Skip to main content

COSE Header parameter for RFC 3161 Time-Stamp Tokens
draft-ietf-cose-tsa-tst-header-parameter-08

Revision differences

Document history

Date Rev. By Action
2025-08-29
08 (System) RFC Editor state changed to EDIT from IESG
2025-08-29
08 Henk Birkholz New version available: draft-ietf-cose-tsa-tst-header-parameter-08.txt
2025-08-29
08 Henk Birkholz New version accepted (logged-in submitter: Henk Birkholz)
2025-08-29
08 Henk Birkholz Uploaded new revision
2025-08-29
07 (System) RFC Editor state changed to IESG from EDIT
2025-08-28
07 (System) RFC Editor state changed to EDIT from AUTH
2025-08-27
07 (System) RFC Editor state changed to AUTH from EDIT
2025-08-27
07 (System) RFC Editor state changed to EDIT
2025-08-27
07 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2025-08-27
07 (System) Announcement was received by RFC Editor
2025-08-27
07 Morgan Condie IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2025-08-27
07 Morgan Condie IESG has approved the document
2025-08-27
07 Morgan Condie Closed "Approve" ballot
2025-08-27
07 Morgan Condie Ballot approval text was generated
2025-08-27
07 Paul Wouters The document is ready. Although the similar names still exist, lets hope the additional text helps implementers enough not to confuse the names :/
2025-08-27
07 (System) Removed all action holders (IESG state changed)
2025-08-27
07 Paul Wouters IESG state changed to Approved-announcement to be sent from IESG Evaluation
2025-08-13
07 Paul Wouters The document is ready to proceed
2025-08-13
07 Paul Wouters IESG state changed to IESG Evaluation from IESG Evaluation::AD Followup
2025-08-13
07 Deb Cooley
[Ballot comment]
The changes to version 7 of this specification were good enough that I have cleared my discuss.

Possibly the comment below wasn't clear …
[Ballot comment]
The changes to version 7 of this specification were good enough that I have cleared my discuss.

Possibly the comment below wasn't clear enough?  I can go back and see if I can state the issue more clearly?  Let me know, and I will try again.
------------------------------------------------------
Original comment:
Section 1.1, para 4:  A small clarification, if the TST is acquired before the statement is signed, then the relying party knows that the statement was signed by the issuer 'not before' the times specified by the TSA.  This is an early bound (vice a no later bound in the first case).
2025-08-13
07 Deb Cooley [Ballot Position Update] Position for Deb Cooley has been changed to No Objection from Discuss
2025-08-12
07 (System) Changed action holders to Paul Wouters (IESG state changed)
2025-08-12
07 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2025-08-12
07 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2025-08-12
07 Thomas Fossati New version available: draft-ietf-cose-tsa-tst-header-parameter-07.txt
2025-08-12
07 Thomas Fossati New version approved
2025-08-12
07 (System) Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org
2025-08-12
07 Thomas Fossati Uploaded new revision
2025-08-07
06 (System) Changed action holders to Thomas Fossati, Henk Birkholz, Maik Riechert (IESG state changed)
2025-08-07
06 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2025-08-05
06 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2025-08-05
06 Deb Cooley
[Ballot discuss]
Thanks to Stefan Santesson for the repeated secdir reviews.  These reviews have driven change to create a better specification.  The authors are lucky …
[Ballot discuss]
Thanks to Stefan Santesson for the repeated secdir reviews.  These reviews have driven change to create a better specification.  The authors are lucky to have drawn a reviewer that is well versed in the subject of timestamps.  I'm not sure it is possible to completely eliminate the issue of a choosing the wrong method, but I hope recent changes have made it harder for the developer to make that mistake.  I will make a few comments which I hope will make it a tiny bit harder.

Names of modes:  Stefan points out that the two mode names are similar, perhaps too similar.  Instead of choosing the mode names by the order of operation, maybe mode names that describe the operation.  Perhaps 'certificate timestamps' and 'unsigned statement timestamps', recognizing that these don't create nice acronyms, and that it is a pretty pervasive change to the draft.

Section 1.1:  Add a sentence to the first para that this specification outlines the original mode and a new mode, where the security characteristics are different so care needs to be taken to choose the appropriate mode.

Section 1.1, para 2&3:  Please consider stating that this use case is the primary, or original use case that most implementations will use. Something like 'The original use case....'  and then 'This primary usage scenario motivates....'

Section 1.1, para 4&5:  Please consider stating that this is a new use case for very specific purposes.  Something like 'The new use case...' and then 'This new usage scenario....'
2025-08-05
06 Deb Cooley
[Ballot comment]

Section 1.1, para 4:  A small clarification, if the TST is acquired before the statement is signed, then the relying party knows that …
[Ballot comment]

Section 1.1, para 4:  A small clarification, if the TST is acquired before the statement is signed, then the relying party knows that the statement was signed by the issuer 'not before' the times specified by the TSA.  This is an early bound (vice a no later bound in the first case).
2025-08-05
06 Deb Cooley Ballot comment and discuss text updated for Deb Cooley
2025-08-04
06 Gorry Fairhurst [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst
2025-07-31
06 Stefan Santesson Request for Telechat review by SECDIR Completed: Has Issues. Reviewer: Stefan Santesson. Sent review to list.
2025-07-30
06 Ketan Talaulikar [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar
2025-07-24
06 Roman Danyliw [Ballot comment]
Thank you to Linda Dunbar for the GENART review.

Thank you for resolving my procedural DISCUSS feedback via the WG re-charter.
2025-07-24
06 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2025-07-22
06 Paul Wouters
Note this document was moved from IESG ballot state to be returned to the WG because it was out of charter. The charter was updated …
Note this document was moved from IESG ballot state to be returned to the WG because it was out of charter. The charter was updated and the document was moved back to go through another IESG telechat without an new IETF LC. Looking back, I should have left the document as-is instead of moving it back to the WG. This was a process failure on my end.
2025-07-21
06 Cindy Morgan Telechat date has been changed to 2025-08-07 (Previous date was 2025-05-08)
2025-07-21
06 Cindy Morgan IESG state changed to IESG Evaluation from Publication Requested
2025-07-19
06 Orie Steele [Ballot Position Update] Position for Orie Steele has been changed to No Objection from Discuss
2025-07-18
06 Michael Jones
Document History

Does the working group (WG) consensus represent the strong concurrence of a
few individuals, with others being silent, or did it reach broad …
Document History

Does the working group (WG) consensus represent the strong concurrence of a
few individuals, with others being silent, or did it reach broad agreement?

The specification does one simple thing that has working group support.  Most of the on-list discussion happened during WGLC, with about 10 people participating, some providing substantive feedback that was addressed after WGLC.  The document has working group consensus.

Was there controversy about particular points, or were there decisions where
the consensus was particularly rough?

The was not controversy.  The feedback received was largely about the exposition.  This is bringing an existing mechanism to COSE.

Has anyone threatened an appeal or otherwise indicated extreme discontent? If
so, please summarize the areas of conflict in separate email messages to the
responsible Area Director. (It should be in a separate email because this
questionnaire is publicly available.)

I am not aware of any threatened appeals or extreme discomfort.

For protocol documents, are there existing implementations of the contents of
the document? Have a significant number of potential implementers indicated
plans to implement? Are any existing implementations reported somewhere,
either in the document itself (as RFC 7942 recommends) or elsewhere
(where)?

C2PA 2.1 uses this specification, and is implemented by Microsoft, Google, and Trupic.  Measur.io has an implementation.

Additional Reviews

Do the contents of this document closely interact with technologies in other
IETF working groups or external organizations, and would it therefore benefit
from their review? Have those reviews occurred? If yes, describe which
reviews took place.

Not that I'm aware of.

Describe how the document meets any required formal expert review criteria,
such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No such criteria apply.

If the document contains a YANG module, has the final version of the module
been checked with any of the recommended validation tools for syntax and
formatting validation? If there are any resulting errors or warnings, what is
the justification for not fixing them at this time? Does the YANG module
comply with the Network Management Datastore Architecture (NMDA) as specified
in RFC 8342?

The document contains no YANG module.

Describe reviews and automated checks performed to validate sections of the
final version of the document written in a formal language, such as XML code,
BNF rules, MIB definitions, CBOR's CDDL, etc.

Document Shepherd Checks

Based on the shepherd's review of the document, is it their opinion that this
document is needed, clearly written, complete, correctly designed, and ready
to be handed off to the responsible Area Director?

This document solves a narrow but useful problem and solves it well.  It is ready to hand off to our AD.

Several IETF Areas have assembled lists of common issues that their
reviewers encounter. For which areas have such issues been identified
and addressed? For which does this still need to happen in subsequent
reviews?

It doesn't appear that most of the common Security Area issues at https://wiki.ietf.org/group/sec/typicalSECareaissues apply, other than Thread Models, which are discussed in the Security Considerations section.

What type of RFC publication is being requested on the IETF stream (Best
Current Practice, Proposed Standard, Internet Standard,
Informational, Experimental or Historic)? Why is this the proper type
of RFC? Do all Datatracker state attributes correctly reflect this intent?

Proposed Standard status is being requested, and is accurately reflected in the datatracker.  This status seems appropriate for the specification.

Have reasonable efforts been made to remind all authors of the intellectual
property rights (IPR) disclosure obligations described in BCP 79? To
the best of your knowledge, have all required disclosures been filed? If
not, explain why. If yes, summarize any relevant discussion, including links
to publicly-available messages when applicable.

All three authors have responded that they are not aware of any IPR considerations that apply to the specification.

Has each author, editor, and contributor shown their willingness to be
listed as such? If the total number of authors and editors on the front page
is greater than five, please provide a justification.

Yes, they are willing.

Document any remaining I-D nits in this document. Simply running the idnits
tool is not enough; please review the "Content Guidelines" on
authors.ietf.org. (Also note that the current idnits tool generates
some incorrect warnings; a rewrite is underway.)

I believe that the reference [IANA.cose_header-parameters] should be informative.  Also, stylistially, it would appear to be better to use either dash or underscore in the reference, but not both in a mixed fashion.

Should any informative references be normative or vice-versa? See the IESG
Statement on Normative and Informative References.

I believe that the reference [IANA.cose_header-parameters] should be informative.

List any normative references that are not freely available to anyone. Did
the community have sufficient access to review any such normative
references?

There are no such references.

Are there any normative downward references (see RFC 3967 and BCP
97
) that are not already listed in the DOWNREF registry? If so,
list them.

There are no such references.

Are there normative references to documents that are not ready to be
submitted to the IESG for publication or are otherwise in an unclear state?
If so, what is the plan for their completion?

There are no such references.

Will publication of this document change the status of any existing RFCs? If
so, does the Datatracker metadata correctly reflect this and are those RFCs
listed on the title page, in the abstract, and discussed in the
introduction? If not, explain why and point to the part of the document
where the relationship of this document to these other RFCs is discussed.

Publication of this document will not change the status of any existing RFCs.

Describe the document shepherd's review of the IANA considerations section,
especially with regard to its consistency with the body of the document.
Confirm that all aspects of the document requiring IANA assignments are
associated with the appropriate reservations in IANA registries. Confirm
that any referenced IANA registries have been clearly identified. Confirm
that each newly created IANA registry specifies its initial contents,
allocations procedures, and a reasonable name (see RFC 8126).

The IANA Considerations section appears to be consistent with the rest of the specification.

List any new IANA registries that require Designated Expert Review for
future allocations. Are the instructions to the Designated Expert clear?
Please include suggestions of designated experts, if appropriate.

The specification creates no new IANA registries.
2025-07-18
06 Michael Jones IETF WG state changed to Submitted to IESG for Publication from WG Document
2025-07-18
06 Michael Jones IESG state changed to Publication Requested from I-D Exists
2025-07-18
06 Michael Jones Document is now in IESG state Publication Requested
2025-07-15
06 Tero Kivinen Request for Telechat review by SECDIR is assigned to Stefan Santesson
2025-07-14
06 Paul Wouters Requested Telechat review by SECDIR
2025-07-07
06 Orie Steele [Ballot comment]
Thanks for addressing my comments in -06.
2025-07-07
06 Orie Steele Ballot comment text updated for Orie Steele
2025-06-12
06 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2025-06-12
06 Thomas Fossati New version available: draft-ietf-cose-tsa-tst-header-parameter-06.txt
2025-06-12
06 Thomas Fossati New version approved
2025-06-12
06 (System) Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org
2025-06-12
06 Thomas Fossati Uploaded new revision
2025-06-12
06 (System) Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org
2025-06-12
06 Thomas Fossati Uploaded new revision
2025-05-08
05 Cindy Morgan IETF WG state changed to WG Document from Submitted to IESG for Publication
2025-05-08
05 Cindy Morgan IESG state changed to I-D Exists from IESG Evaluation
2025-05-08
05 Deb Cooley
[Ballot discuss]
Two items: 

I agree with Stefan Santesson's review:  https://mailarchive.ietf.org/arch/msg/secdir/yiKmZx9ivRJZfUdj5g8W1HPB5xM/  (many thanks for that secdir review)

Section 5:  These types of systems rely …
[Ballot discuss]
Two items: 

I agree with Stefan Santesson's review:  https://mailarchive.ietf.org/arch/msg/secdir/yiKmZx9ivRJZfUdj5g8W1HPB5xM/  (many thanks for that secdir review)

Section 5:  These types of systems rely on accurate time, and prompt reporting of compromised keys.  STD96 discusses the necessity of keeping private keys private, but does not discuss the prompt reporting when those keys are disclosed.  I think two short warnings (one on the necessity for the accuracy of time, and one on the prompt reporting of compromised keys) would be useful for someone using/implementing this document.  (I'm happy to help with the words for these two warnings)
2025-05-08
05 Deb Cooley [Ballot Position Update] New position, Discuss, has been recorded for Deb Cooley
2025-05-07
05 Mike Bishop
[Ballot comment]
I support Roman's DISCUSS regarding charter status. The remaining comments can hopefully be used to improve the document if and when it is …
[Ballot comment]
I support Roman's DISCUSS regarding charter status. The remaining comments can hopefully be used to improve the document if and when it is submitted by a WG whose charter permits it.

The 2119 MUST in the first sentence of 3.x is unnecessary -- if a different field were used, it wouldn't be what's defined in this specification. You can simply say that these headers are used for the corresponding purposes. However, a more useful 2119 keyword might be in mandating that the header be protected/unprotected as appropriate; if this header appears in the wrong section then the security properties won't apply.

The examples in 3.2.x don't specify behavior; they might be better placed in Appendix A, which already contains examples. (Do the two sets of examples illustrate different things?)
2025-05-07
05 Mike Bishop [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop
2025-05-07
05 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2025-05-06
05 Gunter Van de Velde [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde
2025-05-06
05 Éric Vyncke
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-cose-tsa-tst-header-parameter-05
CC @evyncke

Thank you for the work put into this document.

Please find below some …
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-cose-tsa-tst-header-parameter-05
CC @evyncke

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points.

Special thanks to Michael Jones for the shepherd's write-up including the WG consensus but the justification of the intended status is rather light.

Other thanks to Alexey Melnikov, the IoT directorate reviewer (at my request), please consider this int-dir review:
https://datatracker.ietf.org/doc/review-ietf-cose-tsa-tst-header-parameter-05-iotdir-telechat-melnikov-2025-04-30/ (and I have read Thomas' reply)

I hope that this review helps to improve the document,

Regards,

-éric

## COMMENTS (non-blocking)

### Fit the COSE charter ?

I support Roman's DISCUSS on this I-D not fitting the COSE charter.

### Section 1.1

Please expand "TSA" at first use.

Add reference(s) for TSA (RFC 3161 ?) & "Transparency Service".

### Section 2

Isn't 'boxes' unclear in `by allowing multiple private-key boxes` ?

### Section 2.1

Thanks for using SVG graphics, much cleaner.

Should clock also be considered as input in the TSA box in figure 1 ? The graphics seems to indicate that the private key is feeded in the clock...
2025-05-06
05 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2025-05-05
05 Orie Steele
[Ballot discuss]
# Orie Steele, ART AD, comments for draft-ietf-cose-tsa-tst-header-parameter-05
CC @OR13

* line numbers:
  - https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-cose-tsa-tst-header-parameter-05.txt&submitcheck=True

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Discuss

Thanks to Shuping Peng for the ARTART review.

### Transparency Service

The term is capitalized, but no definition is provided.
Given the origin of the draft in scitt, its implied that this is the same TS that the SCITT Architecture describes.
However, SCITT architecture does not support registering anything in the unprotected header (can't support CTT).

https://datatracker.ietf.org/doc/html/draft-ietf-scitt-architecture-11#section-6.2-6

### CTT

```
122   entry cannot be changed.  In certain cases, such as when a short-
123   lived certificate is used for the signature, the registration policy
124   of a Transparency Service may add a trustworthy timestamp to the
125   signed document.  This is done to lock the signature to a specific
126   point in time.  To achieve this, the Transparency Service acquires a
127   TST from a TSA, bundles it alongside the signed document, and then
128   registers it.  A relying party that wants to ascertain the
129   authenticity of the document after the signing key has expired (or
130   has been compromised), can do so by making sure that no revocation
131   information has been made public before the time asserted in the TST.
```

MUST the TSA be a separate entity from the Transparency Service?

Is it possible for the document signer to supply the TST instead of the Transparency Service?

What happens if there is already a TST present, when the Transparency Service receives the cose object?
2025-05-05
05 Orie Steele [Ballot Position Update] New position, Discuss, has been recorded for Orie Steele
2025-05-02
05 (System) IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2025-05-02
05 Roman Danyliw
[Ballot discuss]
For the responsible AD and WG chairs -- this document is not in scope for the current WG charter.  My understanding of its …
[Ballot discuss]
For the responsible AD and WG chairs -- this document is not in scope for the current WG charter.  My understanding of its substance is that it defines two, new COSE attributes.  The approved -03 charter explicitly says:

“The WG will produce documents for new attributes only if they are in the
list of deliverables below. A re-charter will be required to expand that list.
The WG is expected as part of normal processing to review and comment on
attributes that are not in charter but are of general public interest.”

There is no subsequent reference to work about specifying timestamp related attributes in the work items section of the charter (or any other place).
2025-05-02
05 Roman Danyliw [Ballot comment]
Thank you to Linda Dunbar for the GENART review.
2025-05-02
05 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2025-04-30
05 Alexey Melnikov Request for Telechat review by IOTDIR Completed: Ready. Reviewer: Alexey Melnikov. Sent review to list.
2025-04-29
05 Andy Newton [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton
2025-04-26
05 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2025-04-24
05 Mohamed Boucadair
[Ballot comment]
Hi Henk, Thomas, and Maik,

Thank you for the effort put into this specification.

Thanks to Yingzhen Qu for the OPSDIR review.

The …
[Ballot comment]
Hi Henk, Thomas, and Maik,

Thank you for the effort put into this specification.

Thanks to Yingzhen Qu for the OPSDIR review.

The spec is straightforward. There are some guidelines when manipulating timestamps (e.g., rfc8877), but I don’t think those apply here.

I trust the authors have validated all the examples.

Please find below some few comments:

# Hash details: can we have an authoritative reference to zoom more about how the hash is computed/validated?

CURRENT:
  The MessageImprint sent to the TSA (Section 2.4 of [RFC3161]) MUST be
  the hash of the payload of the COSE signed object. 

# Add a normative reference to RFC 8792 as that is required for unfolding

# The use of folding is not consistent

For example, this is not used in 3.2.1, while it is used in other examples.

# Check/fix some uses of folding in the last example, in particular:

CURRENT:
      / signature / h'8eb33e4ca31d1c465ab05aac34cc6b23d58fef5c083106c4
  d25a91aef0b0117e2af9a291aa32e14ab834dc56ed2a223444547e01f11d3b0916e5
  a4c345cacb36'

Thank you.

Cheers,
Med
2025-04-24
05 Mohamed Boucadair [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair
2025-04-16
05 Ines Robles Request for Telechat review by IOTDIR is assigned to Alexey Melnikov
2025-04-16
05 Ines Robles Assignment of request for Telechat review by IOTDIR to Hannes Tschofenig was rejected
2025-04-14
05 Ines Robles Request for Telechat review by IOTDIR is assigned to Hannes Tschofenig
2025-04-14
05 Éric Vyncke Requested Telechat review by IOTDIR
2025-04-02
05 Stefan Santesson Request for Telechat review by SECDIR Completed: Serious Issues. Reviewer: Stefan Santesson. Sent review to list. Submission of review completed at an earlier date.
2025-04-02
05 Stefan Santesson Request for Telechat review by SECDIR Completed: Serious Issues. Reviewer: Stefan Santesson.
2025-03-28
05 Tero Kivinen Request for Telechat review by SECDIR is assigned to Stefan Santesson
2025-03-25
05 Thomas Fossati New version available: draft-ietf-cose-tsa-tst-header-parameter-05.txt
2025-03-25
05 Thomas Fossati New version approved
2025-03-25
05 (System) Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org
2025-03-25
05 Thomas Fossati Uploaded new revision
2025-03-13
04 Stefan Santesson Request for Telechat review by SECDIR Completed: Serious Issues. Reviewer: Stefan Santesson. Sent review to list.
2025-03-13
04 Tero Kivinen Request for Telechat review by SECDIR is assigned to Stefan Santesson
2025-03-11
04 Cindy Morgan Placed on agenda for telechat - 2025-05-08
2025-03-11
04 Paul Wouters Ballot has been issued
2025-03-11
04 Paul Wouters [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters
2025-03-11
04 Paul Wouters Created "Approve" ballot
2025-03-11
04 Paul Wouters IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2025-03-11
04 Paul Wouters Ballot writeup was changed
2025-02-05
04 David Dong IANA Experts State changed to Expert Reviews OK from Reviews assigned
2025-01-22
04 (System) IANA Review state changed to Version Changed - Review Needed from IANA - Not OK
2025-01-22
04 Thomas Fossati New version available: draft-ietf-cose-tsa-tst-header-parameter-04.txt
2025-01-22
04 (System) New version approved
2025-01-22
04 (System) Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org
2025-01-22
04 Thomas Fossati Uploaded new revision
2025-01-13
03 Yingzhen Qu Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Yingzhen Qu. Sent review to list.
2025-01-13
03 David Dong
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-cose-tsa-tst-header-parameter-03. If any part of this review is inaccurate, please let us know.

IANA understands that, upon …
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-cose-tsa-tst-header-parameter-03. If any part of this review is inaccurate, please let us know.

IANA understands that, upon approval of this document, there is a single action which we must complete.

In the COSE Header Parameters registry in the CBOR Object Signing and Encryption (COSE) registry group located at:

https://www.iana.org/assignments/cose/

two new parameters will be registered as follows:

Name: 3161-tcc
Label: [ TBD-at-Registration ]
Value Type: bstr
Value Registry:
Description: RFC 3161 timestamp token
Reference: [ RFC-to-be; Section 3.1 ]

Name: 3161-ctt
Label: [ TBD-at-Registration ]
Value Type: bstr
Value Registry:
Description: RFC 3161 timestamp token
Reference: [ RFC-to-be; Section 3.2 ]

As this document requests registrations in an Expert Review or Specification Required (see RFC 8126) registry, we have initiated the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK."

We understand that this is the only action required to be completed upon approval of this document.

NOTE: The action requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the action that will be performed.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Sr. Specialist
2025-01-13
03 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2025-01-13
03 David Dong IANA Experts State changed to Reviews assigned
2025-01-13
03 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2025-01-11
03 Linda Dunbar Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Linda Dunbar. Sent review to list.
2024-12-28
03 Shuping Peng Request for Last Call review by ARTART Completed: Ready with Issues. Reviewer: Shuping Peng. Sent review to list.
2024-12-27
03 Jean Mahoney Request for Last Call review by GENART is assigned to Linda Dunbar
2024-12-27
03 Carlos Pignataro Request for Last Call review by OPSDIR is assigned to Yingzhen Qu
2024-12-27
03 Barry Leiba Request for Last Call review by ARTART is assigned to Shuping Peng
2024-12-23
03 Jenny Bui IANA Review state changed to IANA - Review Needed
2024-12-23
03 Jenny Bui
The following Last Call announcement was sent out (ends 2025-01-13):

From: The IESG
To: IETF-Announce
CC: cose-chairs@ietf.org, cose@ietf.org, draft-ietf-cose-tsa-tst-header-parameter@ietf.org, michael_b_jones@hotmail.com, paul.wouters@aiven.io …
The following Last Call announcement was sent out (ends 2025-01-13):

From: The IESG
To: IETF-Announce
CC: cose-chairs@ietf.org, cose@ietf.org, draft-ietf-cose-tsa-tst-header-parameter@ietf.org, michael_b_jones@hotmail.com, paul.wouters@aiven.io
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (COSE Header parameter for RFC 3161 Time-Stamp Tokens) to Proposed Standard


The IESG has received a request from the CBOR Object Signing and Encryption
WG (cose) to consider the following document: - 'COSE Header parameter for
RFC 3161 Time-Stamp Tokens'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2025-01-13. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document defines a CBOR Signing And Encrypted (COSE) header
  parameter for incorporating RFC 3161-based timestamping into COSE
  message structures (COSE_Sign and COSE_Sign1).  This enables the use
  of established RFC 3161 timestamping infrastructure to prove the
  creation time of a message.

Discussion Venues

  This note is to be removed before publishing as an RFC.

  Source for this draft and an issue tracker can be found at
  https://github.com/ietf-scitt/draft-birkholz-cose-tsa-tst-header-
  parameter.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-cose-tsa-tst-header-parameter/



No IPR declarations have been submitted directly on this I-D.




2024-12-23
03 Jenny Bui IESG state changed to In Last Call from Last Call Requested
2024-12-23
03 Jenny Bui Last call announcement was changed
2024-12-23
03 Jenny Bui Last call announcement was generated
2024-12-22
03 Paul Wouters Last call was requested
2024-12-22
03 Paul Wouters Ballot approval text was generated
2024-12-22
03 Paul Wouters Ballot writeup was generated
2024-12-22
03 Paul Wouters IESG state changed to Last Call Requested from Publication Requested
2024-12-22
03 Paul Wouters Last call announcement was changed
2024-12-19
03 Michael Jones
Document History

Does the working group (WG) consensus represent the strong concurrence of a
few individuals, with others being silent, or did it reach broad …
Document History

Does the working group (WG) consensus represent the strong concurrence of a
few individuals, with others being silent, or did it reach broad agreement?

The specification does one simple thing that has working group support.  Most of the on-list discussion happened during WGLC, with about 10 people participating, some providing substantive feedback that was addressed after WGLC.  The document has working group consensus.

Was there controversy about particular points, or were there decisions where
the consensus was particularly rough?

The was not controversy.  The feedback received was largely about the exposition.  This is bringing an existing mechanism to COSE.

Has anyone threatened an appeal or otherwise indicated extreme discontent? If
so, please summarize the areas of conflict in separate email messages to the
responsible Area Director. (It should be in a separate email because this
questionnaire is publicly available.)

I am not aware of any threatened appeals or extreme discomfort.

For protocol documents, are there existing implementations of the contents of
the document? Have a significant number of potential implementers indicated
plans to implement? Are any existing implementations reported somewhere,
either in the document itself (as RFC 7942 recommends) or elsewhere
(where)?

C2PA 2.1 uses this specification, and is implemented by Microsoft, Google, and Trupic.  Measur.io has an implementation.

Additional Reviews

Do the contents of this document closely interact with technologies in other
IETF working groups or external organizations, and would it therefore benefit
from their review? Have those reviews occurred? If yes, describe which
reviews took place.

Not that I'm aware of.

Describe how the document meets any required formal expert review criteria,
such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No such criteria apply.

If the document contains a YANG module, has the final version of the module
been checked with any of the recommended validation tools for syntax and
formatting validation? If there are any resulting errors or warnings, what is
the justification for not fixing them at this time? Does the YANG module
comply with the Network Management Datastore Architecture (NMDA) as specified
in RFC 8342?

The document contains no YANG module.

Describe reviews and automated checks performed to validate sections of the
final version of the document written in a formal language, such as XML code,
BNF rules, MIB definitions, CBOR's CDDL, etc.

Document Shepherd Checks

Based on the shepherd's review of the document, is it their opinion that this
document is needed, clearly written, complete, correctly designed, and ready
to be handed off to the responsible Area Director?

This document solves a narrow but useful problem and solves it well.  It is ready to hand off to our AD.

Several IETF Areas have assembled lists of common issues that their
reviewers encounter. For which areas have such issues been identified
and addressed? For which does this still need to happen in subsequent
reviews?

It doesn't appear that most of the common Security Area issues at https://wiki.ietf.org/group/sec/typicalSECareaissues apply, other than Thread Models, which are discussed in the Security Considerations section.

What type of RFC publication is being requested on the IETF stream (Best
Current Practice, Proposed Standard, Internet Standard,
Informational, Experimental or Historic)? Why is this the proper type
of RFC? Do all Datatracker state attributes correctly reflect this intent?

Proposed Standard status is being requested, and is accurately reflected in the datatracker.  This status seems appropriate for the specification.

Have reasonable efforts been made to remind all authors of the intellectual
property rights (IPR) disclosure obligations described in BCP 79? To
the best of your knowledge, have all required disclosures been filed? If
not, explain why. If yes, summarize any relevant discussion, including links
to publicly-available messages when applicable.

All three authors have responded that they are not aware of any IPR considerations that apply to the specification.

Has each author, editor, and contributor shown their willingness to be
listed as such? If the total number of authors and editors on the front page
is greater than five, please provide a justification.

Yes, they are willing.

Document any remaining I-D nits in this document. Simply running the idnits
tool is not enough; please review the "Content Guidelines" on
authors.ietf.org. (Also note that the current idnits tool generates
some incorrect warnings; a rewrite is underway.)

I believe that the reference [IANA.cose_header-parameters] should be informative.  Also, stylistially, it would appear to be better to use either dash or underscore in the reference, but not both in a mixed fashion.

Should any informative references be normative or vice-versa? See the IESG
Statement on Normative and Informative References.

I believe that the reference [IANA.cose_header-parameters] should be informative.

List any normative references that are not freely available to anyone. Did
the community have sufficient access to review any such normative
references?

There are no such references.

Are there any normative downward references (see RFC 3967 and BCP
97
) that are not already listed in the DOWNREF registry? If so,
list them.

There are no such references.

Are there normative references to documents that are not ready to be
submitted to the IESG for publication or are otherwise in an unclear state?
If so, what is the plan for their completion?

There are no such references.

Will publication of this document change the status of any existing RFCs? If
so, does the Datatracker metadata correctly reflect this and are those RFCs
listed on the title page, in the abstract, and discussed in the
introduction? If not, explain why and point to the part of the document
where the relationship of this document to these other RFCs is discussed.

Publication of this document will not change the status of any existing RFCs.

Describe the document shepherd's review of the IANA considerations section,
especially with regard to its consistency with the body of the document.
Confirm that all aspects of the document requiring IANA assignments are
associated with the appropriate reservations in IANA registries. Confirm
that any referenced IANA registries have been clearly identified. Confirm
that each newly created IANA registry specifies its initial contents,
allocations procedures, and a reasonable name (see RFC 8126).

The IANA Considerations section appears to be consistent with the rest of the specification.

List any new IANA registries that require Designated Expert Review for
future allocations. Are the instructions to the Designated Expert clear?
Please include suggestions of designated experts, if appropriate.

The specification creates no new IANA registries.
2024-12-19
03 Michael Jones IETF WG state changed to Submitted to IESG for Publication from WG Document
2024-12-19
03 Michael Jones IESG state changed to Publication Requested from I-D Exists
2024-12-19
03 (System) Changed action holders to Paul Wouters (IESG state changed)
2024-12-19
03 Michael Jones Responsible AD changed to Paul Wouters
2024-12-19
03 Michael Jones Document is now in IESG state Publication Requested
2024-12-19
03 Michael Jones
Document History

Does the working group (WG) consensus represent the strong concurrence of a
few individuals, with others being silent, or did it reach broad …
Document History

Does the working group (WG) consensus represent the strong concurrence of a
few individuals, with others being silent, or did it reach broad agreement?

The specification does one simple thing that has working group support.  Most of the on-list discussion happened during WGLC, with about 10 people participating, some providing substantive feedback that was addressed after WGLC.  The document has working group consensus.

Was there controversy about particular points, or were there decisions where
the consensus was particularly rough?

The was not controversy.  The feedback received was largely about the exposition.  This is bringing an existing mechanism to COSE.

Has anyone threatened an appeal or otherwise indicated extreme discontent? If
so, please summarize the areas of conflict in separate email messages to the
responsible Area Director. (It should be in a separate email because this
questionnaire is publicly available.)

I am not aware of any threatened appeals or extreme discomfort.

For protocol documents, are there existing implementations of the contents of
the document? Have a significant number of potential implementers indicated
plans to implement? Are any existing implementations reported somewhere,
either in the document itself (as RFC 7942 recommends) or elsewhere
(where)?

C2PA 2.1 uses this specification, and is implemented by Microsoft, Google, and Trupic.  Measur.io has an implementation.

Additional Reviews

Do the contents of this document closely interact with technologies in other
IETF working groups or external organizations, and would it therefore benefit
from their review? Have those reviews occurred? If yes, describe which
reviews took place.

Not that I'm aware of.

Describe how the document meets any required formal expert review criteria,
such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No such criteria apply.

If the document contains a YANG module, has the final version of the module
been checked with any of the recommended validation tools for syntax and
formatting validation? If there are any resulting errors or warnings, what is
the justification for not fixing them at this time? Does the YANG module
comply with the Network Management Datastore Architecture (NMDA) as specified
in RFC 8342?

The document contains no YANG module.

Describe reviews and automated checks performed to validate sections of the
final version of the document written in a formal language, such as XML code,
BNF rules, MIB definitions, CBOR's CDDL, etc.

Document Shepherd Checks

Based on the shepherd's review of the document, is it their opinion that this
document is needed, clearly written, complete, correctly designed, and ready
to be handed off to the responsible Area Director?

This document solves a narrow but useful problem and solves it well.  It is ready to hand off to our AD.

Several IETF Areas have assembled lists of common issues that their
reviewers encounter. For which areas have such issues been identified
and addressed? For which does this still need to happen in subsequent
reviews?

It doesn't appear that most of the common Security Area issues at https://wiki.ietf.org/group/sec/typicalSECareaissues apply, other than Thread Models, which are discussed in the Security Considerations section.

What type of RFC publication is being requested on the IETF stream (Best
Current Practice, Proposed Standard, Internet Standard,
Informational, Experimental or Historic)? Why is this the proper type
of RFC? Do all Datatracker state attributes correctly reflect this intent?

Proposed Standard status is being requested, and is accurately reflected in the datatracker.  This status seems appropriate for the specification.

Have reasonable efforts been made to remind all authors of the intellectual
property rights (IPR) disclosure obligations described in BCP 79? To
the best of your knowledge, have all required disclosures been filed? If
not, explain why. If yes, summarize any relevant discussion, including links
to publicly-available messages when applicable.

All three authors have responded that they are not aware of any IPR considerations that apply to the specification.

Has each author, editor, and contributor shown their willingness to be
listed as such? If the total number of authors and editors on the front page
is greater than five, please provide a justification.

Yes, they are willing.

Document any remaining I-D nits in this document. Simply running the idnits
tool is not enough; please review the "Content Guidelines" on
authors.ietf.org. (Also note that the current idnits tool generates
some incorrect warnings; a rewrite is underway.)

I believe that the reference [IANA.cose_header-parameters] should be informative.  Also, stylistially, it would appear to be better to use either dash or underscore in the reference, but not both in a mixed fashion.

Should any informative references be normative or vice-versa? See the IESG
Statement on Normative and Informative References.

I believe that the reference [IANA.cose_header-parameters] should be informative.

List any normative references that are not freely available to anyone. Did
the community have sufficient access to review any such normative
references?

There are no such references.

Are there any normative downward references (see RFC 3967 and BCP
97
) that are not already listed in the DOWNREF registry? If so,
list them.

There are no such references.

Are there normative references to documents that are not ready to be
submitted to the IESG for publication or are otherwise in an unclear state?
If so, what is the plan for their completion?

There are no such references.

Will publication of this document change the status of any existing RFCs? If
so, does the Datatracker metadata correctly reflect this and are those RFCs
listed on the title page, in the abstract, and discussed in the
introduction? If not, explain why and point to the part of the document
where the relationship of this document to these other RFCs is discussed.

Publication of this document will not change the status of any existing RFCs.

Describe the document shepherd's review of the IANA considerations section,
especially with regard to its consistency with the body of the document.
Confirm that all aspects of the document requiring IANA assignments are
associated with the appropriate reservations in IANA registries. Confirm
that any referenced IANA registries have been clearly identified. Confirm
that each newly created IANA registry specifies its initial contents,
allocations procedures, and a reasonable name (see RFC 8126).

The IANA Considerations section appears to be consistent with the rest of the specification.

List any new IANA registries that require Designated Expert Review for
future allocations. Are the instructions to the Designated Expert clear?
Please include suggestions of designated experts, if appropriate.

The specification creates no new IANA registries.
2024-11-08
03 Ivaylo Petrov Changed consensus to Yes from Unknown
2024-11-08
03 Ivaylo Petrov Intended Status changed to Proposed Standard from None
2024-11-08
03 Ivaylo Petrov Notification list changed to michael_b_jones@hotmail.com because the document shepherd was set
2024-11-08
03 Ivaylo Petrov Document shepherd changed to Michael B. Jones
2024-09-10
03 Thomas Fossati New version available: draft-ietf-cose-tsa-tst-header-parameter-03.txt
2024-09-10
03 Thomas Fossati New version accepted (logged-in submitter: Thomas Fossati)
2024-09-10
03 Thomas Fossati Uploaded new revision
2024-08-27
02 (System) Document has expired
2024-07-22
03 (System) Request for posting confirmation emailed to previous authors: Henk Birkholz , Maik Riechert , Thomas Fossati , cose-chairs@ietf.org
2024-07-22
03 Carsten Bormann Uploaded new revision
2024-02-24
02 Thomas Fossati New version available: draft-ietf-cose-tsa-tst-header-parameter-02.txt
2024-02-24
02 Thomas Fossati New version accepted (logged-in submitter: Thomas Fossati)
2024-02-24
02 Thomas Fossati Uploaded new revision
2023-11-07
01 Thomas Fossati New version available: draft-ietf-cose-tsa-tst-header-parameter-01.txt
2023-11-07
01 Thomas Fossati New version accepted (logged-in submitter: Thomas Fossati)
2023-11-07
01 Thomas Fossati Uploaded new revision
2023-09-10
00 Michael Jones This document now replaces draft-birkholz-cose-tsa-tst-header-parameter instead of None
2023-09-10
00 Henk Birkholz New version available: draft-ietf-cose-tsa-tst-header-parameter-00.txt
2023-09-10
00 Michael Jones WG -00 approved
2023-09-10
00 Henk Birkholz Set submitter to "Henk Birkholz ", replaces to draft-birkholz-cose-tsa-tst-header-parameter and sent approval email to group chairs: cose-chairs@ietf.org
2023-09-10
00 Henk Birkholz Uploaded new revision