Hi,

On Mon, September 26, 2022 12:27 pm, Michael Richardson wrote:
>
> Derek Atkins <[email protected]> wrote:
>     > We are happily using the (currently draft) CBOR Certificates object
> in
>     > our code, but we're getting closer to having a requirement where a
>
> To be clear, you are talking about certificates encoded in CBOR, and for
> which the signature is calculated over the CBOR. i.e. _Natively signed
> C509 certificates_

Yes, I am specifically talking about NATIVE CBOR certificates, where the
signature is calculated over the CBOR.

>
>     > My straightforward proposal, which keeps some amount of backwards
>     > compatibility (in the sense that the TBSCertificate still has the
> same
>     > number of top-level entries), would be to modify this to allow
> either a
>     > singleton or an array for subjectPublicKeyAlgorithm,
> subjectPublicKey,
>     > issuerSignatureAlgorithm, and issuerSignatureValue.  At a higher
> level,
>     > the restriction that both subjectPublicKeyAlgoritihm and
>     > subjectPublicKey must contain the same number of items and in the
> same
>     > order, and both issuerSignatureAlgorithm and issuerSignatureValue
> must
>     > contain the same number of items and in the same order.
>
> So, this might be backwards compatible to the draft, it would not be 1:1
> with
> X509 format certificates.  I guess that you are alright with this, but I
> think for the community, that might be a big step.

We don't use X509 in any capacity (except our cloud service that uses HTTPS).

>
>     > The benefit of this approach is that all signatures cover all keys
> and
>     > all SignatureAlgorithm identifiers, so you cannot go back and add a
> new
>     > signature method (downgrade attack).
>
>     > Another benefit of this approach is that it requires only minimal
>     > updates to existing parsers.  While it is true that a parser that
>     > expects a single entry would fail with the array with multiple
>     > Ids/Keys/Signatures, I don't see this as a bad thing because, most
>     > likely, the recipient would want to be able to validate both
>     > signatures.
>
> Agreed.
>
>     > Oh... Having thrown this out there, I am offering to write it up if
>     > there is interest, either as a modification to the existing
> CBOR-Certs
>     > draft, or a companion draft.
>
> If we were further along with cose-cbor-encoded-cert, then I'd want to see
> it
> as a new document.  It does not seem that we are in that place yet.
> Still, it might be kinder to the reviewers of the current document if it
> were
> a new draft.

I am fine with that, although my draft would start with "take all the
definitions from [xxx] and make these minor changes"

-derek

-- 
       Derek Atkins                 617-623-3745
       [email protected]             www.ihtfp.com
       Computer and Internet Security Consultant

_______________________________________________
COSE mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cose

Reply via email to