<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-tsa-tst-header-parameter-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="TST Header">COSE Header parameter for RFC 3161 Time-Stamp Tokens</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-tsa-tst-header-parameter-02"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author initials="M." surname="Riechert" fullname="Maik Riechert">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Maik.Riechert@microsoft.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="24"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 51?>

<t>RFC 3161 provides a method for timestamping a message digest to prove that the message was created before a given time.
This document defines a CBOR Signing And Encrypted (COSE) header parameter that can be used to combine COSE message structures used for signing (i.e., COSE_Sign and COSE_Sign1) with existing RFC 3161-based timestamping infrastructure.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-scitt/draft-birkholz-cose-tsa-tst-header-parameter"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>RFC 3161 <xref target="RFC3161"/> provides a method to timestamp a message digest to prove that it was created before a given time.</t>
      <t>This document defines a new COSE <xref target="STD96"/> header parameter that carries the TimestampToken (TST) output of RFC 3161, thus allowing existing and widely deployed trust infrastructure to be used with COSE structures used for signing (COSE_Sign and COSE_Sign1).</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="modes-of-use">
      <name>Modes of use</name>
      <t>There are two different modes of composing COSE protection and timestamping.</t>
      <section anchor="sec-timestamp-then-cose">
        <name>Timestamp then COSE (TTC)</name>
        <t><xref target="fig-timestamp-then-cose"/> shows the case where a datum is first digested and submitted to a TSA to be timestamped.</t>
        <t>A signed COSE message is then built as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The obtained timestamp token is added to the protected headers,</t>
          </li>
          <li>
            <t>The original datum becomes the payload of the signed COSE message.</t>
          </li>
        </ul>
        <figure anchor="fig-timestamp-then-cose">
          <name>Timestamp, then COSE (TTC)</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="576" viewBox="0 0 576 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 48,64 L 48,128" fill="none" stroke="black"/>
                <path d="M 88,32 L 88,64" fill="none" stroke="black"/>
                <path d="M 88,112 L 88,144" fill="none" stroke="black"/>
                <path d="M 136,112 L 136,144" fill="none" stroke="black"/>
                <path d="M 184,112 L 184,144" fill="none" stroke="black"/>
                <path d="M 208,32 L 208,64" fill="none" stroke="black"/>
                <path d="M 232,112 L 232,144" fill="none" stroke="black"/>
                <path d="M 264,72 L 264,128" fill="none" stroke="black"/>
                <path d="M 336,32 L 336,64" fill="none" stroke="black"/>
                <path d="M 384,32 L 384,64" fill="none" stroke="black"/>
                <path d="M 568,32 L 568,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 88,32" fill="none" stroke="black"/>
                <path d="M 208,32 L 336,32" fill="none" stroke="black"/>
                <path d="M 384,32 L 568,32" fill="none" stroke="black"/>
                <path d="M 88,48 L 200,48" fill="none" stroke="black"/>
                <path d="M 336,48 L 376,48" fill="none" stroke="black"/>
                <path d="M 8,64 L 88,64" fill="none" stroke="black"/>
                <path d="M 208,64 L 336,64" fill="none" stroke="black"/>
                <path d="M 384,64 L 568,64" fill="none" stroke="black"/>
                <path d="M 104,96 L 120,96" fill="none" stroke="black"/>
                <path d="M 184,112 L 232,112" fill="none" stroke="black"/>
                <path d="M 48,128 L 80,128" fill="none" stroke="black"/>
                <path d="M 136,128 L 176,128" fill="none" stroke="black"/>
                <path d="M 232,128 L 264,128" fill="none" stroke="black"/>
                <path d="M 184,144 L 232,144" fill="none" stroke="black"/>
                <path d="M 104,160 L 120,160" fill="none" stroke="black"/>
                <path d="M 104,96 C 95.16936,96 88,103.16936 88,112" fill="none" stroke="black"/>
                <path d="M 120,96 C 128.83064,96 136,103.16936 136,112" fill="none" stroke="black"/>
                <path d="M 104,160 C 95.16936,160 88,152.83064 88,144" fill="none" stroke="black"/>
                <path d="M 120,160 C 128.83064,160 136,152.83064 136,144" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="384,48 372,42.4 372,53.6" fill="black" transform="rotate(0,376,48)"/>
                <polygon class="arrowhead" points="272,72 260,66.4 260,77.6" fill="black" transform="rotate(270,264,72)"/>
                <polygon class="arrowhead" points="208,48 196,42.4 196,53.6" fill="black" transform="rotate(0,200,48)"/>
                <polygon class="arrowhead" points="184,128 172,122.4 172,133.6" fill="black" transform="rotate(0,176,128)"/>
                <polygon class="arrowhead" points="88,128 76,122.4 76,133.6" fill="black" transform="rotate(0,80,128)"/>
                <g class="text">
                  <text x="48" y="52">payload</text>
                  <text x="272" y="52">Sig_structure</text>
                  <text x="476" y="52">COSE_Sign/COSE_Sign1</text>
                  <text x="112" y="132">TSA</text>
                  <text x="208" y="132">TST</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
.---------.              .---------------.     .----------------------.
| payload +------------->| Sig_structure +---->| COSE_Sign/COSE_Sign1 |
'----+----'              '---------------'     '----------------------'
     |                          ^
     |     .---.                |
     |    |     |     .-----.   |
     '--->| TSA +---->| TST +---'
          |     |     '-----'
           '---'
]]></artwork>
          </artset>
        </figure>
        <t>The message imprint sent to the TSA (<xref section="2.4" sectionFormat="of" target="RFC3161"/>) <bcp14>MUST</bcp14> be the hash of the payload field of the COSE signed object.</t>
      </section>
      <section anchor="sec-cose-then-timestamp">
        <name>COSE then Timestamp (CTT)</name>
        <t><xref target="fig-cose-then-timestamp"/> shows the case where the signature(s) field of the signed COSE object is digested and submitted to a TSA to be timestamped.
The obtained timestamp token is then added back as an unprotected header into the same COSE object.</t>
        <figure anchor="fig-cose-then-timestamp">
          <name>COSE, then Timestamp (CTT)</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="328" viewBox="0 0 328 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
                <path d="M 48,64 L 48,104" fill="none" stroke="black"/>
                <path d="M 48,144 L 48,192" fill="none" stroke="black"/>
                <path d="M 192,32 L 192,64" fill="none" stroke="black"/>
                <path d="M 192,112 L 192,144" fill="none" stroke="black"/>
                <path d="M 216,176 L 216,208" fill="none" stroke="black"/>
                <path d="M 264,176 L 264,208" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,64" fill="none" stroke="black"/>
                <path d="M 296,72 L 296,192" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 192,32" fill="none" stroke="black"/>
                <path d="M 272,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 200,48 L 272,48" fill="none" stroke="black"/>
                <path d="M 8,64 L 192,64" fill="none" stroke="black"/>
                <path d="M 272,64 L 320,64" fill="none" stroke="black"/>
                <path d="M 8,112 L 192,112" fill="none" stroke="black"/>
                <path d="M 8,144 L 192,144" fill="none" stroke="black"/>
                <path d="M 232,160 L 248,160" fill="none" stroke="black"/>
                <path d="M 48,192 L 208,192" fill="none" stroke="black"/>
                <path d="M 264,192 L 296,192" fill="none" stroke="black"/>
                <path d="M 232,224 L 248,224" fill="none" stroke="black"/>
                <path d="M 232,160 C 223.16936,160 216,167.16936 216,176" fill="none" stroke="black"/>
                <path d="M 248,160 C 256.83064,160 264,167.16936 264,176" fill="none" stroke="black"/>
                <path d="M 232,224 C 223.16936,224 216,216.83064 216,208" fill="none" stroke="black"/>
                <path d="M 248,224 C 256.83064,224 264,216.83064 264,208" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="304,72 292,66.4 292,77.6" fill="black" transform="rotate(270,296,72)"/>
                <polygon class="arrowhead" points="216,192 204,186.4 204,197.6" fill="black" transform="rotate(0,208,192)"/>
                <polygon class="arrowhead" points="208,48 196,42.4 196,53.6" fill="black" transform="rotate(180,200,48)"/>
                <polygon class="arrowhead" points="56,104 44,98.4 44,109.6" fill="black" transform="rotate(90,48,104)"/>
                <g class="text">
                  <text x="100" y="52">COSE_Sign/COSE_Sign1</text>
                  <text x="296" y="52">TST</text>
                  <text x="100" y="132">signatures/signature</text>
                  <text x="240" y="196">TSA</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
.----------------------.         .-----.
| COSE_Sign/COSE_Sign1 |<--------+ TST |
'----+-----------------'         '-----'
     |                              ^
     v                              |
.----------------------.            |
| signatures/signature |            |
'----+-----------------'            |
     |                     .---.    |
     |                    |     |   |
     '------------------->| TSA +---'
                          |     |
                           '---'
]]></artwork>
          </artset>
        </figure>
        <t>In this context, timestamp tokens are similar to a countersignature <xref target="RFC9338"/> made by the TSA.</t>
      </section>
    </section>
    <section anchor="sec-tst-hdr">
      <name>RFC 3161 Time-Stamp Tokens COSE Header Parameters</name>
      <t>The two modes described in <xref target="sec-timestamp-then-cose"/> and <xref target="sec-cose-then-timestamp"/> use different inputs into the timestamping machinery, and consequently create different kinds of binding between COSE and TST.
To clearly separate their semantics two different COSE header parameters are defined as described in the following subsections.</t>
      <section anchor="sec-tst-hdr-ttc">
        <name><tt>3161-ttc</tt></name>
        <t>The <tt>3161-ttc</tt> COSE <em>protected</em> header parameter <bcp14>MUST</bcp14> be used for the mode described in <xref target="sec-timestamp-then-cose"/>.</t>
        <t>The <tt>3161-ttc</tt> protected header is defined as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Name: 3161-ttc</t>
          </li>
          <li>
            <t>Label: TBD</t>
          </li>
          <li>
            <t>Value Type: bstr</t>
          </li>
          <li>
            <t>Value Registry: <xref target="IANA.cose"/></t>
          </li>
          <li>
            <t>Description: RFC 3161 timestamp token</t>
          </li>
          <li>
            <t>Reference: <xref target="sec-tst-hdr-ttc"/> of RFCthis</t>
          </li>
        </ul>
        <t>The content of the byte string are the bytes of the DER-encoded RFC 3161 TimeStampToken structure.</t>
      </section>
      <section anchor="sec-tst-hdr-ctt">
        <name><tt>3161-ctt</tt></name>
        <t>The <tt>3161-ctt</tt> COSE <em>unprotected</em> header parameter <bcp14>MUST</bcp14> be used for the mode described in <xref target="sec-cose-then-timestamp"/>.</t>
        <t>The message imprint sent in the request to the TSA <bcp14>MUST</bcp14> be either:</t>
        <ul spacing="normal">
          <li>
            <t>the hash of the signature field of the COSE_Sign1 message.</t>
          </li>
          <li>
            <t>the hash of the signatures field of the COSE_Sign message.</t>
          </li>
        </ul>
        <t>In either case, to minimize dependencies, the hash algorithm <bcp14>SHOULD</bcp14> be the same as the algorithm used for signing the COSE message.
This may not be possible if the timestamp token has been obtained outside the processing context in which the COSE object is assembled.</t>
        <t>The <tt>3161-ctt</tt> unprotected header is defined as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Name: 3161-ctt</t>
          </li>
          <li>
            <t>Label: TBD</t>
          </li>
          <li>
            <t>Value Type: bstr</t>
          </li>
          <li>
            <t>Value Registry: <xref target="IANA.cose"/></t>
          </li>
          <li>
            <t>Description: RFC 3161 timestamp token</t>
          </li>
          <li>
            <t>Reference: <xref target="sec-tst-hdr-ctt"/> of RFCthis</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="timestamp-processing">
      <name>Timestamp Processing</name>
      <t>RFC 3161 timestamp tokens use CMS as signature envelope format.
<xref target="STD70"/> provides the details about signature verification, and <xref target="RFC3161"/> provides the details specific to timestamp token validation.
The payload of the signed timestamp token is the TSTInfo structure defined in <xref target="RFC3161"/>, which contains the message imprint that was sent to the TSA.
The hash algorithm is contained in the message imprint structure, together with the hash itself.</t>
      <t>As part of the signature verification, the receiver <bcp14>MUST</bcp14> make sure that the message imprint in the embedded timestamp token matches either the payload or the signature fields, depending on the mode of use.</t>
      <t><xref section="B" sectionFormat="of" target="RFC3161"/> provides an example that illustrates how timestamp tokens can be used to verify signatures of a timestamped message when utilizing X.509 certificates.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations made in <xref target="RFC3161"/> as well as those of <xref target="RFC9338"/> apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add the two COSE header parameters described in <xref target="sec-tst-hdr"/> to the "COSE Header Parameters" subregistry of the <xref target="IANA.cose"/> registry.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="STD70">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3161"/>
          <seriesInfo name="DOI" value="10.17487/RFC3161"/>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.cose" target="http://www.iana.org/assignments/cose">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9338">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9338"/>
          <seriesInfo name="DOI" value="10.17487/RFC9338"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
