Re: [COSE] Newly Submitted Draft - CBOR Web Token (CWT) Claims in COSE Headers

Mike Jones <Michael.Jones@microsoft.com> Thu, 03 March 2022 17:02 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: cose@ietfa.amsl.com
Delivered-To: cose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCD443A0E6D for <cose@ietfa.amsl.com>; Thu, 3 Mar 2022 09:02:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.1
X-Spam-Level:
X-Spam-Status: No, score=-7.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id blyrxAbGgXiz for <cose@ietfa.amsl.com>; Thu, 3 Mar 2022 09:02:16 -0800 (PST)
Received: from na01-obe.outbound.protection.outlook.com (mail-eus2azlp170100001.outbound.protection.outlook.com [IPv6:2a01:111:f403:c110::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE5A83A0E6E for <cose@ietf.org>; Thu, 3 Mar 2022 09:02:15 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ajnh4p8E/RuJJ9p5yQTBV/unKWoh03xUQEGxutUQrkilE4raeSKg1pqwqa4MWVNiAxhqqJUh4nC+urN+oZWGYwADIsHfgPX9xCQlwXWFyoFLfSncpCjFRrxEJ5S7N5M92kV8FfWTl1+O73G2brN3c5Eg56c6ZD1MqhiZq56LOyMgnV69ck9Qv1TtVUK2xNlRRHXVyg8ulnWwDv/jmFbdaqobzbENoVaeTW2QcdNa/2PtH0woYViegT+zvgsjwJPDrYILco2sd71PJttGXBWNqain/eMGVAsFaCNmThIzSL4f+C+86qHS2CoVEmLRMf5CZFXi81nx2sF/nuTNWCBQ7Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=N5H60UeQk0lO8rCWJ/WfDckLhE95793Fyp/x5OuguOg=; b=lHsIP4P/JUkcokymv7ia8v+hhNTGhI0QDVyMSEpPvtGLYN395Cc/OtOea1FuhyuzUBc6mrM1RiIwP51FgWGikYk33NrzUSktjTHVqc4++cYFBP7jln2TxnnLfBYoJ+icOWiN1UfYQxIC6SPT3NoyZ5U1DfJoHQ1oK/5UNKRLu7+obaiAMH3urcdFZu/69lfZrJd7x16FsQqGMfegGh6bWNVT1344wYDpPDYgVqy7t+kHTpt7a8LyObAhHN36FyA887ll87a/i8rkRx4YNVqPrqwyVUYychF9bhtCPBPnJkr8yrpQi593Im6F09fSctQTglWU6XfFmaHp6xq5/nGIZg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=N5H60UeQk0lO8rCWJ/WfDckLhE95793Fyp/x5OuguOg=; b=h7C8E8H6tmeafbUhFcRmKikMVLRIMoi7O3zAEShL4UTc0Zd1UhqR+ZM/GmSaNWP2xYwT9RxFRDWwIxYxJSxSgarx9Oj1vRgCexonNX8QKnmIBXQrwCxxYTJkjmw81AfKNdUIqekf40yFqMAkjuaCsqV9tCsr+vpT6ECmPLzZ1zo=
Received: from SJ0PR00MB1005.namprd00.prod.outlook.com (2603:10b6:a03:2d3::18) by DM6PR00MB0716.namprd00.prod.outlook.com (2603:10b6:5:21c::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5079.0; Thu, 3 Mar 2022 17:02:10 +0000
Received: from SJ0PR00MB1005.namprd00.prod.outlook.com ([fe80::5044:63b:1f97:9084]) by SJ0PR00MB1005.namprd00.prod.outlook.com ([fe80::5044:63b:1f97:9084%7]) with mapi id 15.20.5081.000; Thu, 3 Mar 2022 17:02:10 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Hannes Tschofenig <hannes.tschofenig@arm.com>, Anders Rundgren <anders.rundgren.net@gmail.com>, Laurence Lundblade <lgl@island-resort.com>
CC: Tobias Looker <tobias.looker@mattr.global>, "cose@ietf.org" <cose@ietf.org>
Thread-Topic: [COSE] Newly Submitted Draft - CBOR Web Token (CWT) Claims in COSE Headers
Thread-Index: AQHYLuNpO+a1REgpikyvEcDYgSJnZqyt4rrQ
Date: Thu, 3 Mar 2022 17:02:10 +0000
Message-ID: <SJ0PR00MB10051A6A8F8D3C9F87896899F5049@SJ0PR00MB1005.namprd00.prod.outlook.com>
References: <SY4P282MB1274BCAC469DFE3B7284DFB29D039@SY4P282MB1274.AUSP282.PROD.OUTLOOK.COM> <DBBPR08MB5915A5EE40B555A4953E7BA0FA039@DBBPR08MB5915.eurprd08.prod.outlook.com> <SJ0PR00MB10050EBE6EAB4E80584A31B9F5039@SJ0PR00MB1005.namprd00.prod.outlook.com> <280EEA8E-67E4-4E7A-94A6-8C0A60048F81@island-resort.com> <36e34eb7-ee20-3644-4383-1c3f72279fc3@gmail.com> <DBBPR08MB59154C935195F0ADEFD0EC4BFA049@DBBPR08MB5915.eurprd08.prod.outlook.com>
In-Reply-To: <DBBPR08MB59154C935195F0ADEFD0EC4BFA049@DBBPR08MB5915.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-03T17:02:05Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=36ec2deb-a102-4df9-acd3-bbc9d072b7ce; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 38864c9d-edb9-431c-cd6b-08d9fd378e55
x-ms-traffictypediagnostic: DM6PR00MB0716:EE_
x-ld-processed: 72f988bf-86f1-41af-91ab-2d7cd011db47,ExtAddr
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <DM6PR00MB07168C86CFB070C0921A19B0F5049@DM6PR00MB0716.namprd00.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR00MB1005.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(6506007)(71200400001)(9686003)(7696005)(53546011)(122000001)(82960400001)(10290500003)(2906002)(166002)(82950400001)(55016003)(508600001)(66476007)(8990500004)(33656002)(966005)(110136005)(316002)(38100700002)(54906003)(66946007)(8936002)(64756008)(52536014)(4326008)(83380400001)(8676002)(86362001)(66446008)(66556008)(5660300002)(76116006)(186003)(38070700005)(26005); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?SFU0ajFISU1XenZxZzNDeFJvcDQ5aEpkL0lsNnBtOEduNTMrbmpTdjhpQ1J4?= =?utf-8?B?TDdnL3lsTE0wZGN6T0kyQW9QaTR3V3MxeVV4dzlEdi94alpuRkFzaGhYMzVh?= =?utf-8?B?ZWpaN2dLYzlSNmtmajYxOFNJWU9VNUVEZlBqb0JBU1lDUVhUZnRRSlJhT1lF?= =?utf-8?B?OUtLY2EzeDM5Um9HMk1lWFdTclNyUHpKTjVNdmM4eXY3ZTNncTV4aW9hQ1Ar?= =?utf-8?B?RG0vL2RlckwzZVBlbUtWTkNFU3ViSk5VbzQ1eW9hcnA2RmNPakdVY1hpc2Q4?= =?utf-8?B?RlFaSU5KdE40OVBPeDVZMUI2SHE4V3I2QW9KUkRpM0pUTE5qcEl3aUNYTVBN?= =?utf-8?B?Y0hnelF0ODBYVWRmcHppaytwWUNjU0pGSTNYMVo0eE9mZVF0N0U5ZTFidkRU?= =?utf-8?B?SVlLVlJodEJqankzWU9zRldPVHpTdi9QdDRGQXVZN0hEc0o4bkFKQkN3NG01?= =?utf-8?B?TW4rTFNmRFZtU2F2U2xqYnRGSnhLVnhJSkF6cmVWMno1cHpPcDA1eEttMlZO?= =?utf-8?B?K3ZFS2F5S2tZR2pIZ0tqMy9WR2ROQVd0TkFGMWZUbkwxNlFFQ2JPWnVSK2xH?= =?utf-8?B?MDU0a3podjcxWnJ2OW50S1FTWmJpbkZnK0YxK3czdGt1YjZEdlQrUEY1Nysw?= =?utf-8?B?RjQ3dEVRbThpQ09JUVV2WWdROUZQa3lmdlA0K0l1Skwzd2RQSlFUSjYrQUZV?= =?utf-8?B?Y1pWZkRRZGZzQyt5YTliZnhIam8zRlZBZFZ1QlNaaHRHdFVZdXE3RjdiRkt3?= =?utf-8?B?SUw2NTRqSVRmaStJNjU1SnN1eVNNNmdyQ2JEb2lZQjJtT01CTEZ0MFpkMzkx?= =?utf-8?B?SVo0dGlEOEZoWDVUL3dkd21OZHN6ZzZaZUMwTDNnbTNycll2allwMHpLczE4?= =?utf-8?B?MWZTYjVoTTljWGVTS00vN0piVUVwOG42MnVhUFVjbVlnUlFIWko1cHRaYTV3?= =?utf-8?B?c0g1V3RwTUhpVDU3MzNRNmY5blRiRFVNc2p0dWJDMEQ0LzN5aGVkU3ZyVGFH?= =?utf-8?B?ZjJYdWxTQXJVWk5xLzFmZytIWGcyNFF4d3V1MjFYWHRUMGIwOXZWZkJFVDVu?= =?utf-8?B?Yk1FbGxqR0JGMFVFcTZxOVJXU0NMOVdMbW8rNnBwalpLRk5wZ1pvL2lBbWt6?= =?utf-8?B?UllNTDQ3RWswaGp0eklDbTRYVUVkOWIwZXd3MkxiUEJkcWpzQnM2dkJ0bGZq?= =?utf-8?B?WWNNY2xhbU5QUWdpRis3MzJCdnVTVDFXZDFDMkZ4blVkVitZOEVaVmUzdHBK?= =?utf-8?B?Q0FhczFERm50cnVtUzJrY2NFdHk4T3FMb2tTNHF2dnhKZGgxT1Z0TWdqM0NL?= =?utf-8?B?VWZHMy9BTlpCc1NWODZyM3NPdnZoMHhQR0NqeExSQUdYTWFZZTYwaGF3Y3g5?= =?utf-8?B?eG4yOVRRNlVOUnJpd0VOYzlkcHQ0YWJYSkxFMjdjNVRMcWZNRFF0aWFaV3gy?= =?utf-8?B?YkhTQWF6WmtJOS9lNnl4QlZMc25HMmlQUW9lbkJ2WXpvNjlEUFk4YUlJc2FI?= =?utf-8?B?V0prdEROWlpxZWsxMGprL0xJSjRzWEhhRnZXdWdGNVc1QUpEVkxWRStLYlZp?= =?utf-8?B?ODgxWFQzQmFrUXhRV2xOMzNuMG9aQ2RnU2pVVndxNlFuVDY1RDlFWitHc1p2?= =?utf-8?B?S1dUNys5dW5aOVl5Mm5UMXMwbTM2WFdpVG5RQVNCZU9Jc0J3SkxvanhNU2ZC?= =?utf-8?B?NHNBd0ZGMlREdXNmaVRabEcvK2Vac2pzOVAvemRNVDJmMEFQSWV0ZTJBQWxv?= =?utf-8?B?am5KYXltbkdPZk5YejlpL2JmUVA0N2E0aHp1aG9tRUcyV0lFNldNU0xobW9C?= =?utf-8?B?OWVrYUFiSVY0UnZUMUtyV3JsUzVUU0tkaGE2VERFNkR2Q29YV0kwaHZibFVN?= =?utf-8?B?VXArV3o2UkRiK0pjWUtDaXFzaHBVc0VsRHhTTWFxcG45eHBSOEVOb1hBWFY2?= =?utf-8?Q?jLxXYoUCRtqn4+5xB5DdR6GbXxu+Sska?=
Content-Type: multipart/alternative; boundary="_000_SJ0PR00MB10051A6A8F8D3C9F87896899F5049SJ0PR00MB1005namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR00MB1005.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 38864c9d-edb9-431c-cd6b-08d9fd378e55
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 17:02:10.1152 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 9C9NiyZgL3IEgoZGCZDkCam30vbNBLMw11LziH+Gnk2awkwFO+YZB9GMtU5YN2/o9wh17u8N29GFingis9bs9A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR00MB0716
Archived-At: <https://mailarchive.ietf.org/arch/msg/cose/Si1etJUWV0TFuzIrPJjfyw-YwuI>
Subject: Re: [COSE] Newly Submitted Draft - CBOR Web Token (CWT) Claims in COSE Headers
X-BeenThere: cose@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: CBOR Object Signing and Encryption <cose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cose>, <mailto:cose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cose/>
List-Post: <mailto:cose@ietf.org>
List-Help: <mailto:cose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cose>, <mailto:cose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2022 17:02:21 -0000

We are *definitely* not attempting to change anything about COSE message processing, including how encryption is done.  We are defining an additional header parameter that can be used – that’s it.

                                                       -- Mike

From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Sent: Thursday, March 3, 2022 1:45 AM
To: Anders Rundgren <anders.rundgren.net@gmail.com>om>; Laurence Lundblade <lgl@island-resort.com>om>; Mike Jones <Michael.Jones@microsoft.com>
Cc: Tobias Looker <tobias.looker@mattr.global>al>; cose@ietf.org
Subject: RE: [COSE] Newly Submitted Draft - CBOR Web Token (CWT) Claims in COSE Headers

Hi Anders,

Thanks for jumping in.

The example you provide below is actually quite interesting and related to a question I posted to the list a few days ago (see https://mailarchive.ietf.org/arch/msg/cose/9nowDz5kbfUvrGR-o6U1Tm31XAA/).

I am not sure whether the intention of Tobias & Mike are actually to re-define the way how encryption is accomplished. They should confirm.

Ciao
Hannes

From: Anders Rundgren <anders.rundgren.net@gmail.com<mailto:anders.rundgren.net@gmail.com>>
Sent: Thursday, March 3, 2022 8:39 AM
To: Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>; Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org<mailto:Michael.Jones=40microsoft.com@dmarc.ietf.org>>
Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com<mailto:Hannes.Tschofenig@arm.com>>; Tobias Looker <tobias.looker=40mattr.global@dmarc.ietf.org<mailto:tobias.looker=40mattr.global@dmarc.ietf.org>>; cose@ietf.org<mailto:cose@ietf.org>
Subject: Re: [COSE] Newly Submitted Draft - CBOR Web Token (CWT) Claims in COSE Headers

On 2022-03-02 19:33, Laurence Lundblade wrote:
Makes sense to me. Helps out for the EAT claim named “profile” which gives information about the type of the token you might want before fully verifying it. Addresses an issue Anders brought up about the profile claim.

Not so fast  :)  I brought up a bunch of things which can be illustrated by this (just implemented...) example of an encryption object:

211(["https://example.com/myobject"<https://example.com/myobject>com/myobject>, {
  / COSE content encryption algorithm = A256GCM /
  1: 3,
  / Key encryption container /
  2: {
    / COSE Key encryption algorithm = ECDH-ES+A256KW /
    1: -31,
    / Key identifier /
    3: "mykey",
    / Ephemeral key /
    5: {
      / COSE Key type = OKP /
      1: 1,
      / COSE Curve = X25519 /
      -1: 4,
      / COSE X coordinate /
      -2: h'33a04b83d4428824b6d5477522d4a88fac4441122bc46136c0203faa308c3929'
    },
    / Encrypted key /
    10: h'e08977c25aeccaecd63b3367de2e2b8f700c82e098ad1e5099d9db510920ccff14debf820427e4ba'
  },
  / Tag /
  8: h'59a84826983e3247fbec4295f75cc138',
  / IV /
  9: h'fd8556c122cff2bc128d5119',
  / Encrypted data /
  10: h'e16b16c29da5163eb0131dd1f10f080f8850f55df2ae9d89a3b839ad50952858445f290dfb60'
}])

The core of this builds on Deterministic CBOR which unleashes the true power of CBOR in a way legacy solutions do not.   The enhancements include:

  *   Eliminating wrapping of header and (unencrypted) application data.
  *   Using the entire container (modulo the algorithm output variables which are added lastly) as input to a signature process and to the authentication part of an encryption process.  In the example that includes the top-level CBOR tag as well.  cryptoOperation(cborObject.encode()) is all that it takes on the encoder's side.
This is pretty much what the X.509 folks have been doing from the very start so there is close to zero innovation here 😁

In the example I have also used a URL as profile/object type indicator since IANA CBOR custom tag 1537244 or whatever you end-up with, simply isn't pretty enough :)  To be more serious: URLs are decentralized and would in this context probably be browseable as well.

Cheers,
Anders
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.