<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-tsa-tst-header-parameter-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="TST Header">COSE Header parameter for RFC 3161 Time-Stamp Tokens</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-tsa-tst-header-parameter-01"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author initials="M." surname="Riechert" fullname="Maik Riechert">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Maik.Riechert@microsoft.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="07"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 51?>

<t>RFC 3161 provides a method for timestamping a message digest to prove that the message was created before a given time.
This document defines a CBOR Signing And Encrypted (COSE) header parameter that can be used to combine COSE message structures used for signing (i.e., COSE_Sign and COSE_Sign1) with existing RFC 3161-based timestamping infrastructure.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-scitt/draft-birkholz-cose-tsa-tst-header-parameter"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>RFC 3161 <xref target="RFC3161"/> provides a method to timestamp a message digest to prove that it was created before a given time.</t>
      <t>This document defines a new COSE <xref target="STD96"/> header parameter that carries the TimestampToken (TST) output of RFC 3161, thus allowing existing and widely deployed trust infrastructure to be used with COSE structures used for signing (COSE_Sign and COSE_Sign1).</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="modes-of-use">
      <name>Modes of use</name>
      <t>There are two different modes of composing COSE protection and timestamping.</t>
      <section anchor="sec-timestamp-then-cose">
        <name>Timestamp then COSE</name>
        <t><xref target="fig-timestamp-then-cose"/> shows the case where a datum is first digested and submitted to a TSA to be timestamped.</t>
        <t>A signed COSE message is then built as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The obtained timestamp token is added to the protected headers,</t>
          </li>
          <li>
            <t>The original datum becomes the payload of the signed COSE message.</t>
          </li>
        </ul>
        <figure anchor="fig-timestamp-then-cose">
          <name>Timestamp, then COSE</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="576" viewBox="0 0 576 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 48,64 L 48,128" fill="none" stroke="black"/>
                <path d="M 88,32 L 88,64" fill="none" stroke="black"/>
                <path d="M 88,112 L 88,144" fill="none" stroke="black"/>
                <path d="M 136,112 L 136,144" fill="none" stroke="black"/>
                <path d="M 184,112 L 184,144" fill="none" stroke="black"/>
                <path d="M 208,32 L 208,64" fill="none" stroke="black"/>
                <path d="M 232,112 L 232,144" fill="none" stroke="black"/>
                <path d="M 264,72 L 264,128" fill="none" stroke="black"/>
                <path d="M 336,32 L 336,64" fill="none" stroke="black"/>
                <path d="M 384,32 L 384,64" fill="none" stroke="black"/>
                <path d="M 568,32 L 568,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 88,32" fill="none" stroke="black"/>
                <path d="M 208,32 L 336,32" fill="none" stroke="black"/>
                <path d="M 384,32 L 568,32" fill="none" stroke="black"/>
                <path d="M 88,48 L 200,48" fill="none" stroke="black"/>
                <path d="M 336,48 L 376,48" fill="none" stroke="black"/>
                <path d="M 8,64 L 88,64" fill="none" stroke="black"/>
                <path d="M 208,64 L 336,64" fill="none" stroke="black"/>
                <path d="M 384,64 L 568,64" fill="none" stroke="black"/>
                <path d="M 104,96 L 120,96" fill="none" stroke="black"/>
                <path d="M 184,112 L 232,112" fill="none" stroke="black"/>
                <path d="M 48,128 L 80,128" fill="none" stroke="black"/>
                <path d="M 136,128 L 176,128" fill="none" stroke="black"/>
                <path d="M 232,128 L 264,128" fill="none" stroke="black"/>
                <path d="M 184,144 L 232,144" fill="none" stroke="black"/>
                <path d="M 104,160 L 120,160" fill="none" stroke="black"/>
                <path d="M 104,96 C 95.16936,96 88,103.16936 88,112" fill="none" stroke="black"/>
                <path d="M 120,96 C 128.83064,96 136,103.16936 136,112" fill="none" stroke="black"/>
                <path d="M 104,160 C 95.16936,160 88,152.83064 88,144" fill="none" stroke="black"/>
                <path d="M 120,160 C 128.83064,160 136,152.83064 136,144" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="384,48 372,42.4 372,53.6" fill="black" transform="rotate(0,376,48)"/>
                <polygon class="arrowhead" points="272,72 260,66.4 260,77.6" fill="black" transform="rotate(270,264,72)"/>
                <polygon class="arrowhead" points="208,48 196,42.4 196,53.6" fill="black" transform="rotate(0,200,48)"/>
                <polygon class="arrowhead" points="184,128 172,122.4 172,133.6" fill="black" transform="rotate(0,176,128)"/>
                <polygon class="arrowhead" points="88,128 76,122.4 76,133.6" fill="black" transform="rotate(0,80,128)"/>
                <g class="text">
                  <text x="48" y="52">payload</text>
                  <text x="272" y="52">Sig_structure</text>
                  <text x="476" y="52">COSE_Sign/COSE_Sign1</text>
                  <text x="112" y="132">TSA</text>
                  <text x="208" y="132">TST</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
.---------.              .---------------.     .----------------------.
| payload +------------->| Sig_structure +---->| COSE_Sign/COSE_Sign1 |
'----+----'              '---------------'     '----------------------'
     |                          ^
     |     .---.                |
     |    |     |     .-----.   |
     '--->| TSA +---->| TST +---'
          |     |     '-----'
           '---'
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="sec-cose-then-timestamp">
        <name>COSE then Timestamp</name>
        <t><xref target="fig-cose-then-timestamp"/> shows the case where the signature(s) field of the signed COSE object is digested and submitted to a TSA to be timestamped.
The obtained timestamp token is then added back as an unprotected header into the same COSE object.</t>
        <t>In this context, timestamp tokens are similar to a countersignature <xref target="RFC9338"/> made by the TSA.</t>
        <figure anchor="fig-cose-then-timestamp">
          <name>COSE, then Timestamp</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="328" viewBox="0 0 328 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
                <path d="M 48,64 L 48,104" fill="none" stroke="black"/>
                <path d="M 48,144 L 48,192" fill="none" stroke="black"/>
                <path d="M 192,32 L 192,64" fill="none" stroke="black"/>
                <path d="M 192,112 L 192,144" fill="none" stroke="black"/>
                <path d="M 216,176 L 216,208" fill="none" stroke="black"/>
                <path d="M 264,176 L 264,208" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,64" fill="none" stroke="black"/>
                <path d="M 296,72 L 296,192" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 192,32" fill="none" stroke="black"/>
                <path d="M 272,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 200,48 L 272,48" fill="none" stroke="black"/>
                <path d="M 8,64 L 192,64" fill="none" stroke="black"/>
                <path d="M 272,64 L 320,64" fill="none" stroke="black"/>
                <path d="M 8,112 L 192,112" fill="none" stroke="black"/>
                <path d="M 8,144 L 192,144" fill="none" stroke="black"/>
                <path d="M 232,160 L 248,160" fill="none" stroke="black"/>
                <path d="M 48,192 L 208,192" fill="none" stroke="black"/>
                <path d="M 264,192 L 296,192" fill="none" stroke="black"/>
                <path d="M 232,224 L 248,224" fill="none" stroke="black"/>
                <path d="M 232,160 C 223.16936,160 216,167.16936 216,176" fill="none" stroke="black"/>
                <path d="M 248,160 C 256.83064,160 264,167.16936 264,176" fill="none" stroke="black"/>
                <path d="M 232,224 C 223.16936,224 216,216.83064 216,208" fill="none" stroke="black"/>
                <path d="M 248,224 C 256.83064,224 264,216.83064 264,208" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="304,72 292,66.4 292,77.6" fill="black" transform="rotate(270,296,72)"/>
                <polygon class="arrowhead" points="216,192 204,186.4 204,197.6" fill="black" transform="rotate(0,208,192)"/>
                <polygon class="arrowhead" points="208,48 196,42.4 196,53.6" fill="black" transform="rotate(180,200,48)"/>
                <polygon class="arrowhead" points="56,104 44,98.4 44,109.6" fill="black" transform="rotate(90,48,104)"/>
                <g class="text">
                  <text x="100" y="52">COSE_Sign/COSE_Sign1</text>
                  <text x="296" y="52">TST</text>
                  <text x="100" y="132">signatures/signature</text>
                  <text x="240" y="196">TSA</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
.----------------------.         .-----.
| COSE_Sign/COSE_Sign1 |<--------+ TST |
'----+-----------------'         '-----'
     |                              ^
     v                              |
.----------------------.            |
| signatures/signature |            |
'----+-----------------'            |
     |                     .---.    |
     |                    |     |   |
     '------------------->| TSA +---'
                          |     |
                           '---'
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="sec-tst-hdr">
      <name>RFC 3161 Time-Stamp Tokens COSE Header Parameter</name>
      <t>To carry RFC 3161 timestamp tokens in COSE signed messages, a new COSE header parameter, <tt>rfc3161-tst</tt>, is defined as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Name: rfc3161-tst</t>
        </li>
        <li>
          <t>Label: TBD</t>
        </li>
        <li>
          <t>Value Type: bstr</t>
        </li>
        <li>
          <t>Value Registry: none</t>
        </li>
        <li>
          <t>Description: RFC 3161 timestamp token</t>
        </li>
        <li>
          <t>Reference: RFCthis</t>
        </li>
      </ul>
      <t>The content of the byte string are the bytes of the DER-encoded RFC 3161 TimeStampToken structure.</t>
      <t>When used as described in <xref target="sec-timestamp-then-cose"/>, the message imprint sent to the TSA (<xref section="2.4" sectionFormat="of" target="RFC3161"/>) <bcp14>MUST</bcp14> be the hash of the payload field of the COSE signed object.</t>
      <t>When used as described in <xref target="sec-cose-then-timestamp"/>, the message imprint sent in the request to the TSA <bcp14>MUST</bcp14> be either:</t>
      <ul spacing="normal">
        <li>
          <t>the hash of the signature field of the COSE_Sign1.</t>
        </li>
        <li>
          <t>the hash of the signatures field of the COSE_Sign message.</t>
        </li>
      </ul>
      <t>In either case, to minimize dependencies, the hash algorithm <bcp14>SHOULD</bcp14> be the same as the algorithm used for signing the COSE message.  This may not be possible if the timestamp token has been obtained outside the processing context in which the COSE object is assembled.</t>
      <t>RFC 3161 timestamp tokens use CMS as signature envelope format. <xref target="STD70"/> provides the details about signature verification, and <xref target="RFC3161"/> provides the details specific to timestamp token validation.
The payload of the signed timestamp token is the TSTInfo structure defined in <xref target="RFC3161"/>, which contains the message imprint that was sent to the TSA.
The hash algorithm is contained in the message imprint structure, together with the hash itself.</t>
      <t>As part of the signature verification, the receiver <bcp14>MUST</bcp14> make sure that the message imprint in the embedded timestamp token matches either the payload or the signature fields, depending on the mode of use..</t>
      <t>Guidance is illustrated in <xref section="B" sectionFormat="of" target="RFC3161"/> via an example that shows how timestamp tokens can be used during signature verification of a timestamped message when using X.509 certificates.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations made in <xref target="RFC3161"/> as well as those of <xref target="RFC9338"/> apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add the COSE Header parameter described in <xref target="sec-tst-hdr"/> to the "COSE Header Parameters" of the <xref target="IANA.cose"/> registry.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="STD70">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3161"/>
          <seriesInfo name="DOI" value="10.17487/RFC3161"/>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.cose" target="http://www.iana.org/assignments/cose">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9338">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9338"/>
          <seriesInfo name="DOI" value="10.17487/RFC9338"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
