Dear Mike, Orie, and *Paul (AD), Thank you for your replies. We have updated the sourcecode as requested. Please review and let us know if any further changes are needed.
*Paul, please review the updates to the sourcecode in Section 6 and let us know if you approve; see https://www.rfc-editor.org/authors/rfc9679-auth48diff.html. Note from Orie: > The example of EDN was changed during auth48 but the encoded hex was not > updated. I confirmed the source code blocks are processed correctly using > cbor.me, this was the only issue I encountered. Section 6 OLD: A50102200121582065EDA5A12577C2BAE829437FE338701A10AAA375E1BB5B5DE108D E439C08551D2258201E52ED75701163F7F9E40DDF9F341B3DC9BA860AF7E0CA7CA7E9 EECD0084D19C0258246D65726961646F632E6272616E64796275636B406275636B6C6 16E642E6578616D706C65 NEW: A50102200121582065EDA5A12577C2BAE829437FE338701A10AAA375E1BB5B5DE108D E439C08551D2258201E52ED75701163F7F9E40DDF9F341B3DC9BA860AF7E0CA7CA7E9 EECD0084D19C025820496BD8AFADF307E5B08C64B0421BF9DC01528A344A43BDA88FA DD1669DA253EC —FILES (please refresh)— The updated XML file is here: https://www.rfc-editor.org/authors/rfc9679.xml The updated output files are here: https://www.rfc-editor.org/authors/rfc9679.txt https://www.rfc-editor.org/authors/rfc9679.pdf https://www.rfc-editor.org/authors/rfc9679.html This diff file shows all changes made during AUTH48: https://www.rfc-editor.org/authors/rfc9679-auth48diff.html These diff files show only changes made during the last edit round: https://www.rfc-editor.org/authors/rfc9679-lastdiff.html https://www.rfc-editor.org/authors/rfc9679-lastrfcdiff.html This diff file shows all changes made to date: https://www.rfc-editor.org/authors/rfc9679-diff.html For the AUTH48 status of this document, please see: https://www.rfc-editor.org/auth48/rfc9679 Thank you, RFC Editor/kc > On Dec 9, 2024, at 10:25 AM, Orie Steele <orie@transmute.industries> wrote: > > Hi, the text here: > > OLD: > > A50102200121582065EDA5A12577C2BAE829437FE338701A10AAA375E1BB5B5DE108D > E439C08551D2258201E52ED75701163F7F9E40DDF9F341B3DC9BA860AF7E0CA7CA7E9 > EECD0084D19C0258246D65726961646F632E6272616E64796275636B406275636B6C6 > 16E642E6578616D706C65 > > NEW: > > A50102200121582065EDA5A12577C2BAE829437FE338701A10AAA375E1BB5B5DE108DE439C08551D2258201E52ED75701163F7F9E40DDF9F341B3DC9BA860AF7E0CA7CA7E9EECD0084D19C025820496BD8AFADF307E5B08C64B0421BF9DC01528A344A43BDA88FADD1669DA253EC > > The example of EDN was changed during auth48 but the encoded hex was not > updated. > > I confirmed the source code blocks are processed correctly using cbor.me, > this was the only issue I encountered. > > OS > > On Fri, Dec 6, 2024 at 4:35 PM Michael Jones <michael_b_jo...@hotmail.com> > wrote: > I looked at all the sourcecode blocks. Their types look fine to me. > > Best wishes, > -- Mike > > -----Original Message----- > From: Karen Moore <kmo...@amsl.com> > Sent: Friday, December 6, 2024 12:34 PM > To: Hannes Tschofenig <hannes.tschofe...@gmx.net>; Orie Steele > <orie@transmute.industries>; Isobe Kohei <isobeko...@gmail.com>; Hannes > Tschofenig <hannes.tschofe...@gmail.com> > Cc: Michael Jones <michael_b_jo...@hotmail.com>; RFC Editor > <rfc-edi...@rfc-editor.org>; cose-...@ietf.org; Cose Chairs Wg > <cose-cha...@ietf.org>; auth48archive <auth48archive@rfc-editor.org>; Paul > Wouters <paul.wout...@aiven.io> > Subject: AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-thumbprint-06> for your > review > > Authors, > > The IANA actions are complete for this document. Prior to moving forward with > publication, please confirm if you want to perform any further checks on the > sourcecode per this note: > > > The sourcecode type should be set to cbor-diag. We should validate these > > source code blocks once more at the very end, using CBOR.me or similar. > > > Best regards, > RFC Editor/kc > > > On Dec 5, 2024, at 10:25 AM, Karen Moore <kmo...@amsl.com> wrote: > > > > Hi Paul and *Authors, > > > > Thank you for your quick reply. We have noted your approval on the AUTH48 > > status page (https://www.rfc-editor.org/auth48/rfc9679). > > > > *Authors, please confirm if any final checks need to be performed prior to > > publication per this comment: > > > >> The sourcecode type should be set to cbor-diag. We should validate these > >> source code blocks once more at the very end, using CBOR.me or similar. > > > > Note that we will ask IANA to update their registry per the recent update; > > we will inform you when complete. > > > > Best regards, > > RFC Editor/kc > > > >> On Dec 5, 2024, at 9:54 AM, Paul Wouters <paul.wout...@aiven.io> wrote: > >> > >> I approve, > >> > >> Thanks everyone for working this out and catching it before the RFC went > >> out. > >> > >> Paul > >> > >> On Thu, Dec 5, 2024 at 12:45 PM Karen Moore <kmo...@amsl.com> wrote: > >> Hi Mike and *Paul (AD), > >> > >> Thanks for providing the updated XML file. The changes are now reflected > >> in our files. Hannes and Orie, we will assume your assent to these changes > >> unless we hear otherwise. > >> > >> *Paul, please review the following changes and let us know if you approve > >> (we updated item 3 and added item 4; see Mike’s explanation for the new > >> changes in the thread below). The updates can also be viewed here: > >> https://www.rfc-editor.org/authors/rfc9679-auth48diff.html. > >> > >> 1) Section 5.1 > >> > >> OLD: > >> The COSE Key Thumbprint is a digest of the essential parameters > >> required to represent the key as a COSE Key, rather than any > >> additional data that might accompany the key. > >> > >> NEW: > >> The COSE Key Thumbprint is a digest of the ordered essential > >> parameters needed to represent a COSE Key, with all other parameters > >> excluded. > >> > >> ... > >> 2) Section 5.3 > >> > >> OLD: > >> Any party in possession of a key that is represented as a COSE Key > >> can use the COSE Key Thumbprint. > >> > >> NEW: > >> The only prerequisites are that the COSE_Key representation of the > >> key be defined and the party creating the COSE Key Thumbprint be in > >> possession of the necessary key material. > >> > >> … > >> 3) Addition of Section 5.5 > >> > >> NEW: > >> 5.5 Relationship to JSON Web Key Thumbprints > >> > >> The ckt of a COSE Key, as described in Section 7 of [RFC9052], and > >> the jkt of a JSON Web Key, as described in Section 4 of [RFC7517], > >> are different even when the underlying cryptographic key material is > >> the same. > >> > >> This document does not register a JWT confirmation method [RFC7800] > >> for using "ckt" as a confirmation method for a JWT or a CWT > >> confirmation method [RFC8747] for using "jkt" as a confirmation > >> method for a CWT. > >> > >> ... > >> 4) Section 5.6 - please review the file for the changes to this section. > >> > >> … > >> 5) Section 8 > >> > >> OLD: > >> Confirmation Method Name: ckt > >> Confirmation Method Description: COSE Key SHA-256 Thumbprint JWT > >> Confirmation Method Name: jkt > >> > >> NEW: > >> Confirmation Method Name: ckt > >> Confirmation Method Description: COSE Key SHA-256 Thumbprint JWT > >> Confirmation Method Name: (none) > >> > >> > >> —FILES (please refresh)— > >> > >> The updated XML file is here: > >> https://www/. > >> rfc-editor.org%2Fauthors%2Frfc9679.xml&data=05%7C02%7C%7C9544d46df66b > >> 4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638 > >> 691140464939559%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiO > >> iIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7 > >> C%7C%7C&sdata=9Me94X%2Br0n99MgWJeiVNBDMWu2H%2F%2FBUtZ7%2BnWTndVZo%3D& > >> reserved=0 > >> > >> The updated output files are here: > >> https://www/. > >> rfc-editor.org%2Fauthors%2Frfc9679.txt&data=05%7C02%7C%7C9544d46df66b > >> 4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638 > >> 691140464950611%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiO > >> iIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7 > >> C%7C%7C&sdata=Fsl%2Fg9ZG13NgmZitOgbx2s7RwnOztrJpau1g6xqly%2Bg%3D&rese > >> rved=0 > >> https://www/. > >> rfc-editor.org%2Fauthors%2Frfc9679.pdf&data=05%7C02%7C%7C9544d46df66b > >> 4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638 > >> 691140464961460%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiO > >> iIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7 > >> C%7C%7C&sdata=xR7GOgpVjsV0EFW8%2F1LKHXNdvJrGUZYn1fgVLxgBvjE%3D&reserv > >> ed=0 > >> https://www/. > >> rfc-editor.org%2Fauthors%2Frfc9679.html&data=05%7C02%7C%7C9544d46df66 > >> b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C63 > >> 8691140464972095%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYi > >> OiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0% > >> 7C%7C%7C&sdata=mhyzYzCDinFXQDNyv5Mnba%2FtlPRNawV6okAEWJWaVFo%3D&reser > >> ved=0 > >> > >> This diff file shows all changes made during AUTH48: > >> https://www/. > >> rfc-editor.org%2Fauthors%2Frfc9679-auth48diff.html&data=05%7C02%7C%7C > >> 9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7 > >> C1%7C0%7C638691140464982812%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiO > >> nRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ > >> %3D%3D%7C0%7C%7C%7C&sdata=4Q2EXvpbtg6pj2Bd9kxDnv3MvRTIdbSA3guNFGp2wi4 > >> %3D&reserved=0 > >> > >> These diff files show only changes made during the last edit round: > >> https://www/. > >> rfc-editor.org%2Fauthors%2Frfc9679-lastdiff.html&data=05%7C02%7C%7C95 > >> 44d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1 > >> %7C0%7C638691140464993688%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnR > >> ydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3 > >> D%3D%7C0%7C%7C%7C&sdata=8MfXLLAQsYchBiSoaSXpANGtv2aymEWMD9kz5GpsKHY%3 > >> D&reserved=0 > >> https://www/. > >> rfc-editor.org%2Fauthors%2Frfc9679-lastrfcdiff.html&data=05%7C02%7C%7 > >> C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa% > >> 7C1%7C0%7C638691140465004216%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGki > >> OnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyf > >> Q%3D%3D%7C0%7C%7C%7C&sdata=7Tu7WeAoLyKMdDOnRiCnh%2FmpQr%2BYTX0EHfIqoF > >> hboDE%3D&reserved=0 > >> > >> This diff file shows all changes made to date: > >> https://www/. > >> rfc-editor.org%2Fauthors%2Frfc9679-diff.html&data=05%7C02%7C%7C9544d4 > >> 6df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0 > >> %7C638691140465014730%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWU > >> sIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D > >> %7C0%7C%7C%7C&sdata=qp0u2ZndV9%2Bkz4%2BHbRA5b92WU0IhgtUluWPuhwNcrhc%3 > >> D&reserved=0 > >> > >> For the AUTH48 status of this document, please see: > >> https://www/. > >> rfc-editor.org%2Fauth48%2Frfc9679&data=05%7C02%7C%7C9544d46df66b4fad8 > >> 33008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C63869114 > >> 0465025294%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLj > >> AuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C% > >> 7C&sdata=mgDSViKT0Hyl7I%2B60i0CrYfwyKX5lZG%2BrPmVRDYquKg%3D&reserved= > >> 0 > >> > >> Thank you, > >> RFC Editor/kc > >> > >> > >>> On Dec 4, 2024, at 3:08 PM, Michael Jones <michael_b_jo...@hotmail.com> > >>> wrote: > >>> > >>> Folks, I hate to do this, but in reviewing the newly added section, I > >>> realized that it was incorrectly using the term "claim". In both RFC > >>> 7800 and RFC 8747, "cnf" is a claim, whereas the JWT and CWT confirmation > >>> members are referred to as "members" - not "claims". Then I realized > >>> there other places in the draft this the term "claim" was incorrectly > >>> used. > >>> > >>> The attached updated source file makes the needed corrections. For > >>> easier reviewing, a diff from the RFC Editor's source also follows. > >>> > >>> RFC Editor, please apply these edits and send out a new draft for review. > >>> > >>> Thanks, > >>> -- Mike (writing as a COSE chair) > >>> > >>> diff rfc9679.xml rfc9679_mbj.xml > >>> 46c46 > >>> < <date year="2024" month="October"/> > >>> --- > >>>> <date year="2024" month="December"/> > >>> 284,285c284,288 > >>> < This document does not register a JWT claim for using ckt as a > >>> confirmation > >>> < method for a JWT or a CWT claim for using jkt as a confirmation > >>> method for a CWT. > >>> --- > >>>> This document does not register > >>>> a JWT confirmation method <xref target="RFC7800"/> for using > >>>> "ckt" as a confirmation method for a JWT or a CWT confirmation > >>>> method <xref target="RFC8747"/> for using "jkt" as a confirmation > >>>> method for a CWT. > >>> 293,294c296,297 > >>> < <t>The proof-of-possession key is identified using the "ckt" > >>> claim, > >>> < the COSE Key Thumbprint claim. This claim contains the value of > >>> --- > >>>> <t>The proof-of-possession key is identified using the "ckt" > >>>> member of the CWT confirmation claim "cnf". This member contains > >>>> the value of > >>> 299c302 > >>> < claim. In this approach, the issuer of a CWT declares that the > >>> --- > >>>> member. In this approach, the issuer of a CWT declares that the > >>> 302c305 > >>> < of the key by including a "ckt" claim in the CWT.</t> > >>> --- > >>>> of the key by including a "ckt" CWT confirmation method member in > >>>> the CWT.</t> > >>> 304c307 > >>> < <t>The following example demonstrates the use of the "ckt" claim > >>> --- > >>>> <t>The following example demonstrates the use of the "ckt" > >>>> member > >>> 319,320c322,323 > >>> < <t><xref target="IANA"/> registers the "ckt" claim and the > >>> confirmation method. > >>> < The "ckt" claim is expected to be used in the "cnf" claim.</t> > >>> --- > >>>> <t><xref target="IANA"/> registers the "ckt" CWT confirmation > >>>> method member. > >>>> The "ckt" member is used in the "cnf" claim.</t> > >>> 510a514 > >>>> <xi:include > >>>> href="https://na01.safelinks.protection.outlook.com/?url=https%3A%252 > >>>> F%2Fbib.ietf.org%2Fpublic%2Frfc%2Fbibxml%2Freference.RFC.7800.xml%2 > >>>> 522%2F&data=05%7C02%7C%7C9544d46df66b4fad833008dd163551da%7C84df9e7 > >>>> fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638691140465036648%7CUnknown%7C > >>>> TWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4 > >>>> zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=q2LHlyc0jk > >>>> lVmi9pIrvk8G0YOJ%2BtkF5CGripORRLtlA%3D&reserved=0> > >> > >> > >>> On Dec 4, 2024, at 12:12 PM, Karen Moore <kmo...@amsl.com> wrote: > >>> > >>> Hi Orie and *Paul (AD), > >>> > >>> We have updated the text with your additional suggested edits; the > >>> changes are now reflected in our files (links below). We now await > >>> approvals from Hannes and Paul. > >>> > >>> *Paul, please review the following changes and let us know if you > >>> approve. The updates can also be viewed here: > >>> https://www.rfc-editor.org/authors/rfc9679-auth48diff.html. > >>> > >>> 1) Section 5.1 > >>> > >>> OLD: > >>> The COSE Key Thumbprint is a digest of the essential parameters > >>> required to represent the key as a COSE Key, rather than any > >>> additional data that might accompany the key. > >>> > >>> NEW: > >>> The COSE Key Thumbprint is a digest of the ordered essential > >>> parameters needed to represent a COSE Key, with all other > >>> parameters excluded. > >>> > >>> ... > >>> 2) Section 5.3 > >>> > >>> OLD: > >>> Any party in possession of a key that is represented as a COSE Key > >>> can use the COSE Key Thumbprint. > >>> > >>> NEW: > >>> The only prerequisites are that the COSE_Key representation of the > >>> key be defined and the party creating the COSE Key Thumbprint be in > >>> possession of the necessary key material. > >>> > >>> … > >>> 3) Addition of Section 5.5 > >>> > >>> NEW: > >>> 5.5 Relationship to JSON Web Key Thumbprints > >>> > >>> The ckt of a COSE Key, as described in Section 7 of [RFC9052], and > >>> the jkt of a JSON Web Key, as described in Section 4 of RFC 7517, > >>> are different even when the underlying cryptographic key material is the > >>> same. > >>> > >>> This document does not register a JWT claim for using ckt as a > >>> confirmation method for a JWT or a CWT claim for using jkt as a > >>> confirmation method for a CWT. > >>> > >>> … > >>> 4) Section 8 > >>> > >>> OLD: > >>> Confirmation Method Name: ckt > >>> Confirmation Method Description: COSE Key SHA-256 Thumbprint JWT > >>> Confirmation Method Name: jkt > >>> > >>> NEW: > >>> Confirmation Method Name: ckt > >>> Confirmation Method Description: COSE Key SHA-256 Thumbprint JWT > >>> Confirmation Method Name: (none) > >>> > >>> > >>> —FILES (please refresh)— > >>> > >>> The updated XML file is here: > >>> https://www/ > >>> .rfc-editor.org%2Fauthors%2Frfc9679.xml&data=05%7C02%7C%7C9544d46df6 > >>> 6b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C > >>> 638691140465060532%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsI > >>> lYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D% > >>> 7C0%7C%7C%7C&sdata=pR%2FYwpMq8vYw1GuBuqwluIFHSkD9o0pIAPh1An6xJIY%3D& > >>> reserved=0 > >>> > >>> The updated output files are here: > >>> https://www/ > >>> .rfc-editor.org%2Fauthors%2Frfc9679.txt&data=05%7C02%7C%7C9544d46df6 > >>> 6b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C > >>> 638691140465071281%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsI > >>> lYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D% > >>> 7C0%7C%7C%7C&sdata=NTS6w4UFqkC%2BR9LoD86rZkqkPlwGbx%2BrxX%2BoRJz1Cy4 > >>> %3D&reserved=0 > >>> https://www/ > >>> .rfc-editor.org%2Fauthors%2Frfc9679.pdf&data=05%7C02%7C%7C9544d46df6 > >>> 6b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C > >>> 638691140465082645%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsI > >>> lYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D% > >>> 7C0%7C%7C%7C&sdata=rgRi2sWh85kqRKA%2FSsrhBLvMqkqPg8H3uGjjoQ7dShc%3D& > >>> reserved=0 > >>> https://www/ > >>> .rfc-editor.org%2Fauthors%2Frfc9679.html&data=05%7C02%7C%7C9544d46df > >>> 66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7 > >>> C638691140465093413%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUs > >>> IlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D > >>> %7C0%7C%7C%7C&sdata=pbPzR2vsSF8dKjaOCG5DeOMzqcLZo6tEPvNDJWynaTQ%3D&r > >>> eserved=0 > >>> > >>> This diff file shows all changes made during AUTH48: > >>> https://www/ > >>> .rfc-editor.org%2Fauthors%2Frfc9679-auth48diff.html&data=05%7C02%7C% > >>> 7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaa > >>> a%7C1%7C0%7C638691140465104166%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hc > >>> GkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUI > >>> joyfQ%3D%3D%7C0%7C%7C%7C&sdata=GW6JGkFDyHXApETPyRO9Gd6o1ZRJwrtYrqIFm > >>> 1eP8RY%3D&reserved=0 > >>> > >>> These diff files show only changes made during the last edit round: > >>> https://www/ > >>> .rfc-editor.org%2Fauthors%2Frfc9679-lastdiff.html&data=05%7C02%7C%7C > >>> 9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa% > >>> 7C1%7C0%7C638691140465115074%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGk > >>> iOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjo > >>> yfQ%3D%3D%7C0%7C%7C%7C&sdata=BQ2SWfFPQo2nOGoRFi9eE7eh8ELr62cvtgXhZjX > >>> wVR8%3D&reserved=0 > >>> https://www/ > >>> .rfc-editor.org%2Fauthors%2Frfc9679-lastrfcdiff.html&data=05%7C02%7C > >>> %7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaa > >>> aa%7C1%7C0%7C638691140465126114%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1h > >>> cGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldU > >>> IjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=YTINm31Pzmtm9PuAJ5Jmo0EVHr3irXXJD%2B > >>> 6yX40l%2Fo0%3D&reserved=0 > >>> > >>> This diff file shows all changes made to date: > >>> https://www/ > >>> .rfc-editor.org%2Fauthors%2Frfc9679-diff.html&data=05%7C02%7C%7C9544 > >>> d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1% > >>> 7C0%7C638691140465137113%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnR > >>> ydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ% > >>> 3D%3D%7C0%7C%7C%7C&sdata=FGXOXzHwS%2FZNierdvtwwH7SQgwAE5P1OwPpARIv%2 > >>> F8P8%3D&reserved=0 > >>> > >>> For the AUTH48 status of this document, please see: > >>> https://www/ > >>> .rfc-editor.org%2Fauth48%2Frfc9679&data=05%7C02%7C%7C9544d46df66b4fa > >>> d833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C63869 > >>> 1140465148142%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOi > >>> IwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7 > >>> C%7C%7C&sdata=V1fBW3dE4mG2Pi4xKstvtQwyLT5vcwCSWuOAIDPAqmk%3D&reserve > >>> d=0 > >>> > >>> Thank you, > >>> RFC Editor/kc > >>> > >>> > >>>> On Dec 4, 2024, at 7:26 AM, Orie Steele <orie@transmute.industries> > >>>> wrote: > >>>> > >>>> Thank you! > >>>> > >>>> "cose key" should be "COSE Key", > >>>> > >>>> We could add "COSE Key as described in Section 7 of RFC9052" and "JSON > >>>> Web Key, as described in Section 4 of RFC7517" > >>>> > >>>> If the citations are helpful... This is a style nit. > >>>> > >>>> I approve of the changes. > >>>> > >>>> On Tue, Dec 3, 2024 at 3:48 PM Karen Moore <kmo...@amsl.com> wrote: > >>>> Authors, > >>>> > >>>> Thank you for the discussion and suggested changes. Our files now > >>>> reflect the updates below (see > >>>> <https://www.rfc-editor.org/authors/rfc9679-lastrfcdiff.html> for a > >>>> snapshot of the changes). Please review and let us know if these changes > >>>> are agreeable or if any further updates are needed. We will then ask the > >>>> AD to approve them. > >>>> > >>>> 1) Section 5.3 > >>>> > >>>> OLD: > >>>> Any party in possession of a key that is represented as a COSE Key > >>>> can use the COSE Key Thumbprint. > >>>> > >>>> NEW: > >>>> The only prerequisites are that the COSE_Key representation of > >>>> the key be defined and the party creating the COSE Key Thumbprint > >>>> be in possession of the necessary key material. > >>>> > >>>> ... > >>>> 2) Addition of New Section. Note that we made “json web key” uppercase > >>>> for consistency. > >>>> > >>>> NEW: > >>>> 5.5 Relationship to JSON Web Key Thumbprints > >>>> > >>>> The ckt of a cose key and jkt of a JSON Web Key are different, > >>>> even when underlying cryptographic key material is the same. > >>>> > >>>> This document does not register a JWT claim for using ckt as a > >>>> confirmation method for a JWT or a CWT claim for using jkt as a > >>>> confirmation method for a CWT. > >>>> > >>>> ... > >>>> 3) Section 8 > >>>> > >>>> OLD: > >>>> Confirmation Method Name: ckt > >>>> Confirmation Method Description: COSE Key SHA-256 Thumbprint JWT > >>>> Confirmation Method Name: jkt > >>>> > >>>> NEW: > >>>> Confirmation Method Name: ckt > >>>> Confirmation Method Description: COSE Key SHA-256 Thumbprint JWT > >>>> Confirmation Method Name: (none) > >>>> > >>>> > >>>> —FILES (please refresh)— > >>>> > >>>> The updated XML file is here: > >>>> https://ww/ > >>>> w.rfc-editor.org%2Fauthors%2Frfc9679.xml&data=05%7C02%7C%7C9544d46d > >>>> f66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0 > >>>> %7C638691140465169721%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRyd > >>>> WUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3 > >>>> D%3D%7C0%7C%7C%7C&sdata=ybjaVt1EwEj%2BEPa9wa5V2Jb%2FlY9RtOtaYVb7ZOm > >>>> EGkw%3D&reserved=0 > >>>> > >>>> The updated output files are here: > >>>> https://ww/ > >>>> w.rfc-editor.org%2Fauthors%2Frfc9679.txt&data=05%7C02%7C%7C9544d46d > >>>> f66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0 > >>>> %7C638691140465180567%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRyd > >>>> WUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3 > >>>> D%3D%7C0%7C%7C%7C&sdata=czMW16qPcbahA%2BfUSC4fq9p%2F1UPUJJP8CR%2BWH > >>>> Bc%2FByg%3D&reserved=0 > >>>> https://ww/ > >>>> w.rfc-editor.org%2Fauthors%2Frfc9679.pdf&data=05%7C02%7C%7C9544d46d > >>>> f66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0 > >>>> %7C638691140465191478%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRyd > >>>> WUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3 > >>>> D%3D%7C0%7C%7C%7C&sdata=svfJ6nNkcPHgErawmc2gNhAADZcn8hHB1twcoPaKn38 > >>>> %3D&reserved=0 > >>>> https://ww/ > >>>> w.rfc-editor.org%2Fauthors%2Frfc9679.html&data=05%7C02%7C%7C9544d46 > >>>> df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C > >>>> 0%7C638691140465203657%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy > >>>> dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ% > >>>> 3D%3D%7C0%7C%7C%7C&sdata=LLQbP9vw%2FCoZyuOIsrcih%2BI6vaBsMt7MjFhHoP > >>>> p5tj4%3D&reserved=0 > >>>> > >>>> This diff file shows all changes made during AUTH48: > >>>> https://ww/ > >>>> w.rfc-editor.org%2Fauthors%2Frfc9679-auth48diff.html&data=05%7C02%7 > >>>> C%7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaa > >>>> aaaa%7C1%7C0%7C638691140465214410%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0e > >>>> U1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIs > >>>> IldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=CWMJs49ps76shRZc0uAIaBU0KsdJ9JQ > >>>> 6FioGa7H5iLA%3D&reserved=0 > >>>> > >>>> These diff files show only changes made during the last edit round: > >>>> https://ww/ > >>>> w.rfc-editor.org%2Fauthors%2Frfc9679-lastdiff.html&data=05%7C02%7C% > >>>> 7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaa > >>>> aa%7C1%7C0%7C638691140465224906%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1 > >>>> hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIl > >>>> dUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=BQ0cX0W%2BW9vcbiX0ezMGrtGWYkHBjWM > >>>> 5tkeTscYVCto%3D&reserved=0 > >>>> https://ww/ > >>>> w.rfc-editor.org%2Fauthors%2Frfc9679-lastrfcdiff.html&data=05%7C02% > >>>> 7C%7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaa > >>>> aaaaa%7C1%7C0%7C638691140465235814%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0 > >>>> eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCI > >>>> sIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=MKebtlbx92dwZEuZWWx%2BgszkRZvl > >>>> %2FHfUY83Ef5TK1rk%3D&reserved=0 > >>>> > >>>> This diff file shows all changes made to date: > >>>> https://ww/ > >>>> w.rfc-editor.org%2Fauthors%2Frfc9679-diff.html&data=05%7C02%7C%7C95 > >>>> 44d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7 > >>>> C1%7C0%7C638691140465246378%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGk > >>>> iOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIj > >>>> oyfQ%3D%3D%7C0%7C%7C%7C&sdata=kWD18%2BJo2%2FxJQ%2F0G187xs4c2WkTSyge > >>>> 3wEtKK5gBaP0%3D&reserved=0 > >>>> > >>>> For the AUTH48 status of this document, please see: > >>>> https://ww/ > >>>> w.rfc-editor.org%2Fauth48%2Frfc9679&data=05%7C02%7C%7C9544d46df66b4 > >>>> fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C63 > >>>> 8691140465257424%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIl > >>>> YiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D% > >>>> 7C0%7C%7C%7C&sdata=K1frRy3PTOkDxxSy0sJw1atwU5tn34OC65vx0b1%2BilY%3D > >>>> &reserved=0 > >>>> > >>>> Thank you, > >>>> RFC Editor/kc > >>>> > >>>>> On Dec 3, 2024, at 7:55 AM, Hannes Tschofenig > >>>>> <hannes.tschofe...@gmail.com> wrote: > >>>>> > >>>>> Thanks for the insightful comment, Orie. I agree with your proposed > >>>>> edits for the IANA consideration section and the extra text before the > >>>>> section on relationship to certificate thumbprints. > >>>>> > >>>>> I am also fine with the additional text Mike proposed. > >>>>> > >>>>> It is indeed too late to add new functionality at this point in time. > >>>>> > >>>>> Ciao > >>>>> Hannes > >>>>> > >>>>> > >>>>> On Tue, Dec 3, 2024 at 3:13 AM Michael Jones > >>>>> <michael_b_jo...@hotmail.com> wrote: > >>>>> I support adding the section that Orie proposed. > >>>>> > >>>>> > >>>>> > >>>>> However in reviewing related text, I unfortunately found a problem. > >>>>> Reading > >>>>> https://datatracker.ietf.org/doc/html/draft-ietf-cose-key-thumbprint-06#section-5.3, > >>>>> it differs from https://www.rfc-editor.org/rfc/rfc7638#section-3.5 in > >>>>> a counterproductive and overly restrictive way. Please change: > >>>>> > >>>>> > >>>>> > >>>>> Any party in possession of a key that is represented as a COSE Key > >>>>> can > >>>>> > >>>>> use the COSE Key Thumbprint. > >>>>> > >>>>> > >>>>> > >>>>> to: > >>>>> > >>>>> > >>>>> > >>>>> The only prerequisites are that the COSE_Key representation > >>>>> > >>>>> of the key be defined and the party creating the COSE Key > >>>>> Thumbprint > >>>>> > >>>>> be in possession of the necessary key material. > >>>>> > >>>>> > >>>>> > >>>>> That way it will be more actionable and will parallel the corresponding > >>>>> RFC 7638 text. > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> Thanks all, > >>>>> > >>>>> -- > >>>>> Mike > >>>>> > >>>>> > >>>>> > >>>>> From: Orie Steele <orie@transmute.industries> > >>>>> Sent: Monday, December 2, 2024 5:55 PM > >>>>> To: Michael Jones <michael_b_jo...@hotmail.com> > >>>>> Cc: Hannes Tschofenig <hannes.tschofe...@gmail.com>; Hannes > >>>>> Tschofenig <hannes.tschofe...@gmx.net>; RFC Editor > >>>>> <rfc-edi...@rfc-editor.org>; Isobe Kohei <isobeko...@gmail.com>; > >>>>> cose-...@ietf.org; Cose Chairs Wg <cose-cha...@ietf.org>; Paul > >>>>> Wouters <paul.wout...@aiven.io>; auth48archive > >>>>> <auth48archive@rfc-editor.org> > >>>>> Subject: Re: AUTH48: RFC-to-be 9679 > >>>>> <draft-ietf-cose-key-thumbprint-06> for your review > >>>>> > >>>>> > >>>>> > >>>>> Let's add a section to the document, before the section on relationship > >>>>> to certificate thumbprints. > >>>>> > >>>>> > >>>>> > >>>>> 5.5 Relationship to JSON Web Key Thumbprints > >>>>> > >>>>> > >>>>> > >>>>> The ckt of a cose key, and jkt of a json web key are different, even > >>>>> when underlying cryptographic key material is the same. > >>>>> > >>>>> > >>>>> > >>>>> This document does not register a JWT claim for using ckt as a > >>>>> confirmation method for a JWT, or a CWT claim for using jkt as a > >>>>> confirmation method for a CWT. > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> On Mon, Dec 2, 2024, 6:26 PM Orie Steele <orie@transmute.industries> > >>>>> wrote: > >>>>> > >>>>> I agree, let's just stick with the simple (none) solution. > >>>>> > >>>>> > >>>>> > >>>>> Hannes can you approve or suggest changes to the clarifying text that > >>>>> makes it clear this is not an oversight? > >>>>> > >>>>> > >>>>> > >>>>> Mike, do you object to that clarifying text assuming we take you change > >>>>> to the IANA considerations section? > >>>>> > >>>>> > >>>>> > >>>>> OS > >>>>> > >>>>> > >>>>> > >>>>> On Mon, Dec 2, 2024, 5:56 PM Michael Jones > >>>>> <michael_b_jo...@hotmail.com> wrote: > >>>>> > >>>>> I’m either fine with Orie’s proposed change to the registration wording > >>>>> or the following one: > >>>>> > >>>>> > >>>>> > >>>>> From: > >>>>> > >>>>> Confirmation Method Name: ckt > >>>>> Confirmation Method Description: COSE Key SHA-256 Thumbprint > >>>>> JWT Confirmation Method Name: jkt > >>>>> > >>>>> To: > >>>>> > >>>>> Confirmation Method Name: ckt > >>>>> Confirmation Method Description: COSE Key SHA-256 Thumbprint > >>>>> JWT Confirmation Method Name: (none) > >>>>> > >>>>> For the record, I’m not OK trying to add a ckt JWT “cnf” method as an > >>>>> AUTH48 action (despite me appreciating Orie’s discussion of the > >>>>> possibility). > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> Cheers, > >>>>> > >>>>> -- > >>>>> Mike > >>>>> > >>>>> > >>>>> > >>>>> From: Orie Steele <orie@transmute.industries> > >>>>> Sent: Monday, December 2, 2024 2:55 PM > >>>>> To: Hannes Tschofenig <hannes.tschofe...@gmail.com> > >>>>> Cc: Hannes Tschofenig <hannes.tschofe...@gmx.net>; RFC Editor > >>>>> <rfc-edi...@rfc-editor.org>; Isobe Kohei <isobeko...@gmail.com>; > >>>>> cose-...@ietf.org; Cose Chairs Wg <cose-cha...@ietf.org>; Michael > >>>>> Jones <michael_b_jo...@hotmail.com>; Paul Wouters > >>>>> <paul.wout...@aiven.io>; auth48archive@rfc-editor.org > >>>>> Subject: Re: AUTH48: RFC-to-be 9679 > >>>>> <draft-ietf-cose-key-thumbprint-06> for your review > >>>>> > >>>>> > >>>>> > >>>>> This is indeed a bug, for extra assurance that it is a problem: > >>>>> > >>>>> How would you use a ckt to verify a JWT that was using "cnf"? > >>>>> > >>>>> Here is a more complete fix for the bug: > >>>>> > >>>>> https://d/ > >>>>> atatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-cose-key-thumbprint- > >>>>> 06%23section-5.3&data=05%7C02%7C%7C9544d46df66b4fad833008dd163551d > >>>>> a%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638691140465289880% > >>>>> 7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMC > >>>>> IsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sd > >>>>> ata=ZBvwAnUBGfT%2BqBIzr8O%2F1BfCk7G30uNd0Km1Ympuews%3D&reserved=0 > >>>>> > >>>>> Note that the ckt of a cose key, and jkt of a json web key are > >>>>> different, even when underlying cryptographic key material is the same. > >>>>> > >>>>> ckt is a binary string and jkt is always a base64url string encoded as > >>>>> described in section 6.1 of RFC9449. > >>>>> To use a ckt claim inside a JWT, the ckt claim value MUST be base64url > >>>>> encoded. > >>>>> The example provided in section 6.1 of RFC9449 is modified to > >>>>> distinguish confirmation with a CKT instead of JKT: > >>>>> { > >>>>> "sub":"some...@example.com", > >>>>> "iss":"https://na01.safelinks.protection.outlook.com/?url=https%3A > >>>>> %2F%2Fserver.example.com%2F&data=05%7C02%7C%7C9544d46df66b4fad8330 > >>>>> 08dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C63869114 > >>>>> 0465300783%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiI > >>>>> wLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0% > >>>>> 7C%7C%7C&sdata=Cu%2BM21nJCIo93bexflhYWLtFa%2BdJI7smavIJA%2FSuCow%3 > >>>>> D&reserved=0", > >>>>> "nbf":1562262611, > >>>>> "exp":1562266216, > >>>>> "cnf": { > >>>>> "ckt":"SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w" > >>>>> } > >>>>> } > >>>>> > >>>>> I used the same base64url encoded thumbprint the draft already used for > >>>>> extra clarity. > >>>>> > >>>>> ckt would also need to be added here: > >>>>> https://w/ > >>>>> ww.iana.org%2Fassignments%2Fjwt%2Fjwt.xhtml%23confirmation-methods > >>>>> &data=05%7C02%7C%7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f6 > >>>>> 40afb435aaaaaaaaaaaa%7C1%7C0%7C638691140465311278%7CUnknown%7CTWFp > >>>>> bGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMi > >>>>> IsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=a6xSVN2MN1U% > >>>>> 2BULiMQ6Ie%2BVoiEhw26l1ZYGLi90Y5eMg%3D&reserved=0 > >>>>> > >>>>> This kind of change might need to be taken to the relevant lists for > >>>>> review... and maybe another WGLC. > >>>>> > >>>>> ... we could leave the "ckt" in JWT cnf registration to another > >>>>> document, but I think at a minimum we need something added to section > >>>>> 5.3 to the effect of: > >>>>> > >>>>> Note that the ckt of a cose key, and jkt of a json web key are > >>>>> different, even when underlying cryptographic key material is the same. > >>>>> ckt is a binary string and jkt is always a base64url string encoded as > >>>>> described in section 6.1 of RFC9449. > >>>>> > >>>>> ^ If we are comfortable with this change alone, we still have a problem > >>>>> with the registration template: > >>>>> https://w/ > >>>>> ww.rfc-editor.org%2Frfc%2Frfc8747.html%23name-registration-templat > >>>>> e&data=05%7C02%7C%7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f > >>>>> 640afb435aaaaaaaaaaaa%7C1%7C0%7C638691140465322198%7CUnknown%7CTWF > >>>>> pbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zM > >>>>> iIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=MegV9xM3Bdk > >>>>> 2%2Bi%2BF7KXaLbdMuDj0cDAugZkgLYOotDU%3D&reserved=0 > >>>>> > >>>>> """ > >>>>> CWT claims should normally have a corresponding JWT claim. If a > >>>>> corresponding JWT claim would not make sense, the designated experts > >>>>> can choose to accept registrations for which the JWT Claim Name is > >>>>> listed as "N/A". > >>>>> """ > >>>>> > >>>>> The logical JWT claim is "ckt"... not "jkt"... so N/A... does not make > >>>>> sense... and leaving it blank also does not make sense. > >>>>> > >>>>> There is also the x5t claim which sets the precedent that ckt is for > >>>>> cose key, jkt is for json web key, and x5t is for x.509 certs. > >>>>> > >>>>> I propose: > >>>>> > >>>>> From: > >>>>> > >>>>> Confirmation Method Name: ckt > >>>>> Confirmation Method Description: COSE Key SHA-256 Thumbprint > >>>>> JWT Confirmation Method Name: jkt > >>>>> > >>>>> To: > >>>>> > >>>>> Confirmation Method Name: ckt > >>>>> Confirmation Method Description: COSE Key SHA-256 Thumbprint > >>>>> JWT Confirmation Method Name: Not assigned by RFCXXXX ( not to be > >>>>> confused with x5t or jkt ) > >>>>> > >>>>> > >>>>> OS > >>>>> > >>>>> > >>>>> > >>>>> On Mon, Dec 2, 2024 at 4:14 PM Hannes Tschofenig > >>>>> <hannes.tschofe...@gmail.com> wrote: > >>>>> > >>>>> Thanks for the work on the draft and sorry for the slow response. > >>>>> > >>>>> > >>>>> > >>>>> I read through the draft carefully today and in general the edits look > >>>>> good but I noticed a possible bug. > >>>>> > >>>>> > >>>>> > >>>>> In the IANA consideration section we say that the ckt confirmation > >>>>> method maps to the jkt JWT configuration method. I double-checked RFC > >>>>> 9449, which defines the jkt, and it defines the computation as follows: > >>>>> > >>>>> " > >>>>> The value of the jkt member MUST be the base64url encoding > >>>>> > >>>>> of the JWK SHA-256 Thumbprint. > >>>>> " > >>>>> > >>>>> In draft-ietf-cose-key-thumbprint-06 we define the ckt thumbprint as > >>>>> the hash of the deterministic encoding of the COSE_Key structure. > >>>>> > >>>>> > >>>>> > >>>>> So, the question to me is whether we can even map the ckt to the jkt > >>>>> since the underlying structure that is hashed is different: JWK vs. > >>>>> COSE_Key structure. > >>>>> > >>>>> > >>>>> > >>>>> For that reason I believe it would be more correct to change the IANA > >>>>> consideration section by omitting the JWT Confirmation Method Name. > >>>>> > >>>>> Here is the proposed change: > >>>>> > >>>>> From: > >>>>> > >>>>> Confirmation Method Name: ckt > >>>>> Confirmation Method Description: COSE Key SHA-256 Thumbprint > >>>>> JWT Confirmation Method Name: jkt > >>>>> > >>>>> > >>>>> To: > >>>>> > >>>>> Confirmation Method Name: ckt > >>>>> Confirmation Method Description: COSE Key SHA-256 Thumbprint > >>>>> JWT Confirmation Method Name: > >>>>> > >>>>> > >>>>> Do you agree with me? > >>>>> > >>>>> > >>>>> > >>>>> Sorry for noticing this issue only now. > >>>>> > >>>>> > >>>>> > >>>>> Ciao > >>>>> > >>>>> Hannes > >>>>> > >>>>> > >>>>> > >>>>> Betreff: > >>>>> > >>>>> AUTH48: RFC-to-be 9679 <draft-ietf-cose-key-thumbprint-06> for > >>>>> your review > >>>>> > >>>>> Datum: > >>>>> > >>>>> Mon, 21 Oct 2024 14:30:59 -0700 (PDT) > >>>>> > >>>>> Von: > >>>>> > >>>>> rfc-edi...@rfc-editor.org > >>>>> > >>>>> An: > >>>>> > >>>>> isobeko...@gmail.com, hannes.tschofe...@gmx.net, > >>>>> orie@transmute.industries > >>>>> > >>>>> Kopie (CC): > >>>>> > >>>>> rfc-edi...@rfc-editor.org, cose-...@ietf.org, > >>>>> cose-cha...@ietf.org, michael_b_jo...@hotmail.com, > >>>>> paul.wout...@aiven.io, auth48archive@rfc-editor.org > >>>>> > >>>>> > >>>>> > >>>>> *****IMPORTANT***** > >>>>> > >>>>> Updated 2024/10/21 > >>>>> > >>>>> RFC Author(s): > >>>>> -------------- > >>>>> > >>>>> Instructions for Completing AUTH48 > >>>>> > >>>>> Your document has now entered AUTH48. Once it has been reviewed and > >>>>> approved by you and all coauthors, it will be published as an RFC. If > >>>>> an author is no longer available, there are several remedies available > >>>>> as listed in the FAQ (https://www.rfc-editor.org/faq/). > >>>>> > >>>>> You and you coauthors are responsible for engaging other parties (e.g., > >>>>> Contributors or Working Group) as necessary before providing your > >>>>> approval. > >>>>> > >>>>> Planning your review --------------------- > >>>>> > >>>>> Please review the following aspects of your document: > >>>>> > >>>>> * RFC Editor questions > >>>>> > >>>>> Please review and resolve any questions raised by the RFC Editor that > >>>>> have been included in the XML file as comments marked as follows: > >>>>> > >>>>> <!-- [rfced] ... --> > >>>>> > >>>>> These questions will also be sent in a subsequent email. > >>>>> > >>>>> * Changes submitted by coauthors > >>>>> Please ensure that you review any changes submitted by your coauthors. > >>>>> We assume that if you do not speak up that you agree to changes > >>>>> submitted by your coauthors. > >>>>> > >>>>> * Content > >>>>> Please review the full content of the document, as this cannot change > >>>>> once the RFC is published. Please pay particular attention to: > >>>>> - IANA considerations updates (if applicable) > >>>>> - contact information > >>>>> - references > >>>>> > >>>>> * Copyright notices and legends > >>>>> > >>>>> Please review the copyright notice and legends as defined in RFC > >>>>> 5378 and the Trust Legal Provisions (TLP – > >>>>> https://trustee.ietf.org/license-info). > >>>>> > >>>>> * Semantic markup > >>>>> > >>>>> Please review the markup in the XML file to ensure that elements of > >>>>> content are correctly tagged. For example, ensure that <sourcecode> and > >>>>> <artwork> are set correctly. See details at > >>>>> <https://authors.ietf.org/rfcxml-vocabulary>. > >>>>> > >>>>> * Formatted output > >>>>> > >>>>> Please review the PDF, HTML, and TXT files to ensure that the formatted > >>>>> output, as generated from the markup in the XML file, is reasonable. > >>>>> Please note that the TXT will have formatting limitations compared to > >>>>> the PDF and HTML. > >>>>> > >>>>> > >>>>> Submitting changes > >>>>> ------------------ > >>>>> > >>>>> To submit changes, please reply to this email using ‘REPLY ALL’ as all > >>>>> the parties CCed on this message need to see your changes. The parties > >>>>> include: > >>>>> > >>>>> * your coauthors > >>>>> * rfc-edi...@rfc-editor.org (the RPC team) > >>>>> > >>>>> * other document participants, depending on the stream (e.g., IETF > >>>>> Stream participants are your working group chairs, the responsible ADs, > >>>>> and the document shepherd). > >>>>> * auth48archive@rfc-editor.org, which is a new archival mailing list to > >>>>> preserve AUTH48 conversations; it is not an active discussion list: > >>>>> * More info: > >>>>> https://m/ > >>>>> ailarchive.ietf.org%2Farch%2Fmsg%2Fietf-announce%2Fyb6lpIGh-4Q9l2U > >>>>> SxIAe6P8O4Zc&data=05%7C02%7C%7C9544d46df66b4fad833008dd163551da%7C > >>>>> 84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638691140465367921%7CUn > >>>>> known%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIl > >>>>> AiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata= > >>>>> obkx%2F40yWUGklVC2%2BYJOxWHa8g1LEBHGVq8w8PJo4OE%3D&reserved=0 > >>>>> * The archive itself: > >>>>> https://m/ > >>>>> ailarchive.ietf.org%2Farch%2Fbrowse%2Fauth48archive%2F&data=05%7C0 > >>>>> 2%7C%7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaa > >>>>> aaaaaaaa%7C1%7C0%7C638691140465379116%7CUnknown%7CTWFpbGZsb3d8eyJF > >>>>> bXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTW > >>>>> FpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=d%2BHWx1t%2FHc3FWu%2Bf5Z > >>>>> MA2K6%2Bqzjr%2FvYTlSqs9JRDU1g%3D&reserved=0 > >>>>> > >>>>> * Note: If only absolutely necessary, you may temporarily opt out of > >>>>> the archiving of messages (e.g., to discuss a sensitive matter). > >>>>> If needed, please add a note at the top of the message that you have > >>>>> dropped the address. When the discussion is concluded, > >>>>> auth48archive@rfc-editor.org will be re-added to the CC list and its > >>>>> addition will be noted at the top of the message. > >>>>> You may submit your changes in one of two ways: > >>>>> > >>>>> An update to the provided XML file — OR — An explicit list of > >>>>> changes in this format > >>>>> > >>>>> Section # (or indicate Global) > >>>>> > >>>>> OLD: > >>>>> old text > >>>>> > >>>>> NEW: > >>>>> new text > >>>>> > >>>>> You do not need to reply with both an updated XML file and an explicit > >>>>> list of changes, as either form is sufficient. > >>>>> > >>>>> We will ask a stream manager to review and approve any changes > >>>>> that seem beyond editorial in nature, e.g., addition of new text, > >>>>> deletion of text, and technical changes. Information about stream > >>>>> managers can be found in the FAQ. Editorial changes do not require > >>>>> approval from a stream manager. > >>>>> > >>>>> > >>>>> Approving for publication > >>>>> -------------------------- > >>>>> > >>>>> To approve your RFC for publication, please reply to this email > >>>>> stating that you approve this RFC for publication. Please use > >>>>> ‘REPLY ALL’, as all the parties CCed on this message need to see your > >>>>> approval. > >>>>> > >>>>> > >>>>> Files ----- > >>>>> > >>>>> The files are available here: > >>>>> https://w/ > >>>>> ww.rfc-editor.org%2Fauthors%2Frfc9679.xml&data=05%7C02%7C%7C9544d4 > >>>>> 6df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1% > >>>>> 7C0%7C638691140465389898%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiO > >>>>> nRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjo > >>>>> yfQ%3D%3D%7C0%7C%7C%7C&sdata=tcSkll368Dg%2BzOMSk%2FRb%2FWNyBUXimvr > >>>>> NaW0UybSTx%2Fs%3D&reserved=0 > >>>>> https://w/ > >>>>> ww.rfc-editor.org%2Fauthors%2Frfc9679.html&data=05%7C02%7C%7C9544d > >>>>> 46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1 > >>>>> %7C0%7C638691140465400400%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGki > >>>>> OnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIj > >>>>> oyfQ%3D%3D%7C0%7C%7C%7C&sdata=j1DCaezvNW8XL2%2FhW58e7EccIiR%2FtILE > >>>>> AkyeaVlHX0c%3D&reserved=0 > >>>>> https://w/ > >>>>> ww.rfc-editor.org%2Fauthors%2Frfc9679.pdf&data=05%7C02%7C%7C9544d4 > >>>>> 6df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1% > >>>>> 7C0%7C638691140465411063%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiO > >>>>> nRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjo > >>>>> yfQ%3D%3D%7C0%7C%7C%7C&sdata=zcQN%2FWA5p2O%2Bxpl2osMNyXaG4If8yNUo3 > >>>>> 6WCuhwh1ng%3D&reserved=0 > >>>>> https://w/ > >>>>> ww.rfc-editor.org%2Fauthors%2Frfc9679.txt&data=05%7C02%7C%7C9544d4 > >>>>> 6df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1% > >>>>> 7C0%7C638691140465421715%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiO > >>>>> nRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjo > >>>>> yfQ%3D%3D%7C0%7C%7C%7C&sdata=OKgr9qYu8sbcVXqe4JdTALXhd8wgRVCabtqC0 > >>>>> d7sNtk%3D&reserved=0 > >>>>> > >>>>> Diff file of the text: > >>>>> https://w/ > >>>>> ww.rfc-editor.org%2Fauthors%2Frfc9679-diff.html&data=05%7C02%7C%7C > >>>>> 9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaa > >>>>> a%7C1%7C0%7C638691140465432408%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1 > >>>>> hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsI > >>>>> ldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=dqdmC05LpkNX37Haih7URniw9P%2Baa > >>>>> P5Iin4%2F0bmNdU4%3D&reserved=0 > >>>>> https://w/ > >>>>> ww.rfc-editor.org%2Fauthors%2Frfc9679-rfcdiff.html&data=05%7C02%7C > >>>>> %7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaa > >>>>> aaaa%7C1%7C0%7C638691140465443134%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0 > >>>>> eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbC > >>>>> IsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=MaQUhUwZo%2BWsex%2FYXkUXZHtM > >>>>> 6Pln4QBnpO0dhxTyCQk%3D&reserved=0 (side by side) > >>>>> > >>>>> Diff of the XML: > >>>>> https://w/ > >>>>> ww.rfc-editor.org%2Fauthors%2Frfc9679-xmldiff1.html&data=05%7C02%7 > >>>>> C%7C9544d46df66b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaa > >>>>> aaaaa%7C1%7C0%7C638691140465453825%7CUnknown%7CTWFpbGZsb3d8eyJFbXB > >>>>> 0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpb > >>>>> CIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=FQ8eUMTddYOqhvN%2FtyBTiBeLk > >>>>> kkiaavzAAZwALEXVCg%3D&reserved=0 > >>>>> > >>>>> > >>>>> Tracking progress > >>>>> ----------------- > >>>>> > >>>>> The details of the AUTH48 status of your document are here: > >>>>> https://w/ > >>>>> ww.rfc-editor.org%2Fauth48%2Frfc9679&data=05%7C02%7C%7C9544d46df66 > >>>>> b4fad833008dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7 > >>>>> C638691140465464782%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydW > >>>>> UsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3 > >>>>> D%3D%7C0%7C%7C%7C&sdata=hnDXLcg9vwznYUysGzdoJwz4srLanOzY%2BR1gld57 > >>>>> hp8%3D&reserved=0 > >>>>> > >>>>> Please let us know if you have any questions. > >>>>> Thank you for your cooperation, > >>>>> > >>>>> RFC Editor > >>>>> > >>>>> -------------------------------------- > >>>>> RFC9679 (draft-ietf-cose-key-thumbprint-06) > >>>>> > >>>>> Title : CBOR Object Signing and Encryption (COSE) Key Thumbprint > >>>>> Author(s) : K. Isobe, H. Tschofenig, O. Steele WG Chair(s) : > >>>>> Matthew A. Miller, Ivaylo Petrov, Michael B. Jones > >>>>> > >>>>> Area Director(s) : Deb Cooley, Paul Wouters > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> > >>>>> ORIE STEELE > >>>>> Chief Technology Officer > >>>>> http://ww/ > >>>>> w.transmute.industries%2F&data=05%7C02%7C%7C9544d46df66b4fad833008 > >>>>> dd163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C6386911404 > >>>>> 65475371%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwL > >>>>> jAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C > >>>>> %7C%7C&sdata=wLqU3MNLNYTqffiEL9zMRDDkXHYGRpuPObM93Swn4JA%3D&reserv > >>>>> ed=0 > >>>>> > >>>> > >>>> > >>>> > >>>> -- > >>>> > >>>> ORIE STEELE > >>>> Chief Technology Officer > >>>> http://www/ > >>>> .transmute.industries%2F&data=05%7C02%7C%7C9544d46df66b4fad833008dd > >>>> 163551da%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C6386911404654 > >>>> 87222%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuM > >>>> DAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7 > >>>> C&sdata=wNvQdi82LeneJ19AqYYISfVEA%2BYLywAZ3ec%2BymPIVSE%3D&reserved > >>>> =0 > >>>> > >>> > >> > > > > > > -- > > ORIE STEELE > Chief Technology Officer > www.transmute.industries > -- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org