All that I am working with in aviation are using #1.
There is no activity I am involved in that are interested in either 2 or 3.
Oh, and though some are using the RUST code on the github, I *THINK*
Airbus is coding their own...
On 3/18/25 7:19 PM, Orie Steele wrote:
There are 3 variants:
1. Compressed x509
2. Compressed x509 data model signed with COSE.
3. COSE data model achieving same use case
Are there any implementations that are only doing 2?
If you had the option to do 2 or 3, which use cases would be better
solved with 2?
Regards,
OS
On Wed, Mar 19, 2025, 6:07 AM Robert Moskowitz
<[email protected]> wrote:
I am working on a MAJOR, and I really mean MAJOR use of instream
recoding of X.509 certificates as c509.
The application is to authenticate the TESLA keys that will be
used for authenticating GPS messages.
EU is very close to rolling this out for their constellation. US
is more complex as there are ~30 private companies around the
world that have a hand in augmenting GPS.
We are arguing over bits here. "Look at the message, we ONLY have
7 bits where do you thing there is another bit; how will we do it?"...
I missed the call today, too tired. But this is pretty much a
done thing.
I AM working on changes to the actual certs. I believe we can
squeeze out some more bytes here that will even help out the CBOR
encoded format.
Oh, the TESLA part is pretty much done with code ready. It is not
pure RFC TESLA, but apparently something a "bit better". I don't
have the time/experience to evaluate their work. I did argue to
use KMAC over HMAC when they were crying about the compute cost of
HMAC in those birds. But so far, they are staying with HMAC.
Oh, and there is talk about sticking all this on top of ADS-B, but
that is a MUCH bigger lift with a lot more players.
On 3/18/25 1:51 PM, Göran Selander wrote:
Hi Michael,
Happy to hear that people are showing interest in the work. It
would be great to learn what applications they have in mind for
the compressed X.509, please share! We also have noted an
interest, for example from the aviation side, but more examples
are welcome.
However, the overwhelming interest has been for native C509 and
for this setting there are already products deployed. So I
believe the genie is out of the bottle and it would IMHO be
better to set the standard rather than let this be developed in
different proprietary ways.
I don’t think this work pre-empts other work onnew standardized
COSE/CWTbased identity systems. Native C509 are semantically
identical to the compressed X.509 which is intended to support
whever is relevant from PKIX in this context. I take it from your
comment this is not at all what you have in mind, and therefore I
don’t see any significant overlap. The fact that both are signed
CBOR does not make much of any difference.
Indeed, there has already been different proposal on “COSE/CWT
basedidentity” but it has not reached IETF consensus yet. I would
be happy to see a development in that area, but I don’t think it
is fair to say that the lack of success so far should be blamed
on native C509.
Göran
*From: *Michael Richardson <[email protected]>
<mailto:[email protected]>
*Date: *Tuesday, 18 March 2025 at 07:17
*To: *[email protected] <[email protected]> <mailto:[email protected]>
*Subject: *[COSE] Re: [EXT] I-D Action:
draft-ietf-cose-cbor-encoded-cert-13.txt
I was talking about cbor-encoded-cert with a few people over the
hackathon
and over some dinners.
A few people asked that we remove the native signature content.
I concur. I don't think it's useful to create a new, isolated
C509 ecosystem
which retains all of the semantic bugs of PKIX, while being
incompatible with
PKIX.
Many many many people would like to work on a new standardized
COSE/CWT based
identity system which does not share the PKIX history, and they
feel that the
world does not have space for PKIX, native-C509, *and* such a new
system.
--
Michael Richardson <[email protected]>
<mailto:[email protected]>, Sandelman Software Works
-= IPv6 IoT consulting =- *I*LIKE*TRAINS*
_______________________________________________
COSE mailing list [email protected]
To unsubscribe send an email [email protected]
_______________________________________________
COSE mailing list -- [email protected]
To unsubscribe send an email to [email protected]
_______________________________________________
COSE mailing list [email protected]
To unsubscribe send an email [email protected]
_______________________________________________
COSE mailing list -- [email protected]
To unsubscribe send an email to [email protected]