<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-meunier-http-message-signatures-directory-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="HTTP Message Signatures Directory">HTTP Message Signatures Directory</title>
    <seriesInfo name="Internet-Draft" value="draft-meunier-http-message-signatures-directory-00"/>
    <author fullname="Thibault Meunier">
      <organization>Cloudflare</organization>
      <address>
        <email>ot-ietf@thibault.uk</email>
      </address>
    </author>
    <date year="2025" month="April" day="15"/>
    <area>Web and Internet Transport</area>
    <workgroup>HTTP</workgroup>
    <keyword>not-yet</keyword>
    <abstract>
      <?line 47?>

<t>This document describes a method for clients using <xref target="HTTP-MESSAGE-SIGNATURES"/>
to advertise their signing keys.</t>
      <t>It defines a key directory format based on JWKS as defined in <xref section="5" sectionFormat="of" target="JWK"/>,
as well as new HTTP Method Context to allow for in-band key discovery.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://thibmeu.github.io/http-message-signatures-directory/draft-meunier-http-message-signatures-directory.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-meunier-http-message-signatures-directory/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        HTTP  mailing list (<eref target="mailto:ietf-http-wg@w3.org"/>),
        which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/thibmeu/http-message-signatures-directory"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="HTTP-MESSAGE-SIGNATURES"/> allow a signer to generate a signature over an HTTP message, and a verifier to validate it.
The specification assumes verifiers have prior knowledge of
signers' key material, requiring out-of-band key distribution mechanisms. This creates deployment
friction and limits the ability to dynamically verify signatures from previously unknown signers.</t>
      <t>This document defines:
1. A standardized key directory format based on JWKS for publishing HTTP Message Signatures keys
2. A well-known URI location for discovering these key directories
3. A new HTTP header field enabling in-band key directory location discovery</t>
      <t>Together, these mechanisms enable key distribution and discovery for HTTP Message Signatures cryptographic material.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="configuration">
      <name>Configuration</name>
      <t>The key directory is served as a JSON Web Key Set (JWKS) as defined in <xref section="5" sectionFormat="of" target="JWK"/>.
The "alg" parameter are restricted to algorithm registered against HTTP Signature Algorithms Section of <xref target="HTTP-MESSAGE-SIGNATURES-IANA"/></t>
      <t>The directory <bcp14>SHOULD</bcp14> be server over HTTPS.
The directory <bcp14>MUST</bcp14> be served with media type <tt>application/http-message-signatures-directory</tt>.</t>
      <t>Client application <bcp14>SHOULD</bcp14> validate the directory format and reject malformed entries.</t>
    </section>
    <section anchor="http-method-context-signature-agent">
      <name>HTTP Method Context <tt>Signature-Agent</tt></name>
      <t>A service sending signed requests as defined in <xref target="HTTP-MESSAGE-SIGNATURES"/> <bcp14>MAY</bcp14> include a
<tt>Signature-Agent</tt> header field to communicate its signing key directory. This header
field contains a URI allowing retrieval of an HTTP Message Signatures Directory as
defined in <xref target="configuration"/>.</t>
      <section anchor="header-field-definition">
        <name>Header Field Definition</name>
        <t>The <tt>Signature-Agent</tt> header field is an Item Structured Header <xref target="STRUCTURED-HEADERS"/>. Its value <bcp14>MUST</bcp14> be a
String containing a <xref target="URI"/>. The ABNF is:</t>
        <artwork><![CDATA[
Signature-Agent = sf-string   ; Section 3.3.3 of {{STRUCTURED-HEADERS}}
]]></artwork>
        <t>The URI scheme <bcp14>MUST</bcp14> be one of:
- <strong>https (<bcp14>RECOMMENDED</bcp14>)</strong>: Points to an HTTPS resource serving the key directory
- <strong>http</strong>: Points to an HTTP resource serving the key directory
- <strong>data</strong>: Contains an inline key directory</t>
        <t>When using the "data" URI scheme, the media type <bcp14>MUST</bcp14> be
<tt>application/http-message-signatures-directory</tt>. The content <bcp14>MAY</bcp14> be base64 encoded
as per <xref target="BASE64"/>.</t>
        <t>Multiple <tt>Signature-Agent</tt> header fields <bcp14>MAY</bcp14> be present in a request. Processors <bcp14>SHOULD</bcp14>
use the first valid URI that provides a valid key directory.</t>
        <t>TODO: for inlining, CBOR Keys could be useful</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <section anchor="key-rotation">
        <name>Key rotation</name>
        <t>Clients <bcp14>SHOULD</bcp14> implement key rotation by including multiple keys in the directory
with different validity period. When rotating keys, clients <bcp14>SHOULD</bcp14>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Add the new key to the directory before its intended use date</t>
          </li>
          <li>
            <t>Continue to include the old key until its expiration date</t>
          </li>
          <li>
            <t>Remove expired keys from the directory</t>
          </li>
        </ol>
        <t>Servers <bcp14>SHOULD</bcp14> cache the directory contents and refresh upon expiration.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Key directories enable discovery of signing keys which may reveal information about the
signing entity. Implementers should consider:</t>
      <section anchor="directory-content">
        <name>Directory Content</name>
        <t>Key directories should only contain keys actively used for signing. Including additional
keys or metadata may expose unnecessary information about the signing service.</t>
      </section>
      <section anchor="access-patterns">
        <name>Access Patterns</name>
        <t>Verifiers accessing key directories may reveal information about signature verification
patterns. Directory servers should avoid logging personally identifiable information
from directory requests.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This section contains considerations for IANA.</t>
      <section anchor="wkuri-reg">
        <name>Well-Known 'http-message-signatures-directory' URI</name>
        <t>This document updates the "Well-Known URIs" Registry <xref target="WellKnownURIs"/> with the
following values.</t>
        <table anchor="wellknownuri-values">
          <name>'http-message-signatures-directory' Well-Known URI</name>
          <thead>
            <tr>
              <th align="left">URI Suffix</th>
              <th align="left">Change Controller</th>
              <th align="left">Reference</th>
              <th align="left">Status</th>
              <th align="left">Related information</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">http-message-signatures-directory</td>
              <td align="left">IETF</td>
              <td align="left">[this document]</td>
              <td align="left">permanent</td>
              <td align="left">None</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="media-types">
        <name>Media Types</name>
        <t>The following entries should be added to the IANA "media types"
registry:</t>
        <ul spacing="normal">
          <li>
            <t>"application/http-message-signatures-directory"</t>
          </li>
        </ul>
        <t>The templates for these entries are listed below and the
reference should be this RFC.</t>
        <section anchor="applicationhttp-message-signatures-directory-media-type">
          <name>"application/http-message-signatures-directory" media type</name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>http-message-signatures-directory</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>"binary"</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t>see <xref target="security"/></t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>this specification</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Services that implement the signer role for HTTP Message
Signatures and verifiers that interact with the signer for
the purpose of validating signatures.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Additional information:</dt>
            <dd>
              <dl spacing="compact">
                <dt>Magic number(s):</dt>
                <dd>N/A</dd>
                <dt>Deprecated alias names for this type:</dt>
                <dd>N/A</dd>
                <dt>File extension(s):</dt>
                <dd>N/A</dd>
                <dt>Macintosh file type code(s):</dt>
                <dd>N/A</dd>
              </dl>
            </dd>
            <dt>Person and email address to contact for further information:</dt>
            <dd>
              <t>see Authors' Addresses section</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Author:</dt>
            <dd>
              <t>see Authors' Addresses section</t>
            </dd>
            <dt>Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="HTTP-MESSAGE-SIGNATURES">
          <front>
            <title>HTTP Message Signatures</title>
            <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <author fullname="M. Sporny" initials="M." surname="Sporny"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer and where the message may be transformed (e.g., by intermediaries) before reaching the verifier. This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9421"/>
          <seriesInfo name="DOI" value="10.17487/RFC9421"/>
        </reference>
        <reference anchor="HTTP-MESSAGE-SIGNATURES-IANA" target="https://www.iana.org/assignments/http-message-signature/http-message-signature.xhtml">
          <front>
            <title>HTTP Message Signatures</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JWK">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="STRUCTURED-HEADERS">
          <front>
            <title>Structured Field Values for HTTP</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P-H. Kamp" surname="P-H. Kamp"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handle HTTP header and trailer fields, known as "Structured Fields", "Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields that wish to use a common syntax that is more restrictive than traditional HTTP field values.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8941"/>
          <seriesInfo name="DOI" value="10.17487/RFC8941"/>
        </reference>
        <reference anchor="URI">
          <front>
            <title>URI Design and Ownership</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>Section 1.1.1 of RFC 3986 defines URI syntax as "a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme." In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of substructure in URIs is often problematic.</t>
              <t>This document provides guidance on the specification of URI substructure in standards.</t>
              <t>This document obsoletes RFC 7320 and updates RFC 3986.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="190"/>
          <seriesInfo name="RFC" value="8820"/>
          <seriesInfo name="DOI" value="10.17487/RFC8820"/>
        </reference>
        <reference anchor="WellKnownURIs" target="https://www.iana.org/assignments/well-known-uris/well-known-uris.xhtml">
          <front>
            <title>Well-Known URIs</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="BASE64">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
      </references>
    </references>
    <?line 263?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="key-directory-on-examplecom">
        <name>Key Directory on example.com</name>
        <artwork><![CDATA[
GET /.well-known/bar HTTP/1.1
Host: example.com
Accept: application/http-message-signatures-directory

HTTP/1.1 200 OK
Content-Type: application/http-message-signatures-directory
Cache-Control: max-age=86400
{
  "keys": {
    "kty": "OKP",
    "crv": "Ed25519",
    "kid": "NFcWBst6DXG-N35nHdzMrioWntdzNZghQSkjHNMMSjw",
    "x": "JrQLj5P_89iXES9-vFgrIy29clF9CC_oPPsw3c5D0bs",
    "use": "sig",
    "nbf": 1712793600,
    "exp": 1715385600
  }
}
]]></artwork>
      </section>
      <section anchor="request-with-http-signature-agent">
        <name>Request with HTTP Signature-Agent</name>
        <t>This extend the examples from <xref section="B" sectionFormat="of" target="HTTP-MESSAGE-SIGNATURES"/>.</t>
        <artwork><![CDATA[
POST /foo?param=Value&Pet=dog HTTP/1.1
Host: example.com
Signature-Agent: https://directory.test
{"hello": "world"}

HTTP/1.1 200 OK
{"message": "good dog"}
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
