Skip to content

Commit

Permalink
Update draft-birkholz-scitt-scrapi.md
Browse files Browse the repository at this point in the history
Co-authored-by: robinbryce <[email protected]>
  • Loading branch information
OR13 and robinbryce authored Dec 11, 2023
1 parent a0cfa89 commit 08b30b1
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion draft-birkholz-scitt-scrapi.md
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ When applying registration policies to signed statements with confirmation, the
3. verify the key binding token, using the confirmation claim in the verified issuer signed statement
4. ensure the key binding token has a nonce that is a string representation of a recent unix timestamp.

The exact window of validity for proving possession is a configuration detail of the transparency service.
The exact window of validity for proving possession is a configuration detail of the transparency service. unix timestamps are used so that only a losely synchronised notion of time need be assumed and there is no requirement to account for timezones

If the confirmation key is stolen, the attacker can produce key binding tokens from that point forward in time.
In an interactive confirmation schema, the transparency service can force the confirmation key holder to produce a signature over a nonce that is not guessable, and this prevents certain attacks related to the duration of access to a signing capability and other timing details. However, the cost of coordinating with the transparency service, coupled with the purpose of registering with a transparency service (to obtain a receipt, proving a signed statement was acceptable at a point in time) justify specifying the recent timestamp nonce as a manadatory to implement context binding.
Expand Down

0 comments on commit 08b30b1

Please sign in to comment.