Folks, I hate to do this, but in reviewing the newly added section, I realized that it was incorrectly using the term "claim". In both RFC 7800 and RFC 8747, "cnf" is a claim, whereas the JWT and CWT confirmation members are referred to as "members" - not "claims". Then I realized there other places in the draft this the term "claim" was incorrectly used.
The attached updated source file makes the needed corrections. For easier
reviewing, a diff from the RFC Editor's source also follows.
RFC Editor, please apply these edits and send out a new draft for review.
Thanks,
-- Mike (writing as a COSE chair)
diff rfc9679.xml rfc9679_mbj.xml
46c46
< <date year="2024" month="October"/>
---
> <date year="2024" month="December"/>
284,285c284,288
< This document does not register a JWT claim for using ckt as a confirmation
< method for a JWT or a CWT claim for using jkt as a confirmation method for
a CWT.
---
> This document does not register
> a JWT confirmation method <xref target="RFC7800"/>
> for using "ckt" as a confirmation method for a JWT
> or a CWT confirmation method <xref target="RFC8747"/>
> for using "jkt" as a confirmation method for a CWT.
293,294c296,297
< <t>The proof-of-possession key is identified using the "ckt" claim,
< the COSE Key Thumbprint claim. This claim contains the value of
---
> <t>The proof-of-possession key is identified using the "ckt" member of
> the CWT confirmation claim "cnf". This member contains the value of
299c302
< claim. In this approach, the issuer of a CWT declares that the
---
> member. In this approach, the issuer of a CWT declares that the
302c305
< of the key by including a "ckt" claim in the CWT.</t>
---
> of the key by including a "ckt" CWT confirmation method member in the CWT.</t>
304c307
< <t>The following example demonstrates the use of the "ckt" claim
---
> <t>The following example demonstrates the use of the "ckt" member
319,320c322,323
< <t><xref target="IANA"/> registers the "ckt" claim and the
confirmation method.
< The "ckt" claim is expected to be used in the "cnf" claim.</t>
---
> <t><xref target="IANA"/> registers the "ckt" CWT confirmation method
> member.
> The "ckt" member is used in the "cnf" claim.</t>
510a514
> <xi:include
> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7800.xml%22/>
-----Original Message-----
From: Karen Moore <[email protected]>
Sent: Wednesday, December 4, 2024 12:14 PM
To: Hannes Tschofenig <[email protected]>; Paul Wouters
<[email protected]>; Hannes Tschofenig <[email protected]>; Isobe
Kohei <[email protected]>; Orie Steele <[email protected]>; Michael
Jones <[email protected]>
Cc: RFC Editor <[email protected]>; [email protected]; Cose Chairs Wg
<[email protected]>; auth48archive <[email protected]>
Subject: Re: AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-thumbprint-06> for
your review
Hello Hannes,
We have noted your approval of the document on the AUTH48 status page
(https://www.rfc-editor.org/auth48/rfc9679).
We now await approval from Paul.
Best regards,
RFC Editor/kc
> On Dec 4, 2024, at 12:11 PM, Hannes Tschofenig <[email protected]>
> wrote:
>
> Thanks for the edits. It looks good to me with the additional edits Orie
> proposed in his recent email.
>
> On Wed, Dec 4, 2024 at 4:27 PM Orie Steele <[email protected]> wrote:
> Thank you!
>
> "cose key" should be "COSE Key",
>
> We could add "COSE Key as described in Section 7 of RFC9052" and "JSON Web
> Key, as described in Section 4 of RFC7517"
>
> If the citations are helpful... This is a style nit.
>
> I approve of the changes.
>
> On Tue, Dec 3, 2024 at 3:48 PM Karen Moore <[email protected]> wrote:
> Authors,
>
> Thank you for the discussion and suggested changes. Our files now reflect
> the updates below (see
> <https://www.rfc-editor.org/authors/rfc9679-lastrfcdiff.html> for a snapshot
> of the changes). Please review and let us know if these changes are agreeable
> or if any further updates are needed. We will then ask the AD to approve them.
>
> 1) Section 5.3
>
> OLD:
> Any party in possession of a key that is represented as a COSE Key can
> use the COSE Key Thumbprint.
>
> NEW:
> The only prerequisites are that the COSE_Key representation
> of the key be defined and the party creating the COSE Key Thumbprint
> be in possession of the necessary key material.
>
> ...
> 2) Addition of New Section. Note that we made “json web key” uppercase for
> consistency.
>
> NEW:
> 5.5 Relationship to JSON Web Key Thumbprints
>
> The ckt of a cose key and jkt of a JSON Web Key are different, even when
> underlying cryptographic key material is the same.
>
> This document does not register a JWT claim for using ckt as a confirmation
> method for a JWT or a CWT claim for using jkt as a confirmation method for
> a CWT.
>
> ...
> 3) Section 8
>
> OLD:
> Confirmation Method Name: ckt
> Confirmation Method Description: COSE Key SHA-256 Thumbprint
> JWT Confirmation Method Name: jkt
>
> NEW:
> Confirmation Method Name: ckt
> Confirmation Method Description: COSE Key SHA-256 Thumbprint
> JWT Confirmation Method Name: (none)
>
>
> —FILES (please refresh)—
>
> The updated XML file is here:
>
> https://www.r/
> fc-editor.org%2Fauthors%2Frfc9679.xml&data=05%7C02%7C%7Cffec038f21264c
> 9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638689
> 400647996515%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwL
> jAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%
> 7C&sdata=bzWmdHu1SIdScl4DvOiEyfTd%2F8yGCnR4jeEj1sK1Rnk%3D&reserved=0
>
> The updated output files are here:
>
> https://www.r/
> fc-editor.org%2Fauthors%2Frfc9679.txt&data=05%7C02%7C%7Cffec038f21264c
> 9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638689
> 400648016060%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwL
> jAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%
> 7C&sdata=MWn7grAtZbRscMA87kc8jXdej2zWbTqhbuSjHlqypJI%3D&reserved=0
>
> https://www.r/
> fc-editor.org%2Fauthors%2Frfc9679.pdf&data=05%7C02%7C%7Cffec038f21264c
> 9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638689
> 400648035295%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwL
> jAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%
> 7C&sdata=tWjwnqfIS6zEEf6iwa5xFQjbL8b%2F%2FEDJNHhqb%2B5nZvw%3D&reserved
> =0
>
> https://www.r/
> fc-editor.org%2Fauthors%2Frfc9679.html&data=05%7C02%7C%7Cffec038f21264
> c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C63868
> 9400648050919%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIw
> LjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C
> %7C&sdata=lXM13vx00Wd0CfBgOIyyf5KKoSlalZitAFfoKBepf30%3D&reserved=0
>
> This diff file shows all changes made during AUTH48:
>
> https://www.r/
> fc-editor.org%2Fauthors%2Frfc9679-auth48diff.html&data=05%7C02%7C%7Cff
> ec038f21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%
> 7C0%7C638689400648064937%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRyd
> WUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3
> D%7C0%7C%7C%7C&sdata=0NZU01lPTAdCqLYDPA2Z1oNKTTq9ERRZ8YgPeL9vZJI%3D&re
> served=0
>
> These diff files show only changes made during the last edit round:
>
> https://www.r/
> fc-editor.org%2Fauthors%2Frfc9679-lastdiff.html&data=05%7C02%7C%7Cffec
> 038f21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C
> 0%7C638689400648078454%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWU
> sIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%
> 7C0%7C%7C%7C&sdata=4TNQbumUEeRnloq87gXGMK%2Bx6oYnY%2FHEsYAmSnFwHEc%3D&
> reserved=0
>
> https://www.r/
> fc-editor.org%2Fauthors%2Frfc9679-lastrfcdiff.html&data=05%7C02%7C%7Cf
> fec038f21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1
> %7C0%7C638689400648092307%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy
> dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%
> 3D%7C0%7C%7C%7C&sdata=BXUsNh1kjpgH%2FsyUGhIbzR3e17Qn2poKGyN8XGDwokQ%3D
> &reserved=0
>
> This diff file shows all changes made to date:
>
> https://www.r/
> fc-editor.org%2Fauthors%2Frfc9679-diff.html&data=05%7C02%7C%7Cffec038f
> 21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C
> 638689400648105827%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlY
> iOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%
> 7C%7C%7C&sdata=b%2BgABW%2BoOFSvz1BXmJGkQo0ZwfzdzmwcjXRvoJYVW1o%3D&rese
> rved=0
>
> For the AUTH48 status of this document, please see:
>
> https://www.r/
> fc-editor.org%2Fauth48%2Frfc9679&data=05%7C02%7C%7Cffec038f21264c9983c
> d08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C63868940064
> 8118882%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMD
> AwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sd
> ata=NSSl5drmtVNahxxJRIi64i%2FGrLUQmmvQ3JKATE%2Byw5M%3D&reserved=0
>
> Thank you,
> RFC Editor/kc
>
> > On Dec 3, 2024, at 7:55 AM, Hannes Tschofenig <[email protected]>
> > wrote:
> >
> > Thanks for the insightful comment, Orie. I agree with your proposed edits
> > for the IANA consideration section and the extra text before the section on
> > relationship to certificate thumbprints.
> >
> > I am also fine with the additional text Mike proposed.
> >
> > It is indeed too late to add new functionality at this point in time.
> >
> > Ciao
> > Hannes
> >
> >
> > On Tue, Dec 3, 2024 at 3:13 AM Michael Jones <[email protected]>
> > wrote:
> > I support adding the section that Orie proposed.
> >
> >
> >
> > However in reviewing related text, I unfortunately found a problem.
> > Reading
> > https://datatracker.ietf.org/doc/html/draft-ietf-cose-key-thumbprint-06#section-5.3,
> > it differs from https://www.rfc-editor.org/rfc/rfc7638#section-3.5 in a
> > counterproductive and overly restrictive way. Please change:
> >
> >
> >
> > Any party in possession of a key that is represented as a COSE Key
> > can
> >
> > use the COSE Key Thumbprint.
> >
> >
> >
> > to:
> >
> >
> >
> > The only prerequisites are that the COSE_Key representation
> >
> > of the key be defined and the party creating the COSE Key Thumbprint
> >
> > be in possession of the necessary key material.
> >
> >
> >
> > That way it will be more actionable and will parallel the corresponding RFC
> > 7638 text.
> >
> >
> >
> >
> > Thanks all,
> >
> > --
> > Mike
> >
> >
> >
> > From: Orie Steele <[email protected]>
> > Sent: Monday, December 2, 2024 5:55 PM
> > To: Michael Jones <[email protected]>
> > Cc: Hannes Tschofenig <[email protected]>; Hannes
> > Tschofenig <[email protected]>; RFC Editor
> > <[email protected]>; Isobe Kohei <[email protected]>;
> > [email protected]; Cose Chairs Wg <[email protected]>; Paul
> > Wouters <[email protected]>; auth48archive
> > <[email protected]>
> > Subject: Re: AUTH48: RFC-to-be 9679
> > <draft-ietf-cose-key-thumbprint-06> for your review
> >
> >
> >
> > Let's add a section to the document, before the section on relationship to
> > certificate thumbprints.
> >
> >
> >
> > 5.5 Relationship to JSON Web Key Thumbprints
> >
> >
> >
> > The ckt of a cose key, and jkt of a json web key are different, even when
> > underlying cryptographic key material is the same.
> >
> >
> >
> > This document does not register a JWT claim for using ckt as a confirmation
> > method for a JWT, or a CWT claim for using jkt as a confirmation method for
> > a CWT.
> >
> >
> >
> >
> >
> >
> >
> >
> >
> > On Mon, Dec 2, 2024, 6:26 PM Orie Steele <[email protected]> wrote:
> >
> > I agree, let's just stick with the simple (none) solution.
> >
> >
> >
> > Hannes can you approve or suggest changes to the clarifying text that makes
> > it clear this is not an oversight?
> >
> >
> >
> > Mike, do you object to that clarifying text assuming we take you change to
> > the IANA considerations section?
> >
> >
> >
> > OS
> >
> >
> >
> > On Mon, Dec 2, 2024, 5:56 PM Michael Jones <[email protected]>
> > wrote:
> >
> > I’m either fine with Orie’s proposed change to the registration wording or
> > the following one:
> >
> >
> >
> > From:
> >
> > Confirmation Method Name: ckt
> > Confirmation Method Description: COSE Key SHA-256 Thumbprint
> > JWT Confirmation Method Name: jkt
> >
> > To:
> >
> > Confirmation Method Name: ckt
> > Confirmation Method Description: COSE Key SHA-256 Thumbprint
> > JWT Confirmation Method Name: (none)
> >
> > For the record, I’m not OK trying to add a ckt JWT “cnf” method as an
> > AUTH48 action (despite me appreciating Orie’s discussion of the
> > possibility).
> >
> >
> >
> >
> > Cheers,
> >
> > --
> > Mike
> >
> >
> >
> > From: Orie Steele <[email protected]>
> > Sent: Monday, December 2, 2024 2:55 PM
> > To: Hannes Tschofenig <[email protected]>
> > Cc: Hannes Tschofenig <[email protected]>; RFC Editor
> > <[email protected]>; Isobe Kohei <[email protected]>;
> > [email protected]; Cose Chairs Wg <[email protected]>; Michael
> > Jones <[email protected]>; Paul Wouters
> > <[email protected]>; [email protected]
> > Subject: Re: AUTH48: RFC-to-be 9679
> > <draft-ietf-cose-key-thumbprint-06> for your review
> >
> >
> >
> > This is indeed a bug, for extra assurance that it is a problem:
> >
> > How would you use a ckt to verify a JWT that was using "cnf"?
> >
> > Here is a more complete fix for the bug:
> >
> > https://dat/
> > atracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-cose-key-thumbprint-06%2
> > 3section-5.3&data=05%7C02%7C%7Cffec038f21264c9983cd08dd14a03c85%7C84
> > df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638689400648167196%7CUnknow
> > n%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJX
> > aW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=7GJO0q8u
> > JxSVFlSLdsuzpTAsD%2B8q0MttHOmZgMiqt5M%3D&reserved=0
> >
> > Note that the ckt of a cose key, and jkt of a json web key are different,
> > even when underlying cryptographic key material is the same.
> >
> > ckt is a binary string and jkt is always a base64url string encoded as
> > described in section 6.1 of RFC9449.
> > To use a ckt claim inside a JWT, the ckt claim value MUST be base64url
> > encoded.
> > The example provided in section 6.1 of RFC9449 is modified to distinguish
> > confirmation with a CKT instead of JKT:
> > {
> > "sub":"[email protected]",
> > "iss":"https://server.example.com/",
> > "nbf":1562262611,
> > "exp":1562266216,
> > "cnf": {
> > "ckt":"SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w"
> > }
> > }
> >
> > I used the same base64url encoded thumbprint the draft already used for
> > extra clarity.
> >
> > ckt would also need to be added here:
> > https://www/
> > .iana.org%2Fassignments%2Fjwt%2Fjwt.xhtml%23confirmation-methods&dat
> > a=05%7C02%7C%7Cffec038f21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb4
> > 35aaaaaaaaaaaa%7C1%7C0%7C638689400648192834%7CUnknown%7CTWFpbGZsb3d8
> > eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoi
> > TWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=E%2FuHxvQHDkL91qUvdn9V%2
> > Fiv%2BFpxNOo6Rlu1%2FVPDoB%2Fc%3D&reserved=0
> >
> > This kind of change might need to be taken to the relevant lists for
> > review... and maybe another WGLC.
> >
> > ... we could leave the "ckt" in JWT cnf registration to another document,
> > but I think at a minimum we need something added to section 5.3 to the
> > effect of:
> >
> > Note that the ckt of a cose key, and jkt of a json web key are different,
> > even when underlying cryptographic key material is the same.
> > ckt is a binary string and jkt is always a base64url string encoded as
> > described in section 6.1 of RFC9449.
> >
> > ^ If we are comfortable with this change alone, we still have a problem
> > with the registration template:
> > https://www/
> > .rfc-editor.org%2Frfc%2Frfc8747.html%23name-registration-template&da
> > ta=05%7C02%7C%7Cffec038f21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb
> > 435aaaaaaaaaaaa%7C1%7C0%7C638689400648207569%7CUnknown%7CTWFpbGZsb3d
> > 8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjo
> > iTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Zj7JoUzqivSAAho1RH96bUW
> > SyjoKTii9If1wARZrurI%3D&reserved=0
> >
> > """
> > CWT claims should normally have a corresponding JWT claim. If a
> > corresponding JWT claim would not make sense, the designated experts can
> > choose to accept registrations for which the JWT Claim Name is listed as
> > "N/A".
> > """
> >
> > The logical JWT claim is "ckt"... not "jkt"... so N/A... does not make
> > sense... and leaving it blank also does not make sense.
> >
> > There is also the x5t claim which sets the precedent that ckt is for cose
> > key, jkt is for json web key, and x5t is for x.509 certs.
> >
> > I propose:
> >
> > From:
> >
> > Confirmation Method Name: ckt
> > Confirmation Method Description: COSE Key SHA-256 Thumbprint
> > JWT Confirmation Method Name: jkt
> >
> > To:
> >
> > Confirmation Method Name: ckt
> > Confirmation Method Description: COSE Key SHA-256 Thumbprint
> > JWT Confirmation Method Name: Not assigned by RFCXXXX ( not to be
> > confused with x5t or jkt )
> >
> >
> > OS
> >
> >
> >
> > On Mon, Dec 2, 2024 at 4:14 PM Hannes Tschofenig
> > <[email protected]> wrote:
> >
> > Thanks for the work on the draft and sorry for the slow response.
> >
> >
> >
> > I read through the draft carefully today and in general the edits look good
> > but I noticed a possible bug.
> >
> >
> >
> > In the IANA consideration section we say that the ckt confirmation method
> > maps to the jkt JWT configuration method. I double-checked RFC 9449, which
> > defines the jkt, and it defines the computation as follows:
> >
> > "
> > The value of the jkt member MUST be the base64url encoding
> >
> > of the JWK SHA-256 Thumbprint.
> > "
> >
> > In draft-ietf-cose-key-thumbprint-06 we define the ckt thumbprint as the
> > hash of the deterministic encoding of the COSE_Key structure.
> >
> >
> >
> > So, the question to me is whether we can even map the ckt to the jkt since
> > the underlying structure that is hashed is different: JWK vs. COSE_Key
> > structure.
> >
> >
> >
> > For that reason I believe it would be more correct to change the IANA
> > consideration section by omitting the JWT Confirmation Method Name.
> >
> > Here is the proposed change:
> >
> > From:
> >
> > Confirmation Method Name: ckt
> > Confirmation Method Description: COSE Key SHA-256 Thumbprint
> > JWT Confirmation Method Name: jkt
> >
> >
> > To:
> >
> > Confirmation Method Name: ckt
> > Confirmation Method Description: COSE Key SHA-256 Thumbprint
> > JWT Confirmation Method Name:
> >
> >
> > Do you agree with me?
> >
> >
> >
> > Sorry for noticing this issue only now.
> >
> >
> >
> > Ciao
> >
> > Hannes
> >
> >
> >
> > Betreff:
> >
> > AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-thumbprint-06> for your
> > review
> >
> > Datum:
> >
> > Mon, 21 Oct 2024 14:30:59 -0700 (PDT)
> >
> > Von:
> >
> > [email protected]
> >
> > An:
> >
> > [email protected], [email protected],
> > [email protected]
> >
> > Kopie (CC):
> >
> > [email protected], [email protected], [email protected],
> > [email protected], [email protected],
> > [email protected]
> >
> >
> >
> > *****IMPORTANT*****
> >
> > Updated 2024/10/21
> >
> > RFC Author(s):
> > --------------
> >
> > Instructions for Completing AUTH48
> >
> > Your document has now entered AUTH48. Once it has been reviewed and
> > approved by you and all coauthors, it will be published as an RFC. If an
> > author is no longer available, there are several remedies available as
> > listed in the FAQ (https://www.rfc-editor.org/faq/).
> >
> > You and you coauthors are responsible for engaging other parties (e.g.,
> > Contributors or Working Group) as necessary before providing your approval.
> >
> > Planning your review ---------------------
> >
> > Please review the following aspects of your document:
> >
> > * RFC Editor questions
> >
> > Please review and resolve any questions raised by the RFC Editor that have
> > been included in the XML file as comments marked as follows:
> >
> > <!-- [rfced] ... -->
> >
> > These questions will also be sent in a subsequent email.
> >
> > * Changes submitted by coauthors
> > Please ensure that you review any changes submitted by your coauthors. We
> > assume that if you do not speak up that you agree to changes submitted by
> > your coauthors.
> >
> > * Content
> > Please review the full content of the document, as this cannot change once
> > the RFC is published. Please pay particular attention to:
> > - IANA considerations updates (if applicable)
> > - contact information
> > - references
> >
> > * Copyright notices and legends
> >
> > Please review the copyright notice and legends as defined in RFC
> > 5378 and the Trust Legal Provisions (TLP –
> > https://trustee.ietf.org/license-info).
> >
> > * Semantic markup
> >
> > Please review the markup in the XML file to ensure that elements of content
> > are correctly tagged. For example, ensure that <sourcecode> and <artwork>
> > are set correctly. See details at
> > <https://authors.ietf.org/rfcxml-vocabulary>.
> >
> > * Formatted output
> >
> > Please review the PDF, HTML, and TXT files to ensure that the formatted
> > output, as generated from the markup in the XML file, is reasonable. Please
> > note that the TXT will have formatting limitations compared to the PDF and
> > HTML.
> >
> >
> > Submitting changes
> > ------------------
> >
> > To submit changes, please reply to this email using ‘REPLY ALL’ as all the
> > parties CCed on this message need to see your changes. The parties include:
> >
> > * your coauthors
> > * [email protected] (the RPC team)
> >
> > * other document participants, depending on the stream (e.g., IETF Stream
> > participants are your working group chairs, the responsible ADs, and the
> > document shepherd).
> > * [email protected], which is a new archival mailing list to
> > preserve AUTH48 conversations; it is not an active discussion list:
> > * More info:
> > https://mai/
> > larchive.ietf.org%2Farch%2Fmsg%2Fietf-announce%2Fyb6lpIGh-4Q9l2USxIA
> > e6P8O4Zc&data=05%7C02%7C%7Cffec038f21264c9983cd08dd14a03c85%7C84df9e
> > 7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638689400648277324%7CUnknown%7C
> > TWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4z
> > MiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=QsmVXUToHM9L
> > GhDlqmlc93MbNMwhIkVimBA6yDRp0VQ%3D&reserved=0
> > * The archive itself:
> > https://mai/
> > larchive.ietf.org%2Farch%2Fbrowse%2Fauth48archive%2F&data=05%7C02%7C
> > %7Cffec038f21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaa
> > aa%7C1%7C0%7C638689400648292565%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1h
> > cGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldU
> > IjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=9JjfOtR82MrA6d25M4JqN8zhFofbLYySXX4O
> > yQiX3%2Fc%3D&reserved=0
> >
> > * Note: If only absolutely necessary, you may temporarily opt out of the
> > archiving of messages (e.g., to discuss a sensitive matter).
> > If needed, please add a note at the top of the message that you have
> > dropped the address. When the discussion is concluded,
> > [email protected] will be re-added to the CC list and its
> > addition will be noted at the top of the message.
> > You may submit your changes in one of two ways:
> >
> > An update to the provided XML file
> > — OR —
> > An explicit list of changes in this format
> >
> > Section # (or indicate Global)
> >
> > OLD:
> > old text
> >
> > NEW:
> > new text
> >
> > You do not need to reply with both an updated XML file and an explicit list
> > of changes, as either form is sufficient.
> >
> > We will ask a stream manager to review and approve any changes that
> > seem beyond editorial in nature, e.g., addition of new text, deletion of
> > text, and technical changes. Information about stream managers can be found
> > in the FAQ. Editorial changes do not require approval from a stream manager.
> >
> >
> > Approving for publication
> > --------------------------
> >
> > To approve your RFC for publication, please reply to this email
> > stating that you approve this RFC for publication. Please use ‘REPLY
> > ALL’, as all the parties CCed on this message need to see your approval.
> >
> >
> > Files -----
> >
> > The files are available here:
> > https://www/
> > .rfc-editor.org%2Fauthors%2Frfc9679.xml&data=05%7C02%7C%7Cffec038f21
> > 264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C
> > 638689400648309932%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsI
> > lYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%
> > 7C0%7C%7C%7C&sdata=JQjyIvBMPXkftvVXeZDiZnbm9wTLayJW6SH9u%2Fc%2FMOE%3
> > D&reserved=0
> > https://www/
> > .rfc-editor.org%2Fauthors%2Frfc9679.html&data=05%7C02%7C%7Cffec038f2
> > 1264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7
> > C638689400648327455%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUs
> > IlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D
> > %7C0%7C%7C%7C&sdata=WLL5FVGsJynRmj191VO20UFrO47yZwEL%2BDVTS66Hu6g%3D
> > &reserved=0
> > https://www/
> > .rfc-editor.org%2Fauthors%2Frfc9679.pdf&data=05%7C02%7C%7Cffec038f21
> > 264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C
> > 638689400648345419%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsI
> > lYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%
> > 7C0%7C%7C%7C&sdata=nQSv83kDF8l6wWd30%2B6UmhAFKtgwZ37eeGHXK3xJ8ck%3D&
> > reserved=0
> > https://www/
> > .rfc-editor.org%2Fauthors%2Frfc9679.txt&data=05%7C02%7C%7Cffec038f21
> > 264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C
> > 638689400648362433%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsI
> > lYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%
> > 7C0%7C%7C%7C&sdata=RFPj4fNYkfhGZw25PPl%2FGMF4JJ5ztGgymDO4lY%2Bg4ZQ%3
> > D&reserved=0
> >
> > Diff file of the text:
> > https://www/
> > .rfc-editor.org%2Fauthors%2Frfc9679-diff.html&data=05%7C02%7C%7Cffec
> > 038f21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%
> > 7C0%7C638689400648378700%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnR
> > ydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%
> > 3D%3D%7C0%7C%7C%7C&sdata=ZmyL2kWaxX2ls0KY9YErddGbrprSJMKS%2FMDLTu3cJ
> > BA%3D&reserved=0
> > https://www/
> > .rfc-editor.org%2Fauthors%2Frfc9679-rfcdiff.html&data=05%7C02%7C%7Cf
> > fec038f21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7
> > C1%7C0%7C638689400648397152%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGki
> > OnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoy
> > fQ%3D%3D%7C0%7C%7C%7C&sdata=nwtix1KYYNYJKt%2Fun8NpCSg4%2BGmImmbqRIYf
> > vUrLDQM%3D&reserved=0 (side by side)
> >
> > Diff of the XML:
> > https://www/
> > .rfc-editor.org%2Fauthors%2Frfc9679-xmldiff1.html&data=05%7C02%7C%7C
> > ffec038f21264c9983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%
> > 7C1%7C0%7C638689400648414007%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGk
> > iOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjo
> > yfQ%3D%3D%7C0%7C%7C%7C&sdata=FrWTUDwi%2B3qEMOqubvSIB7EG1eKRdUUZIQUWQ
> > nzdw3M%3D&reserved=0
> >
> >
> > Tracking progress
> > -----------------
> >
> > The details of the AUTH48 status of your document are here:
> > https://www/
> > .rfc-editor.org%2Fauth48%2Frfc9679&data=05%7C02%7C%7Cffec038f21264c9
> > 983cd08dd14a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C63868
> > 9400648430300%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOi
> > IwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7
> > C%7C%7C&sdata=iH3O7S1AhYR57Ehi94B7o0AElOPdOycSDhEukSlW8Cw%3D&reserve
> > d=0
> >
> > Please let us know if you have any questions.
> > Thank you for your cooperation,
> >
> > RFC Editor
> >
> > --------------------------------------
> > RFC9679 (draft-ietf-cose-key-thumbprint-06)
> >
> > Title : CBOR Object Signing and Encryption (COSE) Key Thumbprint
> > Author(s) : K. Isobe, H. Tschofenig, O. Steele WG Chair(s) : Matthew
> > A. Miller, Ivaylo Petrov, Michael B. Jones
> >
> > Area Director(s) : Deb Cooley, Paul Wouters
> >
> >
> >
> >
> >
> > --
> >
> >
> > ORIE STEELE
> > Chief Technology Officer
> > http://www/.
> > transmute.industries%2F&data=05%7C02%7C%7Cffec038f21264c9983cd08dd14
> > a03c85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C6386894006484454
> > 01%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwM
> > CIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sda
> > ta=KT2Gb0P%2BJJcz57WLJFuZHnKWXbk0%2FWx6g5sLOJRNyqg%3D&reserved=0
> >
>
>
>
> --
>
> ORIE STEELE
> Chief Technology Officer
> http://www.tr/
> ansmute.industries%2F&data=05%7C02%7C%7Cffec038f21264c9983cd08dd14a03c
> 85%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638689400648460614%7CU
> nknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiO
> iJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=QaEVRvL
> hRvhznAhoPQKi94%2BFfgMGESmF2aW%2FYHcHZm4%3D&reserved=0
>
rfc9679_mbj.xml
Description: rfc9679_mbj.xml
-- auth48archive mailing list -- [email protected] To unsubscribe send an email to [email protected]
