Hello ACE-EDHOC authors,

On Thu, Dec 12, 2024 at 11:45:58AM +0100, Christian Amsüss wrote:
> The "maybe a subject claim" is critical here: If a COSE_Key were used
> raw, the recipient would have no way of knowing whether or not a subject
> key, let alone with which value, should be in the KCCS that gets used as
> EDHOC input.

To some extent I stand corrected: The implementer in question has
pointed to bullet 4 of section 3.5.2 of RFC9528[1], which *does* say
that a naked COSE_Key is a credential that can be used by wrapping it in
the trivial CCS.

Thus, as long as the cnf used in the ACE profile says that it contains a
COSE_Key, it may be fine to use it -- but then the profile should point
to that conversion.

As a whole, this is probably the state: Those a108a101 prefixes would
thus actually never be sent, because the RS can send its message 2 with
a KID, the C can reconstruct the full credential even though it only got
the COSE_Key, and the client sends a token whose ciphertext may also
contain the COSE_Key (again, with the prefix added before AAD'ing it as
a CRED_I).

BR
c

[1]: https://www.rfc-editor.org/rfc/rfc9528.html#name-authentication-credentials

-- 
To use raw power is to make yourself infinitely vulnerable to greater powers.
  -- Bene Gesserit axiom

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Ace mailing list -- ace@ietf.org
To unsubscribe send an email to ace-le...@ietf.org

Reply via email to