<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-demarco-cose-header-federation-trust-chain-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title abbrev="COSE Trust Chains">COSE Header Parameter for Carrying OpenID Federation 1.0 Trust Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-demarco-cose-header-federation-trust-chain-01"/>
    <author fullname="Giuseppe De Marco">
      <organization>independent</organization>
      <address>
        <email>demarcog83@gmail.com</email>
      </address>
    </author>
    <author fullname="John Bradley">
      <organization>Yubico</organization>
      <address>
        <email>ve7jtb@ve7jtb.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="05"/>
    <area>Security</area>
    <workgroup>CBOR Object Signing and Encryption</workgroup>
    <keyword>OpenID Connect Federation</keyword>
    <keyword>COSE</keyword>
    <abstract>
      <?line 69?>

<t>The CBOR Object Signing and Encryption (COSE) <xref target="RFC9053"/>
message structure uses message headers to give references to elements
that are needed for the security and verifiability of the message, such as
algorithms and keys.</t>
      <t>OpenID Federation 1.0 <xref target="OIDC-FED"/> is a general purpose
attestation mechanism to obtain verifiable
metadata and cryptographic keys.</t>
      <t>This document defines a new COSE header parameter to
identify and transport an OpenID Federation 1.0 Trust Chain.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-demarco-cose-header-federation-trust-chain/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/peppelinux/draft-demarco-cose-header-federation-trust-chain"/>.</t>
    </note>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Standards <xref target="RFC8152"/> and <xref target="RFC9052"/> defines how to transport
symmetric keys in the COSE headers, and are extended by <xref target="RFC9360"/>
to transport X.509 certificates for the requirements
of identification and cryptographic key attestation
of a third party.</t>
      <t>There are some cases where obtaining proof of a third party's identity
through key attestation and cryptographic signature verification
is not enough, cases where the solution requirements include
attestation of metadata, proofs of compliance and policies.</t>
      <t>In these cases, it would be necessary to extend the X.509 certificates
with policies, metadata and other information required by the
interoperability schemes or by a trust framework.</t>
      <t>OpenID Federation 1.0 <xref target="OIDC-FED"/>
allows the exchange of metadata, roles, trust marks, policies
and public keys, in a secure way.</t>
      <t>OpenID Federation 1.0 <xref target="OIDC-FED"/> allows the construction of a trust
infrastructure in which even X.509 certificates can be published
within the Entity Statements that make up
the federation Trust Chain. This flexibility allows an infrastructure
based on OpenID Federation 1.0 to guarantee the security of the
solutions, the historical verifiability of the signatures, and
the revocation mechanisms without
the requirement to implement
CRL or OCSP technologies, where X.509 requires it.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms Trust Anchor, Intermediate, Trust Chain, Entity Statement, are defined in <xref target="OIDC-FED"/> and used in this specification.</t>
    </section>
    <section anchor="audience-target-audienceusage">
      <name>Audience Target audience/Usage</name>
      <t>The audience of the document is implementers that require a high level
of security for the exchange of metadata, cryptographic keys
and policies.</t>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This specification defines how a <xref target="OIDC-FED"/>
Trust Chain is made available within the COSE headers.</t>
      <section anchor="out-of-scope">
        <name>Out of Scope</name>
        <t>The following items are out of scope for the current version of this document:</t>
        <ul spacing="normal">
          <li>
            <t>X.509 publication over a <xref target="OIDC-FED"/> Infrastructure, this can be achieved
using <tt>x5c</tt> or <tt>x5u</tt> as defind in <xref target="RFC7517"/>.</t>
          </li>
          <li>
            <t>Metadata schemas, OpenID Federation allows the definition of custom
metadata schemas even for entities not belonging
to OAuth 2.0 and OpenID ecosystems.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="terminology-1">
      <name>Terminology</name>
      <t>This specification uses the terms "Trust Chain", "Trust Anchor",
"Intermediate", "Trust Mark" and "Entity Statement" as defined in <xref target="OIDC-FED"/>.</t>
    </section>
    <section anchor="the-scope-of-trust-chain-cose-header-parameter">
      <name>The Scope of Trust Chain COSE Header Parameter</name>
      <t>The use of OpenID Federation Trust Chain enables a trust infrastructure
with full suites of Trust Anchors, Intermediates, status and revocation
checking, Trust Marks and metadata policies that have been defined
in <xref target="OIDC-FED"/>.</t>
      <t>The Concise Binary Object Representation (CBOR) key
structures <xref target="RFC8949"/> and Header Parameters for Carrying and
Referencing X.509 Certificates <xref target="RFC9360"/> that have been defined
in COSE currently do not
support all the properties made available in <xref target="OIDC-FED"/>.</t>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>If the application cannot establish trust to the cryptographic keys
or metadata made available and verified within the Trust Chain, the public
key and the metadata <bcp14>MUST NOT</bcp14> be used.</t>
      <t>When Trust Chain parameter is used, the parameter KID defined in <xref target="RFC9052"/>
        <bcp14>MUST</bcp14> be used. KID allows an efficient matching to the key to be used for
signature verification.</t>
    </section>
    <section anchor="trust-chain-cose-header-parameter">
      <name>Trust Chain COSE Header Parameter</name>
      <t>The header parameter defined is <tt>trustchain</tt>, described below:</t>
      <t>trustchain:  This header parameter contains an ordered array of strings,
representing federation Entity Statements encoded as signed
Json Web Tokens <xref target="RFC7519"/>. How the Entity Statements are ordered is defined
in <xref target="OIDC-FED"/>.</t>
      <t>The trust mechanism used to process any Entity Statements
is defined in <xref target="OIDC-FED"/>.</t>
      <t>The header parameter can be used in the following locations:</t>
      <t>COSE_Signature and COSE_Sign1 objects:  In these objects, the
  parameters identify the Trust Chain to be used for obtaining the
  key needed for validating the signature, any needed metadata for
  interoperability purpose, any metadata policy
  and any required Trust Marks for administrative and technical compliances.</t>
      <t>The labels assigned to the header parameter can be found in Table 1.</t>
      <artwork><![CDATA[
 +=============+=======+=================+=====================+
 | Name        | Label | Value Type      | Description         |
 +=============+=======+=================+=====================+
 | trustchain  | 27    | COSE_TRUSTCHAIN | OpenID              |
 |             |       |                 | Federation 1.0      |
 |             |       |                 | Trust Chain         |
 +-------------+-------+-----------------+---------------------+

           Table 1: TRUST CHAIN COSE Header Parameters
]]></artwork>
      <t>Below is an equivalent Concise Data Definition Language (CDDL)
description (see <xref target="RFC8610"/>) of the text above.</t>
      <t><tt>
COSE_TRUSTCHAIN = [ N * jws :bstr ]
</tt></t>
      <t>The variable N represents the number of Entity Statements
that a Trust Chain contains.
The contents of "bstr" are the bytes representing a signed JWT.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC7517">
        <front>
          <title>JSON Web Key (JWK)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7517"/>
        <seriesInfo name="DOI" value="10.17487/RFC7517"/>
      </reference>
      <reference anchor="RFC7519">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="RFC8152">
        <front>
          <title>CBOR Object Signing and Encryption (COSE)</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8152"/>
        <seriesInfo name="DOI" value="10.17487/RFC8152"/>
      </reference>
      <reference anchor="RFC8610">
        <front>
          <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="C. Vigano" initials="C." surname="Vigano"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8610"/>
        <seriesInfo name="DOI" value="10.17487/RFC8610"/>
      </reference>
      <reference anchor="RFC8949">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="RFC9052">
        <front>
          <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="96"/>
        <seriesInfo name="RFC" value="9052"/>
        <seriesInfo name="DOI" value="10.17487/RFC9052"/>
      </reference>
      <reference anchor="RFC9053">
        <front>
          <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
            <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9053"/>
        <seriesInfo name="DOI" value="10.17487/RFC9053"/>
      </reference>
      <reference anchor="RFC9360">
        <front>
          <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="February" year="2023"/>
          <abstract>
            <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9360"/>
        <seriesInfo name="DOI" value="10.17487/RFC9360"/>
      </reference>
      <reference anchor="OIDC-FED">
        <front>
          <title>OpenID Federation 1.0</title>
          <author initials="R." surname="Hedberg" fullname="Roland Hedberg">
            <organization/>
          </author>
          <author initials="M. B." surname="Jones" fullname="Michael Jones">
            <organization/>
          </author>
          <author initials="A. Å." surname="Solberg" fullname="Andreas Solberg">
            <organization/>
          </author>
          <author initials="J." surname="Bradley" fullname="John Bradley">
            <organization/>
          </author>
          <author initials="G." surname="De Marco" fullname="Giuseppe De Marco">
            <organization/>
          </author>
          <author initials="V." surname="Dzhuvinov" fullname="Vladimir Dzhuvinov">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 238?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
