<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-steele-spice-tlsa-cnf-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title>Credential Confirmation with DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-steele-spice-tlsa-cnf-00"/>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <date year="2024" month="June" day="09"/>
    <area>Security</area>
    <workgroup>Secure Patterns for Internet CrEdentials</workgroup>
    <keyword>Digital Credentials</keyword>
    <keyword>TLS Authentication Record</keyword>
    <keyword>Domain Binding</keyword>
    <keyword>Confirmation Claim</keyword>
    <abstract>
      <?line 67?>

<t>Digital Crededentials on the Internet often JSON Web Token (JWT) and CBOR Web Token (CWT), which depends on third parties to certify the keys used.
This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's digital credentials.
This is accomplished by describing how to discover thumbprints for proof-of-possession keys, as described in RFC 7800 and RFC 8747, using TLSA Records as described in RFC 6698.
This approach can be leveraged to develop revocation and assurance capabilities for digital credentials.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://OR13.github.io/draft-steele-spice-tlsa-cnf/draft-steele-spice-tlsa-cnf.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-steele-spice-tlsa-cnf/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Patterns for Internet CrEdentials Working Group mailing list (<eref target="mailto:spice@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spice/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spice/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/OR13/draft-steele-spice-tlsa-cnf"/>.</t>
    </note>
  </front>
  <middle>
    <?line 74?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>JSON Web Token (JWT) and CBOR Web Token (CWT) based digital credential formats can express claims made by an Issuer (iss) and a Subject (sub).
The confirmation claim (cnf) can be used to bind proof-of-possession keys to the Subject claim (sub), which can be a string or URI.
In cases where the Subject is a URL, the JSON Web Key Thumbprint (jkt) or COSE Key Thumbprint (ckt) can be published to the Domain Name System (DNS).
This document describes how digital credentials can leverage specifications developed to support Internet X.509 Public Key Infrastructure Certificate (PKIX), Transport Layer Security (TLS), DNS-Based Authentication of Named Entities (DANE), in order to enable conceptually similar functionality, based on JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE).</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>JWT is described in <xref target="RFC7519"/>, CWT is described in <xref target="RFC8392"/>.
Confirmation claim <tt>cnf</tt> is described in <xref target="RFC7800"/> and <xref target="RFC8747"/>.
JWT, CWT and CNF related claims such as <tt>iss</tt>, <tt>sub</tt>, and <tt>nonce</tt> are shared by both token formats.
TLSA Resource Record and related terminology are described in <xref target="RFC6698"/>.</t>
      <t>This document does not introduce new terminology.</t>
    </section>
    <section anchor="confirmation-claim">
      <name>Confirmation Claim</name>
      <t>This section provides a summary of the confirmation claim and its possible structures in JOSE and COSE, and does not alter or extend the definition of <tt>cnf</tt> in <xref target="RFC7800"/> or <xref target="RFC8747"/>.</t>
      <t>The confirmation claim is an object or map, supporting one or more confirmation methods.</t>
      <t>The following informative example of a decoded JWT claimset is provided:</t>
      <figure anchor="fig-jose-cnf-example-1">
        <name>Confirmation claim in JOSE</name>
        <sourcecode type="json5"><![CDATA[
{
  "iss": "https://iss.example",
  "sub": "https://vendor.example",
  "exp": 1361398824,
  "cnf": {
    "jwk":{
      "kty": "EC",
      "alg": "ES256",
      "crv": "P-256",
      "x": "18wHLeIgW9wVN6VD1Txgpqy2LszYkMf6J8njVAibvhM",
      "y": "-V4dS4UaLMgP_4fY4j8ir7cl1TXlFdAgcx55o7TkcSA"
    },
    // "jkt": "NzbLs...",
    // "kid": "urn:ietf:params:oauth:jwk-thumbprint:sha-256:NzbLs..."
    // "x5t#S256": "bwcK0esc3ACC3DB2Y5_lESsXE8o..."
    // "jwe": "eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSF..."
  },
  // ...
}
]]></sourcecode>
      </figure>
      <t>A similar example of a CWT claimset, is provided in Extended Diagnostic Notation (EDN), see <xref target="I-D.draft-ietf-cbor-edn-literals"/> for more details.</t>
      <figure anchor="fig-cose-cnf-example-1">
        <name>Confirmation claim in COSE</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
  /iss/ 1 : "coaps://iss.example",
  /sub/ 2 : "coaps://vendor.example",
  /exp/ 4 : 1361398824,
  /cnf/ 8 : {
    /COSE_Key/ 1 : h'deebd8afa...423da25ffff'
    /ckt .../
    /Encrypted_COSE_Key .../
  }
  ...
}
]]></sourcecode>
      </figure>
      <t>In order to be compatible with <xref target="RFC6698"/>, the value of the confirmation claim must be reducible to a hash in a verifiable way.</t>
      <t>For JWK and COSE_Key, the hash is produced according to <xref target="RFC9278"/> and <xref target="I-D.draft-ietf-cose-key-thumbprint"/> respectively.
For JKT and CKT, the hash is already present, but must be converted to hexadecimal before use in TLSA Records.
For JWE and Encrypted_COSE_Key, the key must be decrypted and then the process for JWK and COSE_Key is applied.</t>
      <section anchor="key-binding">
        <name>Key Binding</name>
        <t>The confirmation claim can be used to establish key binding, as described in <xref target="I-D.draft-ietf-oauth-sd-jwt-vc"/>, <xref target="I-D.draft-prorock-spice-cose-sd-cwt"/> and <xref target="I-D.draft-barnes-mls-userinfo-vc"/>.</t>
        <t>Publishing a confirmation key associated with a subject, and using globally unique identifiers to identify subjects has additional impact on privacy and traceability.</t>
        <t>See this document's privacy considerations for additional details.</t>
      </section>
    </section>
    <section anchor="confirmation-claim-record">
      <name>Confirmation Claim Record</name>
      <t>This section describes the structure of the confirmation claim record.</t>
      <t>As described in <xref target="RFC6698"/>, there are several components of a TLSA record, including:</t>
      <ul spacing="normal">
        <li>
          <t>TLSA Certificate Usages</t>
        </li>
        <li>
          <t>TLSA Selectors</t>
        </li>
        <li>
          <t>TLSA Matching Types</t>
        </li>
      </ul>
      <t>Until the associated IANA registries contain an entry specific to this draft, the value reserved for private use (255) <bcp14>MUST</bcp14> be used.</t>
      <t>Similar to the process for deriving a prefxied DNS domain name as described in <xref section="3" sectionFormat="of" target="RFC6698"/>, the structure of the confirmation claim needs to be converted to a prefixed DNS domain name.</t>
      <t>In JOSE, the string claim names are used, but in COSE the integer values are used.</t>
      <t>For example:</t>
      <t>The COSE credential claimset:</t>
      <figure anchor="fig-cose-tlsa-cnf-example-1">
        <name>Example COSE Claimset</name>
        <sourcecode type="cbor-diag"><![CDATA[
{
  /iss/ 1 : "coaps://iss.example",
  /sub/ 2 : "coaps://vendor.example",
  /cnf/ 8 : {
    /COSE_Key/ 1 : h'deebd8afa...423da25ffff'
  }
  ...
}
]]></sourcecode>
      </figure>
      <t>Produces the following prefixed DNS domain name:</t>
      <artwork><![CDATA[
_1_8.vendor.example
]]></artwork>
      <t>The following command can be run to retrieve the confirmation claim record:</t>
      <figure anchor="fig-cose-tlsa-cnf-example-1-query">
        <name>Example cnf query</name>
        <artwork><![CDATA[
dig server.ns.vendor.example. _1_8.vendor.example. TLSA
]]></artwork>
      </figure>
      <t>The following informative example of an answer is provided:</t>
      <figure anchor="fig-cose-tlsa-cnf-example-1-answer">
        <name>Example cnf query answer</name>
        <artwork><![CDATA[
;; ...
;; ANSWER SECTION:
_1_8.vendor.example.    300  IN  TLSA  255 255 255 123533...66AAF8
]]></artwork>
      </figure>
      <t>The JOSE credential claimset:</t>
      <figure anchor="fig-jose-tlsa-cnf-example-1">
        <name>Example JOSE Claimset</name>
        <sourcecode type="json5"><![CDATA[
{
  "iss": "https://iss.example",
  "sub": "https://vendor.example",
  "exp": 1361398824,
  "cnf": {
    "jwk":{
      "kty": "EC",
      "alg": "ES256",
      "crv": "P-256",
      "x": "18wHLeIgW9wVN6VD1Txgpqy2LszYkMf6J8njVAibvhM",
      "y": "-V4dS4UaLMgP_4fY4j8ir7cl1TXlFdAgcx55o7TkcSA"
    },
  },
}
]]></sourcecode>
      </figure>
      <t>Produces the following prefixed DNS domain name:</t>
      <artwork><![CDATA[
_jwk_cnf.vendor.example
]]></artwork>
      <t>The following command can be run to retrieve the confirmation claim record:</t>
      <figure anchor="fig-jose-tlsa-cnf-example-1-query">
        <name>Example cnf query</name>
        <artwork><![CDATA[
dig server.ns.vendor.example. _jwk_cnf.vendor.example. TLSA
]]></artwork>
      </figure>
      <t>The following informative example of an answer is provided:</t>
      <figure anchor="fig-jose-tlsa-cnf-example-1-answer">
        <name>Example cnf query answer</name>
        <artwork><![CDATA[
;; ...
;; ANSWER SECTION:
_jwk_cnf.vendor.example.    300  IN  TLSA  255 255 255 12353...6AAF8
]]></artwork>
      </figure>
      <t>In both of the preceeding examples, the claimset contained a key, but the tlsa cnf record contained a thumbprint.</t>
      <t>In order to match the claimset confirmation method to the hash retrieved from the cnf record, the process described in Section 1 <bcp14>MUST</bcp14> be followed.</t>
      <t>Section 5 of <xref target="ADEM"/> describes a mechanism for embedding a key identifier in certificate logs which enables several useful properties for digital credentials.
In particular, the organization identifiers associated with a digitial emblem can be discovered through distribution of certificate transparency logs.
This approach could be extended to feeds of related credential information, by replacing the key identifier with a merkle root for another transparency system.
Enabling the holder of a digital emblem to disclose several credentials, potentially with distinct trust chains, which can be useful in cross border scenarios.
Future work from the IETF SCITT or KEY TRANS working groups could provide useful building blocks for extending Certificate Transparency based discoverability of digital credentials.</t>
      <t>TODO: Consider merkle root instead of single key thumbprint, confirm multiple keys with a single record.</t>
      <t>TODO: Consider relationship to Key Transparency, Metadata &amp; Capability Discovery, Certificate Transparency.</t>
      <t>TODO: Consider BBS / accumulator alternatives to set membership with merkle proofs.</t>
    </section>
    <section anchor="usage">
      <name>Usage</name>
      <section anchor="before-issuance">
        <name>Before Issuance</name>
        <t>The issuer needs to first authenticate the subject, and establishing that they control a confirmation key.</t>
        <t>There are several established mechanisms which might be relevant to this step, including <xref target="RFC9449"/> and <xref target="I-D.draft-ietf-oauth-attestation-based-client-auth"/>.</t>
        <t>At this stage the issuer <bcp14>SHOULD</bcp14> perform the following additional actions:</t>
        <ul spacing="normal">
          <li>
            <t>Resolve the subject's confirmation claim record as described in Section 2</t>
          </li>
          <li>
            <t>Confirm the record contains a thumbprint which matches confirmation claim as described in Section 1</t>
          </li>
        </ul>
        <t>This step is not always required, because of the timing and availability issues associated with setting the confirmation claim record.</t>
      </section>
      <section anchor="after-verification">
        <name>After Verification</name>
        <t>After verifying the presentation of a digital credential which included a confirmation claim, the verifier has confirmed the issuer's signature matches their public key, and that the subject's confirmation key is in their possession.</t>
        <t>Additional validation checks <bcp14>MUST</bcp14> be performed first, including reviewing the valid from and valid until related claims, and checking the</t>
        <t>At this stage the verifier <bcp14>SHOULD</bcp14> perform the following additional actions:</t>
        <ul spacing="normal">
          <li>
            <t>Convert the verified claim set to the confirmation claim record, and resolve it as described in Section 2.</t>
          </li>
          <li>
            <t>Verify that the confirmation claim record contains a hash that matches the confirmation claim in the credential as described in Section 1.</t>
          </li>
        </ul>
      </section>
      <section anchor="revocation">
        <name>Revocation</name>
        <t>This section builds on the After Verification process described above, and applies it to the concrete use case of Subject initiated credential revocation.</t>
        <t>In the event that a device or service controlling the proof-of-possession key for a credential is stolen or compromised, the subject can revoke the confirmation claim the issuer commited to, by deleteing the associated confirmation record.</t>
        <t>After deleting the record, the subject can contact the issuer and obtain a fresh credential with a new confirmation key, and add a new confirmation record to their domain name.</t>
        <t>Due to the timeing and availability constraints of the DNS, verifiers can still be deceived by presentations of the stolen credential.</t>
        <t>The utility of this subject directed revocation depends on the responsiveness and realtime revocation capabilities of the issuer.</t>
        <t>For example, if an issuer could revoke the credential in 5 minutes, and the DNS takes 30 minutes to update, the issuer should be contacted to revoke the credential first.</t>
        <t>However, if the issuer can only revoke credentials in a 24 hour window, and the DNS takes 30 minutes to propagate the subject's revocation of the credential, the subject should revoke the credential first, and then contact the issuer.</t>
      </section>
      <section anchor="assurance">
        <name>Assurance</name>
        <t>This section builds on the Before Isssunace process described above, and applies it to the concrete use case of providing the issuer with increased assurance that a subject identified with a URL and presenting a given public key, controls the associated domain, and the associated private key.</t>
        <t>In this case, the DNS enables the subject to publish and unpublish the thumbprint of the public key they wish to use for digital credentials on the associated domain.</t>
        <t>This approach could be extended to other protocols, and is inspired by similar approaches to demonstrating control of resources or proving possession for example Automated Certificate Management Environment (acme) and DNS-Based Authentication of Named Entities (DANE).</t>
      </section>
      <section anchor="digital-emblems">
        <name>Digital Emblems</name>
        <t>One use case for confirming credentials via DNS is enabling digital emblems or badges.
<xref target="I-D.draft-haberman-digital-emblem-ps"/> describes the challenge of recognizing if a person, organization, vehicle, or asset is recognized or protected under international laws.
<xref target="ADEM"/> proposes a JSON Web Token based solution to this challenge similar to the approach described in this draft.
Using confirmation methods with digital emblems can help protect them against forgery or theft, by requiring an attacker to gain control of both the digital infrastructure where the emblem is published and any cryptographic key material associated with the confirmation method for the credential.
This specification currently extends the TLSA record for digital credential use cases, however it is possible that more fit for purpose DNS Resource Record (RR) types might be created to support digitial emblems in the future.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>As noted in <xref section="5" sectionFormat="of" target="RFC7800"/>, A proof-of-possession key can be used as a correlation handle if the same key is used with multiple parties.
Thus, for privacy reasons, it is recommended that different proof-of-possession keys be used when interacting with different parties.</t>
      <t>By publishing the confirmation key thumbprint, a domain operator is intentionaly enabling this type of correlation.</t>
      <t>Resolving confirmation key thumbprints at the time of verification reveals timing information related to credential processing.</t>
      <t>TODO: additional privacy considerations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC7519"/>, <xref target="RFC8392"/>, <xref target="RFC7800"/>, <xref target="RFC8747"/>, and <xref target="RFC6698"/> apply.</t>
      <t>After verification of a credential which includes a confirmation claim or a key binding token, it is essential that the verifier confirm the key is still published under the domain associated with the subject.
Prior to the issuance or digital credentials it is essential that the issuer obtain proof that the subject of the credential controls the associated proof of possession key.</t>
      <t>TODO: additional security considerations.</t>
    </section>
    <section anchor="internationalization-considerations">
      <name>Internationalization Considerations</name>
      <t>This specification is not limited to URLs that rely on HTTPS.</t>
      <t>Considerations for international domain names in <xref target="UTS46"/> and <xref target="RFC5895"/> both apply.</t>
      <t>For example: ☕.example becomes xn--53h.example when converting from a subject identifier to a TLSA record.</t>
      <t>TODO: additional i18n considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to RFC Editor: Please remove this section as well as references to <xref target="BCP205"/> before AUTH48.</t>
      <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="BCP205"/>.
The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="BCP205"/>, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see fit".</t>
      <section anchor="transmute-prototype">
        <name>Transmute Prototype</name>
        <t>Organization: Transmute Industries Inc</t>
        <t>Name: https://github.com/transmute-industries/jwt.vc</t>
        <t>Description: An application demonstrating the concepts is available at <eref target="https://jwt.vc">https://jwt.vc</eref></t>
        <t>Maturity: Prototype</t>
        <t>Coverage: The current version ('main') implements a post verification check similar to the one described in this document.</t>
        <t>License: Apache-2.0</t>
        <t>Implementation Experience: No interop testing has been done yet. The code works as proof of concept, but is not yet production ready.</t>
        <t>Contact: Orie Steele (orie@transmute.industries)</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
      <t>Thanks to the authors of the following drafts:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="I-D.draft-vesco-vcauthtls-01"/></t>
        </li>
        <li>
          <t><xref target="I-D.draft-carter-high-assurance-dids-with-dns"/></t>
        </li>
        <li>
          <t><xref target="I-D.draft-latour-dns-and-digital-trust"/></t>
        </li>
        <li>
          <t><xref target="I-D.draft-mayrhofer-did-dns"/></t>
        </li>
        <li>
          <t><xref target="I-D.draft-barnes-mls-userinfo-vc"/></t>
        </li>
        <li>
          <t><xref target="I-D.draft-ietf-oauth-sd-jwt-vc"/></t>
        </li>
        <li>
          <t><xref target="I-D.draft-prorock-spice-cose-sd-cwt"/></t>
        </li>
      </ul>
      <t>--back</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC9278">
          <front>
            <title>JWK Thumbprint URI</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="K. Yasuda" initials="K." surname="Yasuda"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification registers a kind of URI that represents a JSON Web Key (JWK) Thumbprint value. JWK Thumbprints are defined in RFC 7638. This enables JWK Thumbprints to be used, for instance, as key identifiers in contexts requiring URIs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9278"/>
          <seriesInfo name="DOI" value="10.17487/RFC9278"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-key-thumbprint">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
            <author fullname="Kohei Isobe" initials="K." surname="Isobe">
              <organization>SECOM CO., LTD.</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This specification defines a method for computing a hash value over a
   COSE Key. It defines which fields in a COSE Key structure are used in
   the hash computation, the method of creating a canonical form of the
   fields, and how to hash the byte sequence.  The resulting hash value
   can be used for identifying or selecting a key that is the subject of
   the thumbprint.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-key-thumbprint-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <referencegroup anchor="BCP205" target="https://www.rfc-editor.org/info/bcp205">
          <reference anchor="RFC7942" target="https://www.rfc-editor.org/info/rfc7942">
            <front>
              <title>Improving Awareness of Running Code: The Implementation Status Section</title>
              <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
              <author fullname="A. Farrel" initials="A." surname="Farrel"/>
              <date month="July" year="2016"/>
              <abstract>
                <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
                <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="205"/>
            <seriesInfo name="RFC" value="7942"/>
            <seriesInfo name="DOI" value="10.17487/RFC7942"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC5895">
          <front>
            <title>Mapping Characters for Internationalized Domain Names in Applications (IDNA) 2008</title>
            <author fullname="P. Resnick" initials="P." surname="Resnick"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="September" year="2010"/>
            <abstract>
              <t>In the original version of the Internationalized Domain Names in Applications (IDNA) protocol, any Unicode code points taken from user input were mapped into a set of Unicode code points that "made sense", and then encoded and passed to the domain name system (DNS). The IDNA2008 protocol (described in RFCs 5890, 5891, 5892, and 5893) presumes that the input to the protocol comes from a set of "permitted" code points, which it then encodes and passes to the DNS, but does not specify what to do with the result of user input. This document describes the actions that can be taken by an implementation between receiving user input and passing permitted code points to the new IDNA protocol. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5895"/>
          <seriesInfo name="DOI" value="10.17487/RFC5895"/>
        </reference>
        <reference anchor="RFC9449">
          <front>
            <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Waite" initials="D." surname="Waite"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9449"/>
          <seriesInfo name="DOI" value="10.17487/RFC9449"/>
        </reference>
        <reference anchor="I-D.draft-ietf-oauth-attestation-based-client-auth">
          <front>
            <title>OAuth 2.0 Attestation-Based Client Authentication</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>MATTR</organization>
            </author>
            <author fullname="Paul Bastian" initials="P." surname="Bastian">
         </author>
            <date day="31" month="May" year="2024"/>
            <abstract>
              <t>   This specification defines an extension to the OAuth 2 protocol as
   defined in [RFC6749] which enables a Client Instance to include a
   key-bound attestation in interactions with an Authorization Server or
   a Resource Server.  This new method enables Client Instances involved
   in a client deployment that is traditionally viewed as a public
   client, to be able to utilize this key-bound attestation to
   authenticate.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-attestation-based-client-auth-03"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN): Application-Oriented Literals, ABNF, and Media Type</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="18" month="May" year="2024"/>
            <abstract>
              <t>   The Concise Binary Object Representation, CBOR (STD 94, RFC 8949),
   defines a "diagnostic notation" in order to be able to converse about
   CBOR data items without having to resort to binary data.

   This document specifies how to add application-oriented extensions to
   the diagnostic notation.  It then defines two such extensions for
   text representations of epoch-based date/times and of IP addresses
   and prefixes (RFC 9164).

   A few further additions close some gaps in usability.  To facilitate
   tool interoperation, this document specifies a formal ABNF definition
   for extended diagnostic notation (EDN) that accommodates application-
   oriented literals.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-09"/>
        </reference>
        <reference anchor="I-D.draft-vesco-vcauthtls-01">
          <front>
            <title>Transport Layer Security (TLS) Authentication with Verifiable Credential (VC)</title>
            <author fullname="Andrea Vesco" initials="A." surname="Vesco">
              <organization>LINKS Foundation</organization>
            </author>
            <author fullname="Leonardo Perugini" initials="L." surname="Perugini">
              <organization>LINKS Foundation</organization>
            </author>
            <date day="16" month="February" year="2024"/>
            <abstract>
              <t>   This document defines a new certificate type and extension for the
   exchange of Verifiable Credentials in the handshake of the Transport
   Layer Security (TLS) protocol.  The new certificate type is intended
   to add the Verifiable Credentials as a new means of authentication.
   The resulting authentication process leverages a distributed ledger
   as the root of trust of the TLS endpoints' public keys.  The
   endpoints can use different distributed ledger technologies to store
   their public keys and to perform the TLS handshake.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vesco-vcauthtls-01"/>
        </reference>
        <reference anchor="I-D.draft-carter-high-assurance-dids-with-dns">
          <front>
            <title>High Assurance DIDs with DNS</title>
            <author fullname="Jesse Carter" initials="J." surname="Carter">
              <organization>CIRA</organization>
            </author>
            <author fullname="Jacques Latour" initials="J." surname="Latour">
              <organization>CIRA</organization>
            </author>
            <author fullname="Mathieu Glaude" initials="M." surname="Glaude">
              <organization>Northern Block</organization>
            </author>
            <author fullname="Tim Bouma" initials="T." surname="Bouma">
              <organization>Digital Governance Council</organization>
            </author>
            <date day="23" month="May" year="2024"/>
            <abstract>
              <t>   This document outlines a method for improving the authenticity,
   discoverability, and portability of Decentralized Identifiers (DIDs)
   by utilizing the current DNS infrastructure and its technologies.
   This method offers a straightforward procedure for a verifier to
   cryptographically cross-validate a DID using data stored in the DNS,
   separate from the DID document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-carter-high-assurance-dids-with-dns-04"/>
        </reference>
        <reference anchor="I-D.draft-latour-dns-and-digital-trust">
          <front>
            <title>Leveraging DNS in Digital Trust: Credential Exchanges and Trust Registries</title>
            <author fullname="Jesse Carter" initials="J." surname="Carter">
              <organization>CIRA</organization>
            </author>
            <author fullname="Jacques Latour" initials="J." surname="Latour">
              <organization>CIRA</organization>
            </author>
            <author fullname="Mathieu Glaude" initials="M." surname="Glaude">
              <organization>NorthernBlock</organization>
            </author>
            <date day="11" month="April" year="2024"/>
            <abstract>
              <t>   This memo describes an architecture for trust registry membership
   association and verification using Decentralized Identifiers (DIDs),
   trust registries, and the DNS.  This architecture provides a verifier
   with a simple process by which to determine and verify an issuer's
   membership in a trust registry.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-latour-dns-and-digital-trust-02"/>
        </reference>
        <reference anchor="I-D.draft-mayrhofer-did-dns">
          <front>
            <title>The Decentralized Identifier (DID) in the DNS</title>
            <author fullname="Alexander Mayrhofer" initials="A." surname="Mayrhofer">
              <organization>nic.at GmbH</organization>
            </author>
            <author fullname="Dimitrij Klesev" initials="D." surname="Klesev">
         </author>
            <author fullname="Markus Sabadello" initials="M." surname="Sabadello">
              <organization>Danube Tech GmbH</organization>
            </author>
            <date day="9" month="June" year="2021"/>
            <abstract>
              <t>   This document specifies the use of the URI Resource Record Type to
   publish Decentralized Identifiers (DIDs) in the DNS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mayrhofer-did-dns-05"/>
        </reference>
        <reference anchor="I-D.draft-barnes-mls-userinfo-vc">
          <front>
            <title>UserInfo Verifiable Credentials as MLS Credentials</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Suhas Nandakumar" initials="S." surname="Nandakumar">
              <organization>Cisco</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   This specification extends Message Layer Security (MLS) credentials
   framework with a new credential type, "UserInfoVC", based on the
   OpenID Connect UserInfo Verifiable Credential type
   "UserInfoCredential".  A UserInfo Verifiable Credential encapsulates
   the UserInfo claims from the OpenID provider as a Verifiable
   Credential that can be presented to a third-party Verifier.  These
   credentials can be easily provisioned to MLS clients using the OpenID
   Connect login flows, augmented with type "UserInfoCredential".  The
   credential itself is an object associating identity attributes to the
   signature public key that the client will use in MLS, signed by the
   OpenID Provider.  In situations where the OpenID Provider is distinct
   from the MLS Delivery Service, these credentials provide end-to-end
   secure identity assurance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-barnes-mls-userinfo-vc-00"/>
        </reference>
        <reference anchor="I-D.draft-ietf-oauth-sd-jwt-vc">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-03"/>
        </reference>
        <reference anchor="I-D.draft-prorock-spice-cose-sd-cwt">
          <front>
            <title>Selective Disclosure CWTs (SD-CWT)</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <date day="21" month="March" year="2024"/>
            <abstract>
              <t>   This document describes how to perform selective disclosure of claims
   withing a CBOR Web Token (CWT) [RFC8392] as well as how to create and
   verify those tokens.

   This document does not define any new cryptography.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-prorock-spice-cose-sd-cwt-00"/>
        </reference>
        <reference anchor="UTS46" target="https://www.unicode.org/reports/tr46/">
          <front>
            <title>UTS46</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.draft-haberman-digital-emblem-ps">
          <front>
            <title>Problem Statement for Digitized Emblems</title>
            <author fullname="Brian Haberman" initials="B." surname="Haberman">
              <organization>Johns Hopkins University Applied Physics Lab</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Bill Woodcock" initials="B." surname="Woodcock">
              <organization>PCH</organization>
            </author>
            <date day="21" month="May" year="2024"/>
            <abstract>
              <t>   International law defines a number of emblems, such as the blue
   helmets of United Nations peacekeeping forces, the blue and white
   shield of UNESCO, and the Red Cross of the International Committee of
   the Red Cross, as indicative of special protections under the Geneva
   Conventions.  Similar protections attach to journalists who wear
   "Press" protective emblems on the battlefield, under Article 79 of
   Protocol I of the Geneva Conventions and Resolution 2222 of the
   United Nations Security Council.  The emblems of national governments
   and inter-governmental organizations protect diplomatic pouches,
   couriers, and envoys under the Vienna Convention on Diplomatic
   Relations.  Other marks enjoy protections against mis-use under the
   Paris Convention, the Madrid Protocol, and the Trade-Related Aspects
   of Intellectual Property Rights.

   Such physical emblems have a number of weaknesses and do not
   translate to the digital realm.  This document provides a summary of
   the problems and documents identified requirements from a number of
   stakeholders for a digital emblem which addresses the shortcomings of
   the physical emblems and makes possible the indication of protections
   of digital assets under international law.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-haberman-digital-emblem-ps-02"/>
        </reference>
        <reference anchor="ADEM" target="https://adem-wg.github.io/adem-spec/draft-adem-wg-adem-core.html">
          <front>
            <title>An Authenticated Digital EMblem - Core Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
