Let's add a section to the document, before the section on relationship to
certificate thumbprints.

5.5 Relationship to JSON Web Key Thumbprints

The ckt of a cose key, and jkt of a json web key are different, even when
underlying cryptographic key material is the same.

This document does not register a JWT claim for using ckt as a confirmation
method for a JWT, or a CWT claim for using jkt as a confirmation method for
a CWT.




On Mon, Dec 2, 2024, 6:26 PM Orie Steele <orie@transmute.industries> wrote:

> I agree, let's just stick with the simple (none) solution.
>
> Hannes can you approve or suggest changes to the clarifying text that
> makes it clear this is not an oversight?
>
> Mike, do you object to that clarifying text assuming we take you change to
> the IANA considerations section?
>
> OS
>
> On Mon, Dec 2, 2024, 5:56 PM Michael Jones <michael_b_jo...@hotmail.com>
> wrote:
>
>> I’m either fine with Orie’s proposed change to the registration wording
>> or the following one:
>>
>>
>>
>> From:
>>
>>    Confirmation Method Name:  ckt
>>    Confirmation Method Description:  COSE Key SHA-256 Thumbprint
>>    JWT Confirmation Method Name:  jkt
>>
>> To:
>>
>>    Confirmation Method Name:  ckt
>>    Confirmation Method Description:  COSE Key SHA-256 Thumbprint
>>    JWT Confirmation Method Name: (none)
>>
>> For the record, I’m not OK trying to add a ckt JWT “cnf” method as an
>> AUTH48 action (despite me appreciating Orie’s discussion of the
>> possibility).
>>
>>
>>
>>                                                                 Cheers,
>>
>>                                                                 -- Mike
>>
>>
>>
>> *From:* Orie Steele <orie@transmute.industries>
>> *Sent:* Monday, December 2, 2024 2:55 PM
>> *To:* Hannes Tschofenig <hannes.tschofe...@gmail.com>
>> *Cc:* Hannes Tschofenig <hannes.tschofe...@gmx.net>; RFC Editor <
>> rfc-edi...@rfc-editor.org>; Isobe Kohei <isobeko...@gmail.com>;
>> cose-...@ietf.org; Cose Chairs Wg <cose-cha...@ietf.org>; Michael Jones <
>> michael_b_jo...@hotmail.com>; Paul Wouters <paul.wout...@aiven.io>;
>> auth48archive@rfc-editor.org
>> *Subject:* Re: AUTH48: RFC-to-be 9679
>> <draft-ietf-cose-key-thumbprint-06> for your review
>>
>>
>>
>> This is indeed a bug, for extra assurance that it is a problem:
>>
>> How would you use a ckt to verify a JWT that was using "cnf"?
>>
>> Here is a more complete fix for the bug:
>>
>>
>> https://datatracker.ietf.org/doc/html/draft-ietf-cose-key-thumbprint-06#section-5.3
>>
>> Note that the ckt of a cose key, and jkt of a json web key are different,
>> even when underlying cryptographic key material is the same.
>>
>> ckt is a binary string and jkt is always a base64url string encoded as
>> described in section 6.1 of RFC9449.
>> To use a ckt claim inside a JWT, the ckt claim value MUST be base64url
>> encoded.
>> The example provided in section 6.1 of RFC9449 is modified to distinguish
>> confirmation with a CKT instead of JKT:
>> {
>>   "sub":"some...@example.com",
>>   "iss":"https://server.example.com";,
>>   "nbf":1562262611,
>>   "exp":1562266216,
>>   "cnf": {
>>     "ckt":"SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w"
>>   }
>> }
>>
>> I used the same base64url encoded thumbprint the draft already used for
>> extra clarity.
>>
>> ckt would also need to be added here:
>> https://www.iana.org/assignments/jwt/jwt.xhtml#confirmation-methods
>>
>> This kind of change might need to be taken to the relevant lists for
>> review... and maybe another WGLC.
>>
>> ... we could leave the "ckt" in JWT cnf registration to another document,
>> but I think at a minimum we need something added to section 5.3 to the
>> effect of:
>>
>> Note that the ckt of a cose key, and jkt of a json web key are different,
>> even when underlying cryptographic key material is the same.
>> ckt is a binary string and jkt is always a base64url string encoded as
>> described in section 6.1 of RFC9449.
>>
>> ^ If we are comfortable with this change alone, we still have a problem
>> with the registration template:
>> https://www.rfc-editor.org/rfc/rfc8747.html#name-registration-template
>>
>> """
>> CWT claims should normally have a corresponding JWT claim. If a
>> corresponding JWT claim would not make sense, the designated experts can
>> choose to accept registrations for which the JWT Claim Name is listed as
>> "N/A".
>> """
>>
>> The logical JWT claim is "ckt"... not "jkt"... so N/A... does not make
>> sense... and leaving it blank also does not make sense.
>>
>> There is also the x5t claim which sets the precedent that ckt is for cose
>> key, jkt is for json web key, and x5t is for x.509 certs.
>>
>> I propose:
>>
>> From:
>>
>>    Confirmation Method Name:  ckt
>>    Confirmation Method Description:  COSE Key SHA-256 Thumbprint
>>    JWT Confirmation Method Name:  jkt
>>
>> To:
>>
>>    Confirmation Method Name:  ckt
>>    Confirmation Method Description:  COSE Key SHA-256 Thumbprint
>>    JWT Confirmation Method Name: Not assigned by RFCXXXX ( not to be
>> confused with x5t or jkt )
>>
>>
>> OS
>>
>>
>>
>> On Mon, Dec 2, 2024 at 4:14 PM Hannes Tschofenig <
>> hannes.tschofe...@gmail.com> wrote:
>>
>> Thanks for the work on the draft and sorry for the slow response.
>>
>>
>>
>> I read through the draft carefully today and in general the edits look
>> good but I noticed a possible bug.
>>
>>
>>
>> In the IANA consideration section we say that the ckt confirmation method
>> maps to the jkt JWT configuration method. I double-checked RFC 9449, which
>> defines the jkt, and it defines the computation as follows:
>>
>> "
>> The value of the jkt member MUST be the base64url encoding
>>
>> of the JWK SHA-256 Thumbprint.
>> "
>>
>> In draft-ietf-cose-key-thumbprint-06 we define the ckt thumbprint as the
>> hash of the deterministic encoding of the COSE_Key structure.
>>
>>
>>
>> So, the question to me is whether we can even map the ckt to the jkt
>> since the underlying structure that is hashed is different: JWK vs.
>> COSE_Key structure.
>>
>>
>>
>> For that reason I believe it would be more correct to change the IANA
>> consideration section by omitting the JWT Confirmation Method Name.
>>
>> Here is the proposed change:
>>
>> From:
>>
>>    Confirmation Method Name:  ckt
>>
>>    Confirmation Method Description:  COSE Key SHA-256 Thumbprint
>>
>>    JWT Confirmation Method Name:  jkt
>>
>>
>>
>> To:
>>
>>    Confirmation Method Name:  ckt
>>
>>    Confirmation Method Description:  COSE Key SHA-256 Thumbprint
>>
>>    JWT Confirmation Method Name:
>>
>>
>>
>> Do you agree with me?
>>
>>
>>
>> Sorry for noticing this issue only now.
>>
>>
>>
>> Ciao
>>
>> Hannes
>>
>>
>>
>> *Betreff: *
>>
>> AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-thumbprint-06> for your review
>>
>> *Datum: *
>>
>> Mon, 21 Oct 2024 14:30:59 -0700 (PDT)
>>
>> *Von: *
>>
>> rfc-edi...@rfc-editor.org
>>
>> *An: *
>>
>> isobeko...@gmail.com, hannes.tschofe...@gmx.net,
>> orie@transmute.industries
>>
>> *Kopie (CC): *
>>
>> rfc-edi...@rfc-editor.org, cose-...@ietf.org, cose-cha...@ietf.org,
>> michael_b_jo...@hotmail.com, paul.wout...@aiven.io,
>> auth48archive@rfc-editor.org
>>
>>
>>
>> *****IMPORTANT*****
>>
>> Updated 2024/10/21
>>
>> RFC Author(s):
>> --------------
>>
>> Instructions for Completing AUTH48
>>
>> Your document has now entered AUTH48. Once it has been reviewed and
>> approved by you and all coauthors, it will be published as an RFC. If an
>> author is no longer available, there are several remedies available as
>> listed in the FAQ (https://www.rfc-editor.org/faq/).
>>
>> You and you coauthors are responsible for engaging other parties (e.g.,
>> Contributors or Working Group) as necessary before providing your approval.
>>
>> Planning your review ---------------------
>>
>> Please review the following aspects of your document:
>>
>> * RFC Editor questions
>>
>> Please review and resolve any questions raised by the RFC Editor that
>> have been included in the XML file as comments marked as follows:
>>
>> <!-- [rfced] ... -->
>>
>> These questions will also be sent in a subsequent email.
>>
>> * Changes submitted by coauthors
>> Please ensure that you review any changes submitted by your coauthors. We
>> assume that if you do not speak up that you agree to changes submitted by
>> your coauthors.
>>
>> * Content
>> Please review the full content of the document, as this cannot change
>> once the RFC is published. Please pay particular attention to:
>> - IANA considerations updates (if applicable)
>> - contact information
>> - references
>>
>> * Copyright notices and legends
>>
>> Please review the copyright notice and legends as defined in
>> RFC 5378 and the Trust Legal Provisions (TLP –
>> https://trustee.ietf.org/license-info).
>>
>> * Semantic markup
>>
>> Please review the markup in the XML file to ensure that elements of
>> content are correctly tagged. For example, ensure that <sourcecode> and
>> <artwork> are set correctly. See details at
>> <https://authors.ietf.org/rfcxml-vocabulary>
>> <https://authors.ietf.org/rfcxml-vocabulary>.
>>
>> * Formatted output
>>
>> Please review the PDF, HTML, and TXT files to ensure that the formatted
>> output, as generated from the markup in the XML file, is reasonable. Please
>> note that the TXT will have formatting limitations compared to the PDF and
>> HTML.
>>
>>
>> Submitting changes
>> ------------------
>>
>> To submit changes, please reply to this email using ‘REPLY ALL’ as all
>> the parties CCed on this message need to see your changes. The parties
>> include:
>>
>> * your coauthors
>> * rfc-edi...@rfc-editor.org (the RPC team)
>>
>> * other document participants, depending on the stream (e.g., IETF Stream
>> participants are your working group chairs, the responsible ADs, and the
>> document shepherd).
>> * auth48archive@rfc-editor.org, which is a new archival mailing list to
>> preserve AUTH48 conversations; it is not an active discussion list:
>> * More info:
>>
>> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>> * The archive itself:
>> https://mailarchive.ietf.org/arch/browse/auth48archive/
>>
>> * Note: If only absolutely necessary, you may temporarily opt out of the
>> archiving of messages (e.g., to discuss a sensitive matter).
>> If needed, please add a note at the top of the message that you have
>> dropped the address. When the discussion is concluded,
>> auth48archive@rfc-editor.org will be re-added to the CC list and its
>> addition will be noted at the top of the message.
>> You may submit your changes in one of two ways:
>>
>> An update to the provided XML file
>> — OR —
>> An explicit list of changes in this format
>>
>> Section # (or indicate Global)
>>
>> OLD:
>> old text
>>
>> NEW:
>> new text
>>
>> You do not need to reply with both an updated XML file and an explicit
>> list of changes, as either form is sufficient.
>>
>> We will ask a stream manager to review and approve any changes that seem
>> beyond editorial in nature, e.g., addition of new text, deletion of text,
>> and technical changes. Information about stream managers can be found in
>> the FAQ. Editorial changes do not require approval from a stream manager.
>>
>>
>> Approving for publication
>> --------------------------
>>
>> To approve your RFC for publication, please reply to this email stating
>> that you approve this RFC for publication. Please use ‘REPLY ALL’,
>> as all the parties CCed on this message need to see your approval.
>>
>>
>> Files -----
>>
>> The files are available here:
>> https://www.rfc-editor.org/authors/rfc9679.xml
>> https://www.rfc-editor.org/authors/rfc9679.html
>> https://www.rfc-editor.org/authors/rfc9679.pdf
>> https://www.rfc-editor.org/authors/rfc9679.txt
>>
>> Diff file of the text:
>> https://www.rfc-editor.org/authors/rfc9679-diff.html
>> https://www.rfc-editor.org/authors/rfc9679-rfcdiff.html (side by side)
>>
>> Diff of the XML: https://www.rfc-editor.org/authors/rfc9679-xmldiff1.html
>>
>>
>> Tracking progress
>> -----------------
>>
>> The details of the AUTH48 status of your document are here:
>> https://www.rfc-editor.org/auth48/rfc9679
>>
>> Please let us know if you have any questions.
>> Thank you for your cooperation,
>>
>> RFC Editor
>>
>> --------------------------------------
>> RFC9679 (draft-ietf-cose-key-thumbprint-06)
>>
>> Title : CBOR Object Signing and Encryption (COSE) Key Thumbprint
>> Author(s) : K. Isobe, H. Tschofenig, O. Steele
>> WG Chair(s) : Matthew A. Miller, Ivaylo Petrov, Michael B. Jones
>>
>> Area Director(s) : Deb Cooley, Paul Wouters
>>
>>
>>
>>
>> --
>>
>>
>>
>>
>> *ORIE STEELE *Chief Technology Officer
>> www.transmute.industries
>>
>> <https://transmute.industries/>
>>
>
-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to