Skip to main content

Last Call Review of draft-ietf-sacm-coswid-18

Request Review of draft-ietf-sacm-coswid
Requested revision No specific revision (document currently at 24)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2021-08-09
Requested 2021-07-26
Authors Henk Birkholz , Jessica Fitzgerald-McKay , Charles Schmidt , David Waltermire
I-D last updated 2021-08-11
Completed reviews Artart Last Call review of -18 by Rich Salz (diff)
Opsdir Last Call review of -18 by Scott O. Bradner (diff)
Secdir Last Call review of -18 by Robert Sparks (diff)
Secdir Telechat review of -20 by Robert Sparks (diff)
Assignment Reviewer Robert Sparks
State Completed
Request Last Call review on draft-ietf-sacm-coswid by Security Area Directorate Assigned
Posted at
Reviewed revision 18 (document currently at 24)
Result Has issues
Completed 2021-08-11
I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG. These comments
were written primarily for the benefit of the security area directors. Document
editors and WG chairs should treat these comments just like any other last call

This document has issues to address before publication as a Proposed Standard


This document defines a representation of software identification using CBOR
leveraging COSE. It attempts to reflect what can be represented with SWIDs XML
to the degree possible, and is capable of representing things that SWID cannot.

The SWID specification is behind a paywall. I have not read it, and cannot
comment on whether there are security considerations discussed there that are
well known by people with a lot of experience with this technology which may
not be explicitly reflected in this document by way of omission-because-obvious.

Ambiguity in the SWID spec is explicitly imported as ambiguity in this one
(see, in particular, the definition of "media (index 10)".

The considerations section spends some time discussing challenges around
signature validation, particularly with a declared out-of-scope identification
of a need for "an association between the signature and the tag's entity item
associated corresponding to the software provider." I am not yet comfortable
that I understand the ramifications of this discussion, and encourage the ADs
to look closely.

Major Issue:

This document needs to discuss privacy issues around the creation, transport,
and storage of CoSWID objects. I suggest leaning on the style of the discussion
in the security considerations section of RFC8412, noting the potential issues
with identifying the primary user of a system, that user's rights on the
system, and (when evidence is present) exposure of runtime information.

Should there be discussion of recovery from loss of control of the signing
credentials specific to CoSWID? For example, would a tag-id have to be
abandoned after such a loss?

Minor Issues:

In section 2.1, do you want to constrain names that can be registered to a
subset of what validates as NMToken? What XML allows there may be surprising.
There may also be a need to inspect what you're pointing to for a definition.
If you follow the current reference
(, you have to follow
through to the obsoleted, which
in the expansion of NMToken allows a wide range of things by way of
CombiningChar and Extender. Note that the rules in the current spec at and have a different production. Your point
is to make sure that anything you register will survive parsing when used in
SWID, so restricting to an even smaller subset should be ok. And fwiw, your
capitalization "NMToken" doesn't match any of the inconsistent variants of the
production in the referenced doc.

At 2.6 reg-id (index 32) you say "The scope SHOULD be the scope of an
organization." Could you add some text motivating why, and what trouble arises
from using other scopes? Or would the sentence be better stated as "The scope
will usually be the scope of an organization."?

At 2.9.1 I worry that "The hash-value byte string value MUST represent the raw
hash value of the hashed resource generated using the hash algorithm indicated
by the hash-alg-id." is underspecified. The diagram in RC6920 section 6 and
some of its examples convey what's meant a little better perhaps. Is there a
way to help avoid getting a string that looks like

Consider RFC6648 (BCP 178) where you are reserving "x_" name prefixes for
private use.

Consider setting the contact for the IANA registrations to a group, area, or
the IESG instead of a person.


This sentence really needs this comma:

  OLD: In the context of software tagging software patching and updating differ
  in an important way.

  NEW: In the context of software tagging, software patching and updating
  differ in an important way.

In section 2, I suggest:

  OLD: As such, it is not always possible to mechanically translate between
  corresponding attribute names in the two formats.  In such cases, a manual
  mapping will need to be used.

  NEW: As such, it is not always possible to simply transform corresponding
  attribute names between the two formats. In such cases, an explicitly
  provided mapping will need to be used.

Consider repeating the observation of SWIDs lack of advice about media
(provided in section 2.3) when it comes up in 2.4.