.
E.g., 4.2 contains a statement about "is defined" that is part of a
paragraph restating RFC 8555 -- this one, however, appears to be new
normative content.
(Languagetool diagnoses overuse of passive voice, which exacerbates
this problem.)</t>
            <t>(The first paragraph of section 4 repeats the last paragraph of
section 3.  But that is not a problem; redundancy can be good if it
improves the flow, and this is clearly labeled as a restatement.)
The introduction of section 4 is a summary/restatement of RFC 8555;
section 4.1 introduces new normative content without warning (and
leads the reader astray by actually referencing RFC 8555).</t>
          </li>
        </ul>
        <t>(These problems were ultimately addressed in <xref target="RFC9444"/>.)</t>
      </section>
      <section anchor="example-eat">
        <name>Example: Base64 Encoding variants in draft-ietf-rats-eat-20</name>
        <t>Base64 encoding is defined in <xref target="RFC4648"/>, but comes in a number of
variants.  These often have default settings that are to be used
"unless the specification referring to this document explicitly states
otherwise" (e.g., <xref section="3.2" sectionFormat="of" target="RFC4648"/>).</t>
        <t>Documents that reference <xref target="RFC4648"/> normatively are
surprisingly often sloppy in doing so.
Not <xref target="I-D.draft-ietf-rats-eat-20"/>: Its Section 2 (terminology) defines
the term "Base64url Encoding”, referencing <xref target="RFC4648"/> as well as
<xref target="RFC7515"/> to fill in the open questions from <xref target="RFC4648"/> (i.e., Section
5 and not Section 4, no '=' padding that would be default, no extra
characters).</t>
        <t>While this was a good start, incomplete restatements in the following
text cause a problem, as detailed in <xref target="rats-comment"/>:</t>
        <blockquote>
          <t>A term "base64url encoded” [...] is used in multiple places.  One of the
places restates its own reference to RFC 4648, but doesn’t restate
the reference to RFC 7515 and the text required with that.  This
restatement is very misleading as it strongly implies RFC 7515 is
<em>not</em> used here; the reference needs to be removed.  In the other
places I find the term is simply used, which assumes the reader
will think to look up the term in the terminology [...]</t>
        </blockquote>
        <t>(The problem in the draft was quickly addressed in the next revision;
with these fixes the draft has now turned into a published RFC <xref target="RFC9711"/>.)</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Restatements about security requirements and properties can create the
same uncertainties and interoperability problems as restatements in
other contexts.
Security considerations sections have turned out to be an attractor
for such problems.
They are meant "both to encourage document authors to consider
security in their designs and to inform the reader of relevant
security issues" (<xref section="1" sectionFormat="of" target="RFC3552"/>).
In practice, they tend to be the first point in a document that
security issues are considered at all, so they often both contain
normative statements that are nowhere else in the document and
security-conscious restatements of other normative statements in the
document, the latter with all the perils that this memo is about.
The fact that security considerations sections are often heavily
fleshed out during IESG processing can exacerbate the problem.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="ISO8601" to="ISO8601:1988"/>
    <displayreference target="ISO8601-2000" to="ISO8601:2000"/>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
          <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
            <front>
              <title>Key words for use in RFCs to Indicate Requirement Levels</title>
              <author fullname="S. Bradner" initials="S." surname="Bradner"/>
              <date month="March" year="1997"/>
              <abstract>
                <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          </reference>
          <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
            <front>
              <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
              <author fullname="B. Leiba" initials="B." surname="Leiba"/>
              <date month="May" year="2017"/>
              <abstract>
                <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          </reference>
        </referencegroup>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="KOENIG">
          <front>
            <title>Patterns and Antipatterns</title>
            <author initials="A." surname="Koenig" fullname="Andrew Koenig">
              <organization/>
            </author>
            <date year="1995"/>
          </front>
          <seriesInfo name="J. Object Oriented Program." value="8(1): pp. 46-48 "/>
        </reference>
        <reference anchor="ANTIPATTERN" target="http://wiki.c2.com/?AntiPattern">
          <front>
            <title>Anti Pattern</title>
            <author>
              <organization/>
            </author>
            <date year="2012" month="November" day="21"/>
          </front>
          <refcontent>C2 Wiki (at the time of writing, last edited:)</refcontent>
        </reference>
        <reference anchor="WP-ANTIPATTERN" target="https://en.wikipedia.org/w/index.php?title=Anti-pattern&amp;oldid=1296568489">
          <front>
            <title>Anti-pattern</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="June" day="20"/>
          </front>
          <refcontent>Wikipedia page (at the time of writing:)</refcontent>
        </reference>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="errata2397" target="https://www.rfc-editor.org/errata/rfc2397">
          <front>
            <title>RFC Errata Report » RFC Editor</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <refcontent>search result</refcontent>
        </reference>
        <reference anchor="RFC9399">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="T. Freeman" initials="T." surname="Freeman"/>
            <author fullname="L. Rosenthol" initials="L." surname="Rosenthol"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document specifies a certificate extension for including logotypes in public key certificates and attribute certificates. This document obsoletes RFCs 3709 and 6170.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9399"/>
          <seriesInfo name="DOI" value="10.17487/RFC9399"/>
        </reference>
        <referencegroup anchor="STD68" target="https://www.rfc-editor.org/info/std68">
          <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234">
            <front>
              <title>Augmented BNF for Syntax Specifications: ABNF</title>
              <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
              <author fullname="P. Overell" initials="P." surname="Overell"/>
              <date month="January" year="2008"/>
              <abstract>
                <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="68"/>
            <seriesInfo name="RFC" value="5234"/>
            <seriesInfo name="DOI" value="10.17487/RFC5234"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC5988">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document specifies relation types for Web links, and defines a registry for them. It also defines the use of such links in HTTP headers with the Link header field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5988"/>
          <seriesInfo name="DOI" value="10.17487/RFC5988"/>
          <annotation>This specification is obsoleted by <xref target="RFC8288"/>.</annotation>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC7230">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document provides an overview of HTTP architecture and its associated terminology, defines the "http" and "https" Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7230"/>
          <seriesInfo name="DOI" value="10.17487/RFC7230"/>
          <annotation>This specification is obsoleted by <xref target="RFC9110"/> and <xref target="RFC9112"/>.</annotation>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9112">
          <front>
            <title>HTTP/1.1</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
              <t>This document obsoletes portions of RFC 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="99"/>
          <seriesInfo name="RFC" value="9112"/>
          <seriesInfo name="DOI" value="10.17487/RFC9112"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
          <annotation>This specification is obsoleted by <xref target="RFC9911"/>.</annotation>
        </reference>
        <reference anchor="RFC9444">
          <front>
            <title>Automated Certificate Management Environment (ACME) for Subdomains</title>
            <author fullname="O. Friel" initials="O." surname="Friel"/>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="T. Hollebeek" initials="T." surname="Hollebeek"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies how Automated Certificate Management Environment (ACME) can be used by a client to obtain a certificate for a subdomain identifier from a certification authority. Additionally, this document specifies how a client can fulfill a challenge against an ancestor domain but may not need to fulfill a challenge against the explicit subdomain if certification authority policy allows issuance of the subdomain certificate without explicit subdomain ownership proof.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9444"/>
          <seriesInfo name="DOI" value="10.17487/RFC9444"/>
        </reference>
        <reference anchor="RFC9911">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schönwälder" initials="J." role="editor" surname="Schönwälder"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document defines a collection of common data types to be used with the YANG data modeling language. It includes several new type definitions and obsoletes RFC 6991.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9911"/>
          <seriesInfo name="DOI" value="10.17487/RFC9911"/>
        </reference>
        <reference anchor="RFC3339">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
        <reference anchor="RFC9557">
          <front>
            <title>Date and Time on the Internet: Timestamps with Additional Information</title>
            <author fullname="U. Sharma" initials="U." surname="Sharma"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>This document defines an extension to the timestamp format defined in RFC 3339 for representing additional information, including a time zone.</t>
              <t>It updates RFC 3339 in the specific interpretation of the local offset Z, which is no longer understood to "imply that UTC is the preferred reference point for the specified time".</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9557"/>
          <seriesInfo name="DOI" value="10.17487/RFC9557"/>
        </reference>
        <reference anchor="I-D.draft-ietf-rats-eat-20">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="13" month="June" year="2023"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine how much
   it wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-20"/>
          <annotation>A revision of this specification was published as <xref target="RFC9711"/>.</annotation>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="rats-comment" target="https://mailarchive.ietf.org/arch/msg/rats/H8qXwQywD0W6x4QcC9Iwd5LYl2s">
          <front>
            <title>Re: [Rats] I-D Action: draft-ietf-rats-eat-20.txt</title>
            <author initials="C." surname="Bormann" fullname="Carsten Bormann">
              <organization/>
            </author>
            <date year="2023" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.draft-ietf-acme-subdomains-04">
          <front>
            <title>ACME for Subdomains</title>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="29" month="June" year="2022"/>
            <abstract>
              <t>   This document outlines how ACME can be used by a client to obtain a
   certificate for a subdomain identifier from a certification
   authority.  The client has fulfilled a challenge against a parent
   domain but does not need to fulfill a challenge against the explicit
   subdomain as certification authority policy allows issuance of the
   subdomain certificate without explicit subdomain ownership proof.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-acme-subdomains-04"/>
        </reference>
        <reference anchor="acme-comment" target="https://mailarchive.ietf.org/arch/msg/last-call/v0RYQkByhAII9yvaD6gbKWx0WtA">
          <front>
            <title>[Last-Call] Artart last call review of draft-ietf-acme-subdomains-04</title>
            <author initials="C." surname="Bormann" fullname="Carsten Bormann">
              <organization/>
            </author>
            <date year="2022" month="November" day="23"/>
          </front>
        </reference>
        <reference anchor="ISO8601" target="https://www.iso.org/standard/15903.html">
          <front>
            <title>Data elements and interchange formats — Information interchange — Representation of dates and times</title>
            <author>
              <organization abbrev="ISO">International Organization for Standardization</organization>
            </author>
            <date year="1988" month="June"/>
          </front>
          <seriesInfo name="ISO" value="8601:1988"/>
          <annotation>Also available from &lt;⁠<eref target="https://nvlpubs.nist.gov/nistpubs/Legacy/FIPS/fipspub4-1-1991.pdf">https://nvlpubs.nist.gov/nistpubs/Legacy/FIPS/fipspub4-1-1991.pdf</eref>&gt;.</annotation>
        </reference>
        <reference anchor="ISO8601-2000" target="https://www.iso.org/standard/26780.html">
          <front>
            <title>Data elements and interchange formats — Information interchange — Representation of dates and times</title>
            <author>
              <organization abbrev="ISO">International Organization for Standardization</organization>
            </author>
            <date year="2000" month="December"/>
          </front>
          <seriesInfo name="ISO" value="8601:2000"/>
        </reference>
      </references>
    </references>
    <?line 604?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Julian Reschke opened the author's eyes to the fundamental problem of
restatements, possibly not using this word.
Many IETFers over decades have worked on mitigating restatements; the
author apologizes that examples in this memo naturally mainly come
from the author's own recollection.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
