<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-demarco-cose-header-federation-trust-chain-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="COSE Trust Chains">COSE Header Parameter for Carrying OpenID Federation 1.0 Trust Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-demarco-cose-header-federation-trust-chain-00"/>
    <author fullname="Giuseppe De Marco">
      <organization>independent</organization>
      <address>
        <email>demarcog83@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="September" day="01"/>
    <area>Security</area>
    <workgroup>CBOR Object Signing and Encryption</workgroup>
    <keyword>OpenID Connect Federation</keyword>
    <keyword>COSE</keyword>
    <abstract>
      <?line 65?>

<t>The CBOR Object Signing and Encryption (COSE) <xref target="RFC9053"/>
message structure uses message headers to give references to elements
that are needed for the security and verifiability of the message, such as
algorithms and keys.</t>
      <t>OpenID Connect Federation 1.0 <xref target="OIDC-FED"/> is a general purpose
attestation mechanism to obtain verifiable
metadata and cryptographic keys.</t>
      <t>This document defines a new COSE header parameter to
identify and transport an OpenID Federation 1.0 Trust Chain.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-demarco-cose-header-federation-trust-chain/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/peppelinux/draft-demarco-cose-header-federation-trust-chain"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Standards <xref target="RFC8152"/> and <xref target="RFC9052"/> defines how to transport
symmetric keys in the COSE headers, and are extended by <xref target="RFC9360"/>
to transport X.509 certificates for the requirements
of identification and cryptographic key attestation
of a third party.</t>
      <t>There are some cases where obtaining proof of a third party's identity
through key attestation and cryptographic signature verification
is not enough, cases where the solution requirements include
attestation of metadata, proofs of compliance and policies.</t>
      <t>In these cases, it would be necessary to extend the X.509 certificates
with policies, metadata and other information required by the
interoperability schemes or by a trust framework.</t>
      <t>OpenID Connect Federation 1.0 <xref target="OIDC-FED"/>
allows the exchange of metadata, roles, trust marks, policies
and public keys, in a secure way.</t>
      <t>OIDC Federation 1.0 <xref target="OIDC-FED"/> allows the construction of a trust
infrastructure in which even X.509 certificates can be published
within the Entity Statements that make up
the federation Trust Chain. This flexibility allows an infrastructure
based on OIDC Federation 1.0 to guarantee the security of the
solutions, the historical verifiability of the signatures, and
the revocation mechanisms without
the requirement to implement
CRL or OCSP technologies, where X.509 requires it.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms Trust Anchor, Intermediate, Trust Chain, Entity Statement, are defined in <xref target="OIDC-FED"/> and used in this specification.</t>
    </section>
    <section anchor="audience-target-audienceusage">
      <name>Audience Target audience/Usage</name>
      <t>The audience of the document is implementers that require a high level
of security for the exchange of metadata, cryptographic keys
and policies.</t>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This specification defines how a <xref target="OIDC-FED"/>
Trust Chain is made available within the COSE headers.</t>
      <section anchor="out-of-scope">
        <name>Out of Scope</name>
        <t>The following items are out of scope for the current version of this document:</t>
        <ul spacing="normal">
          <li>X.509 publication over a <xref target="OIDC-FED"/> Infrastructure, this can be achieved
using <tt>x5c</tt> or <tt>x5u</tt> as defind in <xref target="RFC7517"/>.</li>
          <li>Metadata schemas, OIDC Federation allows the definition of custom
metadata schemas even for entities not belonging
to OAuth2 and OpenID ecosystems.</li>
        </ul>
      </section>
    </section>
    <section anchor="terminology-1">
      <name>Terminology</name>
      <t>This specification uses the terms "Trust Chain", "Trust Anchor",
"Intermediate", "Trust Mark" and "Entity Statement" as defined in <xref target="OIDC-FED"/>.</t>
    </section>
    <section anchor="the-scope-of-trust-chain-cose-header-parameter">
      <name>The Scope of Trust Chain COSE Header Parameter</name>
      <t>The use of OIDC Federation Trust Chain enables a trust infrastructure
with full suites of Trust Anchors, Intermediates, status and revocation
checking, Trust Marks and metadata policies that have been defined
in <xref target="OIDC-FED"/>.</t>
      <t>The Concise Binary Object Representation (CBOR) key
structures <xref target="RFC8949"/> and Header Parameters for Carrying and
Referencing X.509 Certificates <xref target="RFC9360"/> that have been defined
in COSE currently do not
support all the properties made available in <xref target="OIDC-FED"/>.</t>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>If the application cannot establish trust to the cryptographic keys
or metadata made available and verified within the Trust Chain, the public
key and the metadata <bcp14>MUST NOT</bcp14> be used.</t>
      <t>When Trust Chain parameter is used, the parameter KID defined in <xref target="RFC9052"/>
        <bcp14>MUST</bcp14> be used. KID allows an efficient matching to the key to be used for
signature verification.</t>
    </section>
    <section anchor="trust-chain-cose-header-parameter">
      <name>Trust Chain COSE Header Parameter</name>
      <t>The header parameter defined is <tt>trustchain</tt>, described below:</t>
      <t>trustchain:  This header parameter contains an ordered array of strings,
representing federation Entity Statements encoded as signed
Json Web Tokens <xref target="RFC7519"/>. How the Entity Statements are ordered is defined
in <xref target="OIDC-FED"/>.</t>
      <t>The trust mechanism used to process any Entity Statements
is defined in <xref target="OIDC-FED"/>.</t>
      <t>The header parameter can be used in the following locations:</t>
      <t>COSE_Signature and COSE_Sign1 objects:  In these objects, the
  parameters identify the Trust Chain to be used for obtaining the
  key needed for validating the signature, any needed metadata for
  interoperability purpose, any metadata policy
  and any required Trust Marks for administrative and technical compliances.</t>
      <t>The labels assigned to the header parameter can be found in Table 1.</t>
      <artwork><![CDATA[
 +=============+=======+=================+=====================+
 | Name        | Label | Value Type      | Description         |
 +=============+=======+=================+=====================+
 | trustchain  | 27    | COSE_TRUSTCHAIN | OpenID Connect      |
 |             |       |                 | Federation 1.0      |
 |             |       |                 | Trust Chain         |
 +-------------+-------+-----------------+---------------------+

           Table 1: TRUST CHAIN COSE Header Parameters
]]></artwork>
      <t>Below is an equivalent Concise Data Definition Language (CDDL)
description (see <xref target="RFC8610"/>) of the text above.</t>
      <t><tt>
COSE_TRUSTCHAIN = [ N * jws :bstr ]
</tt></t>
      <t>The variable N represent the number of Entity Statements
that a Trust Chain can contain.
The contents of "bstr" are the bytes representing a JWS.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC7517">
        <front>
          <title>JSON Web Key (JWK)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7517"/>
        <seriesInfo name="DOI" value="10.17487/RFC7517"/>
      </reference>
      <reference anchor="RFC7519">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="RFC8152">
        <front>
          <title>CBOR Object Signing and Encryption (COSE)</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8152"/>
        <seriesInfo name="DOI" value="10.17487/RFC8152"/>
      </reference>
      <reference anchor="RFC8610">
        <front>
          <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="C. Vigano" initials="C." surname="Vigano"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8610"/>
        <seriesInfo name="DOI" value="10.17487/RFC8610"/>
      </reference>
      <reference anchor="RFC8949">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="RFC9052">
        <front>
          <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="96"/>
        <seriesInfo name="RFC" value="9052"/>
        <seriesInfo name="DOI" value="10.17487/RFC9052"/>
      </reference>
      <reference anchor="RFC9053">
        <front>
          <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
            <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9053"/>
        <seriesInfo name="DOI" value="10.17487/RFC9053"/>
      </reference>
      <reference anchor="RFC9360">
        <front>
          <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="February" year="2023"/>
          <abstract>
            <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9360"/>
        <seriesInfo name="DOI" value="10.17487/RFC9360"/>
      </reference>
      <reference anchor="OIDC-FED">
        <front>
          <title>OpenID Connect Federation 1.0</title>
          <author initials="R." surname="Hedberg" fullname="Roland Hedberg">
            <organization/>
          </author>
          <author initials="M. B." surname="Jones" fullname="Michael Jones">
            <organization/>
          </author>
          <author initials="A. Å." surname="Solberg" fullname="Andreas Solberg">
            <organization/>
          </author>
          <author initials="J." surname="Bradley" fullname="John Bradley">
            <organization/>
          </author>
          <author initials="G." surname="De Marco" fullname="Giuseppe De Marco">
            <organization/>
          </author>
          <author initials="V." surname="Dzhuvinov" fullname="Vladimir Dzhuvinov">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 234?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
