Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

SCITT Reference APIs
draft-ietf-scitt-scrapi-07

DocumentTypeActive Internet-Draft (scitt WG)
AuthorsHenk Birkholz,Jon Geater
Last updated 2026-02-18(Latest revision 2026-02-04)
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status Proposed Standard
Formats
Reviews
Additional resources GitHub Repository
Mailing list discussion
Stream WG state Submitted to IESG for Publication
Document shepherdAmaury Chamayou
IESG IESG state Publication Requested
Action Holder
Consensus boilerplate Yes
Telechat date (None)
Responsible ADDeb Cooley
Send notices toamchamay@microsoft.com
Email authors Email WG IPR References Referenced by Nits Search email archive
draft-ietf-scitt-scrapi-07
SCITT                                                        H. BirkholzInternet-Draft                                            Fraunhofer SITIntended status: Standards Track                               J. GeaterExpires: 8 August 2026                                   DataTrails Inc.                                                         4 February 2026                          SCITT Reference APIs                       draft-ietf-scitt-scrapi-07Abstract   This document describes a REST API that supports the normative   requirements of the SCITT Architecture.  Optional key discovery and   query interfaces are provided to support interoperability with X.509   Certificates, alternative methods commonly used to support public key   discovery and Artifact Repositories.About This Document   This note is to be removed before publishing as an RFC.   Status information for this document may be found at   https://datatracker.ietf.org/doc/draft-ietf-scitt-scrapi/.   Discussion of this document takes place on the SCITT Working Group   mailing list (mailto:scitt@ietf.org), which is archived at   https://mailarchive.ietf.org/arch/browse/scitt/.  Subscribe at   https://www.ietf.org/mailman/listinfo/scitt/.   Source for this draft and an issue tracker can be found at   https://github.com/ietf-wg-scitt/draft-ietf-scitt-scrapi.Status of This Memo   This Internet-Draft is submitted in full conformance with the   provisions of BCP 78 and BCP 79.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF).  Note that other groups may also distribute   working documents as Internet-Drafts.  The list of current Internet-   Drafts is at https://datatracker.ietf.org/drafts/current/.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."Birkholz & Geater         Expires 8 August 2026                 [Page 1]Internet-Draft                   SCRAPI                    February 2026   This Internet-Draft will expire on 8 August 2026.Copyright Notice   Copyright (c) 2026 IETF Trust and the persons identified as the   document authors.  All rights reserved.   This document is subject to BCP 78 and the IETF Trust's Legal   Provisions Relating to IETF Documents (https://trustee.ietf.org/   license-info) in effect on the date of publication of this document.   Please review these documents carefully, as they describe your rights   and restrictions with respect to this document.  Code Components   extracted from this document must include Revised BSD License text as   described in Section 4.e of the Trust Legal Provisions and are   provided without warranty as described in the Revised BSD License.Table of Contents   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3     1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3   2.  Authentication  . . . . . . . . . . . . . . . . . . . . . . .   4   3.  Endpoints . . . . . . . . . . . . . . . . . . . . . . . . . .   4     3.1.  Core Endpoints  . . . . . . . . . . . . . . . . . . . . .   5       3.1.1.  Transparency Service Keys . . . . . . . . . . . . . .   5       3.1.2.  Individual Transparency Service Key . . . . . . . . .   6       3.1.3.  Register Signed Statement . . . . . . . . . . . . . .   7       3.1.4.  Query Registration Status . . . . . . . . . . . . . .  11       3.1.5.  Resolve Receipt . . . . . . . . . . . . . . . . . . .  15     3.2.  Optional Endpoints  . . . . . . . . . . . . . . . . . . .  17       3.2.1.  Exchange Receipt  . . . . . . . . . . . . . . . . . .  17       3.2.2.  Resolve Signed Statement  . . . . . . . . . . . . . .  19       3.2.3.  Resolve Transparent Statement . . . . . . . . . . . .  20   4.  Privacy Considerations  . . . . . . . . . . . . . . . . . . .  21   5.  Security Considerations . . . . . . . . . . . . . . . . . . .  21     5.1.  General Scope . . . . . . . . . . . . . . . . . . . . . .  22     5.2.  Applicable Environment  . . . . . . . . . . . . . . . . .  22     5.3.  User-host Authentication  . . . . . . . . . . . . . . . .  22     5.4.  Primary Threats . . . . . . . . . . . . . . . . . . . . .  22       5.4.1.  In Scope  . . . . . . . . . . . . . . . . . . . . . .  22       5.4.2.  Out of Scope  . . . . . . . . . . . . . . . . . . . .  24   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  24     6.1.  Well-Known URI for Key Discovery  . . . . . . . . . . . .  24   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  24     7.1.  Normative References  . . . . . . . . . . . . . . . . . .  24     7.2.  Informative References  . . . . . . . . . . . . . . . . .  26   Contributors  . . . . . . . . . . . . . . . . . . . . . . . . . .  26   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  26Birkholz & Geater         Expires 8 August 2026                 [Page 2]Internet-Draft                   SCRAPI                    February 20261.  Introduction   The SCITT Architecture [I-D.draft-ietf-scitt-architecture] defines   the core objects, identifiers and workflows necessary to interact   with a SCITT Transparency Service:   *  Signed Statements   *  Receipts   *  Transparent Statements   *  Registration Policies   SCRAPI defines HTTP endpoints implementing the core operations that   constitute a Transparency Service using COSE ([RFC9052]):   *  Registration of Signed Statements   *  Issuance and resolution of Receipts   *  Discovery of Transparency Service Keys   In addition to these core endpoints, this specification defines   optional supporting endpoints:   *  Retrieving Signed Statements   *  Retrieving Transparent Statements   *  Exchanging Receipts for refreshed Receipts1.1.  Terminology   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and   "OPTIONAL" in this document are to be interpreted as described in   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all   capitals, as shown here.   This specification uses the terms "Signed Statement", "Receipt",   "Transparent Statement", "Artifact Repositories", "Transparency   Service" and "Registration Policy" as defined in   [I-D.draft-ietf-scitt-architecture].   This specification uses "payload" as defined in [RFC9052].Birkholz & Geater         Expires 8 August 2026                 [Page 3]Internet-Draft                   SCRAPI                    February 20262.  Authentication   Authentication is out of scope for this document.  Implementations   MAY authenticate clients, for example for the purposes of   authorization or preventing denial of service attacks.  If   Authentication is not implemented, rate limiting or other denial of   service mitigation MUST be implemented.3.  Endpoints   All messages are sent as HTTP GET or POST requests.   If the Transparency Service cannot process a client's request, it   MUST return either:   1.  an HTTP 3xx code, indicating to the client additional action they       must take to complete the request, such as follow a redirection,       or   2.  an HTTP 4xx or 5xx status code, and the body MUST be a Concise       Problem Details object (application/concise-problem-details+cbor)       [RFC9290] containing:   *  title: A human-readable string identifying the error that      prevented the Transparency Service from processing the request,      ideally short and suitable for inclusion in log messages.   *  detail: A human-readable string describing the error in more      depth, ideally with sufficient detail enabling the error to be      rectified.   SCRAPI is not a CoAP API, but Constrained Problem Details objects   [RFC9290] provide a useful encoding for problem details and avoid the   need to mix CBOR and JSON in endpoint or client implementations.   NOTE: Examples use '\' line wrapping per [RFC8792]   Examples of errors may include:   {     / title /         -1: \               "Bad Signature Algorithm",     / detail /        -2: \               "Signing algorithm 'WalnutDSA' not supported"   }Birkholz & Geater         Expires 8 August 2026                 [Page 4]Internet-Draft                   SCRAPI                    February 2026   Most error types are specific to the type of request and are defined   in the respective subsections below.  The one exception is the   "malformed" error type, which indicates that the Transparency Service   could not parse the client's request because it did not comply with   this document:   {     / title /         -1: \               "Malformed request",     / detail /        -2: \               "The request could not be parsed"   }   Clients SHOULD treat 500 and 503 HTTP status code responses as   transient failures and MAY retry the same request without   modification at a later date.   Note that in the case of any error response, the Transparency Service   MAY include a Retry-After header field per [RFC9110] in order to   request a minimum time for the client to wait before retrying the   request.  In the absence of this header field, this document does not   specify a minimum.3.1.  Core Endpoints   The following HTTP endpoints MUST be implemented to enable   conformance to this specification.3.1.1.  Transparency Service Keys   This endpoint is used to discover the public keys that can be used by   relying parties to verify Receipts issued by the Transparency   Service.   The Transparency Service responds with a COSE Key Set, as defined in   Section 7 of [RFC9052].   Request:   GET /.well-known/scitt-keys HTTP/1.1   Host: transparency.example   Accept: application/cbor   Response:Birkholz & Geater         Expires 8 August 2026                 [Page 5]Internet-Draft                   SCRAPI                    February 2026   HTTP/1.1 200 OK   Content-Type: application/cbor   Body (in CBOR diagnostic notation)   [     {       -1:1,       -2:h'65eda5a12577c2bae829437fe338701a10aaa375e1bb5b5de108de439c08551d',       -3:h'1e52ed75701163f7f9e40ddf9f341b3dc9ba860af7e0ca7ca7e9eecd0084d19c',       1:2,       2:'kid1'     },     {       -1:1,       -2:h'bac5b11cad8f99f9c72b05cf4b9e26d244dc189f745228255a219a86d6a09eff',       -3:h'20138bf82dc1b6d562be0fa54ab7804a3a64b6d72ccfed6b6fb6ed28bbfc117e',       1:2,       2:'kid2'     }   ]   The Transparency Service MAY stop returning at that endpoint the keys   it no longer uses to issue Receipts, following a reasonable delay.3.1.2.  Individual Transparency Service Key   This endpoint is used to resolve a single public key, from a kid   value contained in a Receipt previously issued by the Transparency   Service.   Request: ~~~ http-message GET /.well-known/scitt-keys/{kid_value}   HTTP/1.1 Host: transparency.example Accept: application/cbor ~~~   HTTP/1.1 200 OK   Content-Type: application/cbor   Body (in CBOR diagnostic notation)   [     {       -1:1,       -2:h'bac5b11cad8f99f9c72b05cf4b9e26d244dc189f745228255a219a86d6a09eff',       -3:h'20138bf82dc1b6d562be0fa54ab7804a3a64b6d72ccfed6b6fb6ed28bbfc117e',       1:2,       2:'kid_value'     }   ]Birkholz & Geater         Expires 8 August 2026                 [Page 6]Internet-Draft                   SCRAPI                    February 2026   The following expected error is defined.  Implementations MAY return   other errors, so long as they are valid [RFC9290] objects.   HTTP/1.1 404 Not Found   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: "No such key",     / detail /        -2: "No key could be found for this kid value"   }   If the kid values used by the service ({kid_value} in the request   above) are not URL-safe, the endpoint MUST accept the base64url   encoding of the kid value, without padding, in the URL instead.   Section 2 of [RFC7515] specifies Base64Url encoding as follows:   [RFC7515] specifies Base64url encoding as follows:   "Base64 encoding using the URL- and filename-safe character set   defined in Section 5 of RFC 4648 [RFC4648], with all trailing '='   characters omitted and without the inclusion of any line breaks,   whitespace, or other additional characters.  Note that the base64url   encoding of the empty octet sequence is the empty string.  (See   Appendix C of [RFC7515] for notes on implementing base64url encoding   without padding.)"   It is RECOMMENDED to use COSE Key Thumbprint, as defined in [RFC9679]   as the mechanism to assign a kid to Transparency Service keys.3.1.3.  Register Signed Statement   This endpoint instructs a Transparency Service to register a Signed   Statement on its log.  Since log implementations may take many   seconds or longer to reach finality, this API provides an   asynchronous mode that returns a locator that can be used to check   the registration's status asynchronously.   The following is a non-normative example of an HTTP request to   register a Signed Statement:   Request:Birkholz & Geater         Expires 8 August 2026                 [Page 7]Internet-Draft                   SCRAPI                    February 2026   POST /entries HTTP/1.1   Host: transparency.example   Accept: application/cbor   Accept: application/cose   Content-Type: application/cose   Body (in CBOR diagnostic notation)   18([                            / COSE Sign1                                           /     <<{       / signature alg         / 1:  -35, # ES384       / key identifier        / 4:   h'75726e3a...32636573',       / cose sign1 type       / 16:  "application/example+cose",       / payload-hash-alg      / 258: -16, # sha-256       / preimage-content-type / 259: "application/spdx+json",       / payload-location      / 260: "https://.../manifest.json",       / CWT Claims            / 15: {         / Issuer  / 1: "vendor.example",         / Subject / 2: "vendor.product.example",       }     }>>,                          / Protected Header                                     /     {},                           / Unprotected Header                                   /     h'935b5a91...e18a588a',       / Payload, sha-256 digest of file stored at Location   /     h'269cd68f4211dffc...0dcb29c' / Signature                                            /   ])   A Transparency Service depends on both the client's authentication   context (if present) and the verification of the Signed Statement in   the Registration Policy.   The Registration Policy for the Transparency Service MUST be applied   before any additional processing.  The details of Registration   Policies are out of scope for this document.   Response:   One of the following:3.1.3.1.  Status 201 - Registration is successful   If the Transparency Service is able to produce a Receipt within a   reasonable time, it MAY return it directly.   Along with the receipt the Transparency Service MAY return a locator   in the HTTP response Location header, provided the locator is a valid   URL.Birkholz & Geater         Expires 8 August 2026                 [Page 8]Internet-Draft                   SCRAPI                    February 2026   HTTP/1.1 201 Created   Location: https://transparency.example/entries/67ed...befe   Content-Type: application/cose   Body (in CBOR diagnostic notation)   / cose-sign1 / 18([     / protected   / <<{       / key / 4 : "mxA4KiOkQFZ-dkLebSo3mLOEPR7rN8XtxkJe45xuyJk",       / algorithm / 1 : -7,  # ES256       / vds       / 395 : 1, # RFC9162 SHA-256       / claims / 15 : {         / issuer  / 1 : "https://blue.notary.example",         / subject / 2 : "https://green.software.example/cli@v1.2.3",       },     }>>,     / unprotected / {       / proofs / 396 : {         / inclusion / -1 : [           <<[             / size / 9, / leaf / 8,             / inclusion path /             h'7558a95f...e02e35d6'           ]>>         ],       },     },     / payload     / null,     / signature   / h'02d227ed...ccd3774f'   ])   The response contains the Receipt for the Signed Statement.  Fresh   Receipts may be requested through the resource identified in the   Location header.3.1.3.2.  Status 303 - Registration is running   In cases where the registration request is accepted but the   Transparency Service is not able to produce a Receipt in a reasonable   time, it MAY return a locator for the registration operation, as in   this non-normative example:   HTTP/1.1 303 See Other   Location: https://transparency.example/entries/67ed...befe   Content-Type: application/cose   Content-Length: 0   Retry-After: <seconds>Birkholz & Geater         Expires 8 August 2026                 [Page 9]Internet-Draft                   SCRAPI                    February 2026   The location MAY be temporary, and the service may not serve a   relevant response at this Location after a reasonable delay.   The Transparency Service MAY include a Retry-After header in the HTTP   response to help with polling.3.1.3.3.  Status 400 - Invalid Client Request   The following expected errors are defined.  Implementations MAY   return other errors, so long as they are valid [RFC9290] objects.   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Bad Signature Algorithm",     / detail /        -2: \             "Signed Statement contained a non supported algorithm"   }   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: "\             Confirmation Missing",     / detail /        -2: \             "Signed Statement did not contain proof of possession"   }   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Payload Missing",     / detail /        -2: \             "Signed Statement payload must be present"   }Birkholz & Geater         Expires 8 August 2026                [Page 10]Internet-Draft                   SCRAPI                    February 2026   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Rejected",     / detail /        -2: \             "Signed Statement not accepted by the current\             Registration Policy"   }   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: "Invalid locator",     / detail /        -2: "Operation locator is not in a valid form"   }3.1.4.  Query Registration Status   This endpoint lets a client query a Transparency Service for the   registration status of a Signed Statement they have submitted   earlier, and for which they have received a 303 or 302 - Registration   is running response.   Request:   GET /entries/67ed...befe HTTP/1.1   Host: transparency.example   Accept: application/cbor   Accept: application/cose   Content-Type: application/cose   Response:   One of the following:3.1.4.1.  Status 302 - Registration is running   Registration requests MAY fail, in which case the Location MAY return   an error when queried.   If the client requests (GET) the location when the registration is   still in progress, the TS MAY return a 302 Found, as in this non-   normative example:Birkholz & Geater         Expires 8 August 2026                [Page 11]Internet-Draft                   SCRAPI                    February 2026   HTTP/1.1 302 Found   Location: https://transparency.example/entries/67ed...befe   Content-Type: application/cose   Content-Length: 0   Retry-After: <seconds>   The location MAY be temporary, and the service may not serve a   relevant response at this Location after a reasonable delay.   The Transparency Service MAY include a Retry-After header in the HTTP   response to help with polling.3.1.4.2.  Status 200 - Asynchronous registration is successful   Along with the receipt the Transparency Service MAY return a locator   in the HTTP response Location header, provided the locator is a valid   URL.   HTTP/1.1 200 OK   Location: https://transparency.example/entries/67ed...befe   Content-Type: application/cose   Body (in CBOR diagnostic notation)   / cose-sign1 / 18([     / protected   / <<{       / key / 4 : "mxA4KiOkQFZ-dkLebSo3mLOEPR7rN8XtxkJe45xuyJk",       / algorithm / 1 : -7,  # ES256       / vds       / 395 : 1, # RFC9162 SHA-256       / claims / 15 : {         / issuer  / 1 : "https://blue.notary.example",         / subject / 2 : "https://green.software.example/cli@v1.2.3",       },     }>>,     / unprotected / {       / proofs / 396 : {         / inclusion / -1 : [           <<[             / size / 9, / leaf / 8,             / inclusion path /             h'7558a95f...e02e35d6'           ]>>         ],       },     },     / payload     / null,     / signature   / h'02d227ed...ccd3774f'   ])Birkholz & Geater         Expires 8 August 2026                [Page 12]Internet-Draft                   SCRAPI                    February 2026   The response contains the Receipt for the Signed Statement.  Fresh   Receipts may be requested through the resource identified in the   Location header.   As an example, a successful asynchronous follows the following   sequence:   Initial exchange:   Client --- POST /entries (Signed Statement) --> TS   Client <-- 303 Location: .../entries/tmp123 --- TS   May happen zero or more times:   Client --- GET .../entries/tmp123           --> TS   Client <-- 302 Location: .../entries/tmp123 --- TS   Finally:   Client --- GET .../entries/tmp123           --> TS   Client <-- 200 (Receipt)                    --- TS              Location: .../entries/final1233.1.4.3.  Status 400 - Invalid Client Request   The following expected errors are defined.  Implementations MAY   return other errors, so long as they are valid [RFC9290] objects.   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Bad Signature Algorithm",     / detail /        -2: \             "Signed Statement contained a non supported algorithm"   }   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: "\             Confirmation Missing",     / detail /        -2: \             "Signed Statement did not contain proof of possession"   }Birkholz & Geater         Expires 8 August 2026                [Page 13]Internet-Draft                   SCRAPI                    February 2026   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Payload Missing",     / detail /        -2: \             "Signed Statement payload must be present"   }   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Rejected",     / detail /        -2: \             "Signed Statement not accepted by the current\             Registration Policy"   }   HTTP/1.1 400 Bad Request   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: "Invalid locator",     / detail /        -2: "Operation locator is not in a valid form"   }3.1.4.4.  Status 404 - Operation Not Found   If no record of the specified running operation is found, the   Transparency Service returns a 404 response.   HTTP/1.1 404 Not Found   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Operation Not Found",     / detail /        -2: \             "No running operation was found matching the requested ID"   }Birkholz & Geater         Expires 8 August 2026                [Page 14]Internet-Draft                   SCRAPI                    February 20263.1.4.5.  Status 429 - Too Many Requests   If a client is polling for an in-progress registration too frequently   then the Transparency Service MAY, in addition to implementing rate   limiting, return a 429 response:   HTTP/1.1 429 Too Many Requests   Content-Type: application/concise-problem-details+cbor   Retry-After: <seconds>   {     / title /         -1: \             "Too Many Requests",     / detail /        -2: \             "Only <number> requests per <period> are allowed."   }3.1.5.  Resolve Receipt   Authentication SHOULD be implemented for this endpoint.   Request:   GET entries/67ed41f1de6a...cfc158694ed0befe HTTP/1.1   Host: transparency.example   Accept: application/cose   Response:3.1.5.1.  Status 200 - OK   If the Receipt is found:Birkholz & Geater         Expires 8 August 2026                [Page 15]Internet-Draft                   SCRAPI                    February 2026   HTTP/1.1 200 OK   Location: https://transparency.example/entries/67ed...befe   Content-Type: application/cose   Body (in CBOR diagnostic notation)   / cose-sign1 / 18([     / protected   / <<{       / key / 4 : "mxA4KiOkQFZ-dkLebSo3mLOEPR7rN8XtxkJe45xuyJk",       / algorithm / 1 : -7,  # ES256       / vds       / 395 : 1, # RFC9162 SHA-256       / claims / 15 : {         / issuer  / 1 : "https://blue.notary.example",         / subject / 2 : "https://green.software.example/cli@v1.2.3",       },     }>>,     / unprotected / {       / proofs / 396 : {         / inclusion / -1 : [           <<[             / size / 9, / leaf / 8,             / inclusion path /             h'7558a95f...e02e35d6'           ]>>         ],       },     },     / payload     / null,     / signature   / h'02d227ed...ccd3774f'   ])3.1.5.2.  Status 404 - Not Found   If there is no Receipt found for the specified EntryID the   Transparency Service returns a 404 response:   HTTP/1.1 404 Not Found   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Not Found",     / detail /        -2: \             "Receipt with entry ID <id> not known \             to this Transparency Service"   }Birkholz & Geater         Expires 8 August 2026                [Page 16]Internet-Draft                   SCRAPI                    February 20263.2.  Optional Endpoints   These additional, optional endpoints can be implemented for client   convenience, but are not required for conformance to this   specification.3.2.1.  Exchange Receipt   This endpoint is used to exchange old or expiring Receipts for fresh   ones.   The iat, exp and kid claims can change each time a Receipt is   exchanged.   This means that fresh Receipts can have more recent issued at times,   further in the future expiration times, and be signed with new   signature algorithms.   Authentication SHOULD be implemented for this endpoint.   Request:Birkholz & Geater         Expires 8 August 2026                [Page 17]Internet-Draft                   SCRAPI                    February 2026   POST receipt-exchange HTTP/1.1   Host: transparency.example   Accept: application/cose   Content-Type: application/cose   Body (in CBOR diagnostic notation)   / cose-sign1 / 18([     / protected   / <<{       / key / 4 : "mxA4KiOkQFZ-dkLebSo3mLOEPR7rN8XtxkJe45xuyJk",       / algorithm / 1 : -7,  # ES256       / vds       / 395 : 1, # RFC9162 SHA-256       / claims / 15 : {         / issuer  / 1 : "https://blue.example",         / subject / 2 : "https://green.example/cli@v1.2.3",         / iat / 6: 1443944944 # Pre-refresh       },     }>>,     / unprotected / {       / proofs / 396 : {         / inclusion / -1 : [           <<[             / size / 9, / leaf / 8,             / inclusion path /             h'7558a95f...e02e35d6'           ]>>         ],       },     },     / payload     / null,     / signature   / h'02d227ed...ccd3774f'   ])   Response:3.2.1.1.  Status 200 - OK   If a new Receipt can be issued for the given submitted Receipt:Birkholz & Geater         Expires 8 August 2026                [Page 18]Internet-Draft                   SCRAPI                    February 2026   HTTP/1.1 200 OK   Content-Type: application/cose   Location: https://transparency.example/entries/67ed...befe   Body (in CBOR diagnostic notation)   / cose-sign1 / 18([     / protected   / <<{       / key / 4 : "0vx7agoebGc...9nndrQmbX",       / algorithm / 1 : -35,  # ES384       / vds       / 395 : 1,  # RFC9162 SHA-256       / claims / 15 : {         / issuer  / 1 : "https://blue.example",         / subject / 2 : "https://green.example/cli@v1.2.3",         / iat / 6: 2443944944, # Post-refresh       },     }>>,     / unprotected / {       / proofs / 396 : {         / inclusion / -1 : [           <<[             / size / 9, / leaf / 8,             / inclusion path /             h'7558a95f...e02e35d6'           ]>>         ],       },     },     / payload     / null,     / signature   / h'123227ed...ccd37123'   ])   A TS may limit how often a new receipt can be issued, and respond   with a 503 if a client requests new receipts too frequently.   The following HTTP endpoints are optional to implement.3.2.2.  Resolve Signed Statement   This endpoint enables Transparency Service APIs to act like Artifact   Repositories, and serve Signed Statements directly, instead of   indirectly through Receipts.   Request:   GET /signed-statements/9e4f...688a HTTP/1.1   Host: transparency.example   Accept: application/coseBirkholz & Geater         Expires 8 August 2026                [Page 19]Internet-Draft                   SCRAPI                    February 2026   Response:   One of the following:3.2.2.1.  Status 200 - Success   HTTP/1.1 200 OK   Content-Type: application/cose   Body (in CBOR diagnostic notation)   18([                            / COSE Sign1         /     h'a1013822',                  / Protected Header   /     {},                           / Unprotected Header /     h'b158a1...0149a9',           / Payload            /     h'269cd68f4211dffc...0dcb29c' / Signature          /   ])3.2.2.2.  Status 404 - Not Found   The following expected errors are defined.  Implementations MAY   return other errors, so long as they are valid [RFC9290] objects.   HTTP/1.1 404 Not Found   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Not Found",     / detail /        -2: \             "No Signed Statement found with the specified ID"   }3.2.3.  Resolve Transparent Statement   This endpoint enables Transparency Service APIs to serve Transparent   Statements directly, including the Receipt they have issued for it.   Request:   GET /transparent-statements/9e4f...688a HTTP/1.1   Host: transparency.example   Accept: application/cose   Response:   One of the following:Birkholz & Geater         Expires 8 August 2026                [Page 20]Internet-Draft                   SCRAPI                    February 20263.2.3.1.  Status 200 - Success   HTTP/1.1 200 OK   Content-Type: application/cose   Body (in CBOR diagnostic notation)   18([                            / COSE Sign1         /     h'a1013822',                  / Protected Header   /     {                             / Unprotected Header /       394:   [                    / Receipts           /         h'd284586c...4191f9d2'    / Receipt            /       ]     },     h'b158a1...0149a9',           / Payload            /     h'269cd68f4211dffc...0dcb29c' / Signature          /   ])3.2.3.2.  Status 404 - Not Found   The following expected errors are defined.  Implementations MAY   return other errors, so long as they are valid [RFC9290] objects.   HTTP/1.1 404 Not Found   Content-Type: application/concise-problem-details+cbor   {     / title /         -1: \             "Not Found",     / detail /        -2: \             "No Transparent Statement found with the specified ID"   }3.2.3.3.  Eventual Consistency   For all responses additional eventually consistent operation details   MAY be present.  Support for eventually consistent Receipts is   implementation specific, and out of scope for this specification.4.  Privacy Considerations   The privacy considerations section of   [I-D.draft-ietf-scitt-architecture] applies to this document.5.  Security ConsiderationsBirkholz & Geater         Expires 8 August 2026                [Page 21]Internet-Draft                   SCRAPI                    February 20265.1.  General Scope   This document describes the interoperable API for client calls to,   and implementations of, a Transparency Service as specified in   [I-D.draft-ietf-scitt-architecture].  As such the security   considerations in this section are concerned only with security   considerations that are relevant at that implementation layer.  All   questions of security of the related COSE formats, algorithm choices,   cryptographic envelopes, verifiable data structures and the like are   handled elsewhere and out of scope for this document.5.2.  Applicable Environment   SCITT is concerned with issues of cross-boundary supply-chain-wide   data integrity and as such must assume a very wide range of   deployment environments.  Thus, no assumptions can be made about the   security of the computing environment in which any client   implementation of this specification runs.5.3.  User-host Authentication   [I-D.draft-ietf-scitt-architecture] defines 2 distinct roles that   require authentication: Issuers who sign Statements, and Clients that   submit API calls on behalf of Issuers.  While Issuer authentication   and signing of Statements is very important for the trustworthiness   of systems implementing the SCITT building blocks, it is out of scope   of this document.  This document is only concerned with   authentication of API clients.   For those endpoints that require client authentication, Transparency   Services MUST support at least one of the following options:   *  HTTP Authorization header with a JWT   *  domain-bound API key   *  TLS client authentication   Where authentication methods rely on long term secrets, both clients   and Transparency Services implementing this specification SHOULD   allow for the revocation and rolling of authentication secrets.5.4.  Primary Threats5.4.1.  In Scope   The most serious threats to implementations on Transparency Services   are ones that would cause the failure of their main promises, to wit:Birkholz & Geater         Expires 8 August 2026                [Page 22]Internet-Draft                   SCRAPI                    February 2026   *  Threats to strong identification, for example representing the      Statements from one issuer as those of another   *  Threats to payload integrity, for example changing the contents of      a Signed Statement before making it transparent   *  Threats to non-equivocation, for example attacks that would enable      the presentation or verification of divergent proofs for the same      Statement payload5.4.1.1.  Denial of Service Attacks   While denial of service attacks are very hard to defend against   completely, and Transparency Services are unlikely to be in the   critical path of any safety-liable operation, any attack which could   cause the _silent_ failure of Signed Statement registration, for   example, should be considered in scope.   In principle DoS attacks are easily mitigated by the client checking   that the Transparency Service has registered any submitted Signed   Statement and returned a Receipt.  Since verification of Receipts   does not require the involvement of the Transparency Service DoS   attacks are not a major issue.   Clients to Transparency Services SHOULD ensure that Receipts are   available for their registered Statements, either on a periodic or   needs-must basis, depending on the use case.   Beyond this, implementers of Transparency Services SHOULD implement   general good practice around network attacks, flooding, rate limiting   etc.5.4.1.2.  Eavesdropping   Since the purpose of this API is to ultimately put the message   payloads on a Transparency Log there is limited risk to   eavesdropping.  Nonetheless transparency may mean 'within a limited   community' rather than 'in full public', so implementers MUST add   protections against man-in-the-middle and network eavesdropping, such   as TLS.5.4.1.3.  Message Modification Attacks   Modification attacks are mitigated by the use of the Issuer signature   on the Signed Statement.Birkholz & Geater         Expires 8 August 2026                [Page 23]Internet-Draft                   SCRAPI                    February 20265.4.1.4.  Message Insertion Attacks   Insertion attacks are mitigated by the use of the Issuer signature on   the Signed Statement, therefore care must be taken in the protection   of Issuer keys and credentials to avoid theft and impersonation.   Transparency Services MAY also implement additional protections such   as anomaly detection or rate limiting in order to mitigate the impact   of any breach.5.4.2.  Out of Scope5.4.2.1.  Replay Attacks   Replay attacks are not particularly concerning for SCITT or SCRAPI:   Once a statement is made, it is intended to be immutable and non-   repudiable, so making it twice should not lead to any particular   issues.  There could be issues at the payload level (for instance,   the statement "it is raining" may true when first submitted but not   when replayed), but being payload-agnostic implementations of SCITT   services cannot be required to worry about that.   If the semantic content of the payload are time-dependent and   susceptible to replay attacks in this way then timestamps MAY be   added to the protected header signed by the Issuer.5.4.2.2.  Message Deletion Attacks   Once registered with a Transparency Service, Registered Signed   Statements cannot be deleted.  Thus, any message deletion attack must   occur prior to registration else it is indistinguishable from a man-   in-the-middle or denial-of-service attack on this interface.6.  IANA Considerations6.1.  Well-Known URI for Key Discovery   The following value is requested to be registered in the "Well-Known   URIs" registry (using the template from [RFC8615]):   URI suffix: scitt-keys Change controller: IETF Specification   document(s): RFCthis Status: Permanent Related information:   [I-D.draft-ietf-scitt-architecture]7.  References7.1.  Normative ReferencesBirkholz & Geater         Expires 8 August 2026                [Page 24]Internet-Draft                   SCRAPI                    February 2026   [I-D.draft-ietf-scitt-architecture]              Birkholz, H., Delignat-Lavaud, A., Fournet, C., Deshpande,              Y., and S. Lasker, "An Architecture for Trustworthy and              Transparent Digital Supply Chains", Work in Progress,              Internet-Draft, draft-ietf-scitt-architecture-22, 10              October 2025, <https://datatracker.ietf.org/doc/html/              draft-ietf-scitt-architecture-22>.   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate              Requirement Levels", BCP 14, RFC 2119,              DOI 10.17487/RFC2119, March 1997,              <https://doi.org/10.17487/RFC2119>.   [RFC4648]  Josefsson, S., "The Base16, Base32, and Base64 Data              Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006,              <https://doi.org/10.17487/RFC4648>.   [RFC7515]  Jones, M., Bradley, J., and N. Sakimura, "JSON Web              Signature (JWS)", RFC 7515, DOI 10.17487/RFC7515, May              2015, <https://doi.org/10.17487/RFC7515>.   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,              May 2017, <https://doi.org/10.17487/RFC8174>.   [RFC8615]  Nottingham, M., "Well-Known Uniform Resource Identifiers              (URIs)", RFC 8615, DOI 10.17487/RFC8615, May 2019,              <https://doi.org/10.17487/RFC8615>.   [RFC9052]  Schaad, J., "CBOR Object Signing and Encryption (COSE):              Structures and Process", STD 96, RFC 9052,              DOI 10.17487/RFC9052, August 2022,              <https://doi.org/10.17487/RFC9052>.   [RFC9110]  Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,              Ed., "HTTP Semantics", STD 97, RFC 9110,              DOI 10.17487/RFC9110, June 2022,              <https://doi.org/10.17487/RFC9110>.   [RFC9290]  Fossati, T. and C. Bormann, "Concise Problem Details for              Constrained Application Protocol (CoAP) APIs", RFC 9290,              DOI 10.17487/RFC9290, October 2022,              <https://doi.org/10.17487/RFC9290>.   [RFC9679]  Isobe, K., Tschofenig, H., and O. Steele, "CBOR Object              Signing and Encryption (COSE) Key Thumbprint", RFC 9679,              DOI 10.17487/RFC9679, December 2024,              <https://doi.org/10.17487/RFC9679>.Birkholz & Geater         Expires 8 August 2026                [Page 25]Internet-Draft                   SCRAPI                    February 20267.2.  Informative References   [I-D.draft-ietf-oauth-sd-jwt-vc]              Terbu, O., Fett, D., and B. Campbell, "SD-JWT-based              Verifiable Credentials (SD-JWT VC)", Work in Progress,              Internet-Draft, draft-ietf-oauth-sd-jwt-vc-13, 6 November              2025, <https://datatracker.ietf.org/doc/html/draft-ietf-              oauth-sd-jwt-vc-13>.   [RFC2046]  Freed, N. and N. Borenstein, "Multipurpose Internet Mail              Extensions (MIME) Part Two: Media Types", RFC 2046,              DOI 10.17487/RFC2046, November 1996,              <https://doi.org/10.17487/RFC2046>.   [RFC6838]  Freed, N., Klensin, J., and T. Hansen, "Media Type              Specifications and Registration Procedures", BCP 13,              RFC 6838, DOI 10.17487/RFC6838, January 2013,              <https://doi.org/10.17487/RFC6838>.   [RFC8792]  Watsen, K., Auerswald, E., Farrel, A., and Q. Wu,              "Handling Long Lines in Content of Internet-Drafts and              RFCs", RFC 8792, DOI 10.17487/RFC8792, June 2020,              <https://doi.org/10.17487/RFC8792>.Contributors   Orie Steele   Transmute   United States   Email: orie@transmute.industries   Orie contributed examples, text, and URN structure to early version   of this draft.   Amaury Chamayou   Microsoft   United Kingdom   Email: amaury.chamayou@microsoft.com   Amaury contributed crucial content to ensure interoperability between   implementations, improve example expressiveness and consistency, as   well as overall document quality.Authors' AddressesBirkholz & Geater         Expires 8 August 2026                [Page 26]Internet-Draft                   SCRAPI                    February 2026   Henk Birkholz   Fraunhofer SIT   Rheinstrasse 75   64295 Darmstadt   Germany   Email: henk.birkholz@ietf.contact   Jon Geater   DataTrails Inc.   United States   Email: jon.geater@datatrails.aiBirkholz & Geater         Expires 8 August 2026                [Page 27]

[8]ページ先頭

©2009-2026 Movatter.jp