-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Location of signature algorithm #149
Comments
Ok so the problem is that you need issuerSignatureAlgorithm before parsing. That makes sense. Aligning with RFC5280 the signature algorithm would be in these two locations:
Goal: One pass processing for verification and X509 -> C509 processing |
We propose the following, from Old:
To
Since this would achieve the desired one-pass functionality. The sign.alg is also covered by the signature. |
I would like to have the issuerSignatureAlgorithm direct after c509CertificateType to save the unnecessary parsing of certificateSerialNumber. |
We have a slight preference for keeping the structure aligned with existing x.509 structures, so we suggest taking this issue to the wider ietf audience. |
Implementing the change proposed in #149
Comments from the WG in this thread: https://mailarchive.ietf.org/arch/msg/cose/r5znNRvkOgeBdAsKFimzsZBmXSM/ |
PR #153 implements all the agreements from the COSE WG session in Brisbane. Should be ready to merge as soon as a new signature has been calculated for the native cert example. |
Closing as the PR has been approved |
In the current draft (-07), the signature algorithm is at the end of
TBSCertificate
. This does not allow the so-called one-pass signature verification. To verify the signature, one has to first parse the wholeTBSCertificate
to get the signature algorithm, and then come back to the begin ofTBSCertificate
.A better structure is to put the signature algorithm after the
c509CertificateType
, namely theTBSCertificate
shall be changed fromto
For Certificate, Certificate Request ad OCSP, due to the small size, this overhead may be still acceptable. But for the following CRL structure, the overhead is inacceptable, since the
revokedCertificates
may be very large.Note that in the X.509 Certificate, the signature algorithm is at the beginning of TBSCertificate.
The text was updated successfully, but these errors were encountered: