Hi,

This change is complete:

https://www.iana.org/assignments/cwt

thanks,
Amanda

On Thu Dec 05 18:36:04 2024, kmo...@amsl.com wrote:
> Dear IANA,
> 
> Please make the following update to the “CWT Confirmation Methods”
> registry at <https://www.iana.org/assignments/cwt> to match the edited
> document at <https://www.rfc-editor.org/authors/rfc9679-diff.html>.
> 
> OLD:
>  Confirmation Method Name:  ckt
>  Confirmation Method Description:  COSE Key SHA-256 Thumbprint
>   JWT Confirmation Method Name:  jkt
> 
> NEW:
>  Confirmation Method Name:  ckt
>  Confirmation Method Description:  COSE Key SHA-256 Thumbprint
>  JWT Confirmation Method Name:  (none)
> 
> Thanks in advance!
> RFC Editor/kc
> 
> > Begin forwarded message:
> >
> > From: Karen Moore <kmo...@amsl.com>
> > Subject: Re: [AD] AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-
> > thumbprint-06> for your review
> > Date: December 5, 2024 at 10:25:03 AM PST
> > To: Paul Wouters <paul.wout...@aiven.io>, Hannes Tschofenig
> > <hannes.tschofe...@gmx.net>, Orie Steele <orie@transmute.industries>,
> > Isobe Kohei <isobeko...@gmail.com>, Hannes Tschofenig
> > <hannes.tschofe...@gmail.com>
> > Cc: Michael Jones <michael_b_jo...@hotmail.com>, RFC Editor <rfc-
> > edi...@rfc-editor.org>, "cose-...@ietf.org" <cose-...@ietf.org>, Cose
> > Chairs Wg <cose-cha...@ietf.org>, auth48archive <auth48archive@rfc-
> > editor.org>
> >
> > Hi Paul and *Authors,
> >
> > Thank you for your quick reply. We have noted your approval on the
> > AUTH48 status page (https://www.rfc-editor.org/auth48/rfc9679).
> >
> > *Authors, please confirm if any final checks need to be performed
> > prior to publication per this comment:
> >
> >> The sourcecode type should be set to cbor-diag. We should validate
> >> these source code blocks once more at the very end, using CBOR.me or
> >> similar.
> >
> > Note that we will ask IANA to update their registry per the recent
> > update; we will inform you when complete.
> >
> > Best regards,
> > RFC Editor/kc
> >
> >> On Dec 5, 2024, at 9:54 AM, Paul Wouters <paul.wout...@aiven.io>
> >> wrote:
> >>
> >> I approve,
> >>
> >> Thanks everyone for working this out and catching it before the RFC
> >> went out.
> >>
> >> Paul
> >>
> >> On Thu, Dec 5, 2024 at 12:45 PM Karen Moore <kmo...@amsl.com> wrote:
> >> Hi Mike and *Paul (AD),
> >>
> >> Thanks for providing the updated XML file. The changes are now
> >> reflected in our files. Hannes and Orie, we will assume your assent
> >> to these changes unless we hear otherwise.
> >>
> >> *Paul, please review the following changes and let us know if you
> >> approve (we updated item 3 and added item 4; see Mike’s explanation
> >> for the new changes in the thread below). The updates can also be
> >> viewed here: https://www.rfc-editor.org/authors/rfc9679-
> >> auth48diff.html.
> >>
> >> 1) Section 5.1
> >>
> >> OLD:
> >>   The COSE Key Thumbprint is a digest of the essential parameters
> >> required
> >>  to represent the key as a COSE Key, rather than any additional data
> >> that
> >>  might accompany the key.
> >>
> >> NEW:
> >>   The COSE Key Thumbprint is a digest of the ordered essential
> >>   parameters needed to represent a COSE Key, with all other
> >>  parameters excluded.
> >>
> >> ...
> >> 2) Section 5.3
> >>
> >> OLD:
> >>  Any party in possession of a key that is represented as a COSE Key
> >> can
> >>  use the COSE Key Thumbprint.
> >>
> >> NEW:
> >>  The only prerequisites are that the COSE_Key representation
> >>  of the key be defined and the party creating the COSE Key
> >> Thumbprint
> >>  be in possession of the necessary key material.
> >>
> >> …
> >> 3) Addition of Section 5.5
> >>
> >> NEW:
> >>  5.5 Relationship to JSON Web Key Thumbprints
> >>
> >> The ckt of a COSE Key, as described in Section 7 of [RFC9052], and
> >> the jkt of a JSON Web Key, as described in Section 4 of [RFC7517],
> >> are different even when the underlying cryptographic key material is
> >> the same.
> >>
> >> This document does not register a JWT confirmation method [RFC7800]
> >> for using "ckt" as a confirmation method for a JWT or a CWT
> >> confirmation method [RFC8747] for using "jkt" as a confirmation
> >> method for a CWT.
> >>
> >> ...
> >> 4) Section 5.6 - please review the file for the changes to this
> >> section.
> >>
> >> …
> >> 5) Section 8
> >>
> >> OLD:
> >>  Confirmation Method Name:  ckt
> >>  Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>  JWT Confirmation Method Name:  jkt
> >>
> >> NEW:
> >>  Confirmation Method Name:  ckt
> >>   Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>  JWT Confirmation Method Name: (none)
> >>
> >>
> >> —FILES (please refresh)—
> >>
> >> The updated XML file is here:
> >> https://www.rfc-editor.org/authors/rfc9679.xml
> >>
> >> The updated output files are here:
> >> https://www.rfc-editor.org/authors/rfc9679.txt
> >> https://www.rfc-editor.org/authors/rfc9679.pdf
> >> https://www.rfc-editor.org/authors/rfc9679.html
> >>
> >> This diff file shows all changes made during AUTH48:
> >> https://www.rfc-editor.org/authors/rfc9679-auth48diff.html
> >>
> >> These diff files show only changes made during the last edit round:
> >> https://www.rfc-editor.org/authors/rfc9679-lastdiff.html
> >> https://www.rfc-editor.org/authors/rfc9679-lastrfcdiff.html
> >>
> >> This diff file shows all changes made to date:
> >> https://www.rfc-editor.org/authors/rfc9679-diff.html
> >>
> >> For the AUTH48 status of this document, please see:
> >> https://www.rfc-editor.org/auth48/rfc9679
> >>
> >> Thank you,
> >> RFC Editor/kc
> >>
> >>
> >>> On Dec 4, 2024, at 3:08 PM, Michael Jones
> >>> <michael_b_jo...@hotmail.com> wrote:
> >>>
> >>> Folks, I hate to do this, but in reviewing the newly added section,
> >>> I realized that it was incorrectly using the term "claim".  In both
> >>> RFC 7800 and RFC 8747, "cnf" is a claim, whereas the JWT and CWT
> >>> confirmation members are referred to as "members" - not "claims".
> >>> Then I realized there other places in the draft this the term
> >>> "claim" was incorrectly used.
> >>>
> >>> The attached updated source file makes the needed corrections.  For
> >>> easier reviewing, a diff from the RFC Editor's source also follows.
> >>>
> >>> RFC Editor, please apply these edits and send out a new draft for
> >>> review.
> >>>
> >>> Thanks,
> >>> -- Mike (writing as a COSE chair)
> >>>
> >>> diff rfc9679.xml rfc9679_mbj.xml
> >>> 46c46
> >>> <     <date year="2024" month="October"/>
> >>> ---
> >>>> <date year="2024" month="December"/>
> >>> 284,285c284,288
> >>> <    This document does not register a JWT claim for using ckt as a
> >>> confirmation
> >>> <    method for a JWT or a CWT claim for using jkt as a
> >>> confirmation method for a CWT.
> >>> ---
> >>>> This document does not register
> >>>> a JWT confirmation method <xref target="RFC7800"/>
> >>>> for using "ckt" as a confirmation method for a JWT
> >>>> or a CWT confirmation method <xref target="RFC8747"/>
> >>>> for using "jkt" as a confirmation method for a CWT.
> >>> 293,294c296,297
> >>> <         <t>The proof-of-possession key is identified using the
> >>> "ckt" claim,
> >>> < the COSE Key Thumbprint claim. This claim contains the value of
> >>> ---
> >>>> <t>The proof-of-possession key is identified using the "ckt"
> >>>> member of
> >>>> the CWT confirmation claim "cnf". This member contains the value
> >>>> of
> >>> 299c302
> >>> < claim. In this approach, the issuer of a CWT declares that the
> >>> ---
> >>>> member. In this approach, the issuer of a CWT declares that the
> >>> 302c305
> >>> <       of the key by including a "ckt" claim in the CWT.</t>
> >>> ---
> >>>> of the key by including a "ckt" CWT confirmation method member in
> >>>> the CWT.</t>
> >>> 304c307
> >>> <         <t>The following example demonstrates the use of the
> >>> "ckt" claim
> >>> ---
> >>>> <t>The following example demonstrates the use of the "ckt" member
> >>> 319,320c322,323
> >>> <         <t><xref target="IANA"/> registers the "ckt" claim and
> >>> the confirmation method.
> >>> < The "ckt" claim is expected to be used in the "cnf" claim.</t>
> >>> ---
> >>>> <t><xref target="IANA"/> registers the "ckt" CWT confirmation
> >>>> method member.
> >>>> The "ckt" member is used in the "cnf" claim.</t>
> >>> 510a514
> >>>> <xi:include
> >>>> href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7800.xml%22/>
> >>
> >>
> >>> On Dec 4, 2024, at 12:12 PM, Karen Moore <kmo...@amsl.com> wrote:
> >>>
> >>> Hi Orie and *Paul (AD),
> >>>
> >>> We have updated the text with your additional suggested edits; the
> >>> changes are now reflected in our files (links below). We now await
> >>> approvals from Hannes and Paul.
> >>>
> >>> *Paul, please review the following changes and let us know if you
> >>> approve. The updates can also be viewed here: https://www.rfc-
> >>> editor.org/authors/rfc9679-auth48diff.html.
> >>>
> >>> 1) Section 5.1
> >>>
> >>> OLD:
> >>>   The COSE Key Thumbprint is a digest of the essential parameters
> >>> required
> >>>  to represent the key as a COSE Key, rather than any additional
> >>> data that
> >>>  might accompany the key.
> >>>
> >>> NEW:
> >>>   The COSE Key Thumbprint is a digest of the ordered essential
> >>>   parameters needed to represent a COSE Key, with all other
> >>>  parameters excluded.
> >>>
> >>> ...
> >>> 2) Section 5.3
> >>>
> >>> OLD:
> >>>  Any party in possession of a key that is represented as a COSE Key
> >>> can
> >>>  use the COSE Key Thumbprint.
> >>>
> >>> NEW:
> >>>  The only prerequisites are that the COSE_Key representation
> >>>  of the key be defined and the party creating the COSE Key
> >>> Thumbprint
> >>>  be in possession of the necessary key material.
> >>>
> >>> …
> >>> 3) Addition of Section 5.5
> >>>
> >>> NEW:
> >>>  5.5 Relationship to JSON Web Key Thumbprints
> >>>
> >>> The ckt of a COSE Key, as described in Section 7 of [RFC9052], and
> >>> the jkt of a JSON Web Key,
> >>> as described in Section 4 of RFC 7517,  are different even when the
> >>> underlying cryptographic
> >>> key material is the same.
> >>>
> >>> This document does not register a JWT claim for using ckt as a
> >>> confirmation
> >>> method for a JWT or a CWT claim for using jkt as a confirmation
> >>> method for a CWT.
> >>>
> >>> …
> >>> 4) Section 8
> >>>
> >>> OLD:
> >>>  Confirmation Method Name:  ckt
> >>>  Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>  JWT Confirmation Method Name:  jkt
> >>>
> >>> NEW:
> >>>  Confirmation Method Name:  ckt
> >>>   Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>  JWT Confirmation Method Name: (none)
> >>>
> >>>
> >>> —FILES (please refresh)—
> >>>
> >>> The updated XML file is here:
> >>> https://www.rfc-editor.org/authors/rfc9679.xml
> >>>
> >>> The updated output files are here:
> >>> https://www.rfc-editor.org/authors/rfc9679.txt
> >>> https://www.rfc-editor.org/authors/rfc9679.pdf
> >>> https://www.rfc-editor.org/authors/rfc9679.html
> >>>
> >>> This diff file shows all changes made during AUTH48:
> >>> https://www.rfc-editor.org/authors/rfc9679-auth48diff.html
> >>>
> >>> These diff files show only changes made during the last edit round:
> >>> https://www.rfc-editor.org/authors/rfc9679-lastdiff.html
> >>> https://www.rfc-editor.org/authors/rfc9679-lastrfcdiff.html
> >>>
> >>> This diff file shows all changes made to date:
> >>> https://www.rfc-editor.org/authors/rfc9679-diff.html
> >>>
> >>> For the AUTH48 status of this document, please see:
> >>> https://www.rfc-editor.org/auth48/rfc9679
> >>>
> >>> Thank you,
> >>> RFC Editor/kc
> >>>
> >>>
> >>>> On Dec 4, 2024, at 7:26 AM, Orie Steele
> >>>> <orie@transmute.industries> wrote:
> >>>>
> >>>> Thank you!
> >>>>
> >>>> "cose key" should be "COSE Key",
> >>>>
> >>>> We could add "COSE Key as described in Section 7 of RFC9052" and
> >>>> "JSON Web Key, as described in Section 4 of RFC7517"
> >>>>
> >>>> If the citations are helpful... This is a style nit.
> >>>>
> >>>> I approve of the changes.
> >>>>
> >>>> On Tue, Dec 3, 2024 at 3:48 PM Karen Moore <kmo...@amsl.com>
> >>>> wrote:
> >>>> Authors,
> >>>>
> >>>> Thank you for the discussion and suggested changes.  Our files now
> >>>> reflect the updates below (see <https://www.rfc-
> >>>> editor.org/authors/rfc9679-lastrfcdiff.html> for a snapshot of the
> >>>> changes). Please review and let us know if these changes are
> >>>> agreeable or if any further updates are needed. We will then ask
> >>>> the AD to approve them.
> >>>>
> >>>> 1) Section 5.3
> >>>>
> >>>> OLD:
> >>>>  Any party in possession of a key that is represented as a COSE
> >>>> Key can
> >>>>  use the COSE Key Thumbprint.
> >>>>
> >>>> NEW:
> >>>>  The only prerequisites are that the COSE_Key representation
> >>>>  of the key be defined and the party creating the COSE Key
> >>>> Thumbprint
> >>>>  be in possession of the necessary key material.
> >>>>
> >>>> ...
> >>>> 2) Addition of New Section. Note that we made “json web key”
> >>>> uppercase for consistency.
> >>>>
> >>>> NEW:
> >>>>  5.5 Relationship to JSON Web Key Thumbprints
> >>>>
> >>>> The ckt of a cose key and jkt of a JSON Web Key are different,
> >>>> even when
> >>>> underlying cryptographic key material is the same.
> >>>>
> >>>> This document does not register a JWT claim for using ckt as a
> >>>> confirmation
> >>>> method for a JWT or a CWT claim for using jkt as a confirmation
> >>>> method for a CWT.
> >>>>
> >>>> ...
> >>>> 3) Section 8
> >>>>
> >>>> OLD:
> >>>>  Confirmation Method Name:  ckt
> >>>>  Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>>  JWT Confirmation Method Name:  jkt
> >>>>
> >>>> NEW:
> >>>>  Confirmation Method Name:  ckt
> >>>>   Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>>  JWT Confirmation Method Name: (none)
> >>>>
> >>>>
> >>>> —FILES (please refresh)—
> >>>>
> >>>> The updated XML file is here:
> >>>> https://www.rfc-editor.org/authors/rfc9679.xml
> >>>>
> >>>> The updated output files are here:
> >>>> https://www.rfc-editor.org/authors/rfc9679.txt
> >>>> https://www.rfc-editor.org/authors/rfc9679.pdf
> >>>> https://www.rfc-editor.org/authors/rfc9679.html
> >>>>
> >>>> This diff file shows all changes made during AUTH48:
> >>>> https://www.rfc-editor.org/authors/rfc9679-auth48diff.html
> >>>>
> >>>> These diff files show only changes made during the last edit
> >>>> round:
> >>>> https://www.rfc-editor.org/authors/rfc9679-lastdiff.html
> >>>> https://www.rfc-editor.org/authors/rfc9679-lastrfcdiff.html
> >>>>
> >>>> This diff file shows all changes made to date:
> >>>> https://www.rfc-editor.org/authors/rfc9679-diff.html
> >>>>
> >>>> For the AUTH48 status of this document, please see:
> >>>> https://www.rfc-editor.org/auth48/rfc9679
> >>>>
> >>>> Thank you,
> >>>> RFC Editor/kc
> >>>>
> >>>>> On Dec 3, 2024, at 7:55 AM, Hannes Tschofenig
> >>>>> <hannes.tschofe...@gmail.com> wrote:
> >>>>>
> >>>>> Thanks for the insightful comment, Orie. I agree with your
> >>>>> proposed edits for the IANA consideration section and the extra
> >>>>> text before the section on relationship to certificate
> >>>>> thumbprints.
> >>>>>
> >>>>> I am also fine with the additional text Mike proposed.
> >>>>>
> >>>>> It is indeed too late to add new functionality at this point in
> >>>>> time.
> >>>>>
> >>>>> Ciao
> >>>>> Hannes
> >>>>>
> >>>>>
> >>>>> On Tue, Dec 3, 2024 at 3:13 AM Michael Jones
> >>>>> <michael_b_jo...@hotmail.com> wrote:
> >>>>> I support adding the section that Orie proposed.
> >>>>>
> >>>>>
> >>>>>
> >>>>> However in reviewing related text, I unfortunately found a
> >>>>> problem.  Reading https://datatracker.ietf.org/doc/html/draft-
> >>>>> ietf-cose-key-thumbprint-06#section-5.3, it differs from
> >>>>> https://www.rfc-editor.org/rfc/rfc7638#section-3.5 in a
> >>>>> counterproductive and overly restrictive way.  Please change:
> >>>>>
> >>>>>
> >>>>>
> >>>>> Any party in possession of a key that is represented as a COSE
> >>>>> Key can
> >>>>>
> >>>>> use the COSE Key Thumbprint.
> >>>>>
> >>>>>
> >>>>>
> >>>>> to:
> >>>>>
> >>>>>
> >>>>>
> >>>>> The only prerequisites are that the COSE_Key representation
> >>>>>
> >>>>> of the key be defined and the party creating the COSE Key
> >>>>> Thumbprint
> >>>>>
> >>>>> be in possession of the necessary key material.
> >>>>>
> >>>>>
> >>>>>
> >>>>> That way it will be more actionable and will parallel the
> >>>>> corresponding RFC 7638 text.
> >>>>>
> >>>>>
> >>>>>
> >>>>> Thanks all,
> >>>>>
> >>>>> -- Mike
> >>>>>
> >>>>>
> >>>>>
> >>>>> From: Orie Steele <orie@transmute.industries>
> >>>>> Sent: Monday, December 2, 2024 5:55 PM
> >>>>> To: Michael Jones <michael_b_jo...@hotmail.com>
> >>>>> Cc: Hannes Tschofenig <hannes.tschofe...@gmail.com>; Hannes
> >>>>> Tschofenig <hannes.tschofe...@gmx.net>; RFC Editor <rfc-
> >>>>> edi...@rfc-editor.org>; Isobe Kohei <isobeko...@gmail.com>; cose-
> >>>>> a...@ietf.org; Cose Chairs Wg <cose-cha...@ietf.org>; Paul Wouters
> >>>>> <paul.wout...@aiven.io>; auth48archive <auth48archive@rfc-
> >>>>> editor.org>
> >>>>> Subject: Re: AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-
> >>>>> thumbprint-06> for your review
> >>>>>
> >>>>>
> >>>>>
> >>>>> Let's add a section to the document, before the section on
> >>>>> relationship to certificate thumbprints.
> >>>>>
> >>>>>
> >>>>>
> >>>>> 5.5 Relationship to JSON Web Key Thumbprints
> >>>>>
> >>>>>
> >>>>>
> >>>>> The ckt of a cose key, and jkt of a json web key are different,
> >>>>> even when underlying cryptographic key material is the same.
> >>>>>
> >>>>>
> >>>>>
> >>>>> This document does not register a JWT claim for using ckt as a
> >>>>> confirmation method for a JWT, or a CWT claim for using jkt as a
> >>>>> confirmation method for a CWT.
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> On Mon, Dec 2, 2024, 6:26 PM Orie Steele
> >>>>> <orie@transmute.industries> wrote:
> >>>>>
> >>>>> I agree, let's just stick with the simple (none) solution.
> >>>>>
> >>>>>
> >>>>>
> >>>>> Hannes can you approve or suggest changes to the clarifying text
> >>>>> that makes it clear this is not an oversight?
> >>>>>
> >>>>>
> >>>>>
> >>>>> Mike, do you object to that clarifying text assuming we take you
> >>>>> change to the IANA considerations section?
> >>>>>
> >>>>>
> >>>>>
> >>>>> OS
> >>>>>
> >>>>>
> >>>>>
> >>>>> On Mon, Dec 2, 2024, 5:56 PM Michael Jones
> >>>>> <michael_b_jo...@hotmail.com> wrote:
> >>>>>
> >>>>> I’m either fine with Orie’s proposed change to the registration
> >>>>> wording or the following one:
> >>>>>
> >>>>>
> >>>>>
> >>>>> From:
> >>>>>
> >>>>> Confirmation Method Name:  ckt
> >>>>> Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>>> JWT Confirmation Method Name:  jkt
> >>>>>
> >>>>> To:
> >>>>>
> >>>>> Confirmation Method Name:  ckt
> >>>>>  Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>>> JWT Confirmation Method Name: (none)
> >>>>>
> >>>>> For the record, I’m not OK trying to add a ckt JWT “cnf” method
> >>>>> as an AUTH48 action (despite me appreciating Orie’s discussion of
> >>>>> the possibility).
> >>>>>
> >>>>>
> >>>>>
> >>>>> Cheers,
> >>>>>
> >>>>> -- Mike
> >>>>>
> >>>>>
> >>>>>
> >>>>> From: Orie Steele <orie@transmute.industries>
> >>>>> Sent: Monday, December 2, 2024 2:55 PM
> >>>>> To: Hannes Tschofenig <hannes.tschofe...@gmail.com>
> >>>>> Cc: Hannes Tschofenig <hannes.tschofe...@gmx.net>; RFC Editor
> >>>>> <rfc-edi...@rfc-editor.org>; Isobe Kohei <isobeko...@gmail.com>;
> >>>>> cose-...@ietf.org; Cose Chairs Wg <cose-cha...@ietf.org>; Michael
> >>>>> Jones <michael_b_jo...@hotmail.com>; Paul Wouters
> >>>>> <paul.wout...@aiven.io>; auth48archive@rfc-editor.org
> >>>>> Subject: Re: AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-
> >>>>> thumbprint-06> for your review
> >>>>>
> >>>>>
> >>>>>
> >>>>> This is indeed a bug, for extra assurance that it is a problem:
> >>>>>
> >>>>> How would you use a ckt to verify a JWT that was using "cnf"?
> >>>>>
> >>>>> Here is a more complete fix for the bug:
> >>>>>
> >>>>> https://datatracker.ietf.org/doc/html/draft-ietf-cose-key-
> >>>>> thumbprint-06#section-5.3
> >>>>>
> >>>>> Note that the ckt of a cose key, and jkt of a json web key are
> >>>>> different, even when underlying cryptographic key material is the
> >>>>> same.
> >>>>>
> >>>>> ckt is a binary string and jkt is always a base64url string
> >>>>> encoded as described in section 6.1 of RFC9449.
> >>>>> To use a ckt claim inside a JWT, the ckt claim value MUST be
> >>>>> base64url encoded.
> >>>>> The example provided in section 6.1 of RFC9449 is modified to
> >>>>> distinguish confirmation with a CKT instead of JKT:
> >>>>> {
> >>>>> "sub":"some...@example.com",
> >>>>> "iss":"https://server.example.com";,
> >>>>> "nbf":1562262611,
> >>>>> "exp":1562266216,
> >>>>> "cnf": {
> >>>>>   "ckt":"SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w"
> >>>>> }
> >>>>> }
> >>>>>
> >>>>> I used the same base64url encoded thumbprint the draft already
> >>>>> used for extra clarity.
> >>>>>
> >>>>> ckt would also need to be added here:
> >>>>> https://www.iana.org/assignments/jwt/jwt.xhtml#confirmation-
> >>>>> methods
> >>>>>
> >>>>> This kind of change might need to be taken to the relevant lists
> >>>>> for review... and maybe another WGLC.
> >>>>>
> >>>>> ... we could leave the "ckt" in JWT cnf registration to another
> >>>>> document, but I think at a minimum we need something added to
> >>>>> section 5.3 to the effect of:
> >>>>>
> >>>>> Note that the ckt of a cose key, and jkt of a json web key are
> >>>>> different, even when underlying cryptographic key material is the
> >>>>> same.
> >>>>> ckt is a binary string and jkt is always a base64url string
> >>>>> encoded as described in section 6.1 of RFC9449.
> >>>>>
> >>>>> ^ If we are comfortable with this change alone, we still have a
> >>>>> problem with the registration template:
> >>>>> https://www.rfc-editor.org/rfc/rfc8747.html#name-registration-
> >>>>> template
> >>>>>
> >>>>> """
> >>>>> CWT claims should normally have a corresponding JWT claim. If a
> >>>>> corresponding JWT claim would not make sense, the designated
> >>>>> experts can choose to accept registrations for which the JWT
> >>>>> Claim Name is listed as "N/A".
> >>>>> """
> >>>>>
> >>>>> The logical JWT claim is "ckt"... not "jkt"... so N/A... does not
> >>>>> make sense... and leaving it blank also does not make sense.
> >>>>>
> >>>>> There is also the x5t claim which sets the precedent that ckt is
> >>>>> for cose key, jkt is for json web key, and x5t is for x.509
> >>>>> certs.
> >>>>>
> >>>>> I propose:
> >>>>>
> >>>>> From:
> >>>>>
> >>>>> Confirmation Method Name:  ckt
> >>>>> Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>>> JWT Confirmation Method Name:  jkt
> >>>>>
> >>>>> To:
> >>>>>
> >>>>> Confirmation Method Name:  ckt
> >>>>>  Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>>> JWT Confirmation Method Name: Not assigned by RFCXXXX ( not to be
> >>>>> confused with x5t or jkt )
> >>>>>
> >>>>>
> >>>>> OS
> >>>>>
> >>>>>
> >>>>>
> >>>>> On Mon, Dec 2, 2024 at 4:14 PM Hannes Tschofenig
> >>>>> <hannes.tschofe...@gmail.com> wrote:
> >>>>>
> >>>>> Thanks for the work on the draft and sorry for the slow response.
> >>>>>
> >>>>>
> >>>>>
> >>>>> I read through the draft carefully today and in general the edits
> >>>>> look good but I noticed a possible bug.
> >>>>>
> >>>>>
> >>>>>
> >>>>> In the IANA consideration section we say that the ckt
> >>>>> confirmation method maps to the jkt JWT configuration method. I
> >>>>> double-checked RFC 9449, which defines the jkt, and it defines
> >>>>> the computation as follows:
> >>>>>
> >>>>> "
> >>>>> The value of the jkt member MUST be the base64url encoding
> >>>>>
> >>>>> of the JWK SHA-256 Thumbprint.
> >>>>> "
> >>>>>
> >>>>> In draft-ietf-cose-key-thumbprint-06 we define the ckt thumbprint
> >>>>> as the hash of the deterministic encoding of the COSE_Key
> >>>>> structure.
> >>>>>
> >>>>>
> >>>>>
> >>>>> So, the question to me is whether we can even map the ckt to the
> >>>>> jkt since the underlying structure that is hashed is different:
> >>>>> JWK vs. COSE_Key structure.
> >>>>>
> >>>>>
> >>>>>
> >>>>> For that reason I believe it would be more correct to change the
> >>>>> IANA consideration section by omitting the JWT Confirmation
> >>>>> Method Name.
> >>>>>
> >>>>> Here is the proposed change:
> >>>>>
> >>>>> From:
> >>>>>
> >>>>> Confirmation Method Name:  ckt
> >>>>> Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>>> JWT Confirmation Method Name:  jkt
> >>>>>
> >>>>>
> >>>>> To:
> >>>>>
> >>>>> Confirmation Method Name:  ckt
> >>>>> Confirmation Method Description:  COSE Key SHA-256 Thumbprint
> >>>>>   JWT Confirmation Method Name:
> >>>>>
> >>>>>
> >>>>> Do you agree with me?
> >>>>>
> >>>>>
> >>>>>
> >>>>> Sorry for noticing this issue only now.
> >>>>>
> >>>>>
> >>>>>
> >>>>> Ciao
> >>>>>
> >>>>> Hannes
> >>>>>
> >>>>>
> >>>>>
> >>>>> Betreff:
> >>>>>
> >>>>> AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-thumbprint-06> for
> >>>>> your review
> >>>>>
> >>>>> Datum:
> >>>>>
> >>>>> Mon, 21 Oct 2024 14:30:59 -0700 (PDT)
> >>>>>
> >>>>> Von:
> >>>>>
> >>>>> rfc-edi...@rfc-editor.org
> >>>>>
> >>>>> An:
> >>>>>
> >>>>> isobeko...@gmail.com, hannes.tschofe...@gmx.net,
> >>>>> orie@transmute.industries
> >>>>>
> >>>>> Kopie (CC):
> >>>>>
> >>>>> rfc-edi...@rfc-editor.org, cose-...@ietf.org, cose-
> >>>>> cha...@ietf.org, michael_b_jo...@hotmail.com,
> >>>>> paul.wout...@aiven.io, auth48archive@rfc-editor.org
> >>>>>
> >>>>>
> >>>>>
> >>>>> *****IMPORTANT*****
> >>>>>
> >>>>> Updated 2024/10/21
> >>>>>
> >>>>> RFC Author(s):
> >>>>> --------------
> >>>>>
> >>>>> Instructions for Completing AUTH48
> >>>>>
> >>>>> Your document has now entered AUTH48. Once it has been reviewed
> >>>>> and approved by you and all coauthors, it will be published as an
> >>>>> RFC. If an author is no longer available, there are several
> >>>>> remedies available as listed in the FAQ (https://www.rfc-
> >>>>> editor.org/faq/).
> >>>>>
> >>>>> You and you coauthors are responsible for engaging other parties
> >>>>> (e.g., Contributors or Working Group) as necessary before
> >>>>> providing your approval.
> >>>>>
> >>>>> Planning your review ---------------------
> >>>>>
> >>>>> Please review the following aspects of your document:
> >>>>>
> >>>>> * RFC Editor questions
> >>>>>
> >>>>> Please review and resolve any questions raised by the RFC Editor
> >>>>> that have been included in the XML file as comments marked as
> >>>>> follows:
> >>>>>
> >>>>> <!-- [rfced] ... -->
> >>>>>
> >>>>> These questions will also be sent in a subsequent email.
> >>>>>
> >>>>> * Changes submitted by coauthors
> >>>>> Please ensure that you review any changes submitted by your
> >>>>> coauthors. We assume that if you do not speak up that you agree
> >>>>> to changes submitted by your coauthors.
> >>>>>
> >>>>> * Content
> >>>>> Please review the full content of the document, as this cannot
> >>>>> change once the RFC is published. Please pay particular attention
> >>>>> to:
> >>>>> - IANA considerations updates (if applicable)
> >>>>> - contact information
> >>>>> - references
> >>>>>
> >>>>> * Copyright notices and legends
> >>>>>
> >>>>> Please review the copyright notice and legends as defined in
> >>>>> RFC 5378 and the Trust Legal Provisions (TLP –
> >>>>> https://trustee.ietf.org/license-info).
> >>>>>
> >>>>> * Semantic markup
> >>>>>
> >>>>> Please review the markup in the XML file to ensure that elements
> >>>>> of content are correctly tagged. For example, ensure that
> >>>>> <sourcecode> and <artwork> are set correctly. See details at
> >>>>> <https://authors.ietf.org/rfcxml-vocabulary>.
> >>>>>
> >>>>> * Formatted output
> >>>>>
> >>>>> Please review the PDF, HTML, and TXT files to ensure that the
> >>>>> formatted output, as generated from the markup in the XML file,
> >>>>> is reasonable. Please note that the TXT will have formatting
> >>>>> limitations compared to the PDF and HTML.
> >>>>>
> >>>>>
> >>>>> Submitting changes
> >>>>> ------------------
> >>>>>
> >>>>> To submit changes, please reply to this email using ‘REPLY ALL’
> >>>>> as all the parties CCed on this message need to see your changes.
> >>>>> The parties include:
> >>>>>
> >>>>> * your coauthors
> >>>>> * rfc-edi...@rfc-editor.org (the RPC team)
> >>>>>
> >>>>> * other document participants, depending on the stream (e.g.,
> >>>>> IETF Stream participants are your working group chairs, the
> >>>>> responsible ADs, and the document shepherd).
> >>>>> * auth48archive@rfc-editor.org, which is a new archival mailing
> >>>>> list to preserve AUTH48 conversations; it is not an active
> >>>>> discussion list:
> >>>>> * More info:
> >>>>> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-
> >>>>> 4Q9l2USxIAe6P8O4Zc
> >>>>> * The archive itself:
> >>>>> https://mailarchive.ietf.org/arch/browse/auth48archive/
> >>>>>
> >>>>> * Note: If only absolutely necessary, you may temporarily opt out
> >>>>> of the archiving of messages (e.g., to discuss a sensitive
> >>>>> matter).
> >>>>>  If needed, please add a note at the top of the message that you
> >>>>> have dropped the address. When the discussion is concluded,
> >>>>> auth48archive@rfc-editor.org will be re-added to the CC list and
> >>>>> its addition will be noted at the top of the message.
> >>>>> You may submit your changes in one of two ways:
> >>>>>
> >>>>> An update to the provided XML file
> >>>>> — OR —
> >>>>> An explicit list of changes in this format
> >>>>>
> >>>>> Section # (or indicate Global)
> >>>>>
> >>>>> OLD:
> >>>>> old text
> >>>>>
> >>>>> NEW:
> >>>>> new text
> >>>>>
> >>>>> You do not need to reply with both an updated XML file and an
> >>>>> explicit list of changes, as either form is sufficient.
> >>>>>
> >>>>> We will ask a stream manager to review and approve any changes
> >>>>> that seem
> >>>>> beyond editorial in nature, e.g., addition of new text, deletion
> >>>>> of text, and technical changes. Information about stream managers
> >>>>> can be found in the FAQ. Editorial changes do not require
> >>>>> approval from a stream manager.
> >>>>>
> >>>>>
> >>>>> Approving for publication
> >>>>> --------------------------
> >>>>>
> >>>>> To approve your RFC for publication, please reply to this email
> >>>>> stating
> >>>>> that you approve this RFC for publication. Please use ‘REPLY
> >>>>> ALL’,
> >>>>> as all the parties CCed on this message need to see your
> >>>>> approval.
> >>>>>
> >>>>>
> >>>>> Files -----
> >>>>>
> >>>>> The files are available here:
> >>>>> https://www.rfc-editor.org/authors/rfc9679.xml
> >>>>> https://www.rfc-editor.org/authors/rfc9679.html
> >>>>> https://www.rfc-editor.org/authors/rfc9679.pdf
> >>>>> https://www.rfc-editor.org/authors/rfc9679.txt
> >>>>>
> >>>>> Diff file of the text:
> >>>>> https://www.rfc-editor.org/authors/rfc9679-diff.html
> >>>>> https://www.rfc-editor.org/authors/rfc9679-rfcdiff.html (side by
> >>>>> side)
> >>>>>
> >>>>> Diff of the XML: https://www.rfc-editor.org/authors/rfc9679-
> >>>>> xmldiff1.html
> >>>>>
> >>>>>
> >>>>> Tracking progress
> >>>>> -----------------
> >>>>>
> >>>>> The details of the AUTH48 status of your document are here:
> >>>>> https://www.rfc-editor.org/auth48/rfc9679
> >>>>>
> >>>>> Please let us know if you have any questions.
> >>>>> Thank you for your cooperation,
> >>>>>
> >>>>> RFC Editor
> >>>>>
> >>>>> --------------------------------------
> >>>>> RFC9679 (draft-ietf-cose-key-thumbprint-06)
> >>>>>
> >>>>> Title : CBOR Object Signing and Encryption (COSE) Key Thumbprint
> >>>>> Author(s) : K. Isobe, H. Tschofenig, O. Steele
> >>>>> WG Chair(s) : Matthew A. Miller, Ivaylo Petrov, Michael B. Jones
> >>>>>
> >>>>> Area Director(s) : Deb Cooley, Paul Wouters
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> --
> >>>>>
> >>>>>
> >>>>> ORIE STEELE
> >>>>> Chief Technology Officer
> >>>>> www.transmute.industries
> >>>>>
> >>>>
> >>>>
> >>>>
> >>>> --
> >>>>
> >>>> ORIE STEELE
> >>>> Chief Technology Officer
> >>>> www.transmute.industries
> >>>>
> >>>
> >>
> >

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to