Thanks for the insightful comment, Orie. I agree with your proposed edits for the IANA consideration section and the extra text before the section on relationship to certificate thumbprints.
I am also fine with the additional text Mike proposed. It is indeed too late to add new functionality at this point in time. Ciao Hannes On Tue, Dec 3, 2024 at 3:13 AM Michael Jones <michael_b_jo...@hotmail.com> wrote: > I support adding the section that Orie proposed. > > > > However in reviewing related text, I unfortunately found a problem. > Reading > https://datatracker.ietf.org/doc/html/draft-ietf-cose-key-thumbprint-06#section-5.3, > it differs from https://www.rfc-editor.org/rfc/rfc7638#section-3.5 in a > counterproductive and overly restrictive way. Please change: > > > > Any party in possession of a key that is represented as a COSE Key can > > use the COSE Key Thumbprint. > > > > to: > > > > The only prerequisites are that the COSE_Key representation > > of the key be defined and the party creating the COSE Key Thumbprint > > be in possession of the necessary key material. > > > > That way it will be more actionable and will parallel the corresponding > RFC 7638 text. > > > > Thanks all, > > -- Mike > > > > *From:* Orie Steele <orie@transmute.industries> > *Sent:* Monday, December 2, 2024 5:55 PM > *To:* Michael Jones <michael_b_jo...@hotmail.com> > *Cc:* Hannes Tschofenig <hannes.tschofe...@gmail.com>; Hannes Tschofenig < > hannes.tschofe...@gmx.net>; RFC Editor <rfc-edi...@rfc-editor.org>; Isobe > Kohei <isobeko...@gmail.com>; cose-...@ietf.org; Cose Chairs Wg < > cose-cha...@ietf.org>; Paul Wouters <paul.wout...@aiven.io>; > auth48archive <auth48archive@rfc-editor.org> > *Subject:* Re: AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-thumbprint-06> > for your review > > > > Let's add a section to the document, before the section on relationship to > certificate thumbprints. > > > > 5.5 Relationship to JSON Web Key Thumbprints > > > > The ckt of a cose key, and jkt of a json web key are different, even when > underlying cryptographic key material is the same. > > > > This document does not register a JWT claim for using ckt as a > confirmation method for a JWT, or a CWT claim for using jkt as a > confirmation method for a CWT. > > > > > > > > > > On Mon, Dec 2, 2024, 6:26 PM Orie Steele <orie@transmute.industries> > wrote: > > I agree, let's just stick with the simple (none) solution. > > > > Hannes can you approve or suggest changes to the clarifying text that > makes it clear this is not an oversight? > > > > Mike, do you object to that clarifying text assuming we take you change to > the IANA considerations section? > > > > OS > > > > On Mon, Dec 2, 2024, 5:56 PM Michael Jones <michael_b_jo...@hotmail.com> > wrote: > > I’m either fine with Orie’s proposed change to the registration wording or > the following one: > > > > From: > > Confirmation Method Name: ckt > Confirmation Method Description: COSE Key SHA-256 Thumbprint > JWT Confirmation Method Name: jkt > > To: > > Confirmation Method Name: ckt > Confirmation Method Description: COSE Key SHA-256 Thumbprint > JWT Confirmation Method Name: (none) > > For the record, I’m not OK trying to add a ckt JWT “cnf” method as an > AUTH48 action (despite me appreciating Orie’s discussion of the > possibility). > > > > Cheers, > > -- Mike > > > > *From:* Orie Steele <orie@transmute.industries> > *Sent:* Monday, December 2, 2024 2:55 PM > *To:* Hannes Tschofenig <hannes.tschofe...@gmail.com> > *Cc:* Hannes Tschofenig <hannes.tschofe...@gmx.net>; RFC Editor < > rfc-edi...@rfc-editor.org>; Isobe Kohei <isobeko...@gmail.com>; > cose-...@ietf.org; Cose Chairs Wg <cose-cha...@ietf.org>; Michael Jones < > michael_b_jo...@hotmail.com>; Paul Wouters <paul.wout...@aiven.io>; > auth48archive@rfc-editor.org > *Subject:* Re: AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-thumbprint-06> > for your review > > > > This is indeed a bug, for extra assurance that it is a problem: > > How would you use a ckt to verify a JWT that was using "cnf"? > > Here is a more complete fix for the bug: > > > https://datatracker.ietf.org/doc/html/draft-ietf-cose-key-thumbprint-06#section-5.3 > > Note that the ckt of a cose key, and jkt of a json web key are different, > even when underlying cryptographic key material is the same. > > ckt is a binary string and jkt is always a base64url string encoded as > described in section 6.1 of RFC9449. > To use a ckt claim inside a JWT, the ckt claim value MUST be base64url > encoded. > The example provided in section 6.1 of RFC9449 is modified to distinguish > confirmation with a CKT instead of JKT: > { > "sub":"some...@example.com", > "iss":"https://server.example.com", > "nbf":1562262611, > "exp":1562266216, > "cnf": { > "ckt":"SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w" > } > } > > I used the same base64url encoded thumbprint the draft already used for > extra clarity. > > ckt would also need to be added here: > https://www.iana.org/assignments/jwt/jwt.xhtml#confirmation-methods > > This kind of change might need to be taken to the relevant lists for > review... and maybe another WGLC. > > ... we could leave the "ckt" in JWT cnf registration to another document, > but I think at a minimum we need something added to section 5.3 to the > effect of: > > Note that the ckt of a cose key, and jkt of a json web key are different, > even when underlying cryptographic key material is the same. > ckt is a binary string and jkt is always a base64url string encoded as > described in section 6.1 of RFC9449. > > ^ If we are comfortable with this change alone, we still have a problem > with the registration template: > https://www.rfc-editor.org/rfc/rfc8747.html#name-registration-template > > """ > CWT claims should normally have a corresponding JWT claim. If a > corresponding JWT claim would not make sense, the designated experts can > choose to accept registrations for which the JWT Claim Name is listed as > "N/A". > """ > > The logical JWT claim is "ckt"... not "jkt"... so N/A... does not make > sense... and leaving it blank also does not make sense. > > There is also the x5t claim which sets the precedent that ckt is for cose > key, jkt is for json web key, and x5t is for x.509 certs. > > I propose: > > From: > > Confirmation Method Name: ckt > Confirmation Method Description: COSE Key SHA-256 Thumbprint > JWT Confirmation Method Name: jkt > > To: > > Confirmation Method Name: ckt > Confirmation Method Description: COSE Key SHA-256 Thumbprint > JWT Confirmation Method Name: Not assigned by RFCXXXX ( not to be > confused with x5t or jkt ) > > > OS > > > > On Mon, Dec 2, 2024 at 4:14 PM Hannes Tschofenig < > hannes.tschofe...@gmail.com> wrote: > > Thanks for the work on the draft and sorry for the slow response. > > > > I read through the draft carefully today and in general the edits look > good but I noticed a possible bug. > > > > In the IANA consideration section we say that the ckt confirmation method > maps to the jkt JWT configuration method. I double-checked RFC 9449, which > defines the jkt, and it defines the computation as follows: > > " > The value of the jkt member MUST be the base64url encoding > > of the JWK SHA-256 Thumbprint. > " > > In draft-ietf-cose-key-thumbprint-06 we define the ckt thumbprint as the > hash of the deterministic encoding of the COSE_Key structure. > > > > So, the question to me is whether we can even map the ckt to the jkt since > the underlying structure that is hashed is different: JWK vs. COSE_Key > structure. > > > > For that reason I believe it would be more correct to change the IANA > consideration section by omitting the JWT Confirmation Method Name. > > Here is the proposed change: > > From: > > Confirmation Method Name: ckt > > Confirmation Method Description: COSE Key SHA-256 Thumbprint > > JWT Confirmation Method Name: jkt > > > > To: > > Confirmation Method Name: ckt > > Confirmation Method Description: COSE Key SHA-256 Thumbprint > > JWT Confirmation Method Name: > > > > Do you agree with me? > > > > Sorry for noticing this issue only now. > > > > Ciao > > Hannes > > > > *Betreff: * > > AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-thumbprint-06> for your review > > *Datum: * > > Mon, 21 Oct 2024 14:30:59 -0700 (PDT) > > *Von: * > > rfc-edi...@rfc-editor.org > > *An: * > > isobeko...@gmail.com, hannes.tschofe...@gmx.net, orie@transmute.industries > > *Kopie (CC): * > > rfc-edi...@rfc-editor.org, cose-...@ietf.org, cose-cha...@ietf.org, > michael_b_jo...@hotmail.com, paul.wout...@aiven.io, > auth48archive@rfc-editor.org > > > > *****IMPORTANT***** > > Updated 2024/10/21 > > RFC Author(s): > -------------- > > Instructions for Completing AUTH48 > > Your document has now entered AUTH48. Once it has been reviewed and > approved by you and all coauthors, it will be published as an RFC. If an > author is no longer available, there are several remedies available as > listed in the FAQ (https://www.rfc-editor.org/faq/). > > You and you coauthors are responsible for engaging other parties (e.g., > Contributors or Working Group) as necessary before providing your approval. > > Planning your review --------------------- > > Please review the following aspects of your document: > > * RFC Editor questions > > Please review and resolve any questions raised by the RFC Editor that have > been included in the XML file as comments marked as follows: > > <!-- [rfced] ... --> > > These questions will also be sent in a subsequent email. > > * Changes submitted by coauthors > Please ensure that you review any changes submitted by your coauthors. We > assume that if you do not speak up that you agree to changes submitted by > your coauthors. > > * Content > Please review the full content of the document, as this cannot change once > the RFC is published. Please pay particular attention to: > - IANA considerations updates (if applicable) > - contact information > - references > > * Copyright notices and legends > > Please review the copyright notice and legends as defined in > RFC 5378 and the Trust Legal Provisions (TLP – > https://trustee.ietf.org/license-info). > > * Semantic markup > > Please review the markup in the XML file to ensure that elements of > content are correctly tagged. For example, ensure that <sourcecode> and > <artwork> are set correctly. See details at > <https://authors.ietf.org/rfcxml-vocabulary> > <https://authors.ietf.org/rfcxml-vocabulary>. > > * Formatted output > > Please review the PDF, HTML, and TXT files to ensure that the formatted > output, as generated from the markup in the XML file, is reasonable. Please > note that the TXT will have formatting limitations compared to the PDF and > HTML. > > > Submitting changes > ------------------ > > To submit changes, please reply to this email using ‘REPLY ALL’ as all the > parties CCed on this message need to see your changes. The parties include: > > * your coauthors > * rfc-edi...@rfc-editor.org (the RPC team) > > * other document participants, depending on the stream (e.g., IETF Stream > participants are your working group chairs, the responsible ADs, and the > document shepherd). > * auth48archive@rfc-editor.org, which is a new archival mailing list to > preserve AUTH48 conversations; it is not an active discussion list: > * More info: > > https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc > * The archive itself: > https://mailarchive.ietf.org/arch/browse/auth48archive/ > > * Note: If only absolutely necessary, you may temporarily opt out of the > archiving of messages (e.g., to discuss a sensitive matter). > If needed, please add a note at the top of the message that you have > dropped the address. When the discussion is concluded, > auth48archive@rfc-editor.org will be re-added to the CC list and its > addition will be noted at the top of the message. > You may submit your changes in one of two ways: > > An update to the provided XML file > — OR — > An explicit list of changes in this format > > Section # (or indicate Global) > > OLD: > old text > > NEW: > new text > > You do not need to reply with both an updated XML file and an explicit > list of changes, as either form is sufficient. > > We will ask a stream manager to review and approve any changes that seem > beyond editorial in nature, e.g., addition of new text, deletion of text, > and technical changes. Information about stream managers can be found in > the FAQ. Editorial changes do not require approval from a stream manager. > > > Approving for publication > -------------------------- > > To approve your RFC for publication, please reply to this email stating > that you approve this RFC for publication. Please use ‘REPLY ALL’, > as all the parties CCed on this message need to see your approval. > > > Files ----- > > The files are available here: > https://www.rfc-editor.org/authors/rfc9679.xml > https://www.rfc-editor.org/authors/rfc9679.html > https://www.rfc-editor.org/authors/rfc9679.pdf > https://www.rfc-editor.org/authors/rfc9679.txt > > Diff file of the text: > https://www.rfc-editor.org/authors/rfc9679-diff.html > https://www.rfc-editor.org/authors/rfc9679-rfcdiff.html (side by side) > > Diff of the XML: https://www.rfc-editor.org/authors/rfc9679-xmldiff1.html > > > Tracking progress > ----------------- > > The details of the AUTH48 status of your document are here: > https://www.rfc-editor.org/auth48/rfc9679 > > Please let us know if you have any questions. > Thank you for your cooperation, > > RFC Editor > > -------------------------------------- > RFC9679 (draft-ietf-cose-key-thumbprint-06) > > Title : CBOR Object Signing and Encryption (COSE) Key Thumbprint > Author(s) : K. Isobe, H. Tschofenig, O. Steele > WG Chair(s) : Matthew A. Miller, Ivaylo Petrov, Michael B. Jones > > Area Director(s) : Deb Cooley, Paul Wouters > > > > > -- > > > > > *ORIE STEELE *Chief Technology Officer > www.transmute.industries > > <https://transmute.industries/> > >
-- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org