Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Substantial rewrite, introducing the terms endorser and endorsee, and clarifying the workflow for each role #6

Merged
merged 6 commits into from
May 5, 2024

Conversation

scouten-adobe
Copy link
Contributor

No description provided.

@scouten-adobe
Copy link
Contributor Author

Will close #1

Will close #4

@@ -85,11 +208,11 @@ Endorsements are COSE objects (see link:++https://c2pa.org/specifications/specif

|X.509 SubjectPublicKeyInfo
|1
|A https://datatracker.ietf.org/doc/html/rfc5280#section-4.1[DER-encoded ASN.1 SubjectPublicKeyInfo] structure (as a CBOR `bstr`), from the _endorsee’s_ X.509 certificate that will be used for signing the claims of assets that this endorsement is expected to be used with.
|The value of the credential shall be compared (bitwise identical) to the SubjectPublicKeyInfo structure of the certificate located in the `x5chain` or `33` (integer) COSE header of the active manifest Claim Signature. (See link:++https://c2pa.org/specifications/specifications/2.0/specs/C2PA_Specification.html#x509_certificates++[Section 14.6, “X.509 Certificates,” of the C2PA 2.0 Technical Specification].)
|A https://datatracker.ietf.org/doc/html/rfc5280#section-4.1[DER-encoded ASN.1 SubjectPublicKeyInfo] structure (as a CBOR `bstr`), from the _endorsee’s_ X.509 certificate that will be used for signing the claims of _<<_c2pa_asset,C2PA assets>>_ that this _<<_endorsement,endorsement>>_ is expected to be used with.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

To bring this in line with @paulengland's suggested changes to the identity assertion, I think this should be a hash of the endorsee's certificate. This would also prevent a situation where an endorsee re-uses a public/private key pair to get a new certificate issued.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@scouten-adobe be sure to update validation to match this change.

docs/modules/ROOT/pages/index.adoc Show resolved Hide resolved
@scouten-adobe
Copy link
Contributor Author

OK to merge with changes as described above.

@scouten-adobe scouten-adobe merged commit c9fc9e2 into main May 5, 2024
1 check passed
@scouten-adobe scouten-adobe deleted the clarify-endorser-and-endorsee branch May 5, 2024 14:53
@github-actions github-actions bot locked and limited conversation to collaborators May 5, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants