<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-tschofenig-jose-key-identifier-security-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Security Aspects of Key Identifiers on COSE/JOSE">Security Aspects of Key Identifiers on COSE/JOSE</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="L." surname="Hazlewood" fullname="Les Hazlewood">
      <organization></organization>
      <address>
        <email>lhazlewood@gmail.com</email>
      </address>
    </author>
    <author initials="Y." surname="Sheffer" fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>

    <date year="2024" month="July" day="23"/>

    <area>Security</area>
    <workgroup>JOSE</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 53?>

<t>This document provides guidance for improving the security of JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) implementations. It emphasizes the importance of handling key identification within the header to simplify security processing and reduce risks. Recommendations are given to ensure better interoperability and security for protocol designers and implementers</t>



    </abstract>



  </front>

  <middle>


<?line 57?>

<section anchor="introduction"><name>Introduction</name>

<t>JSON Object Signing and Encryption (JOSE) was originally designed to provide a security wrapper for access tokens used in the OAuth protocol, focusing particularly on digital signatures. However, its utility as a standard for describing security-related metadata was quickly recognized. Today, JOSE is widely adopted and its functionality spans across various specifications (such as <xref target="RFC7515"/> for JSON Web Signature and <xref target="RFC7516"/> for JSON Web Encryption). <xref target="RFC8725"/> was published to describe JSON Web Token (JWT) best current practices to react to problems with the use of JOSE in context of JWTs.</t>

<t>With the development of CBOR <xref target="RFC8949"/>, a binary encoding format was introduced to address use cases where JSON was too verbose. A security wrapper utilizing CBOR-based encoding was required, leading to the standardization of CBOR Object Signing and Encryption (COSE), further refined by <xref target="RFC9052"/> and <xref target="RFC9053"/>.</t>

<t>The JOSE and COSE specifications have intentionally been kept in sync because modern protocols and payloads are frequently described in the Concise Data Definition Language (CDDL) and serialized to either JOSE or COSE formats. This convergence makes them attractive to developers working across web and embedded systems. Due to their similar designs, the guidance provided in this document is applicable to both JOSE and COSE.</t>

<t>However, certain practices pose security challenges. This document addresses security challenges and provides guidance for improving JOSE/COSE extensions, emphasizing key identification. Key identification should be handled within the header to maintain a clear separation from the payload, simplifying security processing and reducing risks.</t>

<t>The document is structured as follows: <xref target="kid"/> outlines challenges related to key identification. <xref target="guidance"/> provides recommendations.</t>

</section>
<section anchor="terminology-and-requirements-language"><name>Terminology and Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>

</section>
<section anchor="kid"><name>Key Identification</name>

<t>The security wrappers in JOSE and COSE employ a straightforward design, especially for basic functionalities like digital signatures and MACs aimed at a single recipient.</t>

<t>The security wrapper comprises the following components:</t>

<t><list style="symbols">
  <t>A header, divided into protected and unprotected parameters.</t>
  <t>The payload, which may be detached and transmitted independently. This payload requires protection and often consists of a JSON-based format (for JOSE) or a CBOR-encoded format (for COSE). Standardized payloads include JSON Web Tokens (JWT) <xref target="RFC7519"/> and CBOR Web Tokens (CWT) <xref target="RFC8392"/>.</t>
  <t>A digital signature, a tag (for MAC), or ciphertext (for encryption).</t>
</list></t>

<t>The header's purpose is to provide instructions for protecting the payload, including:</t>

<t><list style="symbols">
  <t>Algorithm information used to protect the payload,</t>
  <t>Key identification for verifying the digital signature, MAC, or encryption,</t>
  <t>X.509 certificates and certificate chains,</t>
  <t>Countersignature.</t>
</list></t>

<t>While the layering is straightforward with the header providing instructions for payload protection, certain specifications and applications have begun embedding key identification information within the payload itself, disrupting this clear separation.</t>

<t>Using the 'kid' parameter is the recommended approach for key identification, although <xref target="RFC7515"/> does not mandate that key identification values be globally unique (and hence "collision resistant"). If a JOSE- or COSE-protected message is intended for external or third-party recipients:</t>

<t><list style="symbols">
  <t>The 'kid' parameter MUST contain a globally unique value, or</t>
  <t>Other header parameters, when combined with 'kid', must result in a globally unique value.</t>
</list></t>

<t>For JOSE/COSE-protected messages used within domain-specific contexts like enterprises or specific workloads, uniqueness requirements are relaxed.</t>

<t>The practice of placing key identification information into the payload instead of the JOSE/COSE header forces a parser to postpone security processing until later. The parser must inspect the payload to find the appropriate keying material and subsequently verify it. Since the parser does not know in advance which fields contain key identification, it must expose all information to the application before signature verification or MAC processing. This introduces significant risk, as application developers may make security decisions before completing security processing.</t>

<t>This design is unnecessary because existing header parameters can store this information. If these headers are insufficient, new header parameters can always be defined to convey necessary information. This approach also simplifies libraries, as they do not need to understand payload content to retrieve correct information.</t>

<t>When key identification claims are placed in the payload, they SHOULD also be duplicated in the header, as specified in <xref target="I-D.ietf-cose-cwt-claims-in-headers"/> (for COSE) and <xref section="5.3" sectionFormat="of" target="RFC7519"/> (for JOSE). This approach should only be used as a last resort if the previous methods cannot be implemented.</t>

<t>Finally, transitioning seamlessly from a system using digital signatures over payloads to encrypted payloads is challenging when necessary key lookup information is embedded within the encrypted payload. A redesign is therefore necessary.</t>

</section>
<section anchor="guidance"><name>Guidance</name>

<t>We RECOMMEND that protocol designers and implementers utilize the
available header parameter for key identification. If the standardized
parameters are insufficient, new header parameters can be defined.
Re-using existing header parameters will improve interoperability
because there are a limited number of cases on how to select a key.</t>

<t>Information required to determine the keying material for cryptographically verifying the protected payload MUST be placed in the header of the JOSE/COSE security wrapper.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document does not make requests to IANA.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This specification makes security recommendations for the
JOSE/COSE specification suite. Therefore, it is entirely
about security.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC7515">
  <front>
    <title>JSON Web Signature (JWS)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7515"/>
  <seriesInfo name="DOI" value="10.17487/RFC7515"/>
</reference>

<reference anchor="RFC7516">
  <front>
    <title>JSON Web Encryption (JWE)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7516"/>
  <seriesInfo name="DOI" value="10.17487/RFC7516"/>
</reference>

<reference anchor="RFC8725">
  <front>
    <title>JSON Web Token Best Current Practices</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="D. Hardt" initials="D." surname="Hardt"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="February" year="2020"/>
    <abstract>
      <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="225"/>
  <seriesInfo name="RFC" value="8725"/>
  <seriesInfo name="DOI" value="10.17487/RFC8725"/>
</reference>

<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>

<reference anchor="RFC8949">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
      <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="94"/>
  <seriesInfo name="RFC" value="8949"/>
  <seriesInfo name="DOI" value="10.17487/RFC8949"/>
</reference>

<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>

<reference anchor="RFC7519">
  <front>
    <title>JSON Web Token (JWT)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7519"/>
  <seriesInfo name="DOI" value="10.17487/RFC7519"/>
</reference>

<reference anchor="RFC8392">
  <front>
    <title>CBOR Web Token (CWT)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
    <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8392"/>
  <seriesInfo name="DOI" value="10.17487/RFC8392"/>
</reference>


<reference anchor="I-D.ietf-cose-cwt-claims-in-headers">
   <front>
      <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
      <author fullname="Tobias Looker" initials="T." surname="Looker">
         <organization>Mattr</organization>
      </author>
      <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
         <organization>Self-Issued Consulting</organization>
      </author>
      <date day="29" month="November" year="2023"/>
      <abstract>
	 <t>   This document describes how to include CBOR Web Token (CWT) claims in
   the header parameters of any COSE structure.  This functionality
   helps to facilitate applications that wish to make use of CBOR Web
   Token (CWT) claims in encrypted COSE structures and/or COSE
   structures featuring detached signatures, while having some of those
   claims be available before decryption and/or without inspecting the
   detached payload.  Another use case is using CWT claims with payloads
   that are not CWT Claims Sets, including payloads that are not CBOR at
   all.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cwt-claims-in-headers-10"/>
   
</reference>




    </references>



<?line 133?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>We would like to thank Casten Bormann for his review comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

