COSE Header parameter for RFC 3161 Time-Stamp Tokens
draft-ietf-cose-tsa-tst-header-parameter-08
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2025-08-29
|
08 | (System) | RFC Editor state changed to EDIT from IESG |
|
2025-08-29
|
08 | Henk Birkholz | New version available: draft-ietf-cose-tsa-tst-header-parameter-08.txt |
|
2025-08-29
|
08 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-08-29
|
08 | Henk Birkholz | Uploaded new revision |
|
2025-08-29
|
07 | (System) | RFC Editor state changed to IESG from EDIT |
|
2025-08-28
|
07 | (System) | RFC Editor state changed to EDIT from AUTH |
|
2025-08-27
|
07 | (System) | RFC Editor state changed to AUTH from EDIT |
|
2025-08-27
|
07 | (System) | RFC Editor state changed to EDIT |
|
2025-08-27
|
07 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
|
2025-08-27
|
07 | (System) | Announcement was received by RFC Editor |
|
2025-08-27
|
07 | Morgan Condie | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
|
2025-08-27
|
07 | Morgan Condie | IESG has approved the document |
|
2025-08-27
|
07 | Morgan Condie | Closed "Approve" ballot |
|
2025-08-27
|
07 | Morgan Condie | Ballot approval text was generated |
|
2025-08-27
|
07 | Paul Wouters | The document is ready. Although the similar names still exist, lets hope the additional text helps implementers enough not to confuse the names :/ |
|
2025-08-27
|
07 | (System) | Removed all action holders (IESG state changed) |
|
2025-08-27
|
07 | Paul Wouters | IESG state changed to Approved-announcement to be sent from IESG Evaluation |
|
2025-08-13
|
07 | Paul Wouters | The document is ready to proceed |
|
2025-08-13
|
07 | Paul Wouters | IESG state changed to IESG Evaluation from IESG Evaluation::AD Followup |
|
2025-08-13
|
07 | Deb Cooley | [Ballot comment] The changes to version 7 of this specification were good enough that I have cleared my discuss. Possibly the comment below wasn't clear … [Ballot comment] The changes to version 7 of this specification were good enough that I have cleared my discuss. Possibly the comment below wasn't clear enough? I can go back and see if I can state the issue more clearly? Let me know, and I will try again. ------------------------------------------------------ Original comment: Section 1.1, para 4: A small clarification, if the TST is acquired before the statement is signed, then the relying party knows that the statement was signed by the issuer 'not before' the times specified by the TSA. This is an early bound (vice a no later bound in the first case). |
|
2025-08-13
|
07 | Deb Cooley | [Ballot Position Update] Position for Deb Cooley has been changed to No Objection from Discuss |
|
2025-08-12
|
07 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
|
2025-08-12
|
07 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-08-12
|
07 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
|
2025-08-12
|
07 | Thomas Fossati | New version available: draft-ietf-cose-tsa-tst-header-parameter-07.txt |
|
2025-08-12
|
07 | Thomas Fossati | New version approved |
|
2025-08-12
|
07 | (System) | Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org |
|
2025-08-12
|
07 | Thomas Fossati | Uploaded new revision |
|
2025-08-07
|
06 | (System) | Changed action holders to Thomas Fossati, Henk Birkholz, Maik Riechert (IESG state changed) |
|
2025-08-07
|
06 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
|
2025-08-05
|
06 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
|
2025-08-05
|
06 | Deb Cooley | [Ballot discuss] Thanks to Stefan Santesson for the repeated secdir reviews. These reviews have driven change to create a better specification. The authors are lucky … [Ballot discuss] Thanks to Stefan Santesson for the repeated secdir reviews. These reviews have driven change to create a better specification. The authors are lucky to have drawn a reviewer that is well versed in the subject of timestamps. I'm not sure it is possible to completely eliminate the issue of a choosing the wrong method, but I hope recent changes have made it harder for the developer to make that mistake. I will make a few comments which I hope will make it a tiny bit harder. Names of modes: Stefan points out that the two mode names are similar, perhaps too similar. Instead of choosing the mode names by the order of operation, maybe mode names that describe the operation. Perhaps 'certificate timestamps' and 'unsigned statement timestamps', recognizing that these don't create nice acronyms, and that it is a pretty pervasive change to the draft. Section 1.1: Add a sentence to the first para that this specification outlines the original mode and a new mode, where the security characteristics are different so care needs to be taken to choose the appropriate mode. Section 1.1, para 2&3: Please consider stating that this use case is the primary, or original use case that most implementations will use. Something like 'The original use case....' and then 'This primary usage scenario motivates....' Section 1.1, para 4&5: Please consider stating that this is a new use case for very specific purposes. Something like 'The new use case...' and then 'This new usage scenario....' |
|
2025-08-05
|
06 | Deb Cooley | [Ballot comment] Section 1.1, para 4: A small clarification, if the TST is acquired before the statement is signed, then the relying party knows that … [Ballot comment] Section 1.1, para 4: A small clarification, if the TST is acquired before the statement is signed, then the relying party knows that the statement was signed by the issuer 'not before' the times specified by the TSA. This is an early bound (vice a no later bound in the first case). |
|
2025-08-05
|
06 | Deb Cooley | Ballot comment and discuss text updated for Deb Cooley |
|
2025-08-04
|
06 | Gorry Fairhurst | [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst |
|
2025-07-31
|
06 | Stefan Santesson | Request for Telechat review by SECDIR Completed: Has Issues. Reviewer: Stefan Santesson. Sent review to list. |
|
2025-07-30
|
06 | Ketan Talaulikar | [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar |
|
2025-07-24
|
06 | Roman Danyliw | [Ballot comment] Thank you to Linda Dunbar for the GENART review. Thank you for resolving my procedural DISCUSS feedback via the WG re-charter. |
|
2025-07-24
|
06 | Roman Danyliw | [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss |
|
2025-07-22
|
06 | Paul Wouters | Note this document was moved from IESG ballot state to be returned to the WG because it was out of charter. The charter was updated … Note this document was moved from IESG ballot state to be returned to the WG because it was out of charter. The charter was updated and the document was moved back to go through another IESG telechat without an new IETF LC. Looking back, I should have left the document as-is instead of moving it back to the WG. This was a process failure on my end. |
|
2025-07-21
|
06 | Cindy Morgan | Telechat date has been changed to 2025-08-07 (Previous date was 2025-05-08) |
|
2025-07-21
|
06 | Cindy Morgan | IESG state changed to IESG Evaluation from Publication Requested |
|
2025-07-19
|
06 | Orie Steele | [Ballot Position Update] Position for Orie Steele has been changed to No Objection from Discuss |
|
2025-07-18
|
06 | Michael Jones | Document History Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad … Document History Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The specification does one simple thing that has working group support. Most of the on-list discussion happened during WGLC, with about 10 people participating, some providing substantive feedback that was addressed after WGLC. The document has working group consensus. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? The was not controversy. The feedback received was largely about the exposition. This is bringing an existing mechanism to COSE. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) I am not aware of any threatened appeals or extreme discomfort. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? C2PA 2.1 uses this specification, and is implemented by Microsoft, Google, and Trupic. Measur.io has an implementation. Additional Reviews Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Not that I'm aware of. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. No such criteria apply. If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? The document contains no YANG module. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. Document Shepherd Checks Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? This document solves a narrow but useful problem and solves it well. It is ready to hand off to our AD. Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? It doesn't appear that most of the common Security Area issues at https://wiki.ietf.org/group/sec/typicalSECareaissues apply, other than Thread Models, which are discussed in the Security Considerations section. What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard status is being requested, and is accurately reflected in the datatracker. This status seems appropriate for the specification. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. All three authors have responded that they are not aware of any IPR considerations that apply to the specification. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes, they are willing. Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) I believe that the reference [IANA.cose_header-parameters] should be informative. Also, stylistially, it would appear to be better to use either dash or underscore in the reference, but not both in a mixed fashion. Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. I believe that the reference [IANA.cose_header-parameters] should be informative. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? There are no such references. Are there any normative downward references (see RFC 3967 and BCP 97) that are not already listed in the DOWNREF registry? If so, list them. There are no such references. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? There are no such references. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Publication of this document will not change the status of any existing RFCs. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). The IANA Considerations section appears to be consistent with the rest of the specification. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The specification creates no new IANA registries. |
|
2025-07-18
|
06 | Michael Jones | IETF WG state changed to Submitted to IESG for Publication from WG Document |
|
2025-07-18
|
06 | Michael Jones | IESG state changed to Publication Requested from I-D Exists |
|
2025-07-18
|
06 | Michael Jones | Document is now in IESG state Publication Requested |
|
2025-07-15
|
06 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Stefan Santesson |
|
2025-07-14
|
06 | Paul Wouters | Requested Telechat review by SECDIR |
|
2025-07-07
|
06 | Orie Steele | [Ballot comment] Thanks for addressing my comments in -06. |
|
2025-07-07
|
06 | Orie Steele | Ballot comment text updated for Orie Steele |
|
2025-06-12
|
06 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
|
2025-06-12
|
06 | Thomas Fossati | New version available: draft-ietf-cose-tsa-tst-header-parameter-06.txt |
|
2025-06-12
|
06 | Thomas Fossati | New version approved |
|
2025-06-12
|
06 | (System) | Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org |
|
2025-06-12
|
06 | Thomas Fossati | Uploaded new revision |
|
2025-06-12
|
06 | (System) | Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org |
|
2025-06-12
|
06 | Thomas Fossati | Uploaded new revision |
|
2025-05-08
|
05 | Cindy Morgan | IETF WG state changed to WG Document from Submitted to IESG for Publication |
|
2025-05-08
|
05 | Cindy Morgan | IESG state changed to I-D Exists from IESG Evaluation |
|
2025-05-08
|
05 | Deb Cooley | [Ballot discuss] Two items: I agree with Stefan Santesson's review: https://mailarchive.ietf.org/arch/msg/secdir/yiKmZx9ivRJZfUdj5g8W1HPB5xM/ (many thanks for that secdir review) Section 5: These types of systems rely … [Ballot discuss] Two items: I agree with Stefan Santesson's review: https://mailarchive.ietf.org/arch/msg/secdir/yiKmZx9ivRJZfUdj5g8W1HPB5xM/ (many thanks for that secdir review) Section 5: These types of systems rely on accurate time, and prompt reporting of compromised keys. STD96 discusses the necessity of keeping private keys private, but does not discuss the prompt reporting when those keys are disclosed. I think two short warnings (one on the necessity for the accuracy of time, and one on the prompt reporting of compromised keys) would be useful for someone using/implementing this document. (I'm happy to help with the words for these two warnings) |
|
2025-05-08
|
05 | Deb Cooley | [Ballot Position Update] New position, Discuss, has been recorded for Deb Cooley |
|
2025-05-07
|
05 | Mike Bishop | [Ballot comment] I support Roman's DISCUSS regarding charter status. The remaining comments can hopefully be used to improve the document if and when it is … [Ballot comment] I support Roman's DISCUSS regarding charter status. The remaining comments can hopefully be used to improve the document if and when it is submitted by a WG whose charter permits it. The 2119 MUST in the first sentence of 3.x is unnecessary -- if a different field were used, it wouldn't be what's defined in this specification. You can simply say that these headers are used for the corresponding purposes. However, a more useful 2119 keyword might be in mandating that the header be protected/unprotected as appropriate; if this header appears in the wrong section then the security properties won't apply. The examples in 3.2.x don't specify behavior; they might be better placed in Appendix A, which already contains examples. (Do the two sets of examples illustrate different things?) |
|
2025-05-07
|
05 | Mike Bishop | [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop |
|
2025-05-07
|
05 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
|
2025-05-06
|
05 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
|
2025-05-06
|
05 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-cose-tsa-tst-header-parameter-05 CC @evyncke Thank you for the work put into this document. Please find below some … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-cose-tsa-tst-header-parameter-05 CC @evyncke Thank you for the work put into this document. Please find below some non-blocking COMMENT points. Special thanks to Michael Jones for the shepherd's write-up including the WG consensus but the justification of the intended status is rather light. Other thanks to Alexey Melnikov, the IoT directorate reviewer (at my request), please consider this int-dir review: https://datatracker.ietf.org/doc/review-ietf-cose-tsa-tst-header-parameter-05-iotdir-telechat-melnikov-2025-04-30/ (and I have read Thomas' reply) I hope that this review helps to improve the document, Regards, -éric ## COMMENTS (non-blocking) ### Fit the COSE charter ? I support Roman's DISCUSS on this I-D not fitting the COSE charter. ### Section 1.1 Please expand "TSA" at first use. Add reference(s) for TSA (RFC 3161 ?) & "Transparency Service". ### Section 2 Isn't 'boxes' unclear in `by allowing multiple private-key boxes` ? ### Section 2.1 Thanks for using SVG graphics, much cleaner. Should clock also be considered as input in the TSA box in figure 1 ? The graphics seems to indicate that the private key is feeded in the clock... |
|
2025-05-06
|
05 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
|
2025-05-05
|
05 | Orie Steele | [Ballot discuss] # Orie Steele, ART AD, comments for draft-ietf-cose-tsa-tst-header-parameter-05 CC @OR13 * line numbers: - https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-cose-tsa-tst-header-parameter-05.txt&submitcheck=True * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * … [Ballot discuss] # Orie Steele, ART AD, comments for draft-ietf-cose-tsa-tst-header-parameter-05 CC @OR13 * line numbers: - https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-cose-tsa-tst-header-parameter-05.txt&submitcheck=True * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Discuss Thanks to Shuping Peng for the ARTART review. ### Transparency Service The term is capitalized, but no definition is provided. Given the origin of the draft in scitt, its implied that this is the same TS that the SCITT Architecture describes. However, SCITT architecture does not support registering anything in the unprotected header (can't support CTT). https://datatracker.ietf.org/doc/html/draft-ietf-scitt-architecture-11#section-6.2-6 ### CTT ``` 122 entry cannot be changed. In certain cases, such as when a short- 123 lived certificate is used for the signature, the registration policy 124 of a Transparency Service may add a trustworthy timestamp to the 125 signed document. This is done to lock the signature to a specific 126 point in time. To achieve this, the Transparency Service acquires a 127 TST from a TSA, bundles it alongside the signed document, and then 128 registers it. A relying party that wants to ascertain the 129 authenticity of the document after the signing key has expired (or 130 has been compromised), can do so by making sure that no revocation 131 information has been made public before the time asserted in the TST. ``` MUST the TSA be a separate entity from the Transparency Service? Is it possible for the document signer to supply the TST instead of the Transparency Service? What happens if there is already a TST present, when the Transparency Service receives the cose object? |
|
2025-05-05
|
05 | Orie Steele | [Ballot Position Update] New position, Discuss, has been recorded for Orie Steele |
|
2025-05-02
|
05 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
|
2025-05-02
|
05 | Roman Danyliw | [Ballot discuss] For the responsible AD and WG chairs -- this document is not in scope for the current WG charter. My understanding of its … [Ballot discuss] For the responsible AD and WG chairs -- this document is not in scope for the current WG charter. My understanding of its substance is that it defines two, new COSE attributes. The approved -03 charter explicitly says: “The WG will produce documents for new attributes only if they are in the list of deliverables below. A re-charter will be required to expand that list. The WG is expected as part of normal processing to review and comment on attributes that are not in charter but are of general public interest.” There is no subsequent reference to work about specifying timestamp related attributes in the work items section of the charter (or any other place). |
|
2025-05-02
|
05 | Roman Danyliw | [Ballot comment] Thank you to Linda Dunbar for the GENART review. |
|
2025-05-02
|
05 | Roman Danyliw | [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw |
|
2025-04-30
|
05 | Alexey Melnikov | Request for Telechat review by IOTDIR Completed: Ready. Reviewer: Alexey Melnikov. Sent review to list. |
|
2025-04-29
|
05 | Andy Newton | [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton |
|
2025-04-26
|
05 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
|
2025-04-24
|
05 | Mohamed Boucadair | [Ballot comment] Hi Henk, Thomas, and Maik, Thank you for the effort put into this specification. Thanks to Yingzhen Qu for the OPSDIR review. The … [Ballot comment] Hi Henk, Thomas, and Maik, Thank you for the effort put into this specification. Thanks to Yingzhen Qu for the OPSDIR review. The spec is straightforward. There are some guidelines when manipulating timestamps (e.g., rfc8877), but I don’t think those apply here. I trust the authors have validated all the examples. Please find below some few comments: # Hash details: can we have an authoritative reference to zoom more about how the hash is computed/validated? CURRENT: The MessageImprint sent to the TSA (Section 2.4 of [RFC3161]) MUST be the hash of the payload of the COSE signed object. # Add a normative reference to RFC 8792 as that is required for unfolding # The use of folding is not consistent For example, this is not used in 3.2.1, while it is used in other examples. # Check/fix some uses of folding in the last example, in particular: CURRENT: / signature / h'8eb33e4ca31d1c465ab05aac34cc6b23d58fef5c083106c4 d25a91aef0b0117e2af9a291aa32e14ab834dc56ed2a223444547e01f11d3b0916e5 a4c345cacb36' Thank you. Cheers, Med |
|
2025-04-24
|
05 | Mohamed Boucadair | [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair |
|
2025-04-16
|
05 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Alexey Melnikov |
|
2025-04-16
|
05 | Ines Robles | Assignment of request for Telechat review by IOTDIR to Hannes Tschofenig was rejected |
|
2025-04-14
|
05 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Hannes Tschofenig |
|
2025-04-14
|
05 | Éric Vyncke | Requested Telechat review by IOTDIR |
|
2025-04-02
|
05 | Stefan Santesson | Request for Telechat review by SECDIR Completed: Serious Issues. Reviewer: Stefan Santesson. Sent review to list. Submission of review completed at an earlier date. |
|
2025-04-02
|
05 | Stefan Santesson | Request for Telechat review by SECDIR Completed: Serious Issues. Reviewer: Stefan Santesson. |
|
2025-03-28
|
05 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Stefan Santesson |
|
2025-03-25
|
05 | Thomas Fossati | New version available: draft-ietf-cose-tsa-tst-header-parameter-05.txt |
|
2025-03-25
|
05 | Thomas Fossati | New version approved |
|
2025-03-25
|
05 | (System) | Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org |
|
2025-03-25
|
05 | Thomas Fossati | Uploaded new revision |
|
2025-03-13
|
04 | Stefan Santesson | Request for Telechat review by SECDIR Completed: Serious Issues. Reviewer: Stefan Santesson. Sent review to list. |
|
2025-03-13
|
04 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Stefan Santesson |
|
2025-03-11
|
04 | Cindy Morgan | Placed on agenda for telechat - 2025-05-08 |
|
2025-03-11
|
04 | Paul Wouters | Ballot has been issued |
|
2025-03-11
|
04 | Paul Wouters | [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters |
|
2025-03-11
|
04 | Paul Wouters | Created "Approve" ballot |
|
2025-03-11
|
04 | Paul Wouters | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
|
2025-03-11
|
04 | Paul Wouters | Ballot writeup was changed |
|
2025-02-05
|
04 | David Dong | IANA Experts State changed to Expert Reviews OK from Reviews assigned |
|
2025-01-22
|
04 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
|
2025-01-22
|
04 | Thomas Fossati | New version available: draft-ietf-cose-tsa-tst-header-parameter-04.txt |
|
2025-01-22
|
04 | (System) | New version approved |
|
2025-01-22
|
04 | (System) | Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org |
|
2025-01-22
|
04 | Thomas Fossati | Uploaded new revision |
|
2025-01-13
|
03 | Yingzhen Qu | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Yingzhen Qu. Sent review to list. |
|
2025-01-13
|
03 | David Dong | IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-cose-tsa-tst-header-parameter-03. If any part of this review is inaccurate, please let us know. IANA understands that, upon … IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-cose-tsa-tst-header-parameter-03. If any part of this review is inaccurate, please let us know. IANA understands that, upon approval of this document, there is a single action which we must complete. In the COSE Header Parameters registry in the CBOR Object Signing and Encryption (COSE) registry group located at: https://www.iana.org/assignments/cose/ two new parameters will be registered as follows: Name: 3161-tcc Label: [ TBD-at-Registration ] Value Type: bstr Value Registry: Description: RFC 3161 timestamp token Reference: [ RFC-to-be; Section 3.1 ] Name: 3161-ctt Label: [ TBD-at-Registration ] Value Type: bstr Value Registry: Description: RFC 3161 timestamp token Reference: [ RFC-to-be; Section 3.2 ] As this document requests registrations in an Expert Review or Specification Required (see RFC 8126) registry, we have initiated the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." We understand that this is the only action required to be completed upon approval of this document. NOTE: The action requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the action that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
|
2025-01-13
|
03 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
|
2025-01-13
|
03 | David Dong | IANA Experts State changed to Reviews assigned |
|
2025-01-13
|
03 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2025-01-11
|
03 | Linda Dunbar | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Linda Dunbar. Sent review to list. |
|
2024-12-28
|
03 | Shuping Peng | Request for Last Call review by ARTART Completed: Ready with Issues. Reviewer: Shuping Peng. Sent review to list. |
|
2024-12-27
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Linda Dunbar |
|
2024-12-27
|
03 | Carlos Pignataro | Request for Last Call review by OPSDIR is assigned to Yingzhen Qu |
|
2024-12-27
|
03 | Barry Leiba | Request for Last Call review by ARTART is assigned to Shuping Peng |
|
2024-12-23
|
03 | Jenny Bui | IANA Review state changed to IANA - Review Needed |
|
2024-12-23
|
03 | Jenny Bui | The following Last Call announcement was sent out (ends 2025-01-13): From: The IESG To: IETF-Announce CC: cose-chairs@ietf.org, cose@ietf.org, draft-ietf-cose-tsa-tst-header-parameter@ietf.org, michael_b_jones@hotmail.com, paul.wouters@aiven.io … The following Last Call announcement was sent out (ends 2025-01-13): From: The IESG To: IETF-Announce CC: cose-chairs@ietf.org, cose@ietf.org, draft-ietf-cose-tsa-tst-header-parameter@ietf.org, michael_b_jones@hotmail.com, paul.wouters@aiven.io Reply-To: last-call@ietf.org Sender: Subject: Last Call: (COSE Header parameter for RFC 3161 Time-Stamp Tokens) to Proposed Standard The IESG has received a request from the CBOR Object Signing and Encryption WG (cose) to consider the following document: - 'COSE Header parameter for RFC 3161 Time-Stamp Tokens' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2025-01-13. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document defines a CBOR Signing And Encrypted (COSE) header parameter for incorporating RFC 3161-based timestamping into COSE message structures (COSE_Sign and COSE_Sign1). This enables the use of established RFC 3161 timestamping infrastructure to prove the creation time of a message. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/ietf-scitt/draft-birkholz-cose-tsa-tst-header- parameter. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-cose-tsa-tst-header-parameter/ No IPR declarations have been submitted directly on this I-D. |
|
2024-12-23
|
03 | Jenny Bui | IESG state changed to In Last Call from Last Call Requested |
|
2024-12-23
|
03 | Jenny Bui | Last call announcement was changed |
|
2024-12-23
|
03 | Jenny Bui | Last call announcement was generated |
|
2024-12-22
|
03 | Paul Wouters | Last call was requested |
|
2024-12-22
|
03 | Paul Wouters | Ballot approval text was generated |
|
2024-12-22
|
03 | Paul Wouters | Ballot writeup was generated |
|
2024-12-22
|
03 | Paul Wouters | IESG state changed to Last Call Requested from Publication Requested |
|
2024-12-22
|
03 | Paul Wouters | Last call announcement was changed |
|
2024-12-19
|
03 | Michael Jones | Document History Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad … Document History Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The specification does one simple thing that has working group support. Most of the on-list discussion happened during WGLC, with about 10 people participating, some providing substantive feedback that was addressed after WGLC. The document has working group consensus. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? The was not controversy. The feedback received was largely about the exposition. This is bringing an existing mechanism to COSE. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) I am not aware of any threatened appeals or extreme discomfort. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? C2PA 2.1 uses this specification, and is implemented by Microsoft, Google, and Trupic. Measur.io has an implementation. Additional Reviews Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Not that I'm aware of. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. No such criteria apply. If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? The document contains no YANG module. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. Document Shepherd Checks Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? This document solves a narrow but useful problem and solves it well. It is ready to hand off to our AD. Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? It doesn't appear that most of the common Security Area issues at https://wiki.ietf.org/group/sec/typicalSECareaissues apply, other than Thread Models, which are discussed in the Security Considerations section. What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard status is being requested, and is accurately reflected in the datatracker. This status seems appropriate for the specification. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. All three authors have responded that they are not aware of any IPR considerations that apply to the specification. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes, they are willing. Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) I believe that the reference [IANA.cose_header-parameters] should be informative. Also, stylistially, it would appear to be better to use either dash or underscore in the reference, but not both in a mixed fashion. Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. I believe that the reference [IANA.cose_header-parameters] should be informative. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? There are no such references. Are there any normative downward references (see RFC 3967 and BCP 97) that are not already listed in the DOWNREF registry? If so, list them. There are no such references. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? There are no such references. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Publication of this document will not change the status of any existing RFCs. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). The IANA Considerations section appears to be consistent with the rest of the specification. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The specification creates no new IANA registries. |
|
2024-12-19
|
03 | Michael Jones | IETF WG state changed to Submitted to IESG for Publication from WG Document |
|
2024-12-19
|
03 | Michael Jones | IESG state changed to Publication Requested from I-D Exists |
|
2024-12-19
|
03 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
|
2024-12-19
|
03 | Michael Jones | Responsible AD changed to Paul Wouters |
|
2024-12-19
|
03 | Michael Jones | Document is now in IESG state Publication Requested |
|
2024-12-19
|
03 | Michael Jones | Document History Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad … Document History Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The specification does one simple thing that has working group support. Most of the on-list discussion happened during WGLC, with about 10 people participating, some providing substantive feedback that was addressed after WGLC. The document has working group consensus. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? The was not controversy. The feedback received was largely about the exposition. This is bringing an existing mechanism to COSE. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) I am not aware of any threatened appeals or extreme discomfort. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? C2PA 2.1 uses this specification, and is implemented by Microsoft, Google, and Trupic. Measur.io has an implementation. Additional Reviews Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Not that I'm aware of. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. No such criteria apply. If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? The document contains no YANG module. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. Document Shepherd Checks Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? This document solves a narrow but useful problem and solves it well. It is ready to hand off to our AD. Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? It doesn't appear that most of the common Security Area issues at https://wiki.ietf.org/group/sec/typicalSECareaissues apply, other than Thread Models, which are discussed in the Security Considerations section. What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard status is being requested, and is accurately reflected in the datatracker. This status seems appropriate for the specification. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. All three authors have responded that they are not aware of any IPR considerations that apply to the specification. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes, they are willing. Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) I believe that the reference [IANA.cose_header-parameters] should be informative. Also, stylistially, it would appear to be better to use either dash or underscore in the reference, but not both in a mixed fashion. Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. I believe that the reference [IANA.cose_header-parameters] should be informative. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? There are no such references. Are there any normative downward references (see RFC 3967 and BCP 97) that are not already listed in the DOWNREF registry? If so, list them. There are no such references. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? There are no such references. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Publication of this document will not change the status of any existing RFCs. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). The IANA Considerations section appears to be consistent with the rest of the specification. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The specification creates no new IANA registries. |
|
2024-11-08
|
03 | Ivaylo Petrov | Changed consensus to Yes from Unknown |
|
2024-11-08
|
03 | Ivaylo Petrov | Intended Status changed to Proposed Standard from None |
|
2024-11-08
|
03 | Ivaylo Petrov | Notification list changed to michael_b_jones@hotmail.com because the document shepherd was set |
|
2024-11-08
|
03 | Ivaylo Petrov | Document shepherd changed to Michael B. Jones |
|
2024-09-10
|
03 | Thomas Fossati | New version available: draft-ietf-cose-tsa-tst-header-parameter-03.txt |
|
2024-09-10
|
03 | Thomas Fossati | New version accepted (logged-in submitter: Thomas Fossati) |
|
2024-09-10
|
03 | Thomas Fossati | Uploaded new revision |
|
2024-08-27
|
02 | (System) | Document has expired |
|
2024-07-22
|
03 | (System) | Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org |
|
2024-07-22
|
03 | Carsten Bormann | Uploaded new revision |
|
2024-02-24
|
02 | Thomas Fossati | New version available: draft-ietf-cose-tsa-tst-header-parameter-02.txt |
|
2024-02-24
|
02 | Thomas Fossati | New version accepted (logged-in submitter: Thomas Fossati) |
|
2024-02-24
|
02 | Thomas Fossati | Uploaded new revision |
|
2023-11-07
|
01 | Thomas Fossati | New version available: draft-ietf-cose-tsa-tst-header-parameter-01.txt |
|
2023-11-07
|
01 | Thomas Fossati | New version accepted (logged-in submitter: Thomas Fossati) |
|
2023-11-07
|
01 | Thomas Fossati | Uploaded new revision |
|
2023-09-10
|
00 | Michael Jones | This document now replaces draft-birkholz-cose-tsa-tst-header-parameter instead of None |
|
2023-09-10
|
00 | Henk Birkholz | New version available: draft-ietf-cose-tsa-tst-header-parameter-00.txt |
|
2023-09-10
|
00 | Michael Jones | WG -00 approved |
|
2023-09-10
|
00 | Henk Birkholz | Set submitter to "Henk Birkholz ", replaces to draft-birkholz-cose-tsa-tst-header-parameter and sent approval email to group chairs: cose-chairs@ietf.org |
|
2023-09-10
|
00 | Henk Birkholz | Uploaded new revision |